You are on page 1of 109

ANNEXURE - II

a) List of Research Publications only in SCI Journals coming from the Department
during the last five years
2021
1. Sandeep Kumar Satapathy, Shruti Mishra, Pradeep Kumar Mallick, Gyoo-Soo Chae.
(2021). ADASYN and ABC-optimized RBF convergence network for classification of
electroencephalograph signal. Personal and Ubiquitous Computing, Springer, 9(2), 453-
466.
2. Venugopal, D., Jayasankar, T., Krishnaraj, N., Venkatraman, S., Prakash, N. B.,
Hemalakshmi, G. R. (2021). Multifactorial Disease Detection Using Regressive Multi-
Array Deep Neural Classifier. Intelligent Automation & Soft Computing, 28(1), 106-117.
3. Aarthi Dhandapani, Viswanathan, V. (2021). Question answering system over semantic
web. IEEE ACCESS, 9(5), 46900-46910.
4. Divya, Karthick, P. A, Ramakrishnan, S. (2021). Muscle fatigue analysis in isometric
contractions using geometric features. Biomedical Signal Processing and Control, 27(9),
205-215.
5. Arathi Reghukumar, Jani Anbarasi, L., Prassanna, J., Manikandan, R., Fadi Al-Turjman.
(2021). Vision Based Segmentation and Classification of Cracks Using Deep Neural
Network. International Journal of Uncertainty, Fuzziness and Knowledge-Based
Systems, 29(1), 141-155.
6. Vimal Shanmuganathan, Kaliappan Madasamy, Harold Robinson Yesudhas, Mucheol
Kim. (2021). Trend analysis using agglomerative hierarchical clustering approach for
time series big data. Journal of Super Computing, Springer, 4(9), 1093-1099.
7. Nirmala Venkatachalam, Leninisha Shanmugam, Genitha, C., Heltin, Govindarajan, G.,
Sasipriya, P. (2021). Enhanced Segmentation of Inflamed ROI to Improve the Accuracy
of Identifying Benign and Malignant Cases in Breast Thermogram. Journal of Oncology,
2021(1), 240-256.
8. Hemalatha, J., Abijah Roseline, Geetha, S., Seifedine Kadry, Robertas Damaševi. (2021).
An efficient densenet based deep learning model for malware detection. MDPI - Entropy,
23(3), 2093-2106.
9. Maheswari, M., Geetha, S., Kumar, S. S., Karuppiah, M., Samanta, D., Park, Y. (2021).
Pevrm: probabilistic evolution based version recommendation model for mobile app.
IEEE Access, 9(1), 20819-20827.
10. Geetha, R., Geetha, S. (2021). A multi-layered “plus-minus one” reversible data
embedding scheme. Springer – Multimedia Tools and Applications, 80(9), 14123-14136.
11. Geetha, S., Akshayanat, C. S., Abhishek, C. S. (2021). Machine vision based fire
detection techniques : a survey. Springer -- Fire Technology, 57(1), 591-623.
12. Monica, K. M., Parvathi, R. (2021). Hybrid FOW - A Novel whale optimized firefly
feature selector for gait analysis. Personal and Ubiquitous Computing, 45(2), 782-794.
13. Vergin Raja Sarobin, M. L., Jani Anbarasi, J., Prassanna, R., Manikandan Fadi Turjman.
(2021). Swarm intelligence-based optimal device deployment in heterogeneous Internet
of things. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 34(8), 893-
899.
14. Dhinakaran, K., Nedunchelian, R., Balasundaram, A. (2021). Crowdsourcing: descriptive
study on algorithms and frameworks for prediction. Archives of Computational Methods
in Engineering, 23(6), 283-298.
15. Dhanashri, Nagaraj, S. V., Reshmi, T. R. (2021). Multi-hop Energy-Efficient Reliable
Cluster-based Sectoring Scheme Using Markov Chain Model to Improve QoS Parameters
in a WSN. Wireless Personal Communications, 2(18), 209-221.
16. Adarsh, T., Kalpally, Vijayakumar, K. P. (2021). Privacy and security framework for
health care systems in IoT. Journal of Ambient Intelligence and Humanized Computing,
12(2), 893-904.
17. Chandrakala, S., Venkatraman, M., Shreyas, N., Jayalakshmi, S. L. (2021). Multi-view
representation for sound event recognition. Signal, Image and Video Processing, 34(4),
3562-3578.
18. Shanmuganathan Vimal, Yesudas Harold-Robinson, Manju Khari, Elena Verdu, Rubén
González Crespo. (2021). Energy efficiency maximization algorithm for underwater
mobile sensor networks. Earth Science Informatics springer, 14(14), 215-225.
19. Prabu Subramani, Fadi Al-Turjman, Rajagopal Kumar, Anusha Kannan, Anand
Loganthan. (2021). Improving medical communication process using recurrent networks
and wearable antenna s11 variation with harmonic suppressions. Personal and
Ubiquitous Computing, 4(10), 209-221.
20. Saravanakumar, R., Krishnaraj, N., Venkatraman, S., Sivakumar, B., Prasanna, S.,
Shankar, K. (2021). Hierarchical symbolic analysis and particle swarm optimization
based fault diagnosis model for rotating machineries with deep neural networks.
Measurement, 171(2), 232-245.
21. Prakash, B., Viswanathan, V. (2021). ARP-GWO: An efficient approach for prioritization
of risks in agile software development. Soft Computing, 7(23), 190-206.
22. Thulasimani Thangamani, Prabha, R., Prasad, M., Usha Kumari, Raghavender, K. V.,
Shafiqul Abidin. (2021). IoT defense machine learning: emerging solutions and future
problems. Microprocessors and Microsystems, 80(1), 767-778.
23. Priyadarsini, K., Mishra, N., Prasad, M. (2021). Detection of malware on the internet of
things and its applications depends on long short-term memory network. Detection of
malware on the internet of things and its applications depends on long short-term
memory network, 11(12), 736-749.
24. Vasundhara Ghate, Sweetlin Hemalatha, C. (2021). Hybrid deep learning approaches for
smartphone sensor-based human activity recognition. Multimedia Tools and Applications,
2(8), 938-949.
25. Selvi, M., Kumar, S. V. N.S., Ganapathy, S., Ayyanar, A., Nehemiah, H. K., Kannan, A.
(2021). An energy efficient clustered gravitational and fuzzy based routing algorithm.
Wireless Personal Communications, 116(1), 61-90.
26. Karthik, R. V., Ganapathy, S. (2021). A fuzzy recommendation system for predicting the
customers interests using sentiment analysis. Applied Soft Computing, 108(4), 267-279.
27. Pradeep, S., Muthurajkumar, S., Ganapathy, S., Kannan, A. (2021). A matrix translation
and elliptic curve based cryptosystem for secured data communication. Wireless Personal
Communications, 65(19), 736-749.
28. Rajeswari, A. R., Ganapathy, Kulothungan, K., Kannan, A. (2021). An efficient trust
based secure energy aware clustering to mitigate trust distortion attack. Concurrency and
Computation: Practice and Experience, 4(13), 423-438.
29. Suthanthiramani, P., Sannasy, M., Sannasi, G., Arputhara, K. (2021). Secured data
storage and retrieval using elliptic curve cryptography in cloud. International Arab
Journal of Information Technology, 18(1), 56-66.
30. Rajeswari, A. R., Kulothungan, K., Sannasi Ganapathy, Arputharaj Kannan. (2021).
Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT. Journal of
Intelligent & Fuzzy Systems, 40(5), 9197-9211
31. Balasubramanian Prabhu Kavin, Sannasi Ganapathy. (2021). A new digital signature
algorithm for ensuring the data integrity in cloud. INTERNATIONAL ARAB JOURNAL
OF INFORMATION TECHNOLOGY, 18(2), 180-190.
32. Richa and Punam Bedi. (2021). Trust and distrust based cross-domain recommender
system. Applied Artificial Intelligence, 35(4), 326-351.
33. Richa and Punam Bedi. (2021). Trust and fuzzy inference based cross domain
serendipitous item recommendations. Journal of Intelligent & Fuzzy Systems, 41(1), 190-
199.
34. Pattabiraman Ventakasubbu, Parvathi Ramasubramanian. (2021). Deep learning-based
brain tumour segmentation. IETE Journal of Research, 67(2), 903-920.
35. Pradeep, K., Javid Ali, L., Gobalakrishnan, N., Raman, C. J., Manikandan, N. (2021).
CWOA: Hybrid approach for task scheduling in cloud environment. The Computer
Journal, 5(13), 106-117.
36. Sarobin, V. R. M., Anbarasi, L. J., Prassanna, J., Manikandan, R., Al-Turjman, F. (2021).
Swarm intelligence-based optimal device deployment in heterogeneous IoT.
International Journal of Communication Systems, 34(8), 240-256.
37. Azath, Maheswari, R., PandiMurgan, Sangeetha. (2021). An enhanced framework for
ensemble effort estimation by using recursive based cloud. IET Software, 15(1), 230-238.
38. Jothi, R., Sraban Kumar Mohanty, Aparajita Ojha. (2021). Gene expression clustering
using local neighborhood-based similarity measures. Computers & Electrical
Engineering, 91(1), 893-904.
39. Prasanalakshmi, B., Murugan, K., Karthik Srinivasan, Shridevi, S., Shermin
Shamsudheen, Yu-Chen Hu. (2021). Improved authentication and computation of
medical data transmission in the security. Springer - Journal of Supercomputing, 75(4),
267-279.
40. Geeta Atkar, Priyadarshini, J. (2021). Speech synthesis using generative adversarial
network for improving readability. Neural Computing and Applications, 9(12), 283-298.
41. Sukanya. G., Priyadarshini, J. (2021). A meta analysis of attention models on legal
judgment prediction system. International Journal of Advanced Computer Science and
Applications, 12(2), 531-538.
42. Sathiyabhama, B., Udhaya Kumar, S., Jayanthi, J., Sathiya, T., Ilavarasi, A. K.,
Yuvarajan, V., Konga Gopikrishna. (2021). A novel feature selection framework based
on grey wolf optimizer for mammogram. Springer-NeuralComputingAndApplications,
33(5), 893-899.
43. Rajakumar Arul, Roobaea Alroobaea, Seifeddine Mechti, Saeed Rubaiee, Murad
Andejany, Usman Tariq, Saman Iftikhar. (2021). Intelligent data analytics in energy
optimization for the internet of underwater. Soft Computing Springer, 23(12), 209-221.
44. Varsha, R, Meghna Manoj Nair, Siddharth, M. Nair, Amit Kumar Tyagi. (2021). Deep
learning based blockchain solution for preserving privacy in future vehicle. IJHIS iOS
Press, 16(4), 223-236.
45. Rahul Neware, Praveena, A., Parkavi, K., Baba Pai, K. Lokanayaki Karnan, Sivakumar
Ponnusamy. (2021). Sensor network security in low power hardware development
through NTPC. International Journal of Aquatic Science, 12(2), 2040-2045.
46. Pavithra Latha Kumaresan, Subbulakshmi Pasupathi, Sindhia Lingaswamy, Sreesharmila
Thangaswamy, Vimal Shunmuganathan, Danilo Pelusi. (2021). Fruit-Fly optimization
based feature integration in image retrieval. Mathematical Biosciences and Engineering,
8(5), 6178–6197.

2020
47. Geetha, R., Geetha, S. (2020). Embedding electronic patient information in clinical
images: an improved and efficient reversible data hiding technique. Springer –
Multimedia Tools and Applications, 1(1), 234-245.
48. Dipalee, A., Chaudhari, Umamaheswari, E. (2020). A new adaptive XOR, hashing and
encryption-based authentication protocol for secure transmission of the medical data in
Internet of Things (IoT). Biomedical Engineering / Biomedizinische Technik, 10(15),
267-279.
49. Suganeshwari, G., Syed Ibrahim, S. P. (2020). Rule-based effective collaborative
recommendation using unfavorable preference. IEEE Access, 8(1), 128116-128123.
50. Quadir, A., Christy Jackson, J., Prassanna, J., Sathyarajasekaran, K., Kumar, K.,
Sabireen, H., Vijaya Kumar, V. An efficient algorithm to detection. (2020). An efficient
algorithm to detect DDoS amplification attacks. Journal of Intelligent & Fuzzy Systems,
39(1), 217-223.
51. Malathy Jawahar, N. K., Chandra Babu, K., Vani, L., Jani Anbarasi, Geetha, S. (2020).
Vision based inspection system for leather surface defect detection using fast
convergence particle swarm optimization ensemble classifier approach. Multimedia Tools
and Applications An International Journal, 10(4), 360-374.
52. Modigari Narendra, M.L., Valarmathi, L., Jani Anbarasi. (2020). Optimization of 3D
triangular mesh watermarking using ACO_weber law. KSII transactions on internet and
information systems, 14(10), 4042-4057.
53. Srinivasa Rao, Jeganathan, Tessy Mathew. (2020). Replication in two-dimensional
cellular automaton with linear rules. Journal of Cellular Automata, 15(5), 197-210.
54. Karthik, R., Menaka Radhakrishnan, Rajalakshmi, R., Joel Raymann. (2020).
Delineation of ischemic lesion from brain MRI using attention gated fully convolutional
neural networks. Biomedical Engineering Letters, 7(3), 267-279.
55. Ashutosh Satapathy, Jenila Livingston, L. M. (2020). A lite convolutional neural network
built on permuted xceptio-inception and xceptio-reduction modules for texture based
facial liveness recognition. Multimedia Tools and Applications, 2(13), 342-356.
56. Ramesh Ragala, Bharadwaja Kumar. (2020). Recursive block LU decomposition based
elm in apache spark. Journal of Intelligent & Fuzzy Systems, 39(6), 8205-8215.
57. Prachi Sarode, Reshmi, T. R., Venkatasubbu Pattabiraman. (2020). Combination of
fitness-mated lion algorithm with neural network for optimal query. Wireless Personal
Communications-An International Journal, 113(2), 456–461.
58. Ishita Dasgupta, Jayit Saha, Pattabiraman Venkatasubbu, Parvathi Ramasubramanian.
(2020). AI Crop Predictor and Weed Detector Using Wireless Technologies: A Smart
Application for Farmers. Arabian Journal for Science and Engineering, 45(11), 11115–
11127.
59. Chakravarthi, K. K., Shyamala, L., Vaidehi. (2020). Cost-effective workflow scheduling
approach on cloud under deadline constraint using firefly algorithm. Applied Intelligence,
4(12), 1237-1249.
60. Chakravarthi, Koneti Kalyan, Shyamala, L. (2020). Topsis inspired budget and deadline
aware multi-workflow scheduling for cloud. Journal of Systems Architecture, 2(41), 64-
79.
61. Punitha, K. (2020). A Novel Mixed Wide and PSO-Bi-LSTM-CNN Model for the
Effective Web Services Classification. Webology, 17(2), 218-237.
62. Sathiyamoorthi, V., Ilavarasi, A. K., Murugeswari, K., Syed Thouheed Ahmed, Aruna
Devi, B., Murali Kalipindi. (2020). A deep convolutional neural network based computer
aided diagnosis system for the prediction of Alzheimer's disease in MRI images.
Elsevier- Measurement, 3(2), 232-245.
63. Sathyarajasekaran, K., Ganesan, R. (2020). Software readiness for maintenance and
support. Journal of Seybold Report, 15(9), 903-920.
64. Saraswathi Shunmuganathan, Renuka Devi Saravanan, Yogesh Palanichamy. (2020).
Securing VPN from insider and outsider bandwidth flooding attack. Microprocessors and
Microsystems, 79(4), 423-438.
65. Kuppusamy, P., Venkatraman, S., Rishikeshan, C. A., Padmanabha Reddy, Y. C. A.
(2020). Deep learning based energy efficient optimal timetable rescheduling model for
intelligent metro transportation systems. Physical Communication, 42(8), 190-199.
66. Malathy Jawahar, Chandra Babu, N. K., Vani, K., Jani Anbarasi, L., Geetha, S. (2020).
Vision based inspection system for leather surface defect detection using fast
convergence particle swarm optimization ensemble classifier approach. Springer –
Multimedia Tools and Applications, 80(3), 4203-4234.
67. Roseline, S. A., Geetha, S., Kadry, S., Nam, Y. (2020). Intelligent Vision-Based Malware
Detection and Classification Using Deep Random Forest Paradigm. IEEE Access, 8(1),
206303-206324.
68. Poornima, N., Saleena, B. (2020). An automated approach to retrieve lecture videos using
context based semantic features and deep learning. Sadhana, 45(254), 893-904.
69. Rajiv Vincent, Prayag Bhatia, Rajesh, Arun Kumar Sivaraman, Mohammed Said
Sulaiman Al Bahri. (2020). Indian currency recognition and verification using transfer
learning. International Journal of Mathematics and Computer Science, 15(4), 1279–
1284.
70. Ankush Rai, Jagadeesh Kannan, R. (2020). Population coding of generative neuronal
cells for collaborative decision making. Journal of the Indian Society of Remote Sensing,
1(13), 283-298.
71. Riyaz, B., Ganapathy, S. (2020). A deep learning approach for effective intrusion
detection in wireless networks. Softcomputing, 24(9), 17265-17278 .
72. Sangeetha, G., Vijayalakshmi, M., Ganapathy, S., Kannan, A. (2020). An improved
congestion-aware routing mechanism in sensor networks using fuzzy rules. Peer-to-Peer
Networking and Applications, 13(3), 890-904 .
73. Nancy, P., Muthurajkumar, S., Ganapathy, S., Kumar, S. V. N. S., Selvi, M., Kannan
Arputharaj. (2020). Intrusion detection using dynamic feature selection and fuzzy
temporal decision. IET Communications, 14(5), 888-895.
74. Kavin, B. P., Ganapathy, S., Kanimozhi, U., Kannan, A. (2020). An enhanced security
framework for secured data storage and Communications in cloud. Wireless Personal
Communications, 115(2), 1107-1135.
75. Munuswamy, S., Saranya, M. S., Ganapathy, S., Muthurajkumar, S., Kannan, A. (2020).
Sentiment analysis techniques for social media-based recommendation systems. National
Academy Science Letters, 6(14), 205-215.
76. Munirathinam, T., Ganapathy, S., Kannan, A. (2020). Cloud and IoT based privacy
preserved e-Healthcare system using secured storage. Journal of Intelligent & Fuzzy
Systems, 39(3), 3011-3023.
77. Poongodi, M., Sharma, A., Vijayakumar, V., Bhardwaj, V., Sharma, A. P., Iqbal, R., &
Kumar, R. (2020). Prediction of the price of Ethereum blockchain cryptocurrency in an
industrial finance system. Computers & Electrical Engineering, 81(1), 106527. (IF :
2.189)
78. Sukumar, A., Subramaniyaswamy, V., Vijayakumar, V., & Ravi, L. (2020). A secure
multimedia steganography scheme using hybrid transform and support vector machine
for cloud-based storage. Multimedia Tools and Applications, 1-25. (IF : 2.101)
79. Sethuraman, S. C., Vijayakumar, V., & Walczak, S. (2020). Cyber Attacks on Healthcare
Devices Using Unmanned Aerial Vehicles. Journal of Medical Systems, 44(1), 29. (IF :
2.415)
80. Rajesh, K. B. (2018). Cybernetic microbial detection system using transfer
learning. Multimedia Tools and Applications, 1(1), 1-18. (IF : 2.101)
81. Geetha, R., & Geetha, S. (2020). Embedding electronic patient information in clinical
images: an improved and efficient reversible data hiding technique. Multimedia Tools
and Applications, 1(1), 1-22. (IF : 2.101)
82. Geetha, R., & Geetha, S. (2020). Efficient high capacity technique to embed EPR
information and to detect tampering in medical images. Journal of Medical Engineering
& Technology, 1(1), 1-14. (IF : 1.4)
83. Suresh Kumar, D., & Jagadeesh Kannan, R. (2020). Reinforcement learning-based
controller for adaptive workflow scheduling in multi-tenant cloud computing. The
International Journal of Electrical Engineering & Education, Online First,
0020720919894199. (IF : 0.941)
84. Chakravarthi, S. S., & Kannan, R. J. (2020). Detection of anomalies in cloud services
using network flowdata analysis. The International Journal of Electrical Engineering &
Education, Online First, 0020720920901436. (IF : 0.941)
85. Sarobin, M. V. R. (2020). Optimized Node Deployment in Wireless Sensor Network for
Smart Grid Application. Wireless Personal Communications, 111(3), 1431-1451. (IF :
0.929)
86. Rai, A. & Kannan, R. J. (2020). IP traffic modelling in scalable drone network for
carrying scalable logistic operations. Wireless Personal Communications. Article in
Press. (IF : 0.929)
87. Rekha, D. (2020). Sustainability modelling and green energy optimisation in microgrid
powered distributed Fog Micro Data Centers in rural area. Wireless Networks, 1(1), 1-14.
(IF : 2.405)
88. Jackson, C. J., Rekha, D., Vijayakumar, V., Carvalho, G. H. S. (2020) Optimal broadcast
scheduling method for VANETs: an adaptive discrete firefly approach. Journal of
Intelligent Fuzzy Systems, Accepted. (IF : 1.637)
89. Nancy, P., Muthurajkumar, S., Ganapathy, S., Kumar, S. V. N., Selvi, M., & Arputharaj,
K. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal
decision tree classification for wireless sensor networks. IET
COMMUNICATIONS, 14(5), 888-895. (IF : 1.779)
90. Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS
aware trust based routing algorithm for wireless sensor networks. Wireless Personal
Communications, 110(4), 1637-1658. (IF : 0.929)
91. Pandiyaraju, V., Logambigai, R., Ganapathy, S., & Kannan, A. (2020). An Energy
Efficient Routing Algorithm for WSNs Using Intelligent Fuzzy Rules in Precision
Agriculture. Wireless Personal Communications, 1(1), 1-17. (IF : 0.929)
92. Ramasamy, J., & Kumaresan, J. S. (2020). Image Encryption and Cluster Based
Framework for Secured Image Transmission in Wireless Sensor Networks. Wireless
Personal Communications, 1(1), 1-14. (IF : 0.929)
93. Kirthica, S., Saravanan, I., & Sridhar, R. (2020). Enhancing the Cloud Inter-operation
Toolkit (CIT) to support multiple cloud service models. Journal of Grid Computing.
Available Online. (IF : 3.288)
94. Chakravarthi, K. K., Shyamala, L., & Vaidehi, V. (2020). Budget aware scheduling
algorithm for workflow applications in IaaS clouds. Cluster Computing, 1(1), 1-15. (IF :
2.04)
95. Chakravarthi, K. K., Shyamala, L., & Vaidehi, V. (2020). TOPSIS inspired Cost-
Efficient Concurrent Workflow Scheduling Algorithm in Cloud. Journal of King Saud
University-Computer and Information Sciences, 1(1), 15. (IF : 1.897)
2019

96. Harini, S., & Pattabiraman, V. (2019). SeRA: Self-Repairing Architecture for Dark
Silicon Era. Journal of Circuits, Systems and Computers, 28(6), 2050053. (IF : 0.595)
97. Malathi, D., Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., & Sangaiah, A. K.
(2019). Hybrid reasoning-based privacy-aware disease prediction support
system. Computers & Electrical Engineering, 73, 114-127. (IF : 2.189)
98. Klug, N., Chauhan, A., Vijayakumar, V., & Ragala, R. (2019). k-RNN: Extending NN-
heuristics for the TSP. Mobile Networks and Applications, 24(4), 1210-1213. (IF : 2.39)
99. Poongodi, M., Vijayakumar, V., Al-Turjman, F., Hamdi, M., & Ma, M. (2019). Intrusion
Prevention System for DDoS Attack on VANET With reCAPTCHA Controller Using
Information Based Metrics. IEEE Access, 7, 158481-158491. (IF : 4.098)
100. Devarajan, M., Subramaniyaswamy, V., Vijayakumar, V., & Ravi, L. (2019).
Fog-assisted personalized healthcare-support system for remote patients with
diabetes. Journal of Ambient Intelligence and Humanized Computing, 10(10), 3747-3760.
(IF : 1.91)
101. Kumar, C., Sathish Kumar, K., Indra Gandhi, V., Vijayakumar, V., & Rawal, B.
S. (2019). A novel distribution system reconfiguration for loss minimization using
symbiotic organism search algorithm. Journal of Intelligent & Fuzzy Systems, 36(5),
4319-4326. (IF : 1.637)
102. Chakkaravarthy, S. S., Sangeetha, D., & Vaidehi, V. (2019). A survey on malware
analysis and mitigation techniques. Computer Science Review, 32, 1-23. (IF : 5.392)
103. Athanesious, J. J., Chakkaravarthy, S. S., Vasuhi, S., & Vaidehi, V. (2019).
Trajectory based abnormal event detection in video traffic surveillance using general
potential data field with spectral clustering. Multimedia Tools and Applications, 78(14),
19877-19903. (IF : 2.101)
104. Marimuthu, P., Perumal, V., & Vijayakumar, V. (2019). OAFPM: optimized
ANFIS using frequent pattern mining for activity recognition. The Journal of
Supercomputing, 75(8), 5347-5366. (IF : 2.157)
105. Tembhare, A., Chakkaravarthy, S. S., Sangeetha, D., Vaidehi, V., & Rathnam, M.
V. (2019). Role-based policy to maintain privacy of patient health records in cloud. The
Journal of Supercomputing, 75(9), 5866-5881. (IF : 2.157)
106. JothiPrabha, A., & Bhargavi, R. (2019). Prediction of Dyslexia from Eye
Movements Using Machine Learning. IETE Journal of Research, 1(1), 1-10. (IF : 0.793)
107. Maya Gopal, P. S., & Bhargavi, R. (2019). A novel approach for efficient crop
yield prediction. Computers and Electronics in Agriculture, 165(1), 104968. (IF : 3.171)
108. Maya Gopal, P. S., & Bhargavi, R. (2019). Performance Evaluation of Best
Feature Subsets for Crop Yield Prediction Using Machine Learning Algorithms. Applied
Artificial Intelligence, 33(7), 621-642. (IF : 0.988)
109. Gopal, P. M., & Bhargavi, R. (2019). Optimum Feature Subset for Optimizing
Crop Yield Prediction Using Filter and Wrapper Approaches. Applied Engineering in
Agriculture, 35(1), 9-14. (IF : 0.74)
110. Prakash, B., & Viswanathan, V. (2019). Distributed cat modeling based agile
framework for software development. Sadhana - Academy Proceedings in Engineering
Sciences, 44(7), 166. (IF : 0.769)
111. Rajarajeswari, S., & Neelanarayanan, V. (2019). Dynamic rule generation and
rule matching for composite environmental condition. Wireless Networks, 1(1), 1-9. (IF :
2.405)
112. Vijayalakshmi, A., & Rajesh Kanna, B. (2019). Deep learning approach to detect
malaria from microscopic images. Multimedia Tools and Applications, 1(1), 1-21. (IF :
2.101)
113. Maheswari, M., & Geetha, S. (2019). Adaptable and proficient Hellinger
Coefficient Based Collaborative Filtering for recommendation system. Cluster
Computing, 22(5), 12325-12338. (IF : 2.04)
114. Hemalatha, J., Devi, M. K., & Geetha, S. (2019). Improving image steganalyser
performance through curvelet transform denoising. Cluster Computing, 22(5), 11821-
11839. (IF : 2.04)
115. Koteeswaran, S., Malarvizhi, N., Kannan, E., Sasikala, S., & Geetha, S. (2019).
Data mining application on aviation accident data for predicting topmost causes for
accidents. Cluster computing, 22(5), 11379-11399. (IF : 2.04)
116. Punithavathi, P., & Geetha, S. (2019). Partial DCT-based cancelable biometric
authentication with security and privacy preservation for IoT applications. Multimedia
Tools and Applications, 78(18), 25487-25514. (IF : 2.101)
117. Punithavathi, P., Geetha, S., Karuppiah, M., Islam, S. H., Hassan, M. M., & Choo,
K. K. R. (2019). A lightweight machine learning-based authentication framework for
smart IoT devices. Information Sciences, 484(1), 255-268. (IF : 5.524)
118. Bharathiraja, S. (2019). Anti-forensics contrast enhancement detection (AFCED)
technique in images based on laplace derivative histogram. Mobile Networks and
Applications, 24(4), 1174-1180. (IF : 2.39)
119. Dinesh Jackson Samuel, R., & Rajesh Kanna, B. (2019). A programmable
microscopic stage: Design and development. Microscopy research and technique, 82(4),
429-442. (IF : 1.147)
120. Samuel, R. D. J., & Kanna, B. R. (2019). Tuberculosis (TB) detection system
using deep neural networks. Neural Computing and Applications, 31(5), 1533-1545. (IF :
4.664)
121. Subburam, S., Selvakumar, S., & Geetha, S. (2018). High performance reversible
data hiding scheme through multilevel histogram modification in lifting integer wavelet
transform. Multimedia Tools and Applications, 77(6), 7071-7095. (IF : 2.101)
122. Rajkumar, S., & Malathi, G. (2019). Impact of image artifact and solution to the
image quality issues in real time SAR images. Mobile Networks and Applications, 24(4),
1166-1173. (IF : 2.39)
123. Rai, A., & Kannan, R. J. (2019). Consensus-based decision making in non-
linearly multi-coupled IoT networked SLAM operations. The International Journal of
Electrical Engineering & Education, 1 (1), 0020720919883797. (IF : 0.941)
124. Kamaraj, P., & Kannan, R. J. (2019). Design and development of the optical
control network active phased array radar. INTERNATIONAL JOURNAL OF
ELECTRICAL ENGINEERING EDUCATION, 1 (1), 10. (IF : 0.941)
125. Chakravarthi, S. S., & Kannan, R. J. (2019). Non-linear Dimensionality
Reduction-based Intrusion Detection using Deep Autoencoder. Network, 10(8), 1. (IF :
0.14)
126. Rai, A., & Kannan, R. J. (2019). One-shot learning technique regression of
reconfigurable learning network for generative modeling in interconnected imaging
infrastructure. The International Journal of Electrical Engineering & Education, 1 (1),
0020720919895908. (IF : 0.941)
127. Rai, A., & Kannan, R. J. (2019). Co-simulation Based Finite State Machine for
Telematic and Data Compression Microservices in IoT. Wireless Personal
Communications, 105(3), 1069-1082. (IF : 0.929)
128. Narasappa, J. H., & Rekha, D. (2019). Energy aware methodical data forwarding
(EAMDF) mechanism in VANET. Journal of Intelligent & Fuzzy Systems, 36(5), 4293-
4303. (IF : 1.637)
129. Kumar, C., Sathish Kumar, K., Indra Gandhi, V., Vijayakumar, V., & Rawal, B.
S. (2019). A novel distribution system reconfiguration for loss minimization using
symbiotic organism search algorithm. Journal of Intelligent & Fuzzy Systems, 36(5),
4319-4326. (IF : 1.637)
130. Vijayakumar, V., Subramaniyaswamy, V., Abawajy, J., & Yang, L. (2019).
Intelligent, smart and scalable cyber-physical systems. Journal of Intelligent and Fuzzy
Systems, 36(5), 3935-3943. (IF : 1.637)
131. Md, A. Q., Varadarajan, V., & Mandal, K. (2019). Efficient algorithm for
identification and cache based discovery of cloud services. Mobile Networks and
Applications, 24(4), 1181-1197. (IF : 2.39)
132. Joshua, C. J., Duraisamy, R., & Varadarajan, V. (2019). A reputation based
weighted clustering protocol in VANET: a multi-objective firefly approach. Mobile
Networks and Applications, 24(4), 1199-1209. (IF : 2.39)
133. Joshua, C. J., & Varadarajan, V. (2019). An optimization framework for routing
protocols in VANETs: a multi-objective firefly algorithm approach. Wireless Networks, 1
(1), 1-10. (IF : 2.405)
134. Anusooya, G., & Vijayakumar, V. (2019). Reduced carbon emission and
optimized power consumption technique using container over virtual machine. Wireless
Networks, 1 (1), 1-19. (IF : 2.405)
135. Anusooya, G., Vijayakumar, V., & Narayanan, V. N. (2019). Reducing the carbon
emission by early prediction of peak time load in a data center. Journal of Intelligent &
Fuzzy Systems, 36(5), 4341-4348. (IF : 1.637)
136. Sivakumar, V., & Rekha, D. (2020). A QoS‐aware energy‐efficient memetic
flower pollination routing protocol for underwater acoustic sensor network. Concurrency
and Computation: Practice and Experience, 32(4), e5166. (IF : 1.167)
137. Prassanna, J., & Venkataraman, N. (2019). Threshold based multi-objective
memetic optimized round Robin scheduling for resource efficient load balancing in
cloud. Mobile Networks and Applications, 24(4), 1214-1225. (IF : 2.39)
138. Prassanna, J., & Venkataraman, N. (2019). Adaptive regressive holt–winters
workload prediction and firefly optimized lottery scheduling for load balancing in
cloud. Wireless Networks, 1(1), 1-19. (IF : 2.405)
139. Varadarajan, V., Neelanarayanan, V., Doyle, R., Al-Shaikhli, I. F., & Groppe, S.
(2019). Mobile Networks in the Era of Big Data. Mobile Networks and
Applications, 24(4), 1135-1138. (IF : 2.39)
140. Varadarajan, V., Neelanarayanan, V., Doyle, R., Al-Shaikhli, I. F., & Groppe, S.
(2019). Emerging Solutions in Big Data and Cloud Technologies for Mobile
Networks. Mobile Networks and Applications, 24(3), 1015-1017. (IF : 2.39)
141. Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Nehemiah, H. K.,
& Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective
communication in wireless sensor networks. Wireless Personal Communications, 105(4),
1475-1490. (IF : 0.929)
142. Ganapathy, S. (2019). A secured storage and privacy-preserving model using
CRT for providing security on cloud and IoT-based applications. Computer
Networks, 151, 181-190. (IF : 3.03)
143. Kanimozhi, U., Ganapathy, S., Manjula, D., & Kannan, A. (2019). An intelligent
risk prediction system for breast cancer using fuzzy temporal rules. National Academy
Science Letters, 42(3), 227-232. (IF : 0.331)
144. Rajeswari, A. R., Kulothungan, K., Ganapathy, S., & Kannan, A. (2019). A
trusted fuzzy based stable and secure routing algorithm for effective communication in
mobile adhoc networks. Peer-to-Peer Networking and Applications, 12(5), 1076-1096.
(IF : 2.397)
145. Perumal, S. P., Sannasi, G., & Arputharaj, K. (2019). An intelligent fuzzy rule-
based e-learning recommendation system for dynamic user interests. The Journal of
Supercomputing, 75(8), 5145-5160. (IF : 2.157)
146. Thangaramya, K., Kulothungan, K., Logambigai, R., Selvi, M., Ganapathy, S., &
Kannan, A. (2019). Energy aware cluster and neuro-fuzzy based routing algorithm for
wireless sensor networks in IoT. Computer Networks, 151, 211-223. (IF : 3.03)
147. Dhanapal, A., & Nithyanandam, P. (2019). An OpenStack based cloud testbed
framework for evaluating HTTP flooding attacks. Wireless Networks, 1(1), 1-11. (IF :
2.405)
148. Vanamoorthy, M., & Devendran, V. (2019). Congestion-Free Transient Plane
(CFTP) Using Bandwidth Sharing During Link Failures in SDN. The Computer Journal,
1(1), 10. (IF : 0.98)
149. Karmel, A., Vijayakumar, V., & Kapilan, R. (2019). Ant-based efficient energy
and balanced load routing approach for optimal path convergence in MANET. Wireless
Networks, 1(1), 1-13. (IF : 2.405)
150. Ravi, L., Subramaniyaswamy, V., Vijayakumar, V., Chen, S., Karmel, A., &
Devarajan, M. (2019). Hybrid location-based recommender system for mobility and
travel planning. Mobile Networks and Applications, 24(4), 1226-1239. (IF : 2.39)
151. Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., & Li, X. (2019). Efficient
user profiling based intelligent travel recommender system for individual and group of
users. Mobile Networks and Applications, 24(3), 1018-1033. (IF : 2.39)
152. Vijayakumar, V., Priyan, M. K., Ushadevi, G., Varatharajan, R., Manogaran, G.,
& Tarare, P. V. (2019). E-health cloud security using timing enabled proxy re-
encryption. Mobile Networks and Applications, 24(3), 1034-1045. (IF : 2.39)
153. Ravi, L., Subramaniyaswamy, V., Devarajan, M., Ravichandran, K. S.,
Arunkumar, S., Indragandhi, V., & Vijayakumar, V. (2019). SECRECSY: A secure
framework for enhanced privacy-preserving location recommendations in cloud
environment. Wireless Personal Communications, 108(3), 1869-1907. (IF : 0.929)
154. Subramaniyaswamy, V., Manogaran, G., Logesh, R., Vijayakumar, V.,
Chilamkurti, N., Malathi, D., & Senthilselvan, N. (2019). An ontology-driven
personalized food recommendation in IoT-based healthcare system. The Journal of
Supercomputing, 75(6), 3184-3216. (IF : 2.157)
155. Sharma, A., Rathee, G., Kumar, R., Saini, H., Varadarajan, V., Nam, Y., &
Chilamkurti, N. (2019). A Secure, Energy-and SLA-Efficient (SESE) E-Healthcare
Framework for Quickest Data Transmission Using Cyber-Physical
System. Sensors, 19(9), 2119. (IF : 3.039)
156. Prachi Sarode and Reshmi TR 2019, Optimized Query Ordering Data
Aggregation model using Neural Networks and Group Search Optimization in Wireless
Sensor networks, Ad Hoc & Sensor Wireless Networks (AHSWN) (SCI Indexed) – In
Press. (IF : 0.56)
157. Dhanashri W and Reshmi TR 2019, Cat-Swarm-Optimization-Based Energy-
Efficient Re-liable Sectoring Scheme in WSN, Journal of Information Science &
Engineering, Special Issue on “Advanced Networking and Communication Solutions for
Wireless Mobile Networks” (SCI Indexed) – In Press. (IF : 0.525)

2018

158. Sethuraman, S. C., Dhamodaran, S., & Vijayakumar, V. (2018). Intrusion


detection system for detecting wireless attacks in IEEE 802.11 networks. IET
Networks, 8(4), 219-232. (IF : 2.58)
159. Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., Gao, X. Z., & Indragandhi,
V. (2018). A hybrid quantum-induced swarm intelligence clustering for the urban trip
recommendation in smart city. Future Generation Computer Systems, 83, 653-673. (IF :
4.639)
160. Vignesh, U., & Parvathi, R. (2018). 3D visualization and cluster analysis of
unstructured protein sequences using ARCSA with a file conversion approach. The
Journal of Supercomputing, 1-15. (IF : 2.157)
161. Indragandhi, V., Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., Siarry, P.,
& Uden, L. (2018). Multi-objective optimization and energy management in renewable
based AC/DC microgrid. Computers & Electrical Engineering, 70, 179-198. (IF : 2.189)
162. Mohanraj, V., Sibi Chakkaravarthy, S., Gogul, I., Sathiesh Kumar, V., Kumar, R.,
& Vaidehi, V. (2018). Hybrid feature descriptors to detect face spoof attacks. Journal of
Intelligent & Fuzzy Systems, 34(3), 1411-1419. (IF : 1.637)
163. Suseela, G., & Phamila, Y. A. V. (2018). Energy efficient image coding
techniques for low power sensor nodes: A review. Ain Shams Engineering Journal, 9(4),
2961-2972. (IF : 3.091)
164. Jasmine, S. G., & Pattabiraman, V. (2018). Improved pure pixel identification
algorithms to determine the endmembers in hyperspectral images. Computers &
Electrical Engineering, 71, 515-532. (IF : 2.189)
165. Sivakumar, V., & Rekha, D. (2018). Node scheduling problem in underwater
acoustic sensor network using genetic algorithm. Personal and Ubiquitous
Computing, 22(5-6), 951-959. (IF : 1.735)
166. Reshmi, T. R. (2018). Enhanced Passive Duplicate Address Detection (EPDAD)
for Autoconfiguration in MANETs. Journal of Information Science &
Engineering, 34(4), 10. (IF : 0.525)
167. Logambigai, R., Ganapathy, S., & Kannan, A. (2018). Energy–efficient grid–
based routing algorithm using intelligent fuzzy rules for wireless sensor
networks. Computers & Electrical Engineering, 68, 62-75. (IF : 2.189)
168. Muthurajkumar, S., Vijayalakshmi, M., Kannan, A., & Ganapathy, S. (2018).
Optimal and energy efficient scheduling techniques for resource management in public
cloud networks. National Academy Science Letters, 41(4), 219-223. (IF : 0.331)
169. Vijay Kumar, T. J., Naidu, L., Nehemiah, H. K., Ganapathy, S., & Kannan, A.
(2018). Identification and classification of pulmonary nodule in lung modality using
digital computer. Applied Mathematics and Information Sciences, 12(2), 451-459. (IF :
0.31)
170. Munuswamy, S., Saravanakumar, J. M., Sannasi, G., Harichandran, K. N., &
Arputharaj, K. (2018). Virtual force-based intelligent clustering for energy-efficient
routing in mobile wireless sensor networks. Turkish Journal of Electrical Engineering &
Computer Sciences, 26(3), 1444-1452. (IF : 0.625)
171. Kirthica, S., & Sridhar, R. (2018). A residue-based approach for resource
provisioning by horizontal scaling across heterogeneous clouds. International Journal of
Approximate Reasoning, 101, 88-106. (IF : 1.982)
172. Kirthica, S., & Sridhar, R. (2018). Horizontal scaling and aggregation across
heterogeneous clouds for resource provisioning. Computers & Electrical
Engineering, 69, 301-316. (IF : 2.189)
173. Logesh, R., Subramaniyaswamy, V., Malathi, D., Sivaramakrishnan, N., &
Vijayakumar, V. (2018). Enhancing recommendation stability of collaborative filtering
recommender system through bio-inspired clustering ensemble method. Neural
Computing and Applications, 1-24. (IF : 4.664)
2017

174. Subramaniam, J., Kannan, R. J., & Ebenezer, D. (2017). Parallel and pipelined 2-
D median filter architecture. IEEE Embedded Systems Letters, 10(3), 69-72. (IF : 1.5)
175. Audithan, S., Vijayasaro, V., Vijayakumar, P., & Vijayakumar, V. (2017). An
Efficient Authentication Scheme for Mobile Cloud Computing Services. Journal of
Information Science & Engineering, 33(3). (IF : 0.525)
176. Pandiaraja, P., Vijayakumar, P., Vijayakumar, V., & Seshadhri, R. (2017).
Computation Efficient Attribute Based Broadcast Group Key Management for Secure
Document Access in Public Cloud. Journal of Information Science & Engineering, 33(3).
(IF : 0.525)
177. Sangeetha, D., & Vaidehi, V. (2017). Improved Searchable Attribute Based
Encryption in Cloud. Journal of Information Science & Engineering, 33(3). (IF : 0.525)
178. Muthumeenakshi, R., Reshmi, T. R., & Murugan, K. (2017). Extended 3PAKE
authentication scheme for value-added services in VANETs. Computers & Electrical
Engineering, 59(1), 27-38. (IF : 2.189)
179. Reshmi, T. R., & Murugan, K. (2017). Light weight cryptographic address
generation (LW-CGA) using system state entropy gathering for IPv6 based
MANETs. China Communications, 14(9), 114-126. (IF : 1.882)
180. Sasikala, S., alias Balamurugan, S. A., & Geetha, S. (2017). A novel adaptive
feature selector for supervised classification. Information Processing Letters, 117(1), 25-
34. (IF : 0.605)
181. Bharathi, C., Rekha, D., & Vijayakumar, V. (2017). Genetic algorithm based
demand side management for smart grid. Wireless personal communications, 93(2), 481-
502. (IF : 0.929)
182. Prabakaran, N., & Kannan, R. J. (2017). Sustainable life-span of WSN nodes
using participatory devices in pervasive environment. Microsystem Technologies, 23(3),
651-657. (IF : 01.513)
183. Subramaniam, J., Kannan, R. J., & Ebenezer, D. (2017). Fast median-finding
word comparator array. Electronics Letters, 53(21), 1402-1404. (IF : 1.343)
184. Jayaram, B., Arumugam, S., & Thulasiraman, K. (2017). Dominator sequences in
bipartite graphs. Theoretical Computer Science, 694, 34-41. (IF : 0.718
185. Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., & Kannan, A. (2017). An
intelligent secured and energy efficient routing algorithm for MANETs. Wireless
Personal Communications, 96(2), 1753-1769. (IF : 0.929)
186. Selvi, M., Velvizhy, P., Ganapathy, S., Nehemiah, H. K., & Kannan, A. (2019).
A rule based delay constrained energy efficient routing technique for wireless sensor
networks. Cluster Computing, 22(5), 10839-10848. (IF : 2.04)
187. Saraswathi, S., Devi, S. R., & Yogesh, P. (2017). Secure Smart Card Based
Remote User Authentication Scheme for Multi-Server Environment to Eliminate Smart
Card Security Breach. Journal of Computational and Theoretical Nanoscience, 14(11),
5174-5183.
188. Prasad, M., & Manoharan, R. (2015). DS-AKA-A Novel Secured Authentication
Protocol for LTE-A Using Public Key Cryptography. Journal of Internet Technology,
18(4) , 753-763. (IF : 0.715)
2016
189. Umamaheswari, E., & Gao, X-Z. (2016). SOUND BEATS. Transylvanian
Review Special Issue. XXIV(11), 2907-2913. (IF : 0.07)
190. Mary, S. S. A., & Suganya, G. (2016). Multi-criteria decision making using
ELECTRE. Circuits and Systems, 7(6), 1008-1020. (IF : 0.595)
191. Sasikala, S., & Geetha, S. (2016). A novel memetic algorithm for discovering
knowledge in binary and multi class predictions based on support vector
machine. Applied Soft Computing, 49(1), 407-422. (IF : 2.857)
192. Sasikala, S., alias Balamurugan, S. A., & Geetha, S. (2016). Improving detection
performance of artificial neural network by Shapley value embedded genetic feature
selector. Neural Network World, 26(2), 175. (IF : 0.957)
193. Sasikala, S., alias Balamurugan, S. A., & Geetha, S. (2016). Multi Filtration
Feature Selection (MFFS) to improve discriminatory ability in clinical data set. Applied
Computing and Informatics, 12(2), 117-127. (IF : 3.93)
194. Muthuramalingam, S., Karthikeyan, N., Geetha, S., & Sindhu, S. S. S. (2016).
Stego anomaly detection in images exploiting the curvelet higher order statistics using
evolutionary support vector machine. Multimedia Tools and Applications, 75(21), 13627-
13661. (IF : 2.101)
195. Saravanan, R., Shanmuganathan, S., & Palanichamy, Y. (2016). Behavior-based
detection of application layer distributed denial of service attacks during flash
events. Turkish Journal of Electrical Engineering & Computer Sciences, 24(2), 510-523.
(IF : 0.625)
2015
196. Muthukumar, B., Sindhu, S. S., Geetha, S., & Kannan, A. (2015). Intelligent
network-misuse-detection-system using neurotree classifier. Neural Network
World, 25(5), 541. (IF : 0.48)
197. Karmel, A., & Jayakumar, C. (2015). Recurrent Ant Colony Optimization for
Optimal Path Convergence in Mobile Ad Hoc Networks. KSII Transactions on Internet
& Information Systems, 9(9), 10. (IF : 0.711)
198. Phamila, A. V. Y., & Amutha, R. (2015). Energy-efficient low bit rate image
compression in wavelet domain for wireless image sensor networks. Electronics
Letters, 51(11), 824-826. (IF : 1.343)
199. Shunmuganathan, S., Saravanan, R. D., & Palanichamy, Y. (2015). Secure and
efficient smart-card-based remote user authentication scheme for multiserver
environment. Canadian Journal of Electrical and Computer Engineering, 38(1), 20-30.
(IF : 01.49)
200. Viswanathan, V., & Krishnamurthi, I. (2015). Finding relevant semantic
association paths using semantic ant colony optimization algorithm. Soft
Computing, 19(1), 251-260. (IF : 1.31)
List of Research SCOPUS Publications coming from the Department during the last five
years (Authors Names, Title of Paper, Name of the Journal, Volume, Page nos., Year)
2021

2020
1. Prakash, B., & Viswanathan, V. (2020). A comparative study of meta-heuristic
optimisation techniques for prioritisation of risks in agile software development.
International Journal of Computer Applications in Technology (IJCAT), 62(2),
175-188.
2. Pradeep, K.V., Anusha, K., & Nachiyappan, S. (2020, March). Performance and
computation time enhancement of various machine learning techniques for NSL-
KDD dataset. International Journal of Recent Technology and Engineering
(IJRTE), 8(6), 4726- 4730.
3. Nachiyappan,S., Pradeep, K.V., & Anusha, K. (2020, March). Blur detection and
classification using Dnn. International Journal of Recent Technology and
Engineering (IJRTE), 8(6), 4777-4780.
4. 189. Rao, B.P., Kumar, K.S., Singh, R.K., & Sundeep , P. (2020, February). Intelligent
system for smart cultivation - to integrate technology in rural economic
development. International Journal of Engineering and Advanced
Technology(IJEAT), 9(3), 511 - 517.
5. Rao, B.P., (2020). AI based e-healthcare in rural areas. International Journal of
Innovative Technology and Exploring Engineering (IJITE), 9(3), 3098-3104.
6. Rahman, A.A., & Selwyn, J. (2020, March). A study on applicability of product
quality models in software engineering literature and defining quality dimensions
for knowledge management systems. International Journal of Scientific and
Technology Research (IJSTR), 9(3), 195-202.
7. Rahman, A.A., & Selwyn, J. (2020, February). A novel approach to design quality
model for knowledge management systems. International Journal of Scientific
and Technology Research(IJSTR), 9(2), 2020.
8. Bharathiraja,S., Suganya, G., Premalatha, M., Kumar, R., & Ramanathan, S.
(2020, March). An efficient methodology to sort large volume of data.
International Journal of Scientific and Technology Research (IJSTR), 9(3), 5828-
5832.
9. Jain, S., & Shyamala, L. (2020, February). A review on suitable execution
environment for executing parallel workloads with mapreduce and spark.
International Journal of Scientific and Technology Research(IJSTR), 9(2), 5595-
5599.
10. Daniel, D.C., & Shyamala, L. (2020, March). Hybrid CNN classification for
sentiment analysis under deep learning. International Journal of Innovative
Technology and Exploring Engineering (IJITEE), 9(5), 1473-1480.
11. PS, M. G., & Chintala, B. R. (2020). Big data challenges and opportunities in
agriculture. International Journal of Agricultural and Environmental Information
Systems (IJAEIS), 11(1), 48-66.
12. Prassanna, J., Quadir, M.A., Jackson,J.C., Prabakaran, R., & Ramanathan, S.
(2020, March). Secrecy protector: a novel data analytics based credit score
management system. International Journal of Scientific and Technology Research
(IJSTR), 9(3),1215-1218.
13. Prassanna, J., Nawas, K., Jackson, J.C., Prabakaran, R., & Ramanathan, S. (2020,
March). Towards building a neural conversation CHATBOT through seq2seq
model. International Journal of Scientific and Technology Research (IJSTR),
9(3), 1219-1222.
14. Gayathri, R., & Neelanarayanan, V. (2020). Denial of service attack prediction
using gradient descent algorithm. Advances in Internet Research and
Engineering(AIRE), 1(45), 1-8.
15. Verma, S.K., Rajesh, M., & Vincent, R. (2020). Smart-farming using internet of
things. Journal of Computational and Theoretical Nanoscience(JCTN), 17(1
),172-176.
16. Vincent, R., Sanjaykumar, K., Rajesh, M., & Verma, S. K. (2020). Agricart: an
innovative methodology for enhancing farmers livelihood. Journal of
Computational and Theoretical Nanoscience (JCTN), 17(1), 373-377.
17. Perumal, S., Ganapathy, S., & Kannan, A. (2020). REFERS: refined and effective
fuzzy e-commerce recommendation system. International Journal of Business
Intelligence and Data Mining (IJBIDM), 17(1), 117-137.
18. Kapadia, A. M., & Pandian, N. (2020). Reversible data hiding methods in integer
wavelet transform. International Journal of Information and Computer Security
(IJICS), 12(1), 70-89.
19. Pramod, S., & Jayasudha, M. (2020). Multi-root symmetrical encryption
preservation sequence scheme in EHR using cloud. Journal of Discrete
Mathematical Science and Cryptography (JDMSC), 22(7), 70-87.
20. Devi, B. G., & Pattabiraman, V. (2020). Soft cosine gradient and gaussian
mixture joint probability recommender system for online social networks.
International Journal of Intelligent Engineering and Systems (IJIES), 13(1), 301-
311.
21. Sudhakara, M., & Meena, M.J. (2020, April). An edge detection mechanism using
L*A*B color-based contrast enhancement for underwater images. Indonesian Journal of
Electrical Engineering and Computer Science (IJEECS), 18(1), no. 41-48.
22. Balasundaram, A. (2020). Computer vision based detection of partially occluded
faces, International Journal of Engineering & Advanced Technology (IJEAT),
9(3), 2188-2200.
2019
23. Lakshmi, V. A., Meena, M. J., & Ibrahim, S. S. (2019). Big data analytics framework to
analyse student's performance. International Journal of Computational Complexity and
Intelligent Algorithms (IJCCIA), 1(2), 154-164.

24. Sudhakara, M., & Meena, M.J. (2019, May). Underwater image enhancement using
conventional techniques with quality metrics. International Journal of Innovative
Technology and Exploring Engineering (IJITEE), 8(7S), 241-249.

25. Bansal, A., Gupta, C. L., & Muralidhar, A. (2019, June). A sentimental analysis for
youtube data using supervised learning approach. International Journal of Engineering
and Advanced Technology (IJEAT), 8(5), 2314-2318.
26. Muralidhar, A., & Pattabiraman, V. (2019). Enhancing the performance of large-scale
profitable itemset mining using efficient data structures. International Journal of
Innovative Technology and Exploring Engineering (IJITEE), 8(9), 1768 -1772.
27. Aarthi, D., Viswanathan, V., Nandhini, B., Ilakiyaselvan, N. (2019, November).
Question classification using a rule based model. International Journal of
Innovative Technology and Exploring Engineering (IJITEE),9(1), 4172-4176.
28. Premalatha, M., & Viswanathan, V. (2019). Course sequence recommendation
with course difficulty index using subset sum approximation algorithms.
Cybernetics and Information Technologies (CIT), 19(3), 25-44.
29. Prakash, B., & Viswanathan, V. (2019). Risk prioritization for software
development using grey wolf optimization. International Journal of Recent
Technology and Engineering, 7(6), 1457-1463.
30. Aarthi D., & Viswanathan, V. (2019, March). Disambiguation of named entity
with supervised technique over a knowledge base. International Journal of Recent
Technology and Engineering (IJTRE),7(6),1386-1391.
31. Premalatha, M., & Viswanathan, V. (2019). Reducing the duration of Higher
education study with sequenced course recommendation using categorical subset
summation algorithm. International Journal of Recent Technology and
Engineering (IJRTE), 7(-5S4), 751-754.
32. Sathyarajasekaran, K., & Ganesan R. (2019, May). An approach on software
Readiness Workflow with Change Impact Analysis (SRW-CIA). International
Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(7),
284-288.
33. Sathyarajasekaran K., & Ganesan R, (2019). A novel process using impact
analysis over requirement phase with impact transition model. Test Engineering
and Management(TEM), 81, 4435-4445.
34. Nachiyappan, S., & Selwyn, J. (2019). A big data framework for quality
assurance and validation. International Journal of Recent Technology and
Engineering (IJRTE), 8(2), 2490-2494 .
35. Nachiyappan, S., & Selwyn, J. (2019), Automated testing for big data
environment using multi model structure validation. International Journal of
Engineering and Advanced Technology (IJEAT), 8(5), 1304-1309 .
36. Kumar, B,S., & Sountharrajan, S. (2019). Big data projects requirement
understandability using big data use case diagram approach. International Journal
of Computational and Theoretical Nanoscience (IJCTN), 16, 1–6.
37. Shankar, V.S., Sajidha,S.A., Nisha,V.M., & Kumar., B.S. (2019, December).
Performance testing in a multi-tenant cloud architecture using genetic algorithm.
International Journal of Engineering and Advanced Technology (IJEAT), 9(2),
2840-2846.
38. Rajarajeswari, S., & Neelanarayanan, V. (2019, July). Detecting and resolving
conflicts in adaptation rules for the context aware system. International Journal of
Recent Technology and Engineering (IJRTE), 8(2), 760-763.
39. Bansal, A., Saleena, B., &Prakash. B. (2019). Using data mining techniques to
analyze the customers reaction towards social media advertisements.
International Journal of Recent Technology and Engineering (IJRTE), 8(2), 1139
– 1143.
40. Nagelli, A., Ragala, R., & Saleena, B. (2019). Automotive rank based ELM using
iterative decomposition. International Journal of Intelligent Engineering and
Systems (IJIES), 12(5), 287-298.
41. Suganya, G., Premalatha, M., & Anushka Sharma, M. P. (2019). IoT based
automated medicine dispenser for online health community using cloud.
International Journal of Recent Technology and Engineering (IJRTE), 7(5S4),
759-762.
42. Ajay, D. M., & Umamaheswari, E. (2019). Packet encryption for securing real-
time Mobile cloud applications. Mobile Networks and Applications (MNA),
24(4), 1249-1254.
43. Amrith, P., Umamaheswari, E., Anitha, R. U., Mani, D., & Ajay, D. M. (2019,
January). Smart detection of vehicle accidents using object identification sensors
with artificial intelligent systems. International Journal of Recent Technology and
Engineering(IJRTE), 7(5), 375-379.
44. Maheswari, S., & Selwyn, J. (2019). State behavior analysis in validating the web
service framework. International Journal of Computers and Applications (IJCA),
1-11.
45. Maheswari, S., & Selwyn, J. (2019). Machine learning algorithms for
understanding web user access based on query. Journal of Advanced Research in
Dynamical and Control Systems (JARDCS), 11(08), 636-647.
46. Jeyasingh, J., & Selwyn, J. (2019, December). Validating the knowledge
acquisition process metrics in content management systems. International Journal
of Engineering and Advanced Technology (IJEAT), 9(1S3), 257-262.
47. Rachel. K.P., & Selwyn, J. (2019, December). a knowledge representation model
using concept-relation graph. International Journal of Engineering and Advanced
Technology (IJEAT), 9(1S3), 170-175.
48. Krishnapriya, M.A., & Selwyn, J. (2019, October). Synthetization of solution
knowledge base. The International Journal of Analytical and Experimental Modal
Analysis (IJAEMA), 11(10), 403-409.
49. Priya, M. K., & Selwyn, J. (2019, September). Code knowledge acquisition for
knowledge management trajectory framework. International Journal of Recent
Technology and Engineering (IJRTE), 8(3), 1830-1834.
50. Rahaman, A., & Selwyn, J. (2019, July). A conceptual model for effectiveness of
knowledge management systems. International Journal of Recent Trends and
Engineering (IJRTE), 8(2), 4195-4199.
51. Ramachandran, D., & Parvathi, R. (2019). Enhanced event detection in twitter
through feature analysis. International Journal of Information Technology and
Web Engineering (IJITWE), 14(3), 1-15.
52. Parvathi, R., & Aravind, J. (2019, September). Classification based credibility
analysis on twitter data. International Journal of Recent Technology and
Engineering (IJRTE), 8(3), 5371-5376.
53. Vinodha, R., & Parvathi, R. (2019, July). Election result prediction using spatial
statistical method. International Journal of Recent Technology and Engineering
(IJRTE), 8(2S6), 838-843.
54. Monica, K.M., & Parvathi, R. (2019, September). Traditional dimensionality
reduction techniques using deep learning. International Journal of Recent
Technology and Engineering (IJRTE), 8(3), 7153-7160.
55. Dutta S., Parvathi R., & Ganesan R. (2019, October). Threat identification and
examination using graph based anomaly detection. International Journal of
Engineering and Advanced Technology (IJEAT),9(1), 7510-7513.
56. Vinodha, R., & Parvathi, R. (2019, December). Location based point-of-interest
recommendation system using co-pear similarity measure. International Journal
Of Scientific and Technology Research (IJSTR), 8(12), 3689-3696.
57. Aravind, J., & Parvathi, R. (2019, July). A personalized location recommendation
system based on probability and proximity. International Journal of Recent
Technology and Engineering (IJRTE),8(2), 714-718.
58. Ramachandran, D., & Parvathi, R. (2019). Analysis of twitter specific preprocessing
technique for tweets. Procedia Computer Science, 165, 245-251.
59. Kamatchi, S. B., & Parvathi, R. (2019). Improvement of crop production using
recommender system by weather forecasts. Procedia Computer Science, 165,
724-732.
60. GayathriDevi, B., & Pattabiraman, V. (2019). Towards user profiling from
multiple online social networks. Procedia Computer Science, 165, 456-461.
61. Pattabiraman, V., & Ganesh, M. (2019, December). Used cars price prediction
using supervised learning techniques. International Journal of Engineering and
Advanced Technology (IJEAT), 9(1S3), 216-223.
62. Muralidhar, A., Sathe, A.A.K., & Pattabiraman, V. (2019, July). Enhancing the
performance of large-scale profitable itemset mining using efficient data structure.
International Journal of Innovative Technology and Exploring Engineering
(IJITEE), 8 (9), 1768-1772.
63. Akram, W., Jain, M., & Hemalatha, C. S. (2019). Design of a smart safety device
for women using IoT. Procedia Computer Science, 165, 656-662.
64. C SweetlinHemalatha, Pathak, R., &Vaidehi, V. (2019). Hybrid decision trees for
data streams based on incremental flexible naive bayes prediction at leaf
nodes. Evolutionary Intelligence,12(4)515-526.
65. Suganeshwari, G., & Ibrahim, S.S (2019, December). A movie recommendation
using common genre relation on user-item subgroup. International Journal of
Engineering and Advanced Technology (IJEAT), 9(1S3), 193-199.
66. Shende, N. N., & SyedIbrahim, S. P. (2019). Layout detection using computer
vision. International J
67. ournal of Computational Complexity and Intelligent Algorithms (IJCCIA), 1(2),
165-177.
68. Suganeshwari, G., & Ibrahim, S.S, (2019, October). Time adaptive collaborative
filtering for movie recommendation. Pertanika Journal of Science & Technology,
27(4), 1783-1802.
69. Vijayakumar, S., & Ibrahim, S.S. (2019, July). Mining learners’ data to perceive
the need for german for academic purposes. International Journal of Recent
Technology and Engineering, 8(2), 5491-5494.
70. Tamrakar, P., & Ibrahim, S. S. (2019). Comparative study of different lazy
learning associative classification methods. Procedia Computer Science, 165,
370-376.
71. Kalamohan, K., Gunasekaran, P., & Ibrahim, S. (2019). Gene coexpression
network analysis of multiple cancers discovers the varying stem cell features
between gastric and breast cancer. Meta Gene, 21, 100576.
72. Tamrakar, P., & Ibrahim, S. S. (2019, May). Lazy learning associative
classification with hybrid feature selection. International Journal of Recent
Technology and Engineering, 8(1), 299-303.
73. Pandey, A., Sharma, A., & Ibrahim, S. S. (2019, May). Clinical image analysis for
detection of skin cancer using convolution neural networks. Theranostics of
Respiratory and Skin Diseases (TRSD),1(3), 61-64.
74. Anand, L., & Ibrahim, S. S. (2018). HANN: a hybrid model for liver syndrome
classification by feature assortment optimization. Journal of medical systems,
42(11), 211.
75. Singh, R.K. & Sivabalakrishnan, M. (2019, August). Classification of gene
expression data using efficient feature selection technique and resampling
method. International Journal of Engineering and Advanced Technology (IJEAT),
8(6), 406-414.
76. Singh, R.K. & Sivabalakrishnan, M. (2019, August). Microarray gene expression
data classification using a hybrid algorithm: MRMRAGA. International Journal
of Innovative Technology and Exploring Engineering (IJITEE), 8(10), 706-713.
77. Subramanian, C.B., Hemalatha, J., Balakannan, S.P & Geetha, S. (2019,
December). Improving image steganalyser performance using second order spam
features extracting through contourlet transform. International Journal of
Engineering and Advanced Technology (IJEAT), 9(IS4), 137-143.
78. Punithavathi, P., & Geetha, S. (2019, December). Cancelable biometric
transformations for e-passport security. International Journal of Engineering and
Advanced Technology (IJEAT), 9(1S3), 342-346.
79. Geetha, R., & Geetha, S. (2019, December). Multi-layered ‘odd-even’ reversible
embedding for encrypted images. International Journal of Engineering and
Advanced Technology (IJEAT), 9(1S3), 347-351.
80. Roseline, S.A., & Geetha, S. (2019, December). An efficient malware detection
system using hybrid feature selection methods. International Journal of
Engineering and Advanced Technology (IJEAT), 9(1S3), 224-228.
81. Gopal, R., Phamila, Y.A.V & Geetha, S. (2019, June). A hand geometry
verification system relating finger length, position of the finger base and palm
center. International Journal of Engineering and Advanced Technology (IJEAT),
8(5), 1974 – 1979.
82. P Balamurugan, S. A. A., Chitra, P. K. A., & Geetha, S. (2019). Multi label
learning approaches for multi species avifaunal occurrence modelling: a case
study of south eastern Tamil Nadu. International Journal of Business Intelligence
and Data Mining, 15(4), 449-477.
83. Hemalatha, J., Devi, M. K., & Geetha, S. (2019). Enhancing the JPEG image
steganography security by RSA and attaining high payload using advanced DCT
replacement method and modified quantisation table. International Journal of
Business Intelligence and Data Mining, 14(1-2), 138-154.
84. Sandhya, P., & Kantesaria, M. (2019, April). Prediction of mental disorder for
employees in IT industry. International Journal of Innovative Technology and
Exploring Engineering(IJITEE),8(6S), 374-376.
85. Venugopal Boppana, S. P. (2019). Focused crawling from the basic approach to
context aware notification architecture. Indonesian Journal of Electrical
Engineering and Computer Science, 13(2), 492-498.
86. Wagdarikar, R.R & Sandhya, P. (2019, December). Parallelism in web services:
design of parallel XML parser for web services. Indonesian Journal of Electrical
Engineering and Computer Science, 16(3),1407-1415.
87. Nivedita, M., Phamila, Y.A.V., & Harsh, P.V. (2019, June). Captioning for
motion detection for video surveillance applications using deep learning.
International Journal of Innovative Technology and Exploring Engineering
(IJITEE) , 8(8),3180-3185.
88. Nivedita, M., & Phamila, Y.A.V. (2019, October). Image captioning for affine
transformed images using image hashing. International Journal of Engineering
and Advanced Technology (IJEAT), 9(1), 4736-4741.
89. Kalaivani,K., Phamila, Y.A.V., Selvaperumal, S.K. (2019, October). Random
forest classifier for extracting water bodies from pansharpened image to detect
surface water changes. International Journal of Engineering and Advanced
Technology (IJEAT), 9(1), 4910-4915.
90. Arshad, Anbarasi, L. J., & Narendra, M., Pushbarani, S., & Dhanya. (2019).
Investigating the effect of social media campaign on german 2017 elections.
International Journal of Recent Technology and Engineering (IJEAT),5, 2123-
212.
91. Murali, S., Narayanan, S., & Prasanna, D., Anbarasi, L.J. (2019). Backtracking
based joint-sparse signal recovery for distributed compressive sense. International
Journal of Innovative Technology and Exploring Engineering (IJITEE) ,12(1),
3919-3922.
92. Surianarayanan, B., Pandian A,S., & Narayanan, S., Anbarasi, L.J. , & Raj, B.E.
(2019). Estimation of percentage of adulteration using structural similarity
index .International Journal of Innovative Technology and Exploring
Engineering, 5(12), 2129-2132.
93. Singh, S., & Jasmine, S. G. (2019). Face recognition system. International
Journal of Engineering Research & Technology (IJERT), 8(5), 263-266.
94. Dudeja, K., Baidya, S., & Gupta, S. S., & Jasmine, S.G. Low-cost 3DOF virtual
reality first aid training programs. International Journal of Engineering and
Advanced Technology (IJEAT), 8(5), 693-696.
95. Shukla, U., Mishra, A., Jasmine, S. G., Vaidehi, V., & Ganesan, S. (2019). A deep
neural network framework for road side analysis and lane detection. Procedia
Computer Science, 165, 252-258.
96. Singh, R.K., & Sivabalakrishnan, M. (2019, August). Classification of
microarray gene expression data using a hybrid approach of mRMR and AGA.
International Journal of Innovative Technology and Exploring Engineering
(IJITEE), 8(10), 706-713.
97. Jeeva, S., & Sivabalakrishnan,M. (2019, September). Utilising P300 via non-
invasive brain computer interface to control wheelchair. International Journal of
Innovative Technology and Exploring Engineering (IJITEE), 8(11), 3329-3333.
98. Naidu, C., Kumar, D., Maheswari, N., Sivagami, M., &Li, G. (2019, April).
Prediction of alzheimer’s disease using oasis dataset. International Journal of
Recent Technology and Engineering (IJRTE), 7(6S3), 36-42.
99. Ravi. R., Sowmiyasree, Maheswari, N., & Sivagami,M. (2019, October).
Improving the performance of hadoop framework using optimization process in
the information management. Advances in Science, Technology and Engineering
Systems Journal (ASTESJ), 4(5),327-333.
100. M Sivagami, M., Revathi, T., & Jeganathan, L. (2019). Dynamic
background modelling using multi-swarm optimisation. International Journal of
Bioinformatics Research and Applications, 15(1), 68-90.
101. Giri, B., Sivagami, M., & Maheswari, N. (2019, April). Frequent item set
mining for data streaming using spark with pincer search algorithm. International
Journal of Recent Technology and Engineering, 7(6), 40-45.
102. Bhavana, V., Ramesh, V., & Sivagami, M. (2019, June). Implementing
discrete cuckoo search algorithm for TSP using MPI and beowulf cluster.
International Journal of Innovative Technology and Exploring Engineering
(IJITEE),8(8),554-560,
103. Karande, S., Shelake, A., Sivagami, M., & Sophia, S. (2019, May).
Prediction of employee retention using cassandra and ensemble learning.
International Journal of Recent Technology and Engineering, Volume-8, Issue-
1,Page No: 508-512, May’2019,Scopus
104. Aiswarya, B., Sharma, A., Chakraborty, R., Malathi, G., Kumar, T.R.
(2019, March). Image processing based edibility analysis of spinach leaves using
machine learning approach. International Journal of Recent Technology and
Engineering (IJRTE), 7(6), 2097-2101.
105. Diviya, M., Malathi, G., & Karmel, A. (2019, November). Regression
based model for prediction of heart disease recumbent. International Journal of
Recent Technology and Engineering (IJRTE), 8(4), 6639-6642.
106. Murugesan, R., Sudarsanam, S.K., Malathi, G.,Vijayakumar, V.,
Neelanarayanan, V., Venugopal, R., Rekha, D., Saha, S., Bajaj, R., Miral, A., &
Malolan, V. (2019, July). Artificial intelligence and agriculture 5. 0, International
Journal of Recent Technology and Engineering(IJRTE), 8(2), 1870-1877.
107. Jackson, J.C., Rekha, D., Vijayakumar, V., & Prasath, V. B. S. (2019).
Broadcast scheduling problem in VANETS: a discrete genetic algorithm
approach. International Journal of Recent Technology and Engineering(IJRTE), 7
(6s), 360-366.
108. Jackson, J.C., & Singh, A. (2019). Fire alert system using real-time video
processing. International Journal of Innovative Technology and Exploring
Engineering(IJITE) , 8(7), 1008-1010.
109. Devi, V.K., & Ganesan, R. (2019). Trust-based selfish node detection
mechanism using beta distribution in wireless sensor network. Journal of ICT
Research and Applications, 13(1), 79-92.
110. Gayathri, R., & Neelanarayanan, V. (2019, August). Moving target
defense strategy for mitigating distributed denial of service attack in the public
cloud environment. International Journal of Engineering and Advanced
Technology, 8(6), 1112-1115.
111. Gayathri, R., & Neelanarayanan, V. (2019). Identification of regression
function and distribution model for denial of service attack in Second Life online
community using simple network management protocol. International Journal of
Web Based Communities, 15(3), 225-237.
112. Sri Vidya, B., Sriraman, H., & Rukmani, P. (2019). Optimized multi-
threading to balance energy and performance efficiency. International Journal of
Recent Technology and Engineering, 7(6), 599-60.
113. Rai, A., Vishwkarma, R., & Panjanathan, R. (2019). Automatic plant
irrigation system with real time notification. International Journal of Recent
Technology and Engineering, 8(1), 1428-1430.
114. Rani. S.U., & Neelanarayanan V. (2019). Control of anesthesia
concentration using PID controller. International Journal of Innovative
Technology and Exploring Engineering, 8(6), 356-360.
115. Rani. S.U., & Neelanarayanan V. (2019). BIS performance for CLAD
PK-PD model. International Journal of Engineering and Advanced Technology
(IJEAT), 8(5), 837-843.
116. Kumar, K.A., Vengatesan., Vincent, R., Rajesh, M., & Singhal, A. (2019).
“A novel arp approach for cloud resource management. International Journal of
Recent Technology and Engineering (IJRTE), 7(5), 260-262.
117. Venkatraj, S., Vincent, R., Vijayakumar, V., Vengatesan, K., & Rajesh,
M. (2019). Development of test automation framework for REST API testing.
Journal of Computational and Theoretical Nanoscience, 16(2), 453-457.
118. Vincent, R., & Vijayakumar, V. (2019). An enhanced virtual reality
method for diagnosing autistic children. International Journal of Recent
Technology and Engineering (IJRTE), 8(2), 3362-3365.
119. Preetha, A.D., & Kumar, T.S.P. (2019). Leveraging fog computing for a
secure and smart healthcare, International Journal of Recent Technology and
Engineering (IJRTE), 8(2), 6177–6182.
120. Quadir, M.A., & Vijayakumar, V. (2019). Combined preference ranking
algorithm for comparing and initial ranking of cloud services, Recent Advances in
Electrical and Electronic Engineering, 13(2), 260 – 275.
121. Md, A. Q., & Vijayakumar, V. (2019). Dynamic ranking of cloud services
for web-based cloud communities: efficient algorithm for rating-based discovery
and multi-level ranking of cloud services. International Journal of Web Based
Communities, 15(3), 248-270.
122. Matthew, K. M., Muhammed, A. Q., & Varadarajan, V. (2019). An
improved key management scheme in cloud storage. International Journal of
Advanced Intelligence Paradigms, 14(3-4), 197-203.
123. Shubankar, B., Chowdhary, M., & Priyaadharshini, M. (20I9). IoT device
for disabled people. Procedia Computer Science, 165, 189-195.
124. Murali, M., Bhargava, M., Snehaa, G., Anand, A., Haque, M.A., Sarobin.
M. V.R. (2019). Data analytics on IoT-based health monitoring system. Journal of
Recent Technology and Engineering (IJRTE), 8(1), 220-223.
125. Parthasarathy, E., Vaidyanathan, P., Akshay, N., Vimal, J., Manikandan,
R., Prassanna, J., Kumar, A., & Daniel, W.C.S. (2019). Development of required
power point tracking algorithm for standalone solar photovoltaic inverter.
International Journal of Recent Technology and Engineering (IJRTE), 7(6), 1578-
1582.
126. Manikandan, R., Parameshwaran, R., Prassanna, J., & Sekar, K.R. (2019).
A study on specific computational algorithms for VLSI cell partitioning problems.
International Journal on Emerging Technologies, 10(2), 67-70.
127. G. Manikandan, Krishnan, R.B., Preethivi, E., Sekar, K.R., Manikandan,
R., & Prassanna, J. (2019). An Approach with steganography and scrambling
mechanism for hiding image over images. International Journal on Emerging
Technologies ,10(1), 64-67.
128. Sethuraman, J., Manikandan, R., Sekar, K.R., Prassanna, J., & Kumar, A.
(2019). Classic search for dominant factors in web pages using search engines and
validation through data analytics using R. International Journal on Emerging
Technologies, 10(2), 117-121.
129. Rajarajeswari, S., & Neelanarayanan, V. (2019). Dynamic rule generation
and rule matching for composite environmental condition in context aware
system. Wireless Networks, 1-9.
130. Venkatesh, R., Ragala, R., & Kannan, R.J. (2019). Squeezing deep
learning into mobile devices. International Journal of Recent Technology and
Engineering(IJRTE), 7(6S), 902 – 906.
131. Jaya, R., Pillai, C.S., & Kannan, R.J. (2019). Hybrid fuzzified fish school
search based learning method for prakriti analysis. Journal of Advanced Research
in Dynamical and Control Systems, 11(2), 1777 – 1784.
132. Prabhakaran, R., & Asha, S. (2019, May). Enhancing cyber security in
power sector systems using block chain. International Journal of Recent
Technology and Engineering, 8(1), 58-62.
133. Prabhakaran, R., & Asha, S. (2019, July). Enhancing cyber security in
power sector using machine learning. International Journal of Innovative
Technology and Exploring Engineering, 8(9), 3382-3386.
134. Jayanthi, R., & Singh, K. J. (2019). A public key-based encryption and
signature verification model for secured image transmission in network.
International Journal of Internet Technology and Secured Transactions, 9(3), 299-
312.
135. Jayanthi, R., & Singh, K. J. (2019). Image encryption techniques for data
transmission in networks: a survey. International Journal of Advanced
Intelligence Paradigms, 12(1-2), 178-191.
136. Sathyarajasekaran, K., & Ganesan, R. (2019). A novel process using
impact analysis over requirement phase with impact transition model. Test
Engineering and Management, 81(11-12), 4435-4445.
137. Sathyarajasekaran, K., & Ganesan, R. (2019). An approach on software
readiness workflow with change impact analysis (SRW-CIA). International
Journal of Innovative Technology and Exploring Engineering, 8(7), 284-288.
138. Devi, T., & Ganesan, R. (2019). Environmental benefits of enhanced hecc-
elgamal cryptosystem for security in cloud data storage using soft computing
techniques. Ekoloji, 28(107), 665-677.
139. Geetha, M., Ganesan, R., & Sai, T. (2019). Performance analysis of the
machine learning algorithms on heart condition predictions. International Journal
of Recent Technology and Engineering, 8(4), 975-981.
140. Dutta, S., Parvathi, R., & Ganesan, R., (2019). Threat identification and
examination using graph based anomaly detection. International Journal of
Engineering and Advanced Technology, 9(1), 7510-7513.
141. Jayasudha, M., & Subbulakshmi, T. (2019). an efficient attribute
encryption for secure data sharing and storage in public and private clouds-a
survey. International Journal of Recent Technology and Engineering,8(1C2),
1185-1189.
142. Jayasudha M, Subbulakshmi T. “A Comparative Study of Attribute based
Encryption of Electronic Health Records in Cloud”, Journal of Advanced
Research in Dynamical and Control Systems, Volume 11, 07-Special Issue, pp.
230-247, 2019.
143. Dhanapal, A., & Nithyanandam, P. (2019). The HTTP flooding attack
detection to secure and safeguard online applications in the cloud. International
Journal of Information System Modeling and Design (IJISMD), 10(3), 41-58.
144. Dhanapal, A., & Nithyanandam, P. (2019). A review of cloud computing
adoption issues and challenges”, Recent Patents on Computer Science, 12, 1-6.
145. Dhanapal, A., & Nithyanandam, P. (2019). The slow HTTP DDoS attacks:
detection, mitigation and prevention in the cloud environment. Scalable
Computing: Practice and Experience, 20(4), 669-685.
146. Dhanapal, A., & Nithyanandam, P. (2019). The slow HTTP distributed
denial of service attack detection in cloud. Scalable Computing: Practice and
Experience, 20(2), 285-298.
147. Kapadia, A. M., & Nithyanandam, P. (2019). Secured reversible matrix
embedding based on dual image using integer wavelet and arnold transform.
Procedia Computer Science, 165, 766-773.
148. Karmel, A., Sharma, A., & Garg, D. (2019). IoT based assistive device
for deaf, dumb and blind People. Procedia Computer Science, 165, 259-269.
149. Adhithiyan, M., & Karmel, A. (2019). Novel approach of deep learning in
toxicity prediction. International Journal of Recent Technology and Engineering
(IJRTE), 7(54), 698-704.
150. Jagtap, M. M., & Devi, S. R. (2019). Securing 5G het nets in SDN using
authentication. International Journal of Innovative Technology and Exploring
Enginering, 8(8), 1297-1303.
151. Monali, P., Mohite, S., & Devi, R. (2019). Design and implementation of
ASCII based method for author attribution. International Journal of Innovative
Technology and Exploring Enginering, 8(9), 1963-1967.
152. Venkatesh, A., & Asha, S. (2019, July). Detecting denial of service attack
in wireless sensor network using energy Efficient Extreme Learning Neural
Network (EEELNN). International Journal of Recent Technology and
Engineering (IJRTE), 8(2), 5913-5918 .
153. Asha, S., & Angel, C. (2019). Creating a smart agricultural environment
using ambient intelligent technique. International Journal of Innovative
Technology and Exploring Engineering (IJITEE), 8(10), 1010-1015.
154. Asha, S., & Sarojini, S. (2019). Botnet detection on the analysis of zeus
panda financial botnet. International Journal of Engineering and Advanced
Technology (IJEAT), 8(6),1972-1976.
155. Devi, B. K., Dudeja, K., John, A. V., Marcin, K., & Subbulakshmi, T.
(2019). Symmetric measure of network traffic using packet ratio and packet
symmetry. Procedia Computer Science, 165, 112-118.
156. Devi, B. K., & Subbulakshmi, T. (2019). “Adaptive Learning and
Automatic Filtering of Distributed Denial of Service (DDoS) Attacks in Cloud
Computing Environment”, International Journal of Engineering and Advanced
Technology, 9(1S3), 200-205.
157. Devi, B. K., & Subbulakshmi, T. (2019). Cloud-based DDoS attack
detection and defence system using statistical approach. International Journal of
Information and Computer Security, 11(4-5), 447-475.
158. Manjaly, J. S., & Subbulakshmi, T. (2019). TaskTracker aware scheduler
with resource availability control for Hadoop MapReduce. International Journal
of Advanced Intelligence Paradigms, 14(3-4), 359-374.
159. Sundararaman, S. A., & SubbuLakshmi, T. (2019). Execution of scientific
workflows on IaaS cloud by PBRR algorithm. International Journal of
Computational Science and Engineering, 19(4), 455-463.
160. Prabhakaran, R., & Asha, S. (2019, July). Analysis of cyber attacks
vulnerabilities in electrical power systems. International Journal of Innovative
Technology and Exploring Engineering (IJITEE), 8(9), 925-928.
161. Nisha, V. M., & Jeganathan, L. (2019). A symmetry based anomaly
detection in brain using cellular automata for computer aided diagnosis.
Indonesian Journal of Electrical Engineering and Computer Science, 14(1), 471-
477.
162. Patro, S.J. , & Nisha, V.M. (2019). Early detection of alzheimers disease
using image processing. International Journal of Engineering Research and
Technology, 8(5), 468-471.
163. Patro, S.J., & Nisha, V. M. (2019). Real time Video Analytics for object
detection and face identification. International Journal of Engineering Research
and Technology, 8(5), 462-467.
164. Lakshmi, D.V., & Jeganathan, L. (2019). Graph Self-Replication System.
Complex systems, 28(3), 313-323.
165. Sivagami, M., Revathi, T., & Jeganathan, L. (2019). Dynamic background
modelling using multi-swarm optimisation. International Journal of
Bioinformatics Research and Applications, 15(1), 68-90.
166. Daniel, D. C., & Shyamala, L. (2019, August). An insight on sentiment
analysis research from text using deep learning methods. International Journal of
Innovative Technology and Exploring Engineering, 8(10), 2033-2048.
167. Vijayakumar, D.S., & Ganapathy, S. (2019). Feature reduction using lasso
hybrid algorithm in wireless intrusion detection system. International Journal of
Innovative Technology and Exploring Engineering (IJITEE), 8(11), 1476-1483.
168. Kavin, B. P., & Ganapathy, S. (2019). A novel M-commerce data security
mechanism using elliptic curve cryptography. International Journal of Innovative
Technology and Exploring Engineering (IJITEE), 8(10), 847-851.
169. Rajeswari, A.R., Kulothungan, K., Ganapathy, S., & Kannan, A. (2019).
Trust aware SVM based IDS for mitigating the malicious nodes in MANET.
International Journal of Innovative Technology and Exploring Engineering, 8(8),
185-197.
170. Prabha, A. J., Bhargavi, R., & Harish, B. (2019). Predictive model for
dyslexia from eye fixation events. International Journal of Engineering and
Advanced Technology,9(3), 2249 – 8958.
171. PS, M. G., & Bhargavi, R. (2019). Selection of Important Features for
Optimizing Crop Yield Prediction. International Journal of Agricultural and
Environmental Information Systems (IJAEIS), 10(3), 54-71.
172. Arumugam, S., & Bhargavi, R. (2019). A survey on driving behavior
analysis in usage based insurance using big data. Journal of Big Data, 6(1), 86.
173. Kumar, J. S., & Maheswari, N. (2019). Privacy preservation analysis in
social network graphs for avoiding community detection and publishing sensitive
information’ International Journal of Innovative Technology and Exploring
Engineering (IJITEE), 8(6), 888 – 893.
174. Kumar, G.B., & Phull, D.K. (2019). Efficient search mechanism from
large scale corpora for domain-specific language modeling in speech recognition,
International Journal of Engineering and Advanced Technology (IJEAT), 8-6,
1682-1689.
175. Saluja, G. S., & Maheswari, N. (2019). Comparative Study to Predict the
Kidney Disease for the Clinical Data Using Classification Techniques. Indian
Journal of Public Health Research & Development, 10(8), 73-77.
176. Kumar, J.S, & Maheswari, N. (2019). Privacy preservation analysis in
social network graphs for avoiding community detection and publishing sensitive
information. International Journal of Innovative Technology and Exploring
Engineering, 8(6),888–893.
177. Chandiramani, K., Garg, D., & Maheswari, N. (2019). Performance
Analysis of Distributed and Federated Learning Models on Private Data. Procedia
Computer Science, 165, 349-355.
178. Balasundaram, A., & Chellappan, C. (2019). Computer vision
based system to detect abandoned objects. International Journal of Engineering &
Advanced Technology (IJEAT), 9(1), 4000-4010.
179. Balasundaram, A., Kumar, S.A., & Kumar, S.M. (2019). Optical flow
based object movement tracking. International Journal of Engineering &
Advanced Technology (IJEAT), 9(1), 3913-3916.
180. Pradeep, K. V., & Vijayakumar, V. (2019, August). Energy-efficient
consolidation of virtual machines in cloud data centers. International Journal of
Engineering and Advanced Technology(IJEAT), 8(6), 446-449.
181. Pradeep, K. V., & Vijayakumar, V. (2019, June). Secure key management
system in cloud environment for client data. International Journal of Engineering
and Advanced Technology(IJEAT), 8(6), 1490-1496.
182. Pradeep.K. V., Vijayakumar, V., & Sathiyanarayanan, M. (2019, May).
Visual analytics on spatial time series for environmental data. International
Journal of Recent Technology and Engineering(IJRET), 8(1C2), 1173-1181.
183. Pradeep.K. V., & Vijayakumar, V. (2019, May). A proposed client based
key management framework to secure information in cloud storage for public
SaaS”, International Journal of Recent Technology and Engineering(IJRET), 8(1),
2148-2153, May 2019.
184. Sowmiyasree, R. R., Maheswari, N., & Sivagami, M. (2019). Improving
the performance of hadoop framework using optimization process in the
information management. Advances in Science, Technology and Engineering
Systems, 4(5), 327–333.
185. Giri, B., Sivagami, M., & Maheswari, N. (2019). Frequent item set mining
for data streaming using spark with pincer search algorithm. International Journal
of Recent Technology and Engineering, 7(6), 40–45.

186. Sariki, T. P., & G, B. K. (2019). Exploiting visual content of book front
cover to aggrandize the content based book recommendation system. International
Journal of Innovative Technology and Exploring Engineering, 8(12), 1631-1634.
187. Ragala, R & Kumar, B. (2019). HOSVD based hybrid CNN-ELM model
for scene categorization. International Journal of Advanced Trends in Computer
Science and Engineering, 8(6), 3498 - 3503.
188. Ragala, R., Nagelli, A., & Saleena, B. (2019). Automotive rank based
ELM using iterative decomposition. International Journal of Intelligent
Engineering and Systems, 12(5), 287-298.
189. Ramesh, R., Ramya, V., & Kannan, R.J. (2019). Squeezing deep learning
into mobile devices. International Journal of Recent Technology and Engineering,
7(6S), 902-906.
190. Kumar, S.M., Ashokkumar, S., & Balasundaram, A. (2019). Providing
enhanced resource management framework for cloud storage. International
Journal of Engineering & Advanced Technology (IJEAT), 9(1), 3903-3908.
191. Sariki, T.P., Kumar, G.B.,Shukla, U., & Mishra, A. (2019). An adroit
approach for extractive text summarization. International Journal of Engineering
and Advanced Technology, 8 (5), 2047-2051.
192. Jothi, R., Mohanty, S. K., & Ojha, A. (2019). DK-means: a deterministic
k-means clustering algorithm for gene expression analysis. Pattern Analysis and
Applications, 22(2), 649-667.
193. Vijayakumar, V., Vairavasundaram, S., Logesh, R., & Sivapathi, A.
(2019). Effective knowledge based recommender system for tailored multiple
point of interest recommendation. International Journal of Web Portals (IJWP),
11(1), 1-18.
194. Pradeep, K. V., Vijayakumar, V., & Subramaniyaswamy, V. (2019). An
Efficient Framework for Sharing a File in a Secure Manner Using Asymmetric
Key Distribution Management in Cloud Environment. Journal of Computer
Networks and Communications, 2019.
195. Chauhan, A., Vijayakumar, V.,Sliman, L. (2019). Ontology matching
techniques: a gold standard model. International Journal of Innovative
Technology and Exploring Engineering, 8(6S), 370-373.

2018
196. Sudhakar, M., & Meena, M. J. (2018). A novel method to detect foreground
region using morphological operations with block based enhancement for underwater
images. International Journal of Engineering & Technology, 7(3), 1751-1756.
197. Anusooya, G., Vijayakumar, V., Punitha, K., Sathyarajasekaran, K., &
Bharathiraja, S. (2018). A comparative analysis about load balancing algorithms
using cloud simulator. International Journal of Civil Engineering & Technology
(IJCIET), 9(7), 476-483.
198. Prakash, B., & Viswanathan, V. (2018). Ontology based risks
management model for agile software development. Journal of Advanced
Research in Dynamical and Control Systems, 10(11), 319-330.
199. Premalatha, M., Viswanathan, V., Suganya, G., Kaviya, M., & Vijaya, A.
(2018). Educational data mining and recommender systems survey. International
Journal of Web Portals (IJWP), 10(1), 39-53.
200. Sathyarajasekaran, K., & Ganesan, R. (2018). Change impact analysis
(CIA) and its role in analysis and design of software development. International
Journal of Engineering and Advanced Technology (IJEAT), 8(2S), 275-283.
201. Sathyarajasekaran, K., & Ganesan, R. (2018). Effect of code generation in
change impact analysis using MVC design pattern. Journal of Advanced Research
in Dynamical Control Systems (JARDCS),10(1), 2417-2429.
202. Kumar, B.S. (2018). Simplifying use case transaction identification by
using architect’s use case diagram. Journal of Advanced Research in Dynamical
& Control Systems, 10(9), 2145-2156.
203. Rao, B.P. (2018). Software development effort estimation: a framework.
International Journal of Applied Business and Economic Research, 15(22), 749-
763.
204. Rajarajeswari, S., & Neelanarayanan, V. (2018). Consistent context aware
behaviour in smart home environment, International Journal of Sustainable
Society, 10(4), 300-312.
205. Poornima, N., & Saleena, B. (2018). Automatic Annotation of Educational
Videos for Enhancing Information Retrieval. Pertanika Journal of Science &
Technology, 26(4), 1571-1590.
206. Ramkumar, A.S, Poorna, B., & Saleena, B. (2018). Ontology based text
document clustering for sports. Journal of Engineering and Applied Sciences,
13(11), 4073-4079.
207. K Dinesh Kumar and E Umamaheswari, “Efficient Cloud Resource
Scaling based on Prediction Approaches”, International Journal of Engineering &
Technology (UAE), ISSN: 2227-524X, Vol. 7, No 4.10, 2018.
208. Kumar, K. D., & Umamaheswari, E. (2018). Efficient Cloud Resource
Scaling based on Prediction Approaches. International Journal of Engineering &
Technology, 7(4.10).
209. Kumar, K. D., & Umamaheswari, E. (2018). Resource provisioning in
cloud computing using prediction models: a survey. International Journal of Pure
and Applied Mathematics, 119(9), 333-342.
210. George, B., & Umamaheswari, E. (2018). An Overview of the impact of
fog computing and internet of things on cloud computing and its challenges.
Journal of Advance Research in Dynamical and Control Systems, 10(12), 882-
887.
211. Maheswari, S., & Selwyn, J. (2018, December). A review on the quality of
service of web services International Journal of Mechanical Engineering and
Technology. 9(12), 414–424.
212. Ranganathan, S., & Selwyn, J. (2018, December). A study on the use of
datamining to improve performance and security of intelligent transportation
systems. International Journal of Mechanical Engineering and Technology,
9(13), 810–818.
213. Mabel, V.H., & Selwyn, J. (2018, September). Preliminary results on the
implementation of music expert system. International Journal of Engineering and
Applied Sciences, 13(14), 5814-5819.
214. Ranganathan, S., & Selwyn, J. (2018, June). Automatic extraction of
acronyms from english newspapers. International Journal of Mechanical
Engineering and Technology, 9(6), 817–826.
215. M Priya, M. K., & Selwyn, J. (2018). KM trajectory schema service frame
work for software development organizations. International Journal of
Engineering &Technology, 7(3.12), 616-620.
216. Selwyn, J., & Sundaram, M. K. (2018). Evaluating the dynamic metrics
for object-relational modeling. International Journal of Knowledge based
Computer Systems, 6(1), 1-6 .
217. Hemalatha, C. S., Sankaran, V., Vaidehi, V., Sharmi, P., Lavanya, B.,
Vasuhi, S., & Kumar, R. (2018). Symmetric uncertainty based search space
reduction for fast face recognition. International Journal of Intelligent
Information Technologies (IJIIT), 14(4), 77-97.
218. Ibrahim, S. S., Sivabalakrishnan, M., & Ibrahim, S. P. (2018, November).
Lazy learning associative classification in mapreduce framework. International
Journal of Recent Technology and Engineering (IJRTE), 7(4S), 168-172.
219. Suganeshwari, G., SP, S. I., & Li, G. (2018). Lazy collaborative filtering
with dynamic neighborhoods. Information discovery and delivery. Information
Discovery and Delivery,46(2), 95-109.
220. Tamrakar, P., & Ibrahim, S. S. (2018). Attribute ranking based lazy
learning associative classification. ARPN Journal of Engineering and Applied
Sciences, 13(11), 3698-3705.
221. Suganeshwari, G., & Ibrahim, S. P. (2018). A comparative study on
similarity measures in collaborative filtering algorithms for movie
recommendation. International Journal of Pure and Applied Mathematics,
119(15), 1495-1504.
222. Tamrakar, P., & Ibrahim, S. S. (2018). A review of lazy learning
associative classifications. International Journal of Pure and Applied
Mathematics, 119(15), 1507-1515.
223. Wagh, T. A., Bhargavi, R., Wagh, T. A., & Samant, R. M. Forest cover
type prediction using cartographic variables. International Journal of Computer
Applications, 975, 8887.
224. Vijayalakshmi, A., PAUL, C. J. (2018, October). Big data health care
system using distributed wearable sensors. International Journal of Engineering
& Technology, 7(4.10), 429-431.

225. Prabha A, J., R, B., & Ragala, R. (2018). Prediction of dyslexia using
support vector machine in distributed environment. International Journal of
Engineering & Technology, 7(4), 2795-2799.
226. Gopal, P.S.M., & Bhargavi, R. (2018) . Feature selection for yield
prediction using boruta algorithm. International Journal of Pure and Applied
Mathematics, 118(22), 139-144.
227. Sarobin, V.R. M., Rukmani, P., Jasmine. S, G., & Harini, S. (2018).
Application of data analytics for IoT based healthcare system, International
Journal of Engineering & Technology, 7(3-8), 169 – 172.
228. Naidu, C., Kumar, D., Maheswari, N., & Sivagami, M. (2018). Prediction
of alzheimer's disease using brain images. Research Journal of Pharmacy and
Technology, 11(12), 5365-5368.
229. Thakur, V. A., Mabel, V.H., & Dhingra, V. (2018). A critical literature
review on patent document mining, analysis and evaluation. Journal of Advanced
Research in Dynamical and Control Systems, 13, pp. 2260-2271.
230. Subramanian, A., Sivagami, M., & Maheswari, N. (2018). Improved
speeded up robust features for low contrast images. International Journal of
Engineering and Technology, 7(4), 4697-4701.
231. Khobragade, A.N., Maheswari, N., Sivagami, M. (2018). Analysing the
housing rate in a real estate informative system, International Journal of Civil
Engineering and Technology, 9(5), 1156-1164.

232. Mayankkushwah, S.A., & Bharathiraja, S. (2018). Detection of malware in


windows operating system, International Journal of Pure and Applied
Mathematics, 120(6), 1219-1240, 2018.
233. Prassanna, J., Prabhakaran, R., Vincent, R., Nawas, K. K., & Geetha, M.
(2018). IOT-Enabled efficient solid waste management system towards building
smart city. International Journal of Civil Engineering and Technology (IJCIET),
9(12), 603-611.
234. Jackson, J. C., & Vijayakumar, V. (2018). A review on congestion control
system using APU and D-FPAV in VANET. International Journal of Advanced
Intelligence Paradigms, 10(4), 391-400.
235. Ponraj, A. S., & Jackson, C. (2018). NFC based parking system for smart
cities. ARPN Journal of Engineering and Applied Sciences, 13 (11), 3758-3764.
236. Jackson, J.C., & Vijayakumar, V. (2018). Taxonomy on evolutionary
computation approaches in vehicular adhoc networks, International Journal of
Pure and Applied Mathematics,120 (8), 169-177.
237. Jyothi, K., & Jackson, J.C. (2018). A time-based approach for solving the
dynamic path problem in vanets – an extension of ant colony optimization,
Journal of Engineering Science and Technology,13 (3), 813-821.
238. Devi, V.K., Gururaj, A.D.M., Kavya, A., & Umamaheswari, E. (2018).
Truck tracking and alerts monitoring system. International Journal of Civil
Engineering and Technology, 9, 105-111.
239. Gayathri, R., & Neelanarayanan, V. (2018). DoS detection solution for
cloud platform using SNMP. Int J Pure Appl Math, 119(11), 175-83.
240. Sivakumar, V., & Rekha, D. (2018). Underwater acoustic sensor node
scheduling using an evolutionary memetic algorithm. Journal of
Telecommunications and Information Technology, 1(1), 88-94.
241. Priya R,P., Sanjay, A.R., Gupta, Y.V & Rekha, D. (2018, July).
Investigating feasible tool for swarm robotic based oil skimming application.
International Journal of Engineering and Technology, 7(1), 960-967.
242. Alamelu, N., & Kumar, T.S.P. (2018). Unique Identical Weightage (UIW)
model for real time customer search queries. International Journal of Recent
Technology and Engineering(IJRTM), 14(1), 1612–1621.
243. Kumar, T. P., & Krishna, P. V. (2018). Power modelling of sensors for
IoT using reinforcement learning. International Journal of Advanced Intelligence
Paradigms, 10(1-2), 3-22.
244. Mathew, S. A., & Md, A. Q. (2018). Evaluation of blockchain in capital
market use-cases. International Journal of Web Portals (IJWP), 10(1), 54-76.
245. Matthew, K. M., & Md, A. Q. (2018). Analysis framework for logs in
communication devices. International Journal of Web Portals (IJWP), 10(1), 15-
26.
246. Maheswari,R., Rani, S., & Sharmila, P.(2018). IoT driven vehicle license
plate extraction approach, International Journal of Engineering and Technology
(UAE), 7 (2), 457-459.
247. Maheswari, R., Gomathy, V., & Sharmila, P. (2018). Cancer detecting
nanobot using positron emission tomography. Procedia Computer Science, 133,
315-322.
248. Maheswari, R., Rani, S., & Sharmila,P. (2018). Real time environment
simulation through virtual reality. International Journal of Engineering and
Technology (UAE), 7(2), 404-406.
249. Maheswari, R., Sheeba, S., Gnanamalar, R., Sharmila, P., & Gomathy, V.
(2018). Solar powered system-on-chip for meteorological data station.
International Journal of Pure and Applied Mathematics, 118(20), 1225-1229.
250. Priyaadharshini, M., & Vinayaga Sundaram, B. (2018). Evaluation of
higher‐order thinking skills using learning style in an undergraduate engineering
in flipped classroom. Computer Applications in Engineering Education, 26(6),
2237-2254.
251. Gondalia, A., Dixit, D., Parashar, S., Raghava, V., Sengupta, A., &
Sarobin, V. R. (2018). IoT-based healthcare monitoring system for war soldiers
using machine learning. Procedia computer science, 133, 1005-1013.
252. Vijaya, A., & Venkataraman, N. (2018). Modernizing Legacy Systems: A
Re-Engineering Approach. International Journal of Web Portals (IJWP), 10(2),
50-60.
253. Shanthi, S., Kannan, R. J., & Santhi, S. (2018). Efficient secure system of
data in cloud using steganography based cryptosystem with FSN. Materials
Today: Proceedings, 5(1), 1967-1973.
254. Gayathri, M., & Kannan, R. J. (2018). Ontology based Indian medical
system. Materials Today: Proceedings, 5(1), 1974-1979.
255. Kumar, P. S., & Kannan, R. J. (2018). An Enhanced and Efficient
Approach for Improving the Performance of HPC Environment Using Map-
Reduce With MARIANE. Materials Today: Proceedings, 5(1), 1980-1988.
256. Naresh, K., & Kannan, R. J. (2018). An Enumeration of Radiotherapy
Terminologies, Planning and its Optimization. Materials Today: Proceedings,
5(1), 1048-1056.
257. Prabakaran, N. (2018). Smart Objects Assisted Event Detection System
Using Wireless Sensor Networks. Materials Today: Proceedings, 5(1), 1063-
1070.
258. Kumar, R, S., & Kannan, R. J. (2018). Review of Advancements in Multi-
tenant Framework in Cloud Computing. Indonesian Journal of Electrical
Engineering and Computer Science, 11(3), 1102-1108.
259. Purniemaa, P., & Kannan, R. J. (2018). Cascaded neural network based
data mining strategy for cloud intrusion detection. Indonesian Journal of
Electrical Engineering and Computer Science, 11(3), 1094 – 1101.
260. Jeyapriya, J., Umadevi, K.S., & Kannan, R. J. (2018). Automated
detection of microaneurysms using probabilistic cascaded neural network.
Indonesian Journal of Electrical Engineering and Computer Science, 11(3), 1083
– 1093.
261. Shanmugavel, S., Kannan, R. J., & Sudhkar, A.V. (2018). Handwritten
optical character extraction and recognition from catalogue sheets. International
Journal of Engineering and Technology, 7(4.5), 36 – 39.

262. Velmurugan, J., & Kannan, R. J. (2018). Dynamic trust factor based
energy efficient relay node selection in WHSNs”, Journal of Engineering and
Applied Sciences, 13(6), 1326 – 1330.
263. Rai, A., & Kannan, R. J. (2018). Differed restructuring of neural
connectome using evolutionary neurodynamic algorithm for improved M2M
online learning. Procedia computer science, 133, 298-305.
264. Kirthica, S., & Sridhar, R. (2018). Securely communicating with an
optimal cloud for intelligently enhancing a cloud's elasticity. International
Journal of Intelligent Information Technologies (IJIIT), 14(2), 43-58.
265. Kushwah, M., Bharathiraja, S., & Asha, S. (2018). Detection of malware
in windows operating system. International Journal of Pure and Applied
Mathematics, 120(6), 1219 – 1240.
266. Jayanthi, R., & Singh, K. J. (2018). Encrypted image-based data hiding
technique using elliptic curve ElGamal cryptography. International Journal of
Reasoning-based Intelligent Systems, 10(3-4), 279-285.
267. Sarojini, S., & Asha, S. (2018). Study of fighting financial botnets
crimeware toolkits. International Journal of Pure and Applied Mathematics,
118(24), 1-12.
268. Prabhakaran, R., & Asha, S. (2018). Enhancing cyber security in power
substation using RSA algorithm and LSB stegnography methodology.
International Journal Of Pure And Applied Mathematics ,118 (24), 1-17.
269. Rishabh, T., & Asha, S. (2018). Network traffic analysis using weka tool,
International Journal of Pure and Applied Mathematics, 118 (24), 1-14.
270. Reddy, M., Bogati, Asha, S. (2018). Orchestration framework and fabric
deployment, International Journal of pure and Applied Mathematics, 118 (24),1-
17.
271. Uday, P., Shankar, Alok, C., Asha, S. (2018). Data mining & predictive
analysis on airlines performance, International Journal Pure and Applied
Mathematics, 118 (24), 1-12.
272. Prabhakaran, R., & Asha, S. (2018). Analysis of cyber physical
vulnerability index in a power station. International Journal of Pure and Applied
Mathematics. 118 (24), 1-9.
273. Agarwal, S., Patel, F., Chaturvedi, P., Asha, S. (2018). A Novel Approach
for Communication among Blind, Deaf and Dumb People. International Journal
of Pure and Applied Mathematics, 118(24), 1-13.
274. Sanmay, K., & Asha, S. (2018). Analysis of data from vehicle data
recorder in automobile vehicles using machine learning. International Journal of
Pure and Applied Mathematics,118 (24), 1-6.
275. Rakhesh, B., & Devi, S.R. A survey to analyse mitigation techniques for
distributed denial of service attacks. International Journal of Civil Engineering
and Technology, 9(11), 1437–1446.
276. Karmel, A., Adhithiyan, M ., Kumar. P.S. (2018, May). Machine learning
based approach for pothole detection, International Journal of Civil Engineering
and Technology (IJCIET), 9(5), 882–888
277. Geetha, M., & Ganesan, R. (2018). Enhanced cuckoo search algorithm for
energy efficient cooperative communication in wireless body area networks
(WBAN), Journal of Advanced Research in Dynamical and Control Systems,
10(10), 2443-2450.

278. Sangeetha, G., Vijayalakshmi, M., Ganapathy, S., & Kannan, A. (2018). A
comprehensive analysis of congestion control models in wireless sensor networks.
International Journal of Strategic Information Technology and Applications
(IJSITA), 9(4), 15-37.

279. Nisha., M, & Jeganathan, L. (2018). Classification of two dimensional


cellular automata rules for symmetric pattern generation”, Symmetry, 10(12), 772.
280. Rao, U.S., & Jeganathan, L. (2018). Replication of a binary image on a
one-dimensional cellular automaton with linear rules, Complex Systems, 27(4),
415-430.
281. Thangaramya, K., Ganapathy, S., Sairamesh, L., Kulothungan, K., &
Arputharaj, K. (2018). Data anonymisation of vertically partitioned data using
map reduce techniques on cloud. International Journal of Communication
Networks and Distributed Systems, 20(4), 519-531.

282. Munavar, M., & Pattabiraman,V. (2018), Analysis of supervised machine


learning techniques on the application of the indian coastal dataset. International
Journal of Pure and Applied Mathematics, 118(18), 1913-1923.
283. Sriraman, H., & Pattabiraman, V. (2018, March), Extending lifetime
reliability model for multi-threaded architectures. International Journal of Next-
Generation Computing, 9(1), 51-65, 2018.
284. Mehfooza, M., & Pattabiraman, V. (2018). SP-DDPT: a simple
prescriptive-based domain data preprocessing technique to support multilabel-
multicriteria learning with expert information. International Journal of Computers
and Applications. 1-7.
285. Rosaline, A., & Parvathi.R. (2018). Sensing the mood on crimes against
women by exploring social media using dimensional model. International Journal
of Engineering and Technology(UAE), 7 (2.20), 344-348.
286. Monika,M., & Parvathi, R., (2018). Correlation analysis of community
detection in social network of big data methodical using set theorem.
International Journal of Engineering and Technology(UAE), 7 (2.21), 398-401.
287. Dharini., R, & Parvathi, R. (2018). Event detection from Twitter – a
survey. International Journal of Web Information Systems, 14 (3), 262-280.
288. Shyamala, L., & Balaji, A. (2018). Adaptive rank based scheduling in an
institutional cloud oriented distributed datacenters. International Journal of Civil
Engineering and Technology, 9,(7), 1241–1248.
289. Kumar, J. S., & Maheswari, N. (2018). An approach towards privacy
preservation of sensitive information in social networked graphs’ Journal of
Advanced Research in Dynamical and Control Systems, 10 (10), 2363 – 2374.
290. Nirmala, G., Geetha, S., & Selvakumar, S. (2018). Optimization of path
planning problem of a mobile robot using hybrid exploration and exploitation
with hill climbing technique. Sylwan Journal, 162(5), 58-71.
291. Geetha, S., Punithavathi, P., Infanteena, A. M., & Sindhu, S. S. S. (2018).
A literature review on image encryption techniques. International Journal of
Information Security and Privacy (IJISP), 12(3), 42-83.
292. Angaleeswari, K., Ezhilarasan, T., Perumal, M., Geetha, S., &
Swaminathan, V. (2018, May) .Study on k - extensibility and weakly k -
extensibility in harary graphs (Hm,n), for specific values of m and n.
International Journal of Mathematics Trends and Technology (IJMTT), 1-7.
293. Sandhya, P. (2018, July). Ensemble learning on forecasting fine grained
pollutant levels in air using random forest, naive bayes, decision tree algorithms.
International Journal of Civil Engineering and Technology (IJCIET),9(7), 303-
313.
294. Sandhya P., Gupta, S., Saikishan, G., & Garg, H.M. (2018). Smart home
using IOT. ARPN Journal of Engineering and Applied Sciences,13(13),4224-
4230.
295. Suseela, S., & Phamila, Y.A.V. (2018). Low complexity secured image
compression for wireless image sensor network with chaotic map. International
Journal of Pure and Applied Mathematics, 119(16), 4861-4870.
296. Kalaivani, K., & Phamila, Y.A.V .(2018). Modified Wiener Filter for
Restoring Landsat Images in Remote Sensing Applications. Pertanika Journal of
Science & Technology, 26(3), 1005-1018.
297. Sekar, S. N, Anbarasi, L. J., & Dhanya, D. (2018). An efficient distributed
compressive sensing framework for reconstruction of sparse signals in mechanical
systems. International Journal of Mechanical Engineering and Technology
(IJMET), 9(13), 1286-1292.
298. Khobragade, A.N., Maheswari, N., & Sivagami, M.(2018). Analyzing the
housing rate in a real estate informative system: a prediction analysis.
International Journal of Civil Engineering & Technology (IJCIET), 9(5), 1156-
1164.
299. Ragala, R., Prabha, A.J., & Bhargavi, R. (2018). Prediction of dyslexia
using support vector machine in distributed environment. International Journal of
Engineering & Technology, 7(4), 2795-2799.
300. NS, G. R. S., Maheswari, N., Samraj, A., & Vijayakumar, M. V. (2018).
An Efficient Score level Multimodal Biometric System using ECG and
Fingerprint. Journal of Telecommunication, Electronic and Computer Engineering
(JTEC), 10(4), 31-36.
301. Sheryl Oliver, A., Anuradha, M., Jean Justus, J., & Maheshwari, N.
(2018). Optimized low computational algorithm for elderly fall detection based on
machine learning techniques.
302. Anuradha, M., Sheryl Oliver, A., Jean Justus, J., & Maheswari, N. (2018).
IOT based monitoring system to detect the ECG of soldiers using GPS and GPRS.
303. Kumar, J.S., & Maheswari, N. An approach towards privacy preservation
of sensitive information in social networked graphs. Journal of Advanced
Research in Dynamical and Control Systems, 10(10), 2363-2374.
304. Sariki, T. P., & Kumar G, B. (2018). A book recommendation system
based on named entities. Annals of Library and Information Studies (ALIS),
65(1), 77-82.
305. Krishnan E, G., & Malathi, G. (2018). Contactless novel hand wrist
biometrics feature detection using surf, International Journal of Civil Engineering
and Technology (IJCIET), 9(11), 1102–1114.
306. Rajesh, K. B., Bhat, M. S., Vijayalakshmi, C., & Raj, A. N. J. (2018).
Model to estimate the salt and pepper noise density level on gray-scale digital
image. EAI Endorsed Transactions on Energy Web, 5(18), 1-7.
307. Srikar, G., & Reshmi, T. R. (2018). A Fuzzy-Logic Based Clustering
Algorithm in WSN to Extend Network Lifetime. International Journal of Applied
Engineering Research, 13(10), 7711-7718.
308. Logesh, R., Subramaniyaswamy, V., & Vijayakumar, V. (2018). A
personalised travel recommender system utilising social network profile and
accurate GPS data. Electronic Government, an International Journal, 14(1), 90-
113.
309. Mohanraj, V., Vaidehi, V., Vasuhi, S., & Kumar, R. (2018). A Novel
Approach for Face Recognition under Varying Illumination Conditions.
International Journal of Intelligent Information Technologies (IJIIT), 14(2), 22-
42.
310. Chakkaravarthy, S. S., Vaidehi, V., & Rajesh, P. (2018). Hybrid analysis
technique to detect advanced persistent threats. International Journal of Intelligent
Information Technologies (IJIIT), 14(2), 59-76.
311. Sibi Chakkaravarthy, S., Sangeetha, D., Venkata Rathnam, M., Srinithi,
K., & Vaidehi, V. (2018). Futuristic cyber-attacks. International Journal of
Knowledge-based and Intelligent Engineering Systems, 22(3), 195-204.
312. Mohanraj, V., Vaidehi, V., Vasuhi, S., & Kumar, R. (2018). A Novel
Approach for Face Recognition under Varying Illumination Conditions.
International Journal of Intelligent Information Technologies (IJIIT), 14(2), 22-
42.
313. Chakravarthi, K. K., & Vijayakumar, V. (2018). Workflow Scheduling
Techniques and Algorithms in IaaS Cloud: A Survey. International Journal of
Electrical and Computer Engineering, 8(2), 853.
314. Brindha, J., & Vijayakumar, V. (2018). Framework and Implementation of
Marine Dumping Area’s Monitoring System Based on GPRS. Indonesian Journal
of Electrical Engineering and Computer Science, 9(2), 322-326.
315. Brindha, J., & Vijayakumar, V. (2018). Proximity Sensors Based Marine
Engine Fault Detection using CAN Protocol. Indonesian Journal of Electrical
Engineering and Computer Science, 9(3), 619-623.
316. Basha, A., & Vijayakumar, V. (2018). Mobile-Robot Navigation through
Fuzzy Behavioral Algorithm & Vector-Polar Histogram Algorithm. Indonesian
Journal of Electrical Engineering and Computer Science, 9(3), 565-571.

2017
317. Sudhakar, M., & Meena, M.J. (2017, November). An efficient eye region
detection by gamma correction for real time application. Journal of Advanced Research
in Dynamical and Control Systems, 9(8), 237-248.
318. Pradhan, G.K, Gollapalli, S, Meena, M.J & Ibrahim, S. P.S. (2017). Survey on
advisor intelligence through purchase patterns and sales analytics. Asian Journal of
Pharmaceutical and Clinical Research, 10(13), 302-304.
319. Nath, N. D., Jha, S., Meena, J.M., & Ibrahim, S. P.S. (2017). A survey paper on
elastic search similarity algorithm. Asian Journal of Pharmaceutical and Clinical
Research, 10(13), 361-364.
320. Sharma, P., Meena, M. J., & Ibrahim, S. P.S. (2017). Media mix modeling
comparison of interaction model to simple log-linear model. Asian Journal of
Pharmaceutical and Clinical Research, 10(13), 390-393.
321. Vaidya, P. V., Meena, M. J., & Ibrahim, S. P.S. (2017). Cloud-based data
analytics framework for mobile app event analysis. Asian Journal of Pharmaceutical and
Clinical Research, 10(13), 207-210.
322. Punitha,K. (2017). Enactment of face recognition algorithm for attendance
system. International Journal of Applied Engineering Research, 12(24), 14014-14018.
323. Premalatha, M., Viswanathan, V., Ravali, R., & Akshay, A. (2017).
Recommender systems for course re-registration. International Journal of
Economic Research,14(16), 319-327.
324. Prakash, B., & Viswanathan, V. (2017). A survey on software estimation
techniques in traditional and agile development models. Indonesian Journal of
Electrical Engineering and Computer Science, 7(3), pp.877-886.
325. Ruikar, A.V., & Viswanathan, V. (2017). Bus location and route system
using IoT . Asian Journal of Pharmaceutical and Clinical Research, Asian
Journal of Pharmaceutical and Clinical Research, Special issue on Advances in
Smart Computing and Bioinformatics, 1(1),129-132.
326. Jayasudha ,R., Viswanathan, V., & Shanthi, P. (2017). Implementation of
reuse in the Agile software development process SCRUM. Asian Journal of
Pharmaceutical and Clinical Research, Special issue on Advances in Smart
Computing and Bioinformatics, 1(1),143-147.
327. Anusooya, G., Jackson, C., & Sathyarajasekaran, K., & Kannan. K.
(2017). RFID based smart car parking system. International Journal of Applied
Engineering Research,12(17), 6559-6563.
328. Nachiyappan, S. and Selwyn, J. (2017). Pre hadoop and post hadoop
validations for big data. International Journal of Mechanical Engineering and
Technology. 8(10), 1(1), 608-616.
329. Kumar, B.S. (2017). Evaluation of capturing architecturally significant
requirements methods. Asian Journal of Pharmaceutical and Clinical Research,
10,1(1), 122-128.
330. Ghosh, S., Kumar, B.S., & Deivanai, K. (2017). Detection of whales
using deep learning methods and neural networks. Asian Journal of
Pharmaceutical and Clinical Research, 10, 1(1), 489-494.
331. Rao, B.P. (2017). A case study on software project development cost,
schedule & effort estimation. Asian Journal of Pharmaceutical and Clinical
Research, Special issue on Advances in Smart Computing and Bioinformatics,
1(1),10-14.
332. Borah, R., Rajarajeswari, S. (2017). A study on application of machine
learning and computer vision for retail projects. Asian Journal of pharmaceutical
and clinical research, 1(1), 476-480.
333. Saikia, S., Saleena, B., & Prakash, B. (2017). Dynamic location area
planning in cellular network using frequent pattern mining. Asian Journal of
Pharmaceutical and Clinical Research,10(13), 324-327.
334. Tejashwini, K., Saleena, B., Prakash, B., & Shopia, S. (2017). Analyzing
the stock market behavior using event study and sentiment analysis on twitter
posts. International Journal of Pure and Applied Mathematics, 117(15), 387 –
396.
335. Sangavi, V.P., & Saleena, B. (2017, April). Unmanned image narration.
Asian Journal of Pharmaceutical and Clinical Research, 10(13), 378-381.
336. Poornima, N., Agrawal, S., & Saleena, B. (2017). Prior ontology selection
and query translation for information search. Asian Journal of Pharmaceutical
and Clinical Research, 10(13), 499-501.
337. Suganya, G., Premalatha, M., Bharathiraja, S., Agrawal, R. (2017). low
cost design to detect drowsiness of driver. International Journal of Civil
Engineering and Technology (IJCIET), 8(9), 1138–1149.
338. Umamaheswari. E., & Ajay, D.M. (2017, April), Scope of internet of
things: a survey, Asian Journal of Pharmaceutical and Clinical Research, 1(1),
187-190.
339. Kumar, K.D., & Umamaheswari, E. (2017, April). An authenticated,
secure virtualization management system in cloud computing. Asian Journal of
Pharmaceutical and Clinical Research, Advances in Smart Computing and
Bioinformatics, 1(1), 45-48.
340. Mabel, V.H., & Selwyn, J. (2017, December). Knowledge based process
framework for the static and dynamic activities in design and development.
International Journal of Mechanical Engineering and Technology, 8(12), 307-
315.
341. Rahaman, A., & Selwyn, J. (2017). A survey study on significant quality
dimensions and factors for knowledge management systems. Journal of Advanced
Research in Dynamical and Control Systems, 1(15), 78-88.
342. Sridhar, R., & Selwyn, J. (2017). A study on the named entity recognition
and classification. International Journal of Artificial Intelligence and Knowledge
Discovery, 7(1), 1.
343. Nimbalkar, Y.A., & Selwyn, J. (2017, August). Implementing a
knowledge based Band Management Tool. International Journal of Scientific
Research in Computer Science, Engineering and Information Technology, 2(4),
163-169.
344. Rachel,S.P, & Selwyn, J. (2017). Concept-relation constructs for
knowledge representation. International Journal of Economic Research, 15(22),
765-775.
345. Maheswari. S, & Selwyn, J. (2017). A survey on QoS of real world web
services. International Journal of Economic Research, 15(22), 847-856.
346. Drishti., Nachiyappan, S., & Selwyn, J. (2017). Towards an automated
testing framework for big data. International Journal of Economic Research,
14(16), 301-311.
347. Suganya, G., Premalatha, M., Bharathiraja, S., & Rohan Agrawal, A.
(2017). Low cost design to detect drowsiness of driver. International Journal of
Civil Engineering and Technology, 8(9), 1138–1149.

348. Sivagami, M., Revathi, T., & Jeganathan, L. (2017). An optimised


background modelling for efficient foreground extraction. International Journal
of High Performance Computing and Networking, 10(1-2), 44-53.
349. Bhargavi, R., & Abraham, M.S. (2017). Failure analysis based on
relaibility testing using genetic algorithm. International Journal of Control
Theory and Applications, 10(33), 183-191.
350. Mathew, T., Jeganathan, L., & Rao, U. S. (2017). A cellular automata
model for safe investment based on expert's recommendations. International
Journal of Economics and Business Research, 14(3-4), 390-400.

351. Waghmare, A., & Hemalatha, S. (2017). Predictive analytics of health care
data.Asian Journal of Pharmaceutical and Clinical Research, 10(1),333 – 336.

352. Anirudh Bhardwaj, C., Mishra, M., & Hemalatha, S. (2017). An


Automated Compatibility Prediction Engine using DISC Theory Based
Classification and Neural Networks. International Journal of Engineering
Technology Science and Research, 4(8), 347 – 353.

353. Vaidya, P.V., Meena, J.M., & Ibrahim, S.P. (2017, April). Cloud-based
data analytics framework for mobile app event analysis. Asian Journal of
Pharmaceutical and Clinical Research, 10(13), 207 – 210.
354. Pradhan, G. K., Gollapalli, Meena, J. M, Ibrahim,S.P. (2017). Survey on
advisor intelligence through purchase patterns and sales analytics. Asian Journal
of Pharmaceutical and Clinical Research, 10(13), 302-304.
355. Nath, N.D., Jha, S., Meena, J. M, Ibrahim,S.P. (2017). A survey on elastic
search similarity algorithm, Asian Journal of Pharmaceutical and Clinical
Research. 10(13), 361 – 364.
356. Singh, R.K. (2017, December). Human-less auto meter reading: HAMER
system. International Journal of Research in Engineering, IT and Social Sciences,
7(12), 77-80.
357. Jamdar1, N., & Vijayalakshmi, A. (2017, April). Big data mining for
interesting patterns with map reduce technique, Asian Journal of Pharmaceutical
and Clinical Research, 10(1), 191-193.
358. Barapatre, D., & Vijayalakshmi, A. (2017). Data Preparation on large
datasets for data science, Asian Journal of Pharmaceutical and Clinical Research,
10(1), 485-488.
359. Kumar, P., Patel, F., & Kanna, R. (2018). An efficient line clipping
algorithm for circular windows using vector calculus and parallelization.
International Journal of Computer Graphics & Animation, 8(1/2), 1-8.
360. Rajkumar, S., & Malathi, G. (2017). An efficient image denoising
approach for the recovery of impulse noise. Bulletin of Electrical Engineering and
Informatics, 6(3), 281-286.
361. Punithavathi, P., & Geetha, S. (2017). Visual cryptography: A brief
survey. Information Security Journal: A Global Perspective, 26(6), 305-317.
362. Punithavathi, P., & Geetha, S. (2017). Random projection-based
cancelable template generation for sparsely distributed biometric patterns.
Indonesian J Electric Eng Comput Sci, 7(3), 877-886.
363. Punithavathi, P., & Subbiah, G. (2017). Can cancellable biometrics
preserve privacy?. Biometric Technology Today, 2017(7), 8-11.
364. Sandhya, P. (2017, August). Health analysis using big data. ARPN Journal
of Engineering and Applied Sciences, 12(15), 4620-4623.
365. Sandhya, P., & Chouhan, S. (2017, April). Internet of thing BASED
based car parking system. Asian Journal of Pharmaceutical and clinical research,
10(13), 97-100.
366. Geetha, M., Prassanna, J., Nivedita, M., & Prabhakaran R. (2017,
November). Towards an enhanced efficient cross layer protocol (EECLAP) for
wireless sensor networks. International Journal of Mechanical Engineering and
Technology, 8(11), 394 – 402.
367. Susheela, G., & Phamila, Y.A.V. (2017). Low bitrate hybrid secured
image compression for wireless image sensor network. Asian Journal of
Pharmaceutical and Clinical Research, 1(4), 101-104.
368. Kalaivani. K., & Phamila, Y.A.V. (2017). Pixel level fusion of multi
temporal landsat images using discrete wavelet transform for detecting changes.
Journal of Advanced Research in Dynamical and Control Systems, 9(5), 125-130.

369. Mounika,N., K., Kalaivani & Phamila, Y.A.V. (2017). Enhanced data
hiding using least significant bit masking technique for image steganography.
Journal of Advanced Research in Dynamical and Control Systems, 9(6), 90-96.

370. Sangavi, V.P., Mounika, N., Jasmine N, G. (2017). disaster recovery


through prediction of safe route using dem levels. Asian Journal Of
Pharmaceutical And Clinical Research,10 (13), 20 – 24.
371. Ibrahim, S. S., Sivabalakrishnan, M., & Kumar, R. S. (2017). Posteriori
probability inspired minimal rule generation in associative classification.
International Journal of Pure and Applied Mathematics, 116(12), 47-55.
372. Ibrahim, S. S., Pavithra, M., & Sivabalakrishnan, M. (2017). Pstree based
associative classification of data stream mining. International Journal of Pure
and Applied Mathematics, 116(12), 57-65.
373. Sivagami, M., Revathi, T., & Jeganathan, L. (2017). An optimized
background modelling for foreground extraction. International Journal of High
Performance Computing and Networking, 10 (1/2), 44-53.
374. Manna, S., & Malathi, G. (2017, August). Performance analysis of
classification algorithm on diabetes healthcare dataset. International Journal of
Research, 5(8), 260-266.
375. Kanna,B.R., & Rajalakshmi, R. (2017). Perceptive interaction for
amputated fingers (PIAF). International Journal of Pure and Applied
Mathematics,117 (20), 713-725.
376. Kanna, B, R., Viswanathan, V., & Ebbinason A.J.G. (2017). Eventr -
Design of an event management mobile application using ontology. Asian Journal
of Pharmaceutical and Clinical Research,10(1), 90-93.
377. Rai, A., & Kannan, R.J. (2017, April). Modeling thermal shock based
cracking behaviour of armour material for fusion reactor. Asian Journal of
Pharmaceutical & Clinical Research, Special Issue on Advances in Smart
Computing and Bioinformatics, 1(1), 214 – 217.
378. Rai, A., & Kannan, R.J. (2017, April). Development of cyber-physical
system for laser-based controlled cloud seeding. Asian Journal of Pharmaceutical
& Clinical Research, Special Issue on Advances in Smart Computing and
Bioinformatics, 1(1), 218 – 221.
379. Rai, A., & Kannan, R.J. (2017, April). Compressed transmission of depth
maps in 3d stream services for robotics & surveillance. Asian Journal of
Pharmaceutical & Clinical Research, Special Issue on Advances in Smart
Computing and Bioinformatics, 1(1), pp 222 – 224.
380. Rai, A., & Kannan, R.J. (2017, April). Neuro-computational modelling of
distributed learning from visual stimuli. Asian Journal of Pharmaceutical &
Clinical Research, Special Issue on Advances in Smart Computing and
Bioinformatics, 1(1), 225 – 229.
381. Rai, A., & Kannan, R.J. (2017, April). Microtubule based neuro-fuzzy
nested framework for security of cyber physical system. Asian Journal of
Pharmaceutical & Clinical Research, Special Issue on Advances in Smart
Computing and Bioinformatics, 1(1), 230 – 234.
382. Rai, A., & Kannan, R.J. (2017, April). Hybrid noise filtering algorithm
based on neuro-type 2 fuzzy systems. Asian Journal of Pharmaceutical &
Clinical Research, Special Issue on Advances in Smart Computing and
Bioinformatics, 1(1), 235 – 238.
383. Rai, A., & Kannan, R.J. (2017, April). Universal infrastructure of M2M
enabled inter-cloud services for intelligent transportation system. Asian Journal of
Pharmaceutical & Clinical Research, Special Issue on Advances in Smart
Computing and Bioinformatics, 1(1), 239 – 243.
384. Rai, A., & Kannan, R.J. (2017, April). Computational modelling and
predicting spread of arboreal epidemic. Asian Journal of Pharmaceutical &
Clinical Research, Special Issue on Advances in Smart Computing and
Bioinformatics, 1(1), 244 – 246.
385. Rai, A., & Kannan, R.J. (2017, April). Region specific wavelet
compression for 4k surveillance images. Asian Journal of Pharmaceutical &
Clinical Research, Special Issue on Advances in Smart Computing and
Bioinformatics, 1(1), 247 – 250.
386. Rai, A., & Kannan, R.J. (2017, April). Central processing unit-graphics
processing unit computing scheme for multi-object tracking in surveillance. Asian
Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in
Smart Computing and Bioinformatics, 1(1), 251 – 253.
387. Rai, A., & Kannan, R.J. (2017, April). Hyper-properties based optical
flow-based autonomous driving system. Asian Journal of Pharmaceutical &
Clinical Research, Special Issue on Advances in Smart Computing and
Bioinformatics, 1(1), 254 – 258.
388. Rai, A., & Kannan, R.J. (2017, April). Modeling of light illumination field
on micro-expression for face recognition application. Asian Journal of
Pharmaceutical & Clinical Research, Special Issue on Advances in Smart
Computing and Bioinformatics, 1(1), 259 – 262.
389. Rai, A., & Kannan, R.J. (2017, April). Associative rule learning for
anomalistic behavioral modeling in banking fraud applications. Asian Journal of
Pharmaceutical & Clinical Research, Special Issue on Advances in Smart
Computing and Bioinformatics, 1(1), 263 – 266.
390. Rai, A., & Kannan, R.J. (2017, April). Shape selectivity of and synthetic
visual intelligence. Asian Journal of Pharmaceutical & Clinical Research,
Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 267 –
271.
391. Rai, A., & Kannan, R.J. (2017, April). Bi-directional recurrent neural
network for improving multispectral image denoising. Asian Journal of
Pharmaceutical & Clinical Research, Special Issue on Advances in Smart
Computing and Bioinformatics, 1(1), 272 – 275.
392. Rai, A., & Kannan, R.J. (2017, April). Touch free user interface for
augmented reality systems. Asian Journal of Pharmaceutical & Clinical
Research, Special Issue on Advances in Smart Computing and Bioinformatics,
1(1), 276 – 278.
393. Rai, A., & Kannan, R.J. (2017, April). Fusion of thermal and RGB images
for border security surveillance. Asian Journal of Pharmaceutical & Clinical
Research, Special Issue on Advances in Smart Computing and Bioinformatics,
1(1), 279 – 281.
394. Rai, A., & Kannan, R.J. (2017, April). Synchronized neural firing for
controlling cyber physical system. Asian Journal of Pharmaceutical & Clinical
Research, Special Issue on Advances in Smart Computing and Bioinformatics,
1(1), pp 282 – 284.
395. Rai, A., & Kannan, R.J. (2017, April). online learning for image
processing in networked setting. Asian Journal of Pharmaceutical & Clinical
Research, Special Issue on Advances in Smart Computing and Bioinformatics,
1(1), 285 – 287.
396. Rai, A., & Kannan, R.J. (2017, April). Wavelet transformation for
enhancing mammographic images. Asian Journal of Pharmaceutical & Clinical
Research, Special Issue on Advances in Smart Computing and Bioinformatics,
1(1), 288 – 291.
397. Rai, A., & Kannan, R.J. (2017, April). A survey of multispectral image
denoising methods for satellite imagery applications. Asian Journal of
Pharmaceutical & Clinical Research, Special Issue on Advances in Smart
Computing and Bioinformatics, 1(1), 292 – 295.
398. Rai, A., & Kannan, R.J. (2017, April). Survey of soft biometric techniques
for gender identification. Asian Journal of Pharmaceutical & Clinical Research,
Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 296 –
301.
399. Rai, A., & Kannan, R.J. (2017, April). Multi-scale modeling of territorial
dynamics of geospatial anthropogenic energy consumption. Asian Journal of
Pharmaceutical & Clinical Research, Special Issue on Advances in Smart
Computing and Bioinformatics, 1(1), 305 – 311.
400. Rai, A., & Kannan, R.J. (2017, April). Internet of things-based multisensor
non-invasive technology for robust monitoring of tunneling infrastructure. Asian
Journal of Pharmaceutical & Clinical Research, Special Issue on Advances in
Smart Computing and Bioinformatics, 1(1), 312 – 316.
401. Rai, A., & Kannan, R.J. (2017, April). Virtual farmer: controlling
phytochrome signaling in plants through cyber-physical system. Asian Journal of
Pharmaceutical & Clinical Research, Special Issue on Advances in Smart
Computing and Bioinformatics, 1(1), 317 – 320.
402. Rai, A., & Kannan, R.J. (2017, April). A development of von neumann
machines with artificial neuro-GLIA network. Asian Journal of Pharmaceutical
& Clinical Research, Special Issue on Advances in Smart Computing and
Bioinformatics, 1(1), 394 – 398.
403. Rai, A., & Kannan, R.J. (2017, April). Simulating drug-target interaction
using large scale molecular dynamics and fuzzy ART. Asian Journal of
Pharmaceutical & Clinical Research, Special Issue on Advances in Smart
Computing and Bioinformatics, 1(1), 399 – 401.
404. Rai, A., & Kannan, R.J. (2017, April). Mathematical architecture of
micro-services for geographic information system based health management
system. Asian Journal of Pharmaceutical & Clinical Research, Special Issue on
Advances in Smart Computing and Bioinformatics, 1(1), 402 – 405.
405. Rai, A., & Kannan, R.J. (2017, April). A review on machine learning
algorithms on human action recognition. Asian Journal of Pharmaceutical &
Clinical Research, Special Issue on Advances in Smart Computing and
Bioinformatics, 1(1), 406 – 416.
406. Rai, A., & Kannan, R.J. (2017, April). Prediction of chronic bacterial
infection by identification of inter cellular responses of genetic fusion centers.
Asian Journal of Pharmaceutical & Clinical Research, Special Issue on Advances
in Smart Computing and Bioinformatics, 1(1), 417 – 419.
407. Rai, A., & Kannan, R.J. (2017, April). Mathematical modeling of
feedback control of gravitational waves. Asian Journal of Pharmaceutical &
Clinical Research, Special Issue on Advances in Smart Computing and
Bioinformatics, 1(1), 420 – 426.
408. Rai, A., & Kannan, R.J. (2017, April). Modeling and dynamics of
puzzling space probes anomalies in space engineering. Asian Journal of
Pharmaceutical & Clinical Research, Special Issue on Advances in Smart
Computing and Bioinformatics, 1(1), 427 – 430.

409. Rai, A., & Kannan, R.J. (2017, April). Computational technique for
modeling and clustering of feedback control in galaxies using gravitational
thermodynamics. Asian Journal of Pharmaceutical & Clinical Research, Special
Issue on Advances in Smart Computing and Bioinformatics, 1(1), 431 – 436.
410. Rai, A., & Kannan, R.J. (2017, April). Energy aware zone routing protocol
for MANET. Asian Journal of Pharmaceutical & Clinical Research, Special Issue
on Advances in Smart Computing and Bioinformatics, 1(1), 437 – 440.
411. Rai, A., & Kannan, R.J. (2017, April). Advanced encryption and extended
authentication for wireless LAN. Asian Journal of Pharmaceutical & Clinical
Research, Special Issue on Advances in Smart Computing and Bioinformatics,
1(1), 441 – 444.
412. Gayathri, M., & Kannan, R.J. (2017, April). Layered architecture toward
mining ayurvedic facts. Asian Journal of Pharmaceutical & Clinical Research,
Special Issue on Advances in Smart Computing and Bioinformatics, 1(1), 506 –
510.
413. Kumar, P.J. S., & Kannan, R.J. (2017, July). Symptoms based predict
treatment medicine suggestion system using data mining techniques. Journal of
Advanced Research in Dynamical & Control Systems, 1(6), 2012 - 2022.
414. Padmanaban. K., & Kannan, R.J. (2017). Enhanced Three Layer Energy
Efficient Clustering (ETLEEC) algorithms for wireless sensor networks. Indian
Journal of Public Health Research & Development, 8(3S), 225 – 229.
415. Velmurugan, A.K., & Kannan, R.J. (2017). Sleep scheduling for energy
efficient load balance routing in heterogeneous wireless sensor network. Indian
Journal of Public Health Research & Development, 8(3S), 236 – 241.
416. Jaya, R., Pillai, C.S., & R Kannan, R.J. (2017, December). Ontology based
optimization with adaptive network based fuzzy inference system based health
maintenance system. International Journal of Current Research and Review,
9(23), 32 -40.
417. Rani, S.U., & Neelanarayanan, V. (2017). A Review of patient –controlled
analgesia infusion system. Asian Journal of Pharmaceutical and Clinical
Research, 10(1), 117-121.
418. Sarobin, M.V., Kumar, B., & Lakshmidevi, K.R. (2017, April). Genetic
algorithm-based clustering of wireless sensor network with novel data encryption.
Asian Journal of Pharmaceutical and Clinical Research, Advances in Smart
Computing and Bioinformatics, 10(13), 94-96.
419. Prassanna, J., Anjali, P., & Neelanarayanan, V. (2017). A review of
existing cloud automation tools. Asian Journal of Pharmaceutical and Clinical
Research, 10(13), 471-473.
420. Manickavasagam, P., & Surwade, S.S. (2017, April). Cognitive, affective
and conative model for analyzing higher education students. Advances in Smart
Computing and Bioinformatics, Asian Journal of Pharmaceutical and Clinical
Research, 1(1), 133-136.
421. Priyaadharshini, M., & Sundaram, B. V. (2017). Lifelong learning:
analyzing behavioral models using cloud based flipped classroom. Journal of
Computational and Theoretical Nanoscience, 14(1), 5770 – 5779.
422. Maheswari, R., Pattabiraman, V., & Sharmila, P. (2017). Reconfigurable
FPGA based soft-core processor for SIMD applications. Asian Journal of
Pharmaceutical and Clinical Research, 10(13), 180-186.
423. Maheswari, R., & Pattabiraman, V. (2017). Improved reconfigurable
hyper-pipeline soft-core processor on FPGA for SIMD. International Journal of
High Performance Computing and Networking, 10(3), 207-217.
424. Vedika, B., & Quadir, M.A. (2017). Cryptographic techniques for secure
key management in personnel cloud. Asian Journal of Pharmaceutical and
Clinical Research, 10(13), 369-72.
425. Pavithra, L., & Rekha, D. (2017, April). Internet of things – survey on
research challenges. Asian Journal of Pharmaceutical and Clinical Research,
10(13), 464-6.
426. Darisini, P.S., & Kumar, T.S.P., & Kumar, R. (2017). A survey on object
tracking in wireless sensor networks for machine tool applications. International
Journal of Mechanical Engineering and Technology, 8(12), 21–30.
427. Kumar, T.S.P., & Chitnis, S. (2017). Distance and hop based energy
estimation in wireless sensor networks. Asian Journal of Pharmaceutical and
Clinical Research, 10(13), 85–89.
428. Rivankar, A., & Anusooya, G. (2017). Energy efficient load balancing for
cloud data center. Asian Journal of Pharmaceutical and Clinical Research,
10(1),162-165.
429. Rani. S.U., & Neelanarayanan. V. (2017). A Review on patient-controlled
analgesia infusion system. Asian Journal of Pharmaceutical and Clinical
Research, 10(1), 117-121.
430. Rani. S.U., Ignatious, A., Hari, B. V. & Balavishnu, V. J. (2017). IoT
patient health monitoring system. Indian Journal of Public Health Research &
Development, 8( 4), 1329-1334.
431. Panjanathan, R., & Ramachandran, G. (2017). Enhanced low latency
queuing algorithm with active queue management for multimedia applications in
wireless networks, International Journal of High Performance Computing and
Networking, 10(1-2), 23-33.
432. Rukmani, P., & Ganesan, R. (2017). Adaptive modified low latency
queuing algorithm for real time traffic in WIMAX networks, Journal of
Engineering Science and Technology, 12(9), 2551-2566.
433. V, K. D., and G. R. (2017, April). A generic trust management framework
for heterogeneous sensors in cyber physical systems, Asian Journal of
Pharmaceutical and Clinical Research, 10(13), 176-179.
434. Nisha, V.M., & Sajidha, S.A. (2017). Simulation of non deterministic
cellular automata by boolean circuits. Research Journal of Pharmaceutical,
Biological and Chemical Sciences, 8(1), 77-81.
435. Sasank, S., Nisha, V. M., Sajidha S. A., & Kumar, G.B. (2017). Urban
growth modelling using cellular automata based classifier. International Journal
of Civil Engineering and Technology, 8(12), 302-308.
436. Padmanabhan, S., Sumathi, V., & Ganapathy, S. (2017). Cloud based POS
system for secured smart shopping CART using RFID. Journal of Advanced
Research in Dynamical and Control Systems, 9(14), 2764-2777.
437. Anusha, K., & Sathiyamoorthy, E. (2017). MAM-ISSIDS: multi-agent
model-based intelligent and self-sharing intrusion detection system for distributed
network. International Journal of Information and Computer Security, 9(4), 361-
386.
438. Anusha, K., & Sathiyamoorthy, E. (2017). A new trust-based mechanism
for detecting intrusions in MANET. Information Security Journal, 26(4), 153-165.
439. Asha, S. (2017). An improved sleep detection and driver alert system
using biometrics. Indian Journal of Public Health Research & Development, 8(4),
1307-1311.
440. Loganathan, S., Saravanan, R. D., & Mukherjee, S. (2017). Energy aware
resource management and job scheduling in cloud datacenter. International
Journal of Intelligent Engineering and Systems, 10(4), 175-184.
441. Saravanan, R. D., Loganathan, S., Shunmuganathan, S., & Palanichamy,
Y. (2017). Suspicious Score Based Mechanism to Protect Web Servers against
Application Layer Distributed Denial of Service Attacks. International Journal of
Intelligent Engineering & Systems, 10(4), 147-156.
442. Fernandez, J. J., Pandian, N., Chavali, R., & Appalaghe, A. K. (2017). A
novel image theft identification using biometric feature. Asian Journal of
pharmaceutical and clinical research, special issue-April, 385-389.
443. Sudhakar, K., & Nithyanandam, P. (2017). An accurate facial component
detection using Gabor filter. Bulletin of Electrical Engineering and Informatics,
6(3), 287-294.
444. Karmel, A. (2017). Multi-Level privacy preservation and transmission of
medical records using cryptographic technique. International Journal of Applied
Engineering Research, 12(17), 6735-6740.
445. A Karmel. (2017). Review of particle swarm optimization for energy
management in mobile Ad Hoc networks, Journal of Engineering and Applied
Sciences, 12 (22), 2017, 6042-6044
446. M Sasikomala, M., & Mayilvahanan, P. (2017). An empirical study of
accident reportin data mining techniques. International Journal of Pure and
Applied Mathematics, 116(24), 35-42.
447. Thiyagarajan, D., & Ganesan, R. (2017). Cryptographically imposed
model for efficient multiple keyword-based search over encrypted data in cloud
by secure index using bloom filter and false random bit generator. IJ Network
Security, 19(3), 413-420.

448. Thiyagarajan, D., & Ganesan, R. (2017). User verifiable multiple keyword
search scheme using the merkle tree for outsourced data in the cloud.
International Journal Of Technology, 8(4), 591-600.
449. Bhargavi, R., Gumparthi, S. & Anith, R. (2017). Relative strength index
for developing effective trading strategies in constructing optimal portfolio.
International Journal of Applied Engineering Research, 12(19), 8926-8936.
450. Sriraman, H., & Venkatasubbu, P. (2017). On the field design bug
tolerance on a multi-core processor using FPGA. International Journal of High
Performance Computing and Networking, 10(1-2), 34-43.
451. Remesh, R. & Pattabiraman, V. (2017). A survey on the cures for the
curse of dimensionality in big data. Asian Journal of Pharmaceutical and Clinical
Research ,Special issue in Advances in Smart Computing and Bioinformatics,
1(1), 354-360.
452. Vignesh, U., & Parvathi, R. (2017). Clustering on structured proteins with
filtering instances on Bioweka. J Eng Sci Technol, 12, 820-833.
453. Joshika., &Parvathi, R. (2017). A survey on business facilities analysis.
Asian Journal of Pharamacutical and clinical research, 1(4),15-19.
454. Verghese, M. S., & Parvathi, R. (2017). A survey on usage analytics for
imaging diagnostic equipments. Asian Journal of Pharmaceutical and clinical
research, 1(4),c457-460.
455. Kamatchi, B., & Parvathi, R. (2017). Feature selection and yield
prediction of rice crop using Ann. Journal of Advanced Research in Dynamical
and Control Systems, 9(12), 546-553.
456. Priya, R,V. & Muralidhar, A. (2017). Facial emotion recognition using eye.
International Journal of Applied Engineering Research , 12(16), 5655-5659.
457. Ilakiyaselvan, N., Abraham, J. V. T., & Muralidhar, A. (2017). Real-time
driver fatigue or drowsiness detection system using face image stream.
International Journal of Civil Engineering & Technology, 8 (1), 793-802.
458. Ashish, M., Kumar, S., & Muralidhar, A. (2017). Employee performance
appraisal system based on ranking and reviews. Entropy, 1, 1.
459. Muralidhar, A., & Pattabiraman, V. (2017). Tabu search based fast high utility
item set mining. Journal of Advanced Research in Dynamical and control Systems, 1(18),
3152 – 3164.
460. Kumar, J, S. & Maheswari, N. (2017), A survey on privacy preserving
techniques for social network data’ Asian Journal of Pharmaceutical and Clinical
Research,10(13), 112.
461. Jaganathan, S.K., & Maheswari, N. (2017). A survey on privacy-
preserving techniques for social network data. Asian Journal of Pharmaceutical
and Clinical Research, 10(13), 112-116.
462. Sariki, T.P., & Manusmare, R.P.(2017). Xtreams toolkit ui development
on microsoft WPF technology. Asian Journal of Pharmaceutical and Clinical
Research, 10(13),449-452.
463. Ragala, R., & Venkataraman, R. (2017). A survey on churn analysis and
prediction in video on demand. Asian Journal of Pharmaceutical and Clinical
Research, 10(1S), 158-161.
464. En, P., & Kumar, B.G. (2017). Diabetic retinopathy image classification
using deep neural network. Asian Journal of Pharmaceutical and Clinical
Research, 10(13), 461-463.
465. Pradeep, K.V., & Tudu, B.P. (2017). Secure and recoverable model to
manage keys for cloud storage. Asian Journal of Pharmaceutical and Clinical
Research, 10(13), 109-111.
466. Manindra, T., & Pradeep. K.V. (2017, April). data compression technique
for cloud storage in multi-user environments. Asian Journal of Pharmaceutical
and Clinical Research, 10(13), 82-84.
467. Pradeep.K.V., & Rakesh, T. (2017, April). Secure and recoverable split
key management technique for cloud storage. Asian Journal of Pharmaceutical
and Clinical Research, 10(13), 109-111.
468. Shrivastava, P., & Kumar, G.B. (2017). Working of acontext-aware
conversational entity. Asian Journal of Pharmaceutical and Clinical Research,
10(13), 202-206.
469. Rajendran, V., & Kumar, G.B. (2017). Prosody prediction for tamil text-
to-speech synthesizer using sentiment analysis. Asian Journal of Pharmaceutical
and Clinical Research, 10(13),6-9.
470. SR, D., & V. Vijayakumar. (2017). A review on security enhancement
through anonymous routing in manet”. Asian Journal of Pharmaceutical and
Clinical Research, 10(13), 166-170,
471. K, S., & V. Vijayakumar. (2017). Secured data aggregation methods in
wireless sensor networks using homomorphic operation - a review. Asian Journal
of Pharmaceutical and Clinical Research, 10(13), 328-332.
472. Reshmi,TR., Anusha, K., Sumati, V., & Pandiyarajan, K.(2017,April) The
IPv6 Resistance – A Survey, Asian Journal of Pharmaceutical and Clinical
Research, 10(13),321-323.
473. Srivastav, A., & Chauhan, A. (2017). Social network data retrieval using
semantic technology. Asian Journal of Pharmaceutical and Clinical Research,
10(13), 31- 35
474.

2016
475. Muralidhar. A., Pattabiraman. V., & Sathe, A.A. (2016). A novel approach to
extract greater profitable itemsets. International Journal of Pure and Applied
Mathematics 109(8), 83-90.
476. Anuradha, A., & Viswanathan, V. (2016). Store attribute
(s) preference of customers towards organised food and grocery retail outlets-a
gap analysis. International Journal of Business Excellence, 10(1), 120-138.
477. Viswanathan, V. (2016). Discovery of semantic
associations in an RDF graph using bi-directional BFS on massively parallel
hardware. International Journal of Big Data Intelligence, 3(3), 176-181.
478. Nachiyappan, S., & Selwyn, J. (2016). Big data validation needs and
challenges. International Journal of Pharmacy and Technology, 8(4), 21998-
22008.
479. Nachiyappan, S. and Selwyn, J. (2016). Towards an automated testing
framework for big data. International Journal of Control Theory and
Applications. 9(52),1.
480. Saikia, S., Saleena, B., & Prakash, B. (2016). Enhancing the accuracy of
prediction and classification of crime using SVM. International Journal of
Control Theory and Applications, 9(52), pp. 1-11.
481. Ajay, D.M. & Umamaheswari, E. (2016). Why, how cloud computing –
how not and cloud security issues. Global Journal of Pure and Applied
Mathematics, 12(1), 1-8.
482. Ajay, D.M. & Umamaheswari, E. (2016). Evaluating the efficiency of
security mechanisms in cloud environments. International Journal of Control
Theory and Applications, 9(51), 75-85.
483. Hema, N., & Selwyn, J. (2016). Knowledge base representation model for
a structured repository, International Journal of Engineering Science and
Computing, 6(3), 2126-2132.
484. Hema N., & Selwyn, J. (2016). Generation of ICD code using graph form
of knowledge representation. International Journal of Control Theory and
Applications, 9(52), 9-21.
485. Hepsiba Mabel, V., & Selwyn, J. (2016). A review on the knowledge
representation models and its implications. International Journal of Information
Technology and Computer Science (IJITCS), 8(10), 72-81.
486. Priya, M. K., & Selwyn, J. (June,2016). An exploratory study on the
practices of knowledge management in software development organizations.
International Journal of Business Intelligents, 5(1), 1-7.
487. Nimbalkar, Y. A., & Justus, S. (2016). Design of layers in knowledgebase
for expert systems. IOSR Journal of Computer Engineering, 18(3), 89-93.
488. Kamala, S. P. R., & Justus, S. (2016). Towards MORK: Model for
Representing Knowledge. International Journal of Modern Education and
Computer Science, 8(3), 45.
489. Nachiyappan, S., & Selwyn, J. (2016, March). Understanding and
addressing technical challenges for big data. International Journal of Engineering
Science and Computing, 6(3), 2132-2135.
490. Mehta, S., Singh, R.K., & Sivabalakrishnan, M. (2016). Analyzing the
cancer to improve the health using big data analytics: a review. International
Journal of Control Theory and Applications, 9(52), 1.
491. Bhargavi, R. (2016). Online Dynamic Regressive Learning. International
Journal of Applied Engineering Research, 11(3), 2085-2090.
492. Bhargavi, R., & Abraham, M.S. (2016). A study and evaluation of
Hoeffding tree for stream data mining. International Journal of Engineering and
future Technology, 8(8), 18- 27.
493. Rajkumar, S., & Malathi, G. (2016). A comparative analysis on image
quality assessment for real time satellite images. Indian J. Sci. Technol, 9.
494. Rajkumar, S., Malathi, G., Kumar, D.V. (2016). An axiomatic image
enhancement algorithm in the field of image processing application, International
Journal of Control Theory and Applications, 51(9),187-193.

495. Punithavathi, P., & Geetha, S. (2016). Securing multimodal biometrics


using random projection-based template transformation. International Journal of
Control Theory and Applications, 9(52), 33–43.
496. Nirmala, G., Geetha, S., & Selvakumar, S. (2016). Mobile robot
localization and navigation in artificial intelligence: Survey. Computational
Methods in Social Sciences, 4(2), 12.
497. Geetha, S., & Sharma, S. (2016). Implementation of artificial neural
networks in multimodal image recognition and text. International Journal of
Advanced Research, 4(8), 1285–1291.
498. Kanmani, A., Karthikeyan, N. & Geetha, S. (2016). High capacity
separable data hiding using repeated histogram modification in integer wavelet
transform domain. Asian Journal of Information Technology, 15(5), 862-865.
499. Hussain, S.H., Geetha, S., & Prabakar, M.A. (2016). Design and
implementation of adaptive model for sustainable home automation using Internet
Of Things (IoT). International Journal of Advanced Engineering Technology,
7(1), 827-829.
500. Sivakumar, T. B., Geetha, S., & AmuthaPrabhakar, M. (2016). An
efficient advanced hierarchical attribute based scheme with asymmetric
encryption for personal health records in cloud computing. Int J Adv Engg Tech,
7(1), 892-895.
501. Sandhya P. (2016, March). Developing evaluators for e-commerce
application, International Journal of Applied Engineering Research, 11(5), 3386-
3389.
502. Suseela, G., & Y. Phamila, Y.A.V. (2016). Gamboled image compression
technique for low power devices with binary DCT and torus automorphism”,
International Journal of Engineering Science and Computing, 6(6), 6655-6657.
503. Kalaivani, K., & Phamila, Y.A.V. (2016). Analysis of image fusion
techniques based on quality assessment metrics. Indian Journal of Science and
Technology, 9 (31), 1-8.
504. Suseela, G., & Y. Phamila, Y.A.V. (2016). Secured image compression
using wavelet transform. Indian Journal of Science and Technology, 9, 33.
505. Jasmine, S.G, & Pattabiraman. V. (2016). Performance evaluation of
dimensionality reduction in hyperspectral imaging, International Journal of
Control Theory and Applications, 9(52), 169-178.
506. Ibrahim. S.P, & Sivabalakrishnan, M. (2016, March). Efficient algorithm
for frequent itemset generation in big data, International Journal of Advanced
Research in Science, Engineering and Technology, 3(3), 1735-1740.
507. Ibrahim. S.P, & Sivabalakrishnan, M. (2016, January). Minimize the
utilization of household items using FP-tree, International Journal for Research
in Applied Science and Engineering Technology(IJRASET), 4(1), 330-337.
508. Ibrahim. S.P, & Sivabalakrishnan, M. (2016, January). Glaucoma
prediction system using associative classification, International Journal of
Multidisciplinary Research Centre (IJMRC), 2(8), 1-4.
509. Jeeva, S., & Sivabalakrishnan, M. (2016). Robust background subtraction
for real time video processing. International Journal of Pure and Applied
Mathematics, 109(5), 117-124.
510. Singh, R.K., & Sivabalakrishnan, M. (2016, December). Analyzing the
impact of diseases on cancer to improve the health using big data analytics: a
review, International Journal of Control Theory and Applications ,9(52), 199-
203.
511. Jeeva, S., & Sivabalakrishnan, M. (2016). Background estimation
techniques, a review, International Journal of Control Theory and Applications,
9(52), 199-203,
512. Sivagami, M., Revathi, T., & Jeganathan L. (2016). Adaptive foreground
object extraction in real time videos using fuzzy c means with weber principle,
Indian Journal of Science and Technology. 9(29), 1-9.

513. Bhatt, M.L.S., & Bharathiraja, S. (2016). Rainy image restoration using
iterative algorithm. International Journal of Applied Engineering Research,
10(34), 27158-27161.
514. Bharathiraja, S., & Kanna, B.R. (2016, December). Pragmatic analysis on
drowning detection system in swimming pool, International Journal of Control
Theory and Applications, 9(51),
515. Samuel, R.D.J., & Kanna, B.R. (2016). Design to automate the
identification and counting of tuberculosis bacilli, International Journal of
Control Theory and Applications, 9 (52), 303-310.
516. Vincent, R., & Vijayakumar, V. (2016). Analyzing prospects of autistic
children to create context aware ambiance. International Journal of Pure and
Applied Mathematics, 109(10), 129-137.
517. Rukmani, P., & Ganesan, R. (2016). Enhanced low latency queuing
algorithm for real time applications in wireless networks. International Journal of
Technology, 7(4), 663-672.
518. Maheswari, R., & Pattabiraman, V. (2016). Petri Net-based System
Modelling for Performance Analysis of Reconfigurable Soft-core Processor using
FPGA. International Journal of Technology, 7(6), 1054-1067.
519. Sarobin, V. R. M., & Ganesan, R. (2016). Bio-Inspired, cluster-based
deterministic node deployment in wireless sensor networks. International Journal
of Technology, 7(4), 673-682.
520. Sarobin, V. R. M., & Thomas, L. A. (2016). Improved LEACH algorithm
for energy efficient clustering of wireless sensor network (WSN). International
Journal of Technology, 7(1), 50-60.
521. Aparna Vijaya and, “A Model Driven Framework for Portable Cloud
Services”, International Journal of Electrical and Computer Engineering, ol.
6(2):708 – 716, 2016.
522. Vijaya, A., & Neelanarayanan, V. (2016). A Model Driven Framework for
Portable Cloud Services. International Journal of Electrical & Computer
Engineering, 6(2), 708-716.
523. Asha Shiny, X. S., & Jagadeesh Kannan, R. (2016). Maximizing Energy
Based on SNR using Self Organizing Map in MANETs. International Journal of
Computing, 5(1), 1-10.
524. Shinde, S.S., Manusmare, R.P., Lawange, A., & Kannan, R.J. (2016).
Neural network based biometric technology for fingerprint classification.
International Journal of Pharmacy and Technology (IJPT),8(3), 18742-18754.
525. Waghmare, A., Verma, N., Gaur, A., & Kannan, R.J. (2016). Neural
network based feature analysis of mortality risk by heart failure, International
Journal of Pharmacy and Technology (IJPT), 8(3), 18755-18762.
526. Devendra, K.C., Tomar, A.S., Javali, P.N., & Kannan, R.J. (2016). Facial
emotion recognition using neural network. International Journal of Pharmacy
and Technology (IJPT), 8(3), 18727-18733.
527. Bhopale, M., Kshatriya, A., Kumar, P., & Kannan, R.J. (2016). Fuzzy
based system for analysis of DDOS attacks. International Journal of Pharmacy
and Technology (IJPT),8 (3), 18718-18726.
528. Nath, N.D., Saikia, S., & Kannan, R. J. (2016). Congestion control in
TCP/IP using TAHOE. International Journal of Pharmacy and Technology
(IJPT), 8(3), 17588-17600.
529. Prabakaran, N., & Kannan, R.J. (2016). Context centered response for
enabling pervasive environment using data centric WSNS. International Journal
of Pharmacy and Technology (IJPT), 8(3), 15485-15496.
530. Harshini, K.S., Rohini, T., Bansal, R., & Kannan, R.J. (2016). Neural
model for ingredient level based multimodal cuisine recognition. International
Journal of Pharmacy and Technology (IJPT), 8(3), 18734-18741.
531. Prabakaran,N., & Kannan, R.J. (2016). A smart wireless access
infrastructure for ubiquitous environment in healthcare. International Journal of
Pharma and Bio Sciences, Special Issue on Health Care Technology &
Management, 1(1), 239 – 244.
532. Umadevi, K.S., & Kannan, R.J. (2016). F-MAC: an optimal clustering
based fault tolerant system for underwater acoustic sensor networks. International
Journal of Pure and Applied Mathematics, 109 (8), 177 – 184.
533. Mishra, V., Jain, H., Nagra, A., Naresh, K., & Kannan, R.J. (2016).
Queuing models for mobile communication approaches. International Journal of
Pharmacy & Technology, 8(4), 5291 – 5302.
534. Prabhakaran, R., & Asha, S. (2016). Enhancing cyber security on
substation automation using RGK algorithm. International Journal of Control
Theory and Applications, 9 (51), 217 -224.
535. Ismail, A.S., & Asha, S. (2016). Data security in cloud computing by
using three tier method. International Journal of Control Theory and
Applications, 9 (51), 123-132.
536. Prabhakaran, R., & Asha, S. (2016). Enhancing cyber security on
substation automation using RSA algorithm. International Journal of Control
Theory and Applications. 9 (51), 225-232.
537. Annamalai, C., & Asha, S. (2016). Energy efficient resource allocation
techniques in cloud: a review. International Journal of Control Theory and
Applications, 9 (52), 141-146.
538. Venkatesh, A., & Asha, S. (2016). intrusion detection system using
modified particle swarm optimization. International Journal of Control Theory
and Applications, 9 (52), 283-292.
539. Asha, S., & Ismail, A.S. (2016, May). Security issues and solutions in
cloud computing – a survey. International Journal of Computer Science and
Information Security, 14(5), 309.
540. Jayasudha, M., Thaneker, S.H., & Subbulakshmi, T. (2016). Secured data
authentication and confidentiality in cloud computing using RSA with
homomorphic encryption technique. International Journal of Control Theory and
Application, 9(52), 1-9.
541. Jayasudha, M., Riteesh, K.S., & Subbulakshmi, T. (2016). data retrieval
in private and public cloud using attribute based encryption. International
Journal of Control Theory and Application, 9(51), 233-239.
542. Anusha, K., & Sathiyamoorthy, E. (2016). Omamids: ontology based
multi-agent model intrusion detection system for detecting web service attacks.
Journal of Applied Security Research, 11(4), 489-508.
543. Anusha, K., & Sathiyamoorthy, E. (2016). A decision tree-based rule
formation with combined PSO-GA algorithm for intrusion detection system.
International Journal of Internet Technology and Secured Transactions, 6(3),
186-202.
544. Anusha, K., & Sathiyamoorthy, E. (2016). Comparative study for feature
selection algorithms in intrusion detection system. Automatic Control and
Computer Sciences, 50(1), 1-9.
545. Rao, U.S., Jeganathan, L., & Mathew, T., (2016). Error bounds for
darboux integral of continuous functions with supremum norm using cellular
automaton. International Journal of Control Theory and Application, 9(52), 179-
190.
546. Mathew, T., Rao, U.S & Jeganathan, L. (2016). Cellular automata: a
decision support system for stock market trading, International Journal of
Computational Economics and Econometrics, 6(4), 366-378.
547. Rajeswari, A. R., Kulothungan, K., Ganapathy, S., & Kannan, A. (2016).
Malicious nodes detection in MANET using back-off clustering approach.
Circuits and Systems, 7(08), 2070.

548. Elumalaivasan, P., Kulothungan, K., Sannasi, G., & Arputharaj, K. (2016).
Trust based Ciphertext policy attribute based encryption techniques for
decentralized disruption tolerant networks. Aust. J. Basic & Appl. Sci, 10(2), 18-
26.
549. Rafi. K.M., & Pattabiraman, V. (2016). Curing the curse of dimensionality
with multi-fold deep denoising autoencoder. International Journal of Control
Theory and Applications, 9(51), 113-122.
550. Sundari, R.S., & Pattabiraman, V. (2016). A complete investigation to
demystify the math behind PCA using the MNIST dataset. International Journal
of Control Theory and Applications, 9(51), 249-260.
551. Kamatchi, B., & Parvathi, R. (2016, June). call log analysis using different
clustering approach. International Journal of Engineering Science and
Computing, 6(6),6952 – 6954.
552. Vinodha, R., & Parvathi, R. (2016). Location Based Travelling
Recommendation System Using Hypertext Induced Topic Search (HITS).
International Journal of Pure and Applied Mathematics, 109(9), 248-256.
553. Kumar, S., Khobragade, A., Maheswari, N., & Prabakaran, A. (2016).
Privacy Preservation in Social Network Using K-Nearest Perturbation Technique.
International Journal of Computer Science and Information Security, 14(8), 146.
554. Kumar, S., Maheswari, N., & John, A.S. (2016). A randomized approach
for privacy preservation. The International Journal of Science and Technology,
4(7), 69–74.
555. Mattani, N., Kumar, J. S., Prabakaran, A., & Maheswari, N. (2016).
Privacy Preservation in Social Network Analysis using Edge Weight Perturbation.
Indian Journal of Science and Technology, 9(37), 1-10.
556. Sariki, T.P., Kumar, G.B., & Kambhatla. (2016). Sarcasm detection.
International Journal of Pharmacy & Technology, 8 (4), 22163-22181.
557. Phulla, D.K., & Kumar, G.B. (2016). Consonant analysis for indian
english. International Journal of Control Theory and Applications, 9 (51), 241-
248.
558. Jothi, R., Mohanty, S. K., & Ojha, A. (2016). Functional grouping of
similar genes using eigenanalysis on minimum spanning tree based neighborhood
graph. Computers in biology and medicine, 71, 135-148.
559. Phull, D. K., & Kumar, G. B. (2016). Vowel analysis for indian english.
Procedia Computer Science, 93, 533-538.
560. Phull, D. K., & Kumar, G. B. (2016). Investigation of indian english
speech recognition using cmu sphinx. International Journal of Applied
Engineering Research, 11(6), 4167-4174.
561. Oliver, A. S., & Maheswari, N. (2016). Identifying the gestures of toddler,
pregnant woman and elderly using segmented pigeon hole feature extraction
technique and IR-threshold classifier. Indian J. Sci. Technol, 9, 39.
562. Mukane, S., & Maheswari, N. (2016). Privacy preserving clinical data of
patients using data perturbation. International Journal of Pharmacy &
Technology, 8(3), 18290-18299.
563. Vasuhi, S., & Vaidehi, V. (2016). An ensemble Kalman filtering algorithm
for state estimation of jump Markov systems. International Journal of Engineering
Systems Modelling and Simulation, 8(1), 1-7.

2015
564. Prathilothamai, M., Devi, M.M., & Viswanathan, V. (2015).
Identification of threat to public life by classifying NEWS RSS Feeds,
International Journal of Applied Engineering Research, 10(13), 33859-33862.
565. Kumar, B.S., & Krishnamurthi, I. (2015). Capturing architecturally
significant requirements using architect’s use case diagram. International Journal
of Applied Engineering Research, 10(6), 13921-13943.
566. Sathis Kumar, B., & Krishnamuthi, I. (2015). CloudASR an android
application for capturing architecturally significant requirements visually in cloud
computing applications using platform as service. Int. J. Appl. Eng. Res, 10(5),
13505-13514.
567. Saleena, B., & Srivatsa, S.K. (2015). Concept similarity for cross ontology
in adaptive e-learning systems. Journal of King Saud University–Computer and
Information sciences, 27(1),1-12.
568. Koteswari, C., & Saleena, B. (2015). Context based ranking of web
database based on user query search. International Journal of Applied
Engineering and Research, 10(11), 29717-29724.
569. Maulik Parekh, D., & Saleena, B. (2015). Designing a cloud based
framework for healthcare system and applying clustering techniques for region
wise diagnosis. Procedia Computer Science, 50, 537-542.
570. Umamaheswari, E., & Ghosh, D.K. (2015, March). Radial basis function
neural networks for software engineering measures –a survey. ARPN Journal of
Engineering and Applied Sciences, 10(5), 2027-2032.
571. Umamaheswari, E., Ghosh, D.K. & Bhalaji, N. (2015, March). Evaluating
metrics at class and method level for java programs using knowledge based
systems. ARPN Journal of Engineering and Applied Sciences, 10(5), 2047-2052 .
572. Umamaheswari, E. (2015, September). Cloud testing vs. conventional
software testing over a web service, International Journal of Scientific Research,
4(9). 583-586.
573. Maheswari, S., & Selwyn, J. (2015). Assessing the behaviour of web
services using finite states. International Journal of Information Engineering and
Electronic Business, 7(4), 31.
574. Balavignesh, G., Qumar, S.M., & Premalatha, M. (2015).Policy
assessment system: a smart approach to assess national policies of developing
countries. International Journal of Applied Engineering Research, 10(34), 27220-
27225.
575. Mabel, V.H., & Selwyn, J. (2015, December). Performance assessment of
3-layered knowledgebase and representation models: an empirical study.
International Journal of Knowledge Engineering and Data Mining, 3(4), 239-254.
576. Ramesh, P.R., & Selwyn, J. (2015, July). Chords suggestion algorithm
using jusic distance for music knowledgebase. International Journal of Computer
and Modern Technology, 2(2), 1.
577. Kharde, D. N., & Selwyn, J. (2015). A knowledge acquisition model using
multi-agents for KaaS. International Journal of Computer and Information
Engineering, 9(2), 521-525.
578. Singh, R. K., & Sivabalakrishnan, M. (2015). Feature selection of gene
expression data for cancer classification: a review. Procedia Computer Science,
50(1), 52-57.
579. Merry, K. P., Singh, R. K., & Kumar, S. S. (2012). Apriori-hybrid
algorithm as a tool for colon cancer microarray data classification. International
Journal of Engineering Research and Development, 4(1), 53-57.
580. Bhargavi, R., & Gumparthi, S. (2015). Credit risk management model
optimization using complex event processing. International Journal of Applied
Engineering Research, 10(3), 6353-6362.
581. Hussain, S.H., Geetha, S., & Prabakar, M.A. (2015). Listing past, current,
and upcoming research in ubiquitous computing – a review. International Journal
of Applied Engineering Research, 10(55), 2142-2145.
582. Sivakumar, T.B., Geetha, S., & Prabakar, M.A. (2015). Role based access
control policy in secure sharing healthcare data using multi cloud. International
Journal of Applied Engineering Research, 10(55), 2302-2307.
583. Seema, S.S., Maheswari, M., Selvakumar, S., & Geetha, S. (2015).
Reckoning trust in e-commerce by mining product reviews. International Journal
of Applied Engineering Research, 10(55), 1875-1879.
584. Chitra, P.K.A., SA alias Balamurugan., & Geetha, S. (2015). Modeling
and analysis of multi label classification algorithms. International Journal of
Applied Engineering Research, 10(55), 1116-1121.
585. Nirmala, G., Geetha, S., & Selvakumar, S. (2015). Optimal long run cost
path of mobile robot navigation using qlearning algorithm. International Journal
of Applied Engineering Research, 10(9), 6867-6870.
586. Jasmine, G. S., & Pattabiraman, V. (2015). Hyperspectral image analysis
using end member extraction algorithm. Int. J. Pure Appl. Math, 101, 809-829.
587. Gayathri, A. U., & Sivabalakrishnan, D. (2015, March). Face and
foreground and background detection estimation using adaptive based algorithm
in real time video’s, International Journal of Advanced Research in Computer and
Communication Engineering, 4(3), 617-620.
588. Sivabalakrishnan, M., & Shanthi, K. (2015). Person Counting System
Using EFV Segmentation and Fuzzy Logic. Procedia Computer Science, 50, 572-
578.
589. Vignesh, R., & Sivabalakrishnan, M . (2015). a comparative study on blur
families and their algorithmic applications methods to make an image restoration
by image deblurring. International Journal of Scientific Progress and Research
(IJSPR), 11(1), 8-11.
590. Sivagami, M., Revathi, T., & Jeganathan, L. (2015). Object detection with
a hard shadow removal in a still image, International Journal of Applied
Engineering and Research, 10(34), 27153-27157.
591. Malathi, G. (2015, July). Image fusion techniques for the assessment of
multi-focus ultrasound placenta using quality metrics. International Journal of
Applied Engineering Research, 10(12), 30761-30774.
592. Vijayalakshmi, A., & Kanna, B.R. (2015). Enhanced quality of service in
visualizing the malaria data using cloud computing. ARPN Journal of
Engineering and Applied Sciences, 10(5), 2061-2065.
593. Rajkumar, S., & Malathi, G. (2015). A novel approach for the recovery of
de-focussed color images. International Journal on Recent Researches In
Science ,Engineering & Technology, 5(3), 1.
594. Jackson, C., Vijayakumar, V., Subramaniyaswamy, V., & Anusooya, G.
(2006). An insight on reputation based incentive scheme and throughput feedback
routing in MANET’S. ARPN Journal of Engineering and Applied Sciences 10 (5),
1988-1992.
595. Rukmani, P., & Ganesan, R. (2015). Modified low latency queuing
algorithm for real time applications in WIMAX networks. International Journal
of Pure and Applied Mathematics, 101(5), 915-924.
596. Chauhan, A., Vijayakumar, V., Vincent, R., & Pradeep, K. V. (2015).
Towards the Development of a Framework for Socially Responsible Software by
Analyzing Social Media Big Data on Cloud Through Ontological Engineering.
Procedia Computer Science, 50(1), 524-530.
597. Vetrivelan, P., Maharajan, S. S., Narayanasamy, P., Koushik, C. P.,
Ratheesh, R., & Kumar, T. P. (2015). Vertical handover and video streaming over
cloud in 4g heterogeneous overlay wireless networks. International Journal of
Engineering and Technology (IJET), 7(5). 1537-1547.
598. Srinivasan, A., Quadir, M. A., & Vijayakumar, V. (2015). Hybrid cloud
for educational sector. Procedia Computer Science, 50, 37-41.
599. Srinivasan, A., Quadir, M. A., & Vijayakumar, V. (2015). Era of cloud
computing: a new insight to hybrid cloud. Procedia Computer Science, 50, 42-51.
600. Maheswari, R., & Pattabiraman, V. (2015). Performance analysis of
reconfigurable open soft core processor-or1200 with global hazard controller.
International Journal of Pure and Applied Mathematics, 101(5), 849-858.
601. Priyaadharshini, M., & Sundaram, B.V. (2015). Teaching and Learning as
a Service (TLaaS). International Journal of Applied Engineering Research,
10(34), 27183-27188.
602. Sarobin, M. V. R., & Ganesan, R. (2015). Swarm intelligence in wireless
sensor networks: a survey. Int. J. Pure Appl. Math, 101(5), 773-807.
603. Prassanna, J., Punitha, K., & Neelanarayanan, V. (2015). Towards an
Analysis of Data Accountability and Auditing for Secure Cloud Data Storage.
Procedia Computer Science, 50(1), 543-550.
604. Vijaya, A., & Neelanarayanan, V. (2015). A model driven framework for
portable cloud services: Proof of concept implementation. International Journal of
Education and Management Engineering, 5(4), 27.
605. Rani. S.U., & Neelanarayanan V. (2015). Interoperable framework
solutions to ICU health care monitoring. ICTACT Journal on Communication
Technology, 6(1),1072-1079.
606. Karthikeyan, G.K., Jayachandran, J., & Neelanarayanan, V. (2015).
Energy aware network scheduling for a data center. International Journal of Big
Data Intelligence, Special Issue on: Big Data and Cloud Computing Challenges,
2(1), 37-44.
607. Kempanna, M., & Kannan, R. J. (2015). Anfis Based Multilayered Botnet
Detection with Traffic Reduction Technique. Middle-East Journal of Scientific
Research, 23(3), 426-431.
608. Shiny, X. A., & Kannan, R. J. (2015). Energy Efficient Clustering
Protocol using Self Organizing Map in MANET. Indian Journal of Science and
Technology, 8(28), 1.
609. Shiny, X.S.A., & Kannan, R.J. (2015). A novel multicast routing protocol
based on SOM to minimize energy consumption in MANETs. International
Journal of Applied Engineering Research (IJAER), 10(19), 39885-39890.
610. Arumugam, S., Jayaram, B., & Thulasiraman, K. (2015). Independent
dominator sequence number of a graph. Procedia Computer Science, 74, 43-46.
611. Vignesh, U., & Asha, S. (2015). Modifying security policies towards
BYOD. Procedia Computer Science, 50, 511-516.
612. Devi, T., & Ganesan, R. (2015). Platform-as-a-Service (PaaS): model and
security issues. TELKOMNIKA Indonesian Journal of Electrical Engineering,
15(1), 151-161.
613. Devi, T., & Ganesan, R. (2015). Present, past and future challenges in
cloud computing, International Journal of Applied Engineering Research, 10(44),
30735-30739.
614. Thiyagarajan, D., & Ganesan, R. (2015). Data Security Model Employing
Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (SHA-3) in
Cloud Computing. International Journal of Technology, 3, 327-335.
615. Suresh, K., & Pattabiraman, V. (2015), Investigation on ARM algorithm
with incremental mining and proposing a new algorithm for streaming dataset”,
Australian Journal of Basic and Applied Sciences, 9(6), 72-76.
616. Suresh, K., & Pattabiraman, V. (2015). An Improved Utility Itemsets
Mining With Respect To Positive And Negative Values Using Mathematical
Model. International Journal of Pure and Applied Mathematics, 101(5), 763-772.
617. Muralidhar, A., & Pattabiraman, V. (2015). An efficient association rule
based clustering of XML documents. Procedia Computer Science, 50, 401-407.
618. Harini, S., & Pattabiraman, V. (2015). Hybrid multi-core Asic architecture
with FPGA for self-repairing of hard faults. Int. J. Pure Appl. Math, 101(8), 905-
914.
619. Rosaline, R. A. A., & Parvathi, R. (2010). Performance analysis of various
text classification algorithms. Int. J. Pure Appl. Math, 101(5), 625-634.
620. Rekha, J. H., & Parvathi, R. (2015). Survey on software project risks and
big data analytics. Procedia Computer Science, 50, 295-300.
621. Mary, S,A., & Suganya, G. (2015). Requirements prioritization –
stakeholder identification and participation. International Journal of Applied
Engineering Research, 10(34), 27230-27233.
622. Kumar, J.S., & Maheswari, N. (2015), A framework for security in data
mining using intelligent agents. ARPN Journal of Engineering and Applied
Sciences, 10(6), 2551–2560.
623. Maheswari N. & Kumar, J. S. (2015). A framework for security in data
mining using intelligent agents. ARPN Journal of Engineering and Applied
Sciences,10(6),1.
624. Chauhan, A., Vijayakumar, V., & Ragala, R. (2015). Towards a Multi-
level Upper Ontology/foundation Ontology Framework as Background
Knowledge for Ontology Matching Problem. Procedia Computer Science, 50,
631-634.
625. Nujella, S., & Pradeep, K. V. (2015). Supervisory service for cloud
infrastructure and services. International Journal of Applied Engineering
Research,10(55), 2866-2870.
626. Rajendran, V., & Kumar, G. B. (2015). Text processing for developing
unrestricted Tamil text to speech synthesis system. Indian Journal of Science and
Technology, 8(29), 112-124.
627. Kumar, B. (2015). An encyclopedic overview of big data analytics.
International Journal of Applied Engineering Research,10(3), 5681-5705.
628. Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V.
(2015). Unstructured data analysis on big data using map reduce. Procedia
Computer Science, 50, 456-465.
629. Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V.
(2015). Intelligent travel recommendation system by mining attributes from
community contributed photos. Procedia Computer Science, 50, 447-455.
630. Va, S., Rb, L., Vc, V., & Vd, I. (2015). Automated message filtering
system in online social network. Procedia Computer Science, 50, 466-475.
631. Jackson, J. C., Vijayakumar, V., Quadir, M. A., & Bharathi, C. (2015).
Survey on programming models and environments for cluster, cloud, and grid
computing that defends big data. Procedia Computer Science, 50, 517-523.
632. Bharathi, C., Vijayakumar, V., & Pradeep, K. V. (2015). An extended
trust management scheme for location based real-time service composition in
secure cloud computing. Procedia Computer Science, 50, 103-108.
633. Durgalakshmi, B., & Vijayakumar, V. (2015). Progonosis and modelling
of breast cancer and its growth novel naïve bayes. Procedia Computer Science,
50, 551-553.
634. Pradeep, K. V., & Vijayakumar, V. (2015). Survey on the key
management for securing the cloud. Procedia Computer Science, 50, 115-121.
635. Anitha, R., & Vijayakumar, V. (2015). Homomorphic Encryption Based
Data Security on Federated Cloud Computing‖. ARPN Journal of Engineering
and Applied Sciences, 10(5).
b) List of Research Publications Conference Proceedings coming from the Department
during the last five years
Conference Proceedings

2022
1. Leninisha Shanmugam. (2022). Font Recognition System for English, International virtual
conference on Machine Learning Applications in Applied Sciences and Mathematics.
2. Leninisha Shanmugam. (2022). Recognition of Birds Nest in High Voltage Power Line using
SSD, First International Conference on Electrical, Electronics, Information and
Communication Technologies.
3. Ayesha, SK. (2022). Energy Efficient Approximate Multiplier Design for Image/Video
Processing Applications, IEEE International Symposium on Smart Electronic Systems (IEEE
– iSES, formerly IEEE – iNIS).
4. Ayesha, SK. 2022. Energy Efficient Approximate 4:2 Compressors for Error Tolerant
Applications, 28th IEEE International Conference on Electronics, Circuits, and Systems
(ICECS).
5. Ayesha, SK. (2022). Design and Analysis of Obfuscated Full Adders, International
Conference on Microelectronics (ICM).
6. Prabhakar Rao, B V A N S S. (2022). Intelligent Vehicle Authentication System,
International Conference on Innovative Technology for Sustainable Development
(ICITSD2022).
7. Jani Anbarasi, L. (2022). Uses and Trends In Hematopoietic Cell Transplantation In The
United States of America, 5th International Conference on Electrical, Electronics,
Communication, Computer Technologies and Optimization Techniques (ICEECCOT).
8. Jani Anbarasi, L. (2022). Breast Cancer Detection and Analysis Using Transfer Learning
Algorithm, 5th International Conference on Electrical, Electronics, Communication,
Computer Technologies and Optimization Techniques (ICEECCOT).
9. Rajalakshmi, R. (2022). Findings of the Shared Task on Offensive Span Identification from
Code-Mixed Tamil, In Proceedings of the Second Workshop on Speech and Language
Technologies for Dravidian Languages (DravidianLangTech-ACL 2022), 261–270, Dublin,
Ireland. Association for Computational Linguistics.
10. Rajalakshmi, R. (2022). Abusive Comment Detection in Tamil using Multilingual
Transformer Models, In Proceedings of the Second Workshop on Speech and Language
Technologies for Dravidian Languages (DravidianLangTech-ACL 2022), 207-213, Dublin,
Ireland. Association for Computational Linguistics.
11. Rajalakshmi, R. (2022). Prediction of tensile stress using machine learning approach for S355
structural, 4th International Conference on Advances In Mechanical Engineering (ICAME
2022).
12. Vani, V. (2022). Automatic Tweet Generation based on user emotion, International
Conference on Machine Learning in Applied Science and Mathematics.
13. Pradeep, K. (2022). Exploration on Task Scheduling using Optimization Algorithm in Cloud
computing, 6th International Conference on Trends in Electronics and Informatics (ICOEI
2022), 874-877.
14. Suguna, M. (2022). Automatic Traffic Sign Detection System with Voice Assistant,
International Conference on Advanced computing Technologies & Applications (ICACTA), 1-
7.
15. Suguna, M. (2022), A Smart wearable motion sensor and acoustic signal processing based on
vocabulary for monitoring children's wellbeing using Big Data, International Conference on
Advanced computing Technologies & Applications (ICACTA), 1-9.
16. Vergin Raja Sarobin, M. (2022). Literature Survey on White Blood Cells Classification Using
Deep Learning Model, International Conference On Recent Advances In Fog And Edge
Computing.
17. Vergin Raja Sarobin, M. (2022). A Study On Early Stage Detection Of Autism Spectrum
Disorder Using Computer Vision, International Conference On Recent Advances In Fog And
Edge Computing.
18. Tyagi, A. K. (2022). Blockchain Enabled Cyber Security: A Comprehensive Survey,
International Conference on Computer Communication and Informatics (ICCCI), 1-6.
19. Tyagi. A. K. (2022). Internet of Things Based Smart Environment: Threat Analysis, Open
Issues, and a Way Forward to Future, International Conference on Computer Communication
and Informatics (ICCCI), 1-6.
20. Tyagi. A. K. (2022). Ethical Hacking: Importance, Controversies and Scope in the Future,
International Conference on Computer Communication and Informatics (ICCCI).
21. Tyagi, A. K. (2022). Blockchain Network based Decentralized Applications for Healthcare
Sector, International Conference on Computer Communication and Informatics (ICCCI).
22. Tyagi, A. K. (2022). Blockchain Technology for Securing Internet of Vehicle: Issues and
Challenges, International Conference on Computer Communication and Informatics (ICCCI).
23. Tyagi, A. K. (2022). Reliable Edge Computing Architectures for Crowdsensing Applications,
International Conference on Computer Communication and Informatics (ICCCI).
24. Tyagi, A. K. (2022). SecVT: Securing the Vehicles of Tomorrow using Blockchain
Technology, International Conference on Computer Communication and Informatics
(ICCCI).
25. Shanmugam, L. (2022). Recognition of Birds Nest in High Voltage Power Line using SSD,
First International Conference on Electrical, Electronics, Information and Communication
Technologies (ICEEICT), 01-07.
26. Suganya, G. (2022). An Effective Decision Support System for Travel in COVID'19
Pandemic using Fuzzy, International Conference on Advanced Computing Technologies and
Applications (ICACTA), 1-7.
2021
27. Vedhapriyavadhana, R. (2021). Image Encryption based on Watermarking and Chaotic masks
using SVD, Virtual International Conference on Futuristic Communication and Network
technologies.
28. Vergin Raja Sarobin, M. (2021). Deployment of Sensor Nodes in IoT Network - A Survey,
Fifth International Conference on I-SMAC.
2020
29. Rao, P. (2020). Expert Advisory System to Invest in Software Industry. In Proceedings of
National Conference on Artificial Intelligence (NCAI).
30. Rao, P. (2020). Role of Digitization in HEIs for Better Ranking. In UGC Sponsored Two Day
National Conference on Future Challenges of Higher educational Institutions in Assessment
& Accreditation Procedures and Ranking Framework Methodologies.
31. Gopu, A., & Neelanarayanan, V. (2020). Multiobjective Virtual Machine Placement Using
Evolutionary Algorithm with Decomposition. In Proceedings of 6th International Conference
on Big Data and Cloud Computing Challenges (pp. 149-162). Springer, Singapore.
32. Jithendra, H. N., & Rekha, D. (2020). On-demand Joint Predictive Flooding in Vehicular
Adhoc Networks. In Proceedings of 5th International Conference on Engineering and
Technology.
33. Natarajan, N., Graceline Jasmine, S., & Jani Anbarasi, L. (2020). Change Detection of Snow
cover on Himalayan Region using Minimum Distance to Mean classifier. In Proceedings of
International Conference on Mathematical Computer Engineering.
34. Thota, S., & Malathi, G. (2020). IOT Based smart rodent detection and fire alert system in
farmland. In Proceedings of International Conference on Research Advancements &
Challenges in Engineering Sciences (ICRACE'2020).
35. Patwa, R., & Malathi, G. (2020). Design of women security interface using IOT. In
Proceedings of International Conference on Research Advancements & Challenges in
Engineering Sciences (ICRACE'2020).
36. Moses, A., & Parvathi, R. (2020). Vehicular Traffic analysis and prediction using Machine
learning algorithms. In Proceedings of International Conference on Emerging Trends in
Information Technology and Engineering (ic-ETITE).
2019
37. Chitlangia, A., & Malathi, G. (2019). Handwriting Analysis based on Histogram of Oriented
Gradient for Predicting Personality traits using SVM. Procedia Computer Science, 165, 384-
390.
38. Rao, P. (2019). The Role of Indian Farmer in Economic Development. In Proceedings of in
the Post Centenary Third National Conference on Macro Economics of India: With Special
Reference to Economic Development of Tamil Nadu.
39. SAHOO, B., MAHARANA, A., MURALI, M., SHIVANI, L., SUGANYA, G., &
PREMALATHA, M. (2019, February). Low-Cost Air Sensing System. In 2019 3rd
International Conference on Computing and Communications Technologies (ICCCT) (pp.
258-267). IEEE.
40. Sheikh, S., Suganya, G., & Premalatha, M. (2020). Automated Resource Management on
AWS Cloud Platform. In Proceedings of 6th International Conference on Big Data and Cloud
Computing Challenges (pp. 133-147). Springer, Singapore.
41. Winnie, Y., Umamaheswari, E., & Ajay, D. M. (2018, September). Enhancing Data Security
in IoT Healthcare Services Using Fog Computing. In 2018 International Conference on
Recent Trends in Advance Computing (ICRTAC) (pp. 200-205). IEEE.
42. Jeyasingh, J., & Justus, S. (2019). Evaluating the Knowledge Management Metrics. In
Indiana Summit 2019.
43. Praveena, N., & Justus, S. (2019). A Study on the CG based Knowledge Representation
Models. In Indiana Summit 2019.
44. Thakur, A., & Hepsiba Mabel V. (2019). Patent Document Analysis- Approach Building. In
Indiana Summit 2019.
45. Akram, W., Jain, M., & Hemalatha, C. S. (2019). Design of a Smart Safety Device for
Women using IoT. Procedia Computer Science, 165, 656-662.
46. SenthilKumar, P., Jani Anbarasi, L., Graceline Jasmine, S., Sarobin, V. R., & Davamani, A.
(2019). EGO-Network Analysis of Facebook Data. In Proceedings of National Conference on
Computational Intelligence and Automation, 12, 225-227.
47. Abijah Roseline, S., Sasisri, A. D., Geetha, S & Balasubramanian, C. (2019). Towards
Efficient Malware Detection and Classification using Multilayered Random Forest Ensemble
Technique. In The IEEE 53rd International Carnahan Conference on Security
Technology (ICCST 2019)
48. Raj, B., Anbarasi, L. J., Narendra, M., & Subashini, V. J. (2019, February). A New
Transformation of 3D Models Using Chaotic Encryption Based on Arnold Cat Map.
In International Conference on Emerging Internetworking, Data & Web Technologies, 322-
332. Springer, Cham.
49. Dhoot, R., Agrawal, S., & Kumar, M. S. (2019, February). Implementation And Analysis Of
Arima Model And Kalman Filter For Weather Forcasting in Spark Computing Environment.
In 2019 3rd International Conference on Computing and Communications Technologies
(ICCCT),105-112. IEEE.
50. Kantesaria, M., & Sandhya, P. (2018, September). Argumentative Analysis on Persuasive
Essays. In 2018 International Conference on Recent Trends in Advance Computing
(ICRTAC) (pp. 168-173). IEEE.
51. Roseline, S. A., Hari, G., Geetha, S., & Krishnamurthy, R. (2019, September). Vision-Based
Malware Detection and Classification Using Lightweight Deep Learning Paradigm.
In International Conference on Computer Vision and Image Processing (pp. 62-73). Springer,
Singapore.
52. Roseline, S. A., & Geetha, S. (2019). High-Performance Malware Classifier using Dense
Convolutional Neural Networks. In 2nd World Summit on Advances in Science, Engineering
and Technology (Indiana Summit 2019).
53. Punithavathi, P., & Geetha, S. (2019). Cancelable Biometric Transformations for E-Passport
Security. In 2nd World Summit on Advances in Science, Engineering and Technology
(Indiana Summit 2019).
54. Pavithra, L., & Rekha, D. (2019). Prevention of Replay Attack for Isolated Smart Grid. In
Proceedings of 5th International Conference on Engineering and Technology.
55. Rai, A., & Jagadeesh Kannan, R. (2019). Automating Machine Learning By Population
Coding of Neuronal Cells In Collaborative Decision Making. In Proceedings of 2nd World
Summit on Advances in Science, Engineering and Technology (Indiana Summit 2019).
56. Rai, A., & Jagadeesh Kannan, R. (2019). Auto Neural Architecture Generator for UAV Based
Geospatial Surveillance for Aerial Crisis Mapping in Dark. In Proceedings of 2nd World
Summit on Advances in Science, Engineering and Technology (Indiana Summit 2019).
57. Devi, V. K., & Ganesan, R. (2019). Conditional Probabilistic Coefficient based Selfish Node
Identification in Cyber Physical Systems. In 2019 International Conference on Wireless
Communications Signal Processing and Networking (WiSPNET) , 1-5. IEEE.
58. Priya, R. P., Marietta, J., Rekha, D., Mohan, B. C., & Amolik, A. (2019). IoT-Based Smart
Office System Architecture Using Smartphones and Smart Wears with MQTT and Razberry.
In Proceedings of the 2nd International Conference on Data Engineering and Communication
Technology (pp. 623-632). Springer, Singapore.
59. Sanket, S., Thakor, J., Kapoor, P., Pande, K., Shrivastav, S. V., & Maheswari, R. (2019,
August). Relative Hand Movement and Voice Control Based Home Automation and PC.
In International Conference on Inventive Computation Technologies (pp. 232-239). Springer,
Cham.
60. Sharmila, P., Baskaran, J., Nayanatara, C., & Maheswari, R. (2019). A hybrid technique of
machine learning and data analytics for optimized distribution of renewable energy resources
targeting smart energy management. Procedia Computer Science, 165, 278-284.
61. Maheswari, R., Azath, H., Sharmila, P., & Gnanamalar, S. S. R. (2019, May). Smart Village:
Solar Based Smart Agriculture with IoT Enabled for Climatic Change and Fertilization of
Soil. In 2019 IEEE 5th International Conference on Mechatronics System and Robots
(ICMSR), 102-105. IEEE.
62. Priyaadharshini, M., & Kanuru, L. S. (2019). Lifelong Learning in higher education using
Learning Analytics. In Proceedings of 9th World Engineering Education Forum
(WEEF - 2019).
63. Priyaadharshini, M., Bettina Shirley, R., Natha Mayil, N., Dakshina, R., & Sandhya, S.
(2019). Learning Analytics: Game-based Learning for Programming Course in Higher
Education. In Proceedings of 9th World Engineering Education Forum (WEEF - 2019).
64. Priyaadharshini, M., Srimadhaven, T., Chris Junni, A. V., Harshith, N., Jessenth Ebenezer, S.,
& Shabari Girish, S. (2019). Learning Analytics: Virtual Reality for Programming Course in
Higher Education. In Proceedings of 9th World Engineering Education Forum (WEEF -
2019).
65. Ajeeth, B., & Muthumanikandan, V. (2020). Hybrid Load Balancing Approach for SDN-
Enabled M2M Networks. In Proceedings of International Conference on Wireless
Communication, 305-314. Springer, Singapore.
66. Karmel, A., Sharma, A., & Garg, D. (2019). IoT based Assistive Device for Deaf, Dumb and
Blind People. Procedia Computer Science, 165, 259-269.
67. Priyadharshini, A., Prasad, M., Joshua Samuel Raj, R., & Geetha, S. (2019). An authenticated
E-voting System using Biometrics and Blockchain. In Proceedings of 3rd ICBDCC 19.
68. Prabha, A. J., & Bhargavi, R. (2019). Prediction of Dyslexia Using Machine Learning—A
Research Travelogue. In Proceedings of the Third International Conference on
Microelectronics, Computing and Communication Systems (pp. 23-34). Springer, Singapore.
69. Bhuvaneswari, A., Thomas, J. T. J., & Kesavan, P. (2019). Embedded Bi-directional GRU
and LSTMLearning Models to Predict Disasterson Twitter Data. Procedia Computer
Science, 165, 511-516.
70. Suganeshwari, G., & Syed Ibrahim, S. P. (2019). A Movie Recommendation Using Common
Genre Relation on User-Item Subgroup. In 2nd World Summit on Advances in Science,
Engineering and Technology (Indiana Summit 2019).
71. Tamrakar, P., Roy, S. S., Satapathy, B., & Ibrahim, S. S. (2019, March). Integration of lazy
learning associative classification with kNN algorithm. In 2019 International Conference on
Vision Towards Emerging Trends in Communication and Networking (ViTECoN), 1-4. IEEE.
72. Dutta S., Parvathi R., & Ganesan, R. (2019). Threat Identification and Analysis using Graph
Based Anomaly Detection. In Proceedings of International Conference on Innovation &
Advanced Multidisciplinary Research.
73. Ramachandran, D., & Parvathi, R. (2019). Analysis of Twitter Specific Preprocessing
Technique for Tweets. Procedia Computer Science, 165, 245-251.
74. Kamatchi, S. B., & Parvathi, R. (2019). Improvement of Crop Production Using
Recommender System by Weather Forecasts. Procedia Computer Science, 165, 724-732.

2018
75. Varghese, R., Sharma, S., & Premalatha, M. (2018, October). Transforming Auto-Encoder
and Decoder Network for Pediatric Bone Image Segmentation using a State-of-the-art
Semantic Segmentation network on Bone Radiographs. In 2018 International Conference on
Intelligent Informatics and Biomedical Sciences (ICIIBMS) (Vol. 3, pp. 251-256). IEEE.
76. Vijayalakshmi, A., Kanna, B. R., & Banukumar, S. (2018). Estimation of Texture Variation in
Malaria Diagnosis. In Computational Signal Processing and Analysis (pp. 325-334). Springer,
Singapore.
77. Kumar, R., & Geetha, S. (2018, September). Malware Detection Modeling Systems. In 2018
International Conference on Recent Trends in Advance Computing (ICRTAC) (pp. 187-192).
IEEE.
78. Ritwik, M. G., Krishna, D., Shreyas, T. R., & Phamila, Y. A. V. (2018, September). Road
Congestion based Traffic Management System with Dynamic Time Quantum. In 2018
International Conference on Recent Trends in Advance Computing (ICRTAC) (pp. 1-6).
IEEE.
79. Roseline, S. A., & Geetha, S. (2018, September). Intelligent Malware Detection using
Oblique Random Forest Paradigm. In 2018 International Conference on Advances in
Computing, Communications and Informatics (ICACCI) (pp. 330-336). IEEE.
80. Sharon, J. J., Anbarasi, L. J., & Raj, B. E. (2018, November). DPSO-FCM based
segmentation and Classification of DCM and HCM Heart Diseases. In 2018 Fifth HCT
Information Technology Trends (ITT) (pp. 41-46). IEEE.
81. Sharma, S., Negi, A., Vaidehi, V., Singh, S., Raj, D. S. S., & Ganesan, S. (2018, September).
Eye state detection for use in advanced driver assistance systems. In 2018 International
Conference on Recent Trends in Advance Computing (ICRTAC) (pp. 155-161). IEEE.
82. Sarobin, M. V. R., & Ganesan, R. (2018). Deterministic Node Deployment for Connected
Target Coverage Problem in Heterogeneous Wireless Sensor Networks for Monitoring Wind
Farm. In Advances in Smart Grid and Renewable Energy (pp. 683-694). Springer, Singapore.
83. Jayasudha, M., Sai Ritheesh, K., & Subbulakshmi, T. (2018). Asymmetric Key Encryption for
File Transfer in the Open Nebula Private Cloud. In Proceedings of the IEEE International
Conference on New Trends in Engineering and Technology (ICNTET 18).
84. Pathak, S., Sharma, A., Shekhar, S., Pandey, A., Devi, B. S. K., Udayakumar, N., &
Subbulakshmi, T. (2018). Detection and Classification of DDoS Attack using Machine
Learning Models with Real Time Generated Dataset. In Proceedings of the International
Conference on New Trends in Engineering and Technology (ICNTET 18).
85. Udayakumar, N., Anandaselvi, S., & Subbulakshmi, T. (2018). Malware analysis and
classification using Support Vector Machines. In Proceedings of the International Conference
on New Trends in Engineering and Technology (ICNTET 18).
86. Jayasudha, M., Somkuwar, S. R., Robin, R. J., & Subbulakshmi, T. (2018, April). Encrypted
Packet Transfer with Enhanced Dijkstra's Algorithm Using Open Source Tools. In 2018
International Conference on Communication and Signal Processing (ICCSP) (pp. 0830-
0834). IEEE.
87. Subbulakshmi, T., Bhardwai, S., Ranjan, P., & John, K. A. (2018, June). Enhanced SPK
Encryption Algorithm for File Encryption Using Java. In 2018 Second International
Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 235-239). IEEE.
88. Devi, B. S. K., Aravindhan, K., Kini, P. S., Reddy, G. A., & Subbulakshmi, T. (2018). A
Prediction Model for Flooded Packets in SNMP Networks. In 2018 Second International
Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 82-86). IEEE.
89. Devi, B. S. K., Gupta, A., Sharma, N., Raghhuveer, J., & Subbulakshmi, T. (2018). Detection
and Classification of Attacks on SNMP Network using Machine Learning. In Proceedings of
the International Conference on New Trends in Engineering and Technology (ICNTET 18).
90. Udayakumar, N., Khera, A., Suri, L., Gupta, C., & Subbulakshmi, T. (2018, April).
Bandwidth Analysis of File Transfer Protocol. In 2018 International Conference on
Communication and Signal Processing (ICCSP) (pp. 0791-0795). IEEE.
91. Devi, B. K., Saglani, V. J., Gupta, A. V., & Subbulakshmi, T. (2018, May). Classifying and
predicting DoS and DDoS attacks on cloud services. In 2018 2nd International Conference on
Trends in Electronics and Informatics (ICOEI) (pp. 1-5). IEEE.
92. Arasu, K., & Ganesan, R. (2018). Effective implementation of energy aware routing for
wireless sensor network. Materials Today: Proceedings, 5(1), 1186-1193.
93. Fernandez, J. J., & Pandian, N. (2018, September). JPEG Metadata: A complete study.
In 2018 International Conference on Recent Trends in Advance Computing (ICRTAC) (pp.
34-40). IEEE.
94. Deepa, S. R., & Rekha, D. (2018, January). Cluster Optimization in Wireless Sensor
Networks Using Particle Swarm Optimization. In Annual Convention of the Computer Society
of India (pp. 240-253). Springer, Singapore.
95. Bollu, D., & Maheswari, R. (2018). Machine Learning Approach To Predict Remaining Life
Span of Bearing. In Proceedings of International Conference on Mathematical Computer
Engineering.
96. Maheswari, R., Gomathy, V., & Sharmila, P. (2018). Cancer Detecting Nanobot using
Positron Emission Tomography. Procedia Computer Science, 133, 315-322.
97. Dhar, S., Gandhi, A., Ahuja, G., & Anusooya, G. (2017, November). Raspberry Pi based real
time tracking system. In 2017 International Conference on Inventive Computing and
Informatics (ICICI) (pp. 442-451). IEEE.
98. Saglani, V. J., Gupta, A. V., Sarma, R., Pathak, S., & Rekha, D. (2018, December). IoT based
Smart Safe System. In 2018 International Conference on Computational Techniques,
Electronics and Mechanical Systems (CTEMS) (pp. 376-379). IEEE.
99. Gulhane, P. R., & Kumar, T. P. (2018, September). TensorFlow Based Website Click through
Rate (CTR) Prediction Using Heat maps. In 2018 International Conference on Recent Trends
in Advance Computing (ICRTAC) (pp. 97-102). IEEE.
100.Singh, P., Prasad, S., & Agyeya, O. (2018, November). Large Scale Image Retrieval with
Locality Sensitive Hashing. In 2018 3rd International Conference on Inventive Computation
Technologies (ICICT) (pp. 12-14). IEEE.
101.Sarobin, V. R., & Mahima, M. (2018). Data Analytics on IoT-based Health Monitoring
System. In Proceedings of International Conference on Cognitive IoT with Big Data & Cloud.
102.Rai, U., Miglani, K., Saha, A., Sahoo, B., & Sarobin, M. V. R. (2018, November). ReachOut
Smart Safety Device. In 2018 6th Edition of International Conference on Wireless Networks
& Embedded Systems (WECON) (pp. 131-134). IEEE.
103.Vergin Raja Sarobin, M. & Vaibhav, A. (2018). Bio-inspired node deployment in
heterogeneous wireless sensor networks for monitoring wind farm. In Proceedings of
International Conference on Mathematical Computer Engineering.
104.Umadevi, K. S., Gaonka, A., Kulkarni, R., & Kannan, R. J. (2018, September). Analysis of
stock market using streaming data framework. In 2018 International Conference on Advances
in Computing, Communications and Informatics (ICACCI) (pp. 1388-1390). IEEE.
105.Umadevi, K. S., Chopra, R., Singh, N., Aruru, L., & Kannan, R. J. (2018, September). Text
Summarization of Spanish Documents. In 2018 International Conference on Advances in
Computing, Communications and Informatics (ICACCI) (pp. 1793-1797). IEEE.
106.Jeganathan, L., Khan, A. N., Raju, J. K., & Narayanasamy, S. (2018, November). On a frame
work of curriculum for engineering education 4.0. In 2018 World Engineering Education
Forum-Global Engineering Deans Council (WEEF-GEDC) (pp. 1-6). IEEE.
107.Kannan, R. J., Punithavathi, P., & Sambandam, N. (2018, November). Technology Adoption
Models–Adoption of ICT in Educational Institutions in India. In 2018 World Engineering
Education Forum-Global Engineering Deans Council (WEEF-GEDC) (pp. 1-6). IEEE.

2017
108.Dhar, S., Pandey, K., Premalatha, M., & Suganya, G. (2017, November). A tree based
approach to improve traditional collision avoidance mechanisms of hashing. In 2017
International Conference on Inventive Computing and Informatics (ICICI) (pp. 339-342).
IEEE.
109.Maheswari, S., & Gudla, U. (2017, January). Secure sharing of personal health records in
Jelastic cloud by attribute based encryption. In 2017 4th International Conference on
Advanced Computing and Communication Systems (ICACCS) (pp. 1-4). IEEE.
110.Geetha, R., & Geetha, S. (2017, October). Improved Reversible Data Embedding in Medical
Images Using I-IWT and Pairwise Pixel Difference Expansion. In International Conference
on Next Generation Computing Technologies (pp. 601-611). Springer, Singapore.
111.Punithavathi, P., Geetha, S., & Sasikala, S. (2017, June). Generation of cancelable iris
template using bi-level transformation. In Proceedings of the 6th International Conference on
Bioinformatics and Biomedical Science (pp. 94-100).
112.Punithavathi, P., Geetha, S., & Shanmugam, S. (2017, November). Cloud-based framework
for cancelable biometric system. In 2017 IEEE International Conference on Cloud Computing
in Emerging Markets (CCEM) (pp. 35-38). IEEE.
113.Rai, A., Kannan, R. J., & Ramanathan, S. (2017, January). Multi-user networked framework
for virtual reality platform. In 2017 14th IEEE Annual Consumer Communications &
Networking Conference (CCNC) (pp. 584-585). IEEE.
114.Lokesh, V. K., Chowdary, C. P., Naresh, K., Jagadeesh Kannan, R. (2017). Classification of
Automobiles by Analysis of Frequency using an Arduino. In Proceedings of 4th International
Conference on ‘Microelectronics, Circuits and Systems.
115.Rai, A., & Kannan, R. J. (2017, June). Membrane computing based scalable distributed
learning and collaborative decision making for cyber physical systems. In 2017 IEEE 26th
international conference on enabling technologies: infrastructure for collaborative
enterprises (WETICE) (pp. 24-27). IEEE.
116.Nisha, V. M., & Jeganathan, L. (2017). A Cellular Automata Model for even linear
Languages. In Proceedings of the International conference on mathematical Computer
Engineering.
117.Subbulakshmi, T., & Manjaly, J. S. (2017, October). A comparison study and performance
evaluation of schedulers in Hadoop YARN. In 2017 2nd International Conference on
Communication and Electronics Systems (ICCES) (pp. 78-83). IEEE.
118.Devi, B. K., Saglani, V. J., Gupta, A. V., & Subbulakshmi, T. (2018, May). Classifying and
predicting DoS and DDoS attacks on cloud services. In 2018 2nd International Conference on
Trends in Electronics and Informatics (ICOEI) (pp. 1-5). IEEE.
119.Kannan, N., Arasu, K., Kannan, R. J., & Ganesan, R. (2017). An efficient system model for
multicasting measured noise value of polluting industries. In Proceedings of International
Conference on Communication and Networks (pp. 377-383). Springer, Singapore.
120.Dhanapal, A., & Nithyanandam, P. (2017). An Efficient and Effective Mechanism to
reproduce real time HTTP Flooding DDoS Attack. In Proceedings of International
Conference on Intelligent computing, Instrumentation and Control Technologies.
121.Sabireen, H., Kirthica, S., & Sridhar, R. (2017, January). Secure data archiving using
enhanced data retention policies. In International Conference on Data Science Analytics and
Applications (pp. 139-152). Springer, Singapore.
122.Rosaline, A., & Parvathi, R. (2017). Analysing student’s mood in social media using valence
and arousal factors to improve their academic performance. In Proceedings of International
conference on Innovative Engineering and Technology.
123.Sodhi, S. S., Kunwar, A. S., Dhingra, K., & Suganya, G. (2017). Smart chair. In Proceedings
of International Conference on Inventive Computing and Informatics (ICICI).
124.Dhar, S., Pandey, K., Premalatha, M., & Suganya, G. (2017). A Tree Based Approach to
Improve Traditional Collision Avoidance Mechanisms of Hashing. In Proceedings of
International Conference on Inventive Computing and Informatics (ICICI).

2016
125.Punithavathi, P., & Geetha, S. (2016, September). Dynamic sectored random projection for
cancelable iris template. In 2016 International Conference on Advances in Computing,
Communications and Informatics (ICACCI) (pp. 711-715). IEEE.
126.Geetha, R., & Geetha, S. (2016, September). Multilevel RDH scheme using image
interpolation. In 2016 International Conference on Advances in Computing, Communications
and Informatics (ICACCI) (pp. 1952-1956). IEEE.
127.Meghani, D., & Geetha, S. (2016, March). ECG Steganography to secure patient data in an E-
Healthcare System. In Proceedings of the ACM Symposium on Women in Research 2016 (pp.
66-70).
128.Punithavathi, P., & Geetha, S. (2017). Cancelable Biometric Template Security Using
Segment-Based Visual Cryptography. In Proceedings of International Conference on
Computer Vision and Image Processing (pp. 511-521). Springer, Singapore.
129.Sivakumar, L., Balabaskaran, J., Thulasiraman, K., & Arumugam, S. (2016, September).
Virtual topologies for abstraction service for IP-VPNs. In 2016 17th International
Telecommunications Network Strategy and Planning Symposium (Networks) (pp. 213-220).
IEEE.
130.Maheswari, R., & Pattabiraman, V. (2016). Performance Analysis of Reconfigurable Soft-
Core using Video Surveillance System. In Proceedings of International Conference on
Mathematical Computer Engineering.
131.Venkataraman, N. (2016). A survey on desktop grid systems-research gap. In Proceedings of
the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC–
16’) (pp. 183-212). Springer, Cham.
132.Prassanna, J., Jadhav, P. A., & Neelanarayanan, V. (2016). Towards an analysis of load
balancing algorithms to enhance efficient management of cloud data centres. In Proceedings
of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC–
16’) (pp. 143-155). Springer, Cham.
133.Anusooya, G., & Vijayakumar, V. (2016). Power optimization system for a small PC using
docker. In Proceedings of the 3rd international symposium on big data and cloud computing
challenges (ISBCC–16’) (pp. 173-181). Springer, Cham.
134.Rai, A., & Jagadeesh Kannan, R. (2016). Multivariate Automated Differential Diagnosis
System. In Souvenir of Engineering Sciences (ADINA YOUNG SCIENTIST AWARD-2016).
135.Rai, A., Ramanathan, S., & Kannan, R. J. (2016, June). Quasi opportunistic supercomputing
for geospatial socially networked mobile devices. In 2016 IEEE 25th international conference
on enabling technologies: infrastructure for collaborative enterprises (WETICE) (pp. 257-
258). IEEE.
136.Rai, A., Ramanathan, S., & Kannan, R. J. (2016). Networked Infrastructure for Scalable
Drone Services. In Proceedings of 5th International Conference on Computing,
Communication and Sensor Network (CCSN 2016).
137.Rai, A., Ramanathan, S., & Kannan, R. J. (2016). One Shot Learning Technique for
Automatic Target Detection in Multiview SAR Imagery. In Proceedings of 5th International
Conference on Computing, Communication and Sensor Network (CCSN 2016).
138.Rai, A., Ramanathan, S., & Kannan, R. J. (2016). Mathematical Modeling of M2M Enabled
Cellular Networks. In Proceedings of 5th International Conference on Computing,
Communication and Sensor Network (CCSN 2016).
139.Naresh, K., & Jagadeesh Kannan, R. (2016). Application of Graph Theory for Intensity
Modulated Radiation Therapy (IMRT) Cancer Treatment. In Proceedings of 5th International
Conference on Computing, Communication and Sensor Network (CCSN 2016).
140.Rosaline, R. A. A., & Parvathi, R. (2016). Mood Based Recommendation System in Social
Media Using PSV Algorithm. In Proceedings of the 3rd International Symposium on Big
Data and Cloud Computing Challenges (ISBCC–16’) (pp. 345-352). Springer, Cham.
141.Ajay, D. M., & Umamaheswari, E. (2016). An Initiation for Testing the Security of a Cloud
Service Provider. In Proceedings of the 3rd International Symposium on Big Data and Cloud
Computing Challenges (ISBCC–16’) (pp. 33-41). Springer, Cham.

2015
142.Subbulakshmi, T., & Udayakumar, N. (2015). Windows XP Vulnerabilities. In Proceedings
of the 11th International Conference on Science Engineering and Technology.
143.Subbulakshmi, T., & Sakpal, S., Prajapat, S. K., Gaikwad, A., & Devi, B. S. K. (2015). Smurf
Attack Detection using Snort IDS. In Proceedings of 11th International Conference on
Science Engineering and Technology.
144.Subbaraj, R., & Venkatraman, N. (2015). A systematic literature review on ontology based
context management system. In Emerging ICT for Bridging the Future-Proceedings of the
49th Annual Convention of the Computer Society of India CSI Volume 2 (pp. 609-619).
Springer, Cham.
145.Jackson, J. C., Vijayakumar, V., Quadir, M. A., & Bharathi, C. (2015). Survey on
programming models and environments for cluster, cloud, and grid computing that defends
big data. Procedia Computer Science, 50, 517-523.
146.Nirmala, G., Geetha, S., & Selvakumar, S. (2015, March). Intellectual method of guiding
mobile robot navigation using reinforcement learning algorithm. In 2015 IEEE International
Conference on Engineering and Technology (ICETECH) (pp. 1-4). IEEE.
147.Sasikala, S., alias Balamurugan, S. A., & Geetha, S. (2015). A novel feature selection
technique for improved survivability diagnosis of breast cancer. Procedia Computer
Science, 50, 16-23.
148.Sirin Seema, R., Maheswari, M., Selvakumar, S., & Geetha, S. (2015). Reckoning Trust in E-
Commerce by Mining Product Reviews. In Proceedings of International Conference on
Advances in Applied Engineering and Technology ICAAET– 2015.
149.Hasan Hussain, S., Geetha, S., & AmuthaPrabakar, M. (2015). Listing Past, Current, and
Upcoming Research in Ubiquitous Computing – A Review. In Proceedings of International
Conference on Advances in Applied Engineering and Technology ICAAET– 2015.
150. Sivakumar, T. B., Geetha, S., & AmuthaPrabakar, M. (2015). Role Based Access Control
Policy in Secure Sharing Healthcare Data Using Multi Cloud. In Proceedings of International
Conference on Advances in Applied Engineering and Technology ICAAET– 2015.
151.Geetha, S., & Sindhu, S. S. S. (2015). A Current Survey on Intrusion Detection Systems for
Wireless Sensor Networks. In Proceedings of Bilingual International Conference on
Information Technology and Library Science.
152.Vergin Raja Sarobin, M., & Ganesan, R. (2015). Swarm Intelligence Based Node Deployment
of Wireless Sensor Networks for Smart Grid Power Generation. In Proceedings of
International Conference on Mathematical Computer Engineering.
153.Jagadeesh Kannan, R., Subramanian, S., & Pradeep Raja, M. (2015). An Adaptive Approach
of Biometric based Authentication in ATM using Deep Learning. In Proceedings of 1st
International Conference on Microelectronics, Computing & Communication Systems.
154.Ramanathan, S., Jagadeesh Kannan, R., Rodriguez, I. (2015). MAM: Mission - Aware
Middleware for Collaborative Communication. In Proceedings of 4th International
Conference on Computing, Communication & Sensor Network (CCSN 2015).
155.Jagadeesh Kannan, R., Subramanian, S., Pradeep Raja, M., & Vidhya, A. (2015). Classifying
and Detecting Packed Polymorphic Malware Files Using Data Mining Tool. In Proceedings
of International Conference on Mathematical Computer Engineering.
156. Prabakaran, N., & Jagadeesh Kannan, R. (2015). Context Centered Response for Enabling
Pervasive Environment using Data Centric WSNs. In Proceedings of International
Conference on Mathematical Computer Engineering.
157.Naresh, K., & Jagadeesh Kannan, R. (2015). An Enumeration of Radiotherapy Terminologies,
Planning and its Optimization. In Proceedings of International Conference on Mathematical
Computer Engineering.
158.Umadevi, K. S., & Jagadeesh Kannan, R. (2015). An Energy Efficient Protocol for
Underwater Acoustic Sensor Networks. In Proceedings of International Conference on
Mathematical Computer Engineering.
159.Deka, J. K., & Syed Ibrahim, S. P. (2015). Driver Behavior Recognition Based on Real Time
Driving Information. In Proceedings of International Conference On Technological
Convergence For Information, Health, Food and Energy Security, Held at CSIR, Chennai,
Tamil Nadu, India.
160.Kaura, A., & Syed Ibrahim, S. P. (2015). Efficient Clustering of Data Extracted from Social
Networking Sites. In Proceedings of International Conference On Technological
Convergence For Information, Health, Food and Energy Security, Held at CSIR, Chennai,
Tamil Nadu, India.
161.Kandge, R., & Syed Ibrahim, S. P. (2015). Efficient Classification of Data Extracted from
Social Networking Sites. In Proceedings of International Conference On Technological
Convergence For Information, Health, Food and Energy Security, Held at CSIR, Chennai,
Tamil Nadu, India.
162.Site, A., & Syed Ibrahim, S. P. (2015). Text Classification Using Side Data. In Proceedings of
International Conference On Technological Convergence For Information, Health, Food and
Energy Security, Held at CSIR, Chennai, Tamil Nadu, India.
163.Bhajipale, M. & Syed Ibrahim, S. P. (2015). Extracting frequent itemset using Graph
Database. In International Conference On Technological Convergence For Information,
Health, Food and Energy Security, Held at CSIR, Chennai, Tamil Nadu, India.
164.Rekha, J. H., & Parvathi, R. (2015). Survey on software project risks and big data
analytics. Procedia Computer Science, 50, 295-300.
165.Mary, S. A., & Suganya, G. (2015). Requirements Prioritization: From the Perspective of
SMEs. Procedia Computer Science, 254-257.
166.Nachiyappan, S., & Justus, S. (2015). Cloud testing tools and its challenges: A comparative
study. Procedia Computer Science, 50, 482-489.
167.Hemaa, N., & Justus, S. (2015). Conceptual Graph Representation Framework for ICD-
10. Procedia Computer Science, 50, 635-642.
168.Prathilothamai, M., Marilakshmi, S., Majeed, N., & Viswanathan, V. (2016). Timely
prediction of road traffic congestion using ontology. In Proceedings of the International
Conference on Soft Computing Systems (pp. 331-344). Springer, New Delhi.
169.Nachiyappan, S., & Justus, S. (2015). Cloud testing tools and its challenges: A comparative
study. Procedia Computer Science, 50, 482-489.
170.Subbaraj, R., & Venkatraman, N. (2015). A systematic literature review on ontology based
context management system. In Emerging ICT for Bridging the Future-Proceedings of the
49th Annual Convention of the Computer Society of India CSI Volume 2 (pp. 609-619).
Springer, Cham.
c) List of Patents obtained or applied for during last five years:
1. “Affordable Smart Besom”, Application No. 202141003738, Indian Patent:
05-02-2021. (Status – Published) Applicants : Dr.Karmel A, Dr.Uma
Maheswari E, Dr.Kanimozhi G, Dr.Kanchana Devi V and Dr.David Maxim
Gururaj A
2. “Combined Preference Ranking Algorithm For Comparing Ands Initial
Ranking Of Cloud Services”, Application No. 202141003744, Indian on :
05-02-2021. (Status – Published) Applicants : Dr.Abdul Quadir Md and
Dr.Vijayakumar Varadarajan
3. “Dynamic Ranking Of Cloud Services For Web-Based Cloud Communities:
Efficient Algorithm For Rating-Based Discovery And Multi-Level Ranking
Of Cloud Services”, Application No. 202141003749, Indian Patent: 05-02-
2021. (Status – Published) Applicants : Dr.Abdul Quadir Md and
Dr.Vijayakumar Varadarajan
4. “Single Tap Attendance System Using Wi-Fi Direct Technology”,
Application No. 202141003748, Indian Patent on : 05-02-2021. (Status –
Published) Applicants : Mr.Jishnu Saurav Mittapalli, Mr.Bera Rahul Dilip
and Dr.S.Shridevi
5. “Modish Carpet”, Application No. 202141003740, Indian Patent: 05-02-
2021. (Status – Published) Applicants : Dr.Kanimozhi G, Dr.Uma
Maheswari E, Dr.Karmel A, Dr.Harini S, Dr.Vani V and Dr.Srutha Keerthi B
6. “Smart Farming With Climate-Crop Recommender Algorithm”,
Application No. 202141003747, Indian Patent: 05-02-2021. (Status –
Published) Applicants : Ms.S.Bangaru Kamatchi and Dr. R.Parvathi
7. “Smart Recliner”, Application No. 202141003752, Indian Patent : 05-02-
2021. (Status – Published) Applicants : Dr.Uma Maheswari E, Dr.Karmel
A, Dr.Kanimozhi G, Dr.Viswanathan V and Dr.David Maxim Gururaj A
8. “Twin Background Model For Video Surveillance Using Video Analytics”,
Application No. 202141003751, Indian Patent: 05-02-2021. (Status –
Published) Applicants : Mr. Jeeva S and Mr. Sivabalakrishnan M
9. “Method And System For Identification Of Brain”, Application No.
202041048787, Indian Patent: 13-11-2020. (Status – Published)
Applicants : Dr. A NAYEEMULLA KHAN, PROF. N. ILAKIYASELVAN and
DR. A. SHAHINA
10. “As-It-Is: Affordable Smart Innovative Triplet Irrigation System”,
Application No. 202041045386, Indian Patent: 11-06-2020. (Status –
Published) Applicants : DR. KANCHANA DEVI V, DR. KANIMOZHI G and
DR. KARMEL A
11. “As-It-Is: Affordable Smart Innovative Triplet Irrigation System”,
Application No. 202041045386, Indian Patent: 11-06-2020. (Status –
Published) Applicants : DR. KANCHANA DEVI V, DR. KANIMOZHI G and
DR. KARMEL A
12. “Smart Grocery Canister For Visually Impaired Persons”, Application No.
202041045389, Indian Patent: 16-10-2020. (Status – Published)
Applicants : DR. UMAMAHESWARI E, DR. KARMEL A, DR. KANIMOZHI G,
DR. VISWANATHAN V, DR. SUBHASHINI R and DR. MANIVANNAN A
13. “An Enhanced Ensemble Classifier For Hate And Offensive Content
Identification”, Application No. 202041043137, Indian Patent : 16-10-
2020. (Status – Published) Applicants :DR. R. RAJALAKSHMI and B.
YASHWANT REDDY
14. “SYSTEM AND METHOD FOR FLUID FLOW MANAGEMENT”, Application
No. 202041008865, Indian Patent Filed on : 02.03.2020. (Status – Filed)
Applicants : S. Kalarani, J. Dafni Rose, R. Priscilla, L. Javid Ali, S. Geetha, L.
Jani Anbarasi, S. Nikkath Bushra, C. A. Subasini and K. Vijayakumar
15. “IMPROVED BLIND IMAGE STEGANALYZER PERFORMANCE USING
CURVELET AND NOVEL THIRD ORDER SPAM FEATURES”, Application
No. 202041002590 A, Indian Patent Filed on : 21.01.2020. (Status –
Published on 31.01.2020): Applicants : C.Balasubramanian, J.Hemalatha,
S.Geetha, A.Ramathilagam, J.Veneeswari, V.Priya, R.Kalaivani.
16. “MALWARE DETECTION AND CLASSIFICATION SYSTEM”, Application No.
201941045886, Indian patent Filed on : 12.11.2019. (Status – Published);
Applicants : S. Geetha, Y. Asnath Victy Phamila, S. Abijah Roseline, A.D.
Sasisri, School of Computing Science and Engineering, VIT, Chennai
Campus, Chennai - 600127, Tamil Nadu, India. C. Balasubramanian,
Department of Computer Science and Engineering, P.S.R. Engineering
College, Sivakasi - 626140, Tamil Nadu, India.
17. “SECURE GOODS DELIVERY SYSTEM”, Application No.201941020567 A,
Indian patent Filed on : 24.05.2019. Date of Publication : 07.06.2019
(Status – Published) Applicants : Saumay Agrawal, Shushil Kumar
Ravishankar,Pritish Gupta, Siddharth Kale, S.Geetha, Y.Asnath Victy
Phamila, School of Computing Science and Engineering, VIT, Chennai
Campus, Chennai - 600127, Tamil Nadu, India, R.Krishnamurthy Address:
Department of Electronics and Communication Engineering, Sri Vasavi
Engineering College, Tadepalligudem– 534101, Andhra Pradesh, India.
18. “NOVEL HAND WRIST BIOMETRICS”, The Patent Office, Govt of India,
Intellectual Property Rights Building, Guindy, Patent published, October
2018. Applicants: E.Gokulakrishnan, G.Malathi, VIT University, Chennai,
India
19. “A METHOD FOR RUNNING HPC WORKLOAD ON COMPUTATIONAL CLOUD”,
Application No.201641044772, Indian patent Filed : 2016. (Status – Filed)
Applicants : S.Bharathiraja, S.Kumar.
20. “INTERNET OF THINGS(IOT) BASED TOGGLER DEVICE FOR HYBRID
VEHICLE POWER PACK”, Application No.201841006122 A, Indian patent Filed :
2018. (Status – Published) Applicant : R.Maheswari
21. “SECURED INFORMATION EXCHANGE METHOD & SYSTEM USING
HAPTIC CODES”, Application No.201841022636, Indian patent Filed : 2018.
(Status – Filed) Applicants : B.Rajesh Kanna
22. “SECURE HEALTH CARE SYSTEM”, Application No.201821015566 A, Indian
patent Filed : 2018. (Status – Published) Applicants : E.Umamaheswari
23. “SMART FLASK”, Application No.201941005617A, Indian patent Filed : 2019.
(Status – Published) Applicants : V.Vijayakumar
24. “AN AUTOMATED INDOOR PARKING SYSTEM AND A METHOD
THEREOF”, Application No.201941019290 Indian patent Filed : 2019. (Status –
Published) Applicants : D.Rekha
25. “A SYSTEM FOR WASTE MANAGEMENT”, Application No.201841046716
Indian patent Filed : 2019. (Status – Filed) Applicants : V.Neelanarayanan,
V.Vijayakumar
26. “DYNAMIC CROP IRRIGATION SYSTEM”, Application No.201841019250
Indian patent Filed : 2018. (Status – Filed) Applicants : N.Maheswari
27. “AUTONOMOUS DRONES FOR SMART FARMING”, Application
No.201841028680 Indian patent Filed : 2018. (Status – Filed) Applicants :
V.Neelanarayanan, V.Vijayakumar

d) List of patents commercialized and its profitability earned out of commercialization (in last
15 years) NIL

e) List of Research Publications scientific technical Books/Book Chapters written by faculty in


the department

Books:
1. Balasubramanian, C., & Geetha, S. VANET: Routing Protocols and Applications. Lap
Lambert Academic Publishing, USA, ISBN: 978-620-0-49717-8, 2020.
2. Geetha, S., & Asnath Victy Phamila, Y. Countering Cyber Attacks and Preserving the
Integrity and Availability of Critical Systems. IGI Global, ISBN: 9781522582410, 2019.
3. Justus, S., & Hepsiba Mabel, V. Software Metrics for Object-Relational Data Modelling,
Lambert Publications, ISBN: 978-613-9-45139-5, 2019.
4. Maheswari, R. Embedded CO-Design for Real Time Operating System, LAMBERT
Academic Publications, 2018.
5. Paul, P. K., & Karmel, A. Advance Computing and Informatics: The Emerging Context.
ND Publishers, New Delhi, ISBN NO: 9789388879347, 2018.
6. Rajesh Kanna, B. Development of Hypergraph based Techniques for Selected Image
Engineering Applications. Archers & Elevators Publishers, Bangalore, ISBN: 978-93-
86501-63-9, 2018.
7. Gayathri, R., Neelanarayanan, V., Kailash, S., & Arunkumar, G. Grid and Cloud
Computing. Renu Publishers, ISSN: 9789385502415, pp.1-139, 2017.
8. Justus, S., Hepsiba Mabel, V., & Geetha, S. Knowledge based Software Process
Improvement. Lap Lambert Academic Publishing, USA, ISBN: 978-3-659-97717-6,
2016.
9. Geetha, S., & Asnath Victy Phamila, Y. Combating Security Breaches and Criminal
Activity in the Digital Sphere. IGI Global, ISBN: 978-1-52-250193-0, 2016.
Book Chapters:
2020
1. Sathis kumar B., Sountharrajan, S., Karthiga, M., Nandhini, S. S., & Suganya, E. On-the-
Go Network Establishment of IoT Devices to Meet the Need of Processing Big Data
Using Machine Learning Algorithms. In: Business Intelligence for Enterprise Internet of
Things, Springer nature, Singapore. (Accepted - May 2020).
2. Deepa, S. R., & Rekha, D. Bacterial Foraging Optimization-Based Clustering in Wireless
Sensor Network by Preventing Left-Out Nodes. In: Mandal J., Sinha D. (eds) Intelligent
Computing Paradigm: Recent Trends. Studies in Computational Intelligence, Springer
nature, Singapore, vol 784, 43-58, 2020.
3. Patil P.R., & Sivagami, M. Forest Cover Classification Using Stacking of Ensemble
Learning and Neural Networks. In: Artificial Intelligence and Evolutionary Computations
in Engineering Systems, Advances in Intelligent Systems and Computing, Springer
nature, Singapore, vol 1056, 2020.
4. Sivakumar S., Rajalakshmi R., Prakash K. B., Rajesh Kanna, B., & Karthikeyan C.
Virtual Vision Architecture for VIP in Ubiquitous Computing. In: Paiva S. (eds)
Technological Trends in Improved Mobility of the Visually Impaired, EAI/Springer
Innovations in Communication and Computing, Springer, 145-179, 2020.
5. Laby, K., Sudhakar, M., Janaki Meena, M., & Syed Ibrahim, S. P. Applications of
Memetic Algorithms in Image Processing Using Deep Learning. In: Hemanth D., Kumar
B., Manavalan G. (eds) Recent Advances on Memetic Algorithms and its Applications in
Image Processing, Studies in Computational Intelligence, Springer, Singapore , vol 873,
2020.
6. SweetlinHemalatha, C., & Vaidehi, V. A Pattern Mining Approach for Wearable Sensor
Based Remote Health Care. In: Developments and Trends in Intelligent Technologies and
Smart Systems, Advances in Computational Intelligence and Robotics (ACIR) Book
Series, IGI Global Publisher, 2020.
7. Pattabiraman V., & Parvathi, R. Automation of Assets Estimation for Accurate Tax
Optimization Through Web Based Spatial Data Mining Techniques. In: Recent Advances
in Computational Intelligence, Springer, 215-232, 2020.
8. Parvathi, R., & Pattabiraman, V. A Similarity-Based Object Classification Using Deep
Neural Networks. In:  Handbook of Research on Deep Learning Innovations and Trends,
IGI Global, 197-219.
2019
9. Shridevi S., Saleena B., & Viswanathan V. Semantic Technologies for Medical
Knowledge Representation. In: Computer Applications in Drug Discovery and
Development, 260, 2019.
10. Punithavathi, P. & Geetha, S. Digital Healthcare Security Issues. In: Countering Cyber
Attacks and Preserving the Integrity and Availability of Critical Systems, IGI Global,
2019.
11. Hemalatha, J., Kavitha Devi, M. K., & Geetha, S. Performance Analysis of Image
Denoising with Curvelet Transform in Detecting the Stego Noise. In: Innovations in
Computer Science and Engineering, Springer, 445–453, 2019.
12. Suseela, G., & Asnath Victy Phamila, Y. Visual Sensor Networks: Critical Infrastructure
Protection. In: Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools,
and Applications, IGI Global, 2019.
13. Siva, V., & Rajesh Kanna, B. AWS Infrastructure Automation and Security Prevention
Using DevOps. In: Artificial Intelligence and Evolutionary Computations in Engineering
Systems, Advances in Intelligent Systems and Computing, vol 1056, 537-549, 2019.
14. Rajesh Kanna, B. Secured Information Exchange Using Haptic Codes. In: Countering
Cyber Attacks and Preserving the Integrity and Availability of Critical Systems. IGI
Global, 267-274, 2019.
15. Suseela, G., & Asnath Victy Phamila, Y. Security Framework for Smart Visual Sensor
Networks, In: Countering Cyber Attacks and Preserving the Integrity and Availability of
Critical Systems, IGI Global, 23, 2019.
16. Sandhya, P., & Mahek, K. Named Entity Recognition in Document Summarization. In:
Trends and Applications of Text Summarization Techniques, 125-149, 2019.
17. Sivabalakrishnan, M., Menaka, R., & Jeeva, S. Smart Video surveillance Systems and
Identification of Human Behavior Analysis. In: Countering Cyber Attacks and Preserving
the Integrity and Availability of Critical Systems, 34-50, 2019.
18. Selvi, M., Thangaramya, K., Saranya, M. S., Kulothungan, K., Ganapathy, S., &
19. Kannan, A. Classification of Medical Dataset Along with Topic Modeling Using
LDA. In: Nano-electronics, Circuits and Communication Systems, 1-11, 2019.
20. Vetrivelan, P., Jagannath, M., & Pradeep Kumar, T. S. Network Intrusion Detection and
Prevention Systems for Attacks in IoT Systems. In: Countering Cyber Attacks and
Preserving the Integrity and Availability of Critical Systems, IGI Global, 2019.
21. Pradeep Kumar, T. S. A Private Cloud-Based Smart Learning Environment Using
Moodle for Universities. In: Countering Cyber Attacks and Preserving the Integrity and
Availability of Critical Systems, IGI Global, 2019.
22. Gopinath, P., Balaji, R., Sangeetha, S., & NeelaNarayanan, V. Techniques for Analysis
of Mobile Malware. In: Countering Cyber Attacks and Preserving the Integrity and
Availability of Critical Systems, IGI Global, 2019.
23. Pattabiraman, V., & Parvathi, R. Automation of Assets Estimation for Accurate Tax
Optimization Through Web Based Spatial Data Mining Techniques. In: Recent
Advances in Computational Intelligence, 215-232, 2019.
24. Parvathi, R., & Pattabiraman, V. A Similarity-Based Object Classification Using Deep
Neural Networks. In:  Handbook of Research on Deep Learning Innovations and Trends,
IGI Global, 2019.
25. Pattabiraman, V., & Parvathi, R. Dimensionality Reduction With Multi-Fold Deep
Denoising Autoencoder. In: Deep Learning Techniques and Optimization Strategies in
Big Data Analytics, IGI Global, 154-165, 2019.
26. Karande, S., & Shyamala, L. Prediction of Employee Turnover Using Ensemble
Learning. In: Ambient Communications and Computer Systems, Springer, 319-327,
2019.
2018
27. Vaidehi, V., Pathak, R., Bhargavi, R. C., Ganapathy, K., Hemalatha, C. S., Fathima, A.
A., & Fernando, X. Enhanced Complex Event Processing Framework for Geriatric
Remote Healthcare. In: Handbook of Research on Investigations in Artificial Life
Research and Development, IGI Global, 348-379, 2018.
28. Shridevi, S., Viswanathan, V., & Saleena, B. Ontology-driven decision support systems
for health care. In: Knowledge Computing and its Applications: Knowledge Computing
in Specific Domains, vol 2, 65-86, 2018.
29. Hemalatha, J., KavithaDevi, M. K., & Geetha, S. A Comparative Review of Various
Machine Learning Approaches for Improving the Performance of Stego Anomaly
Detection. In: Handbook of Research on Network Forensics and Analysis Techniques,
IGI Global, 351-372, 2018.
30. Hemalatha, J., KavithaDevi, M. K., & Geetha, S. A Recent Study on High Dimensional
Features Used in Stego Image Anomaly Detection. In: Applications of Security, Mobile,
Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and
Management, IGI Global, 49-66, 2018.
31. Jasmine, S. G., & Pattabiraman, V. Performance Analysis of Statistical-Based Pixel
Purity Index Algorithms for Endmember Extraction in Hyperspectral Imagery. In:
Advances in Big Data and Cloud Computing, AISC, Springer, vol 645, 157-167, 2018.
32. Jasmine, S. G., & Pattabiraman, V. Enhanced Pixel Purity Index Algorithm to Find the
Index Position of the Pure Pixels in Hyperspectral Images. In: Advances in Electronics,
Communication and Computing, Lecture Notes in Electrical Engineering book series,
363-370, 2018.
33. Bhat, S., & Sivagami, M. Brain Tumour Detection Using Cuckoo Search Algorithm and
Histogram Thresholding for MR Images. In: Advances in Intelligent Systems and
Computing, Springer, 2018.
34. Vijayalakshmi, A., Rajesh Kanna, B., & Banukumar, S. Estimation of Texture Variation
in Malaria Diagnosis. In: Computational Signal Processing and Analysis. Lecture Notes
in Electrical Engineering, vol 490, 325-334, Springer, 2018.
35. Kar, D., & Rajesh Kanna, B. A Novel Video Analytics Framework for Microscopic
Tracking of Microbes. In: Computational Signal Processing and Analysis, Lecture Notes
in Electrical Engineering, vol 490. 115-128, Springer, 2018.
36. GokulaKrishnan, E., & Malathi, G. A Survey on Multi-feature Hand Biometrics
Recognition. In: Computational Vision and Bio Inspired Computing, Springer, 1061-
1071, 2018.
37. Adithya, S., & Sivagami, M. Enhanced Scalar Invariant Feature Transform. In: Lecture
Notes in Electrical Engineering, Springer, 2018.
38. Vaidehi, V., Ravi, Bhargavi, R. C., Ganapathy, K., & SweetlinHemalatha, C. Enhanced
Complex Event Processing Framework for Geriatric Remote Healthcare. In: Handbook of
Research on Investigations in Artificial Life Research and Development, IGI Global,
348-379, 2018.

2017
39. Vincent, R., & Swaytha, K. Cloud Based Renovation Sytsem using Erasure Code
Implementation. In: Computing and Emerging Trends: A Handbook, 2017.
40. Prabakaran, N., & Jagadeesh Kannan, R. Cooperative Sensors for Identifying Impulsive
Events of Asynchronous Environment. In: Advances in Intelligent and Soft Computing,
Springer-Verlag, 215 – 222, 2017.
41. Naresh , K., Arasu, K., Jagadeesh Kannan, R., & Ganesan, R. An Efficient System Model
for Multicasting Measured Noise Value of Polluting Industries. In: Advances in
Intelligent and Soft Computing, Springer-Verlag, 377 – 383, 2017.
42. Parvathi, R., Bangaru Kamatchi, R. A Review On Spatial Big Data Analytics And
Visualization. In: Modern Technologies for Big Data Classification and Clustering, IGI
Global, 179-197, 2017.
43. Parvathi, R., & Vignesh, U. Biological Big Data Analysis and Visualization. In: Modern
Technologies for Big Data Classification and Clustering, IGI Global, 244-259, 2017.

2016
44. Janaki Meena, M., & Syed Ibrahim, S. P. Statistical and Evolutionary Feature Selection
Techniques Parallelized Using MapReduce Programming Model. In: Techniques and
Environments for Big Data Analysis, Springer, 159-180, 2016.
45. Punithavathi, P., & Geetha, S. Visual Cryptography for Securing Images in Cloud. In:
Combating Security Breaches and Criminal Activity in the Digital Sphere, IGI Global,
2016.
46. Geetha, S., & Sindhu, S. S. S. Audio Stego Intrusion Detection System through Hybrid
Neural Tree Model. In: Handbook of Research on Modern Cryptographic Solutions for
Computer and Cyber Security, IGI Global, 45-57, 2016.
47. Sivabalakrishnan, M., Menaka, R., & Jeeva, S. Critical Video Surveillance and
Identification of Human Behavior Analysis of ATM Security Systems. In: Combating
Security Breaches and Criminal Activity in the Digital Sphere, 93-118, 2016.
48. Maheswari, N., & Sivagami, M. Large Scale Data Analytics Tools. In: Apache Hive, Pig
and Hbase Data Science and Big Data Computing Framework and Methodologies,
Springer, 2016.
49. Rajesh Kanna, B., & Kar, D. Intuitive Touch Interaction to Amputated Fingers. In: Smart
Innovation, Systems and Technologies, Springer, vol 49, 387-397, 2016.
50. Vetrivelan, P., Jagannath, M., & Pradeep Kumar, T. S. Network Intrusion Detection and
Prevention Systems on Flooding and Worm Attacks. In: Combating Security Breaches
and Criminal Activity in the Digital Sphere, IGI Global, 183–207, 2016.
51. Gayathri, R., & Neelanarayanan, V. A Systematic Mapping of Security Mechanisms. In:
Criminal activities in the digital sphere, IGI Global, 209-231, 2016.
52. Bhargavi, R. C. Complex Event Processing framework for Big data Applications. In:
Data Science and Big data computing, Springer, 41-56, 2016.
53. Janaki Meena, M., & Syed Ibrahim, S. P. Statistical and Evolutionary Feature Selection
Techniques Parallelized using MapReduce Programming Model. In: Springer book on
Evolutionary Algorithms to handle Big Data, vol 17, 159-180, 2016.
2015
54. Aparna, V., Neelanarayanan, V., & Vijayakumar, V. Framework for Supporting
Heterogeneous Clouds Using Model Driven Approach. In: Computational Intelligence for
Big Data Analysis: Frontier Advances and Applications, Studies in Adaptation, Learning,
and Optimization Series, Springer‐Verlag/ Heidelberg, 219-235, 2015.
55. Vijayalakshmi, A., Rajesh Kanna, B., & Banukumar, S. Estimation of texture variation in
Malaria diagnosis. In: Lecture Notes in Electrical Engineering, Springer Nature, vol. 490,
325-334, 2018.

d) Average Impact Factor of the publications and Name of the Major Journals in which
publications are made
1. Average Impact Factor : 1.8353

2. Major Journals in which publications are made:

1) AdHoc & Sensor Wireless Networks (AHSWN)


2) Ain Shams Engineering Journal
3) Applied Artificial Intelligence
4) Applied Computing and Informatics
5) Applied Soft Computing
6) ASABE- Applied Engineering in Agriculture
7) Canadian Journal of Electrical and Computer Engineering
8) Circuits and Systems
9) Cluster Computing
10) Computer Networks
11) Computers & Electrical Engineering
12) Computers and Electronics in Agriculture
13) Concurrency and Computation: Practice and Experience
14) Electronics Letters
15) IEEE Access
16) IEEE Embedded systems Letters
17) IET Communications
18) IET Electronic Letters
19) IETE Journal of Research
20) Information Processing Letters
21) Information Sciences
22) International Journal of Advanced Computer Science and Applications
23) International Journal of Approximate Reasoning
24) International Journal of Electrical Engineering & Education
25) Journal of Circuits, Systems and Computers
26) Journal of Grid Computing
27) Journal of Intelligent & Fuzzy Systems
28) Journal of Internet Technology
29) Journal of King Saud University –Computer and Information Sciences
30) Journal of Medical Engineering and Technology
31) KSII Transactions on Internet & Information Systems
32) Microscopy research and Technique
33) Microsystem Technologies
34) Mobile Network and Applications
35) Multimedia Tools and Applications
36) National Academy Science Letters
37) Neural Computing and Applications
38) Neural Network World
39) Peer-to-Peer Networking and Applications
40) Personal and Ubiquitous Computing
41) Sadhana
42) Soft Computing
43) The Computer Journal
44) The Journal of Supercomputing
45) Theoretical Computer Science
46) Transylvanian Review
47) Turkish Journal of Electrical Engineering & Computer Sciences
48) Wireless Network
49) Wireless Personal Communications
50) Journal of Information Science and Engineering
51) China Communications
52) Journal of Medical Systems
53) Computer Science Review
54) IET Networks
55) Annales des Télécommunications
56) Sensors
57) Future Generation Computer Systems

You might also like