Papers Published by the Faculty

Author(s) & Title Publications Year
Dr.D.P.JEYAPALAN
Agent based Parallelized Intrusion Detection System using Ant Colony Optimization International Journal of Computer Applications(0975-8887) Vl.No. Vol-105-No_10 2014
A Co-operative Game Theoretic Approach to Improve the Intrusion Detection System in a Network using Ant Colony Clustering International Journal of Computer Applications(0975-8887) Vl.No. Vol-87, No-14 2014
High Performance Network Intrusion Detection Model Using Graph Databases International Journal of Computational Intelligence and Information Security Vl.No. Vol 5, No. 9 2014
Performance Analysis of Intrusion Detection System on WSN Based on Euler Graph International Journal of Advanced Research in Computer Science & Technology Vl.No. Vol 2, Issue 3 2014
A Novel Graph Based Clustering Approach for Network Intrusion Detection International Journal of Computational Intelligence and Information Security Vl.No. Vol-4, No-4 2013
Mr.D.S.RAVI
A Study of Artificial Intelligence analytics in E-Learning National conference on Emerging Trends in Software Development Vl.No. 0 2016
A Study of Learning Standards in E-Learning using Artificial Intelligence International Journal of Advanced Research Trends in Engg. and Technology Vl.No. 3 2016
A study of learning methodology based on learner's in E-Learning using Artificial Intelligence Internation conference on Innovations in Computer Science & Technology Vl.No. 0 2016
Dr.S.ALBERT RABARA
Algorithmic Approach to security Architecture for Integrated IoT Smart Services Environment IEEE INTERNATIONAL CONFERENCE WCCCT-2016 Vl.No. 2016
Enhanced Security Architecture for IPv6 Transition IEEE INTERNATIONAL CONFERENCE WCCCT-2016 Vl.No. 2016
A Secure Architecture for Mobile Web Service (SAMWS) IEEE INTERNATIONAL CONFERENCE WCCCT-2016 Vl.No. 2016
Elliptic Curve Cryptography based Security Framework for Internet of Things (IoT) Enabled Smart Card IEEE INTERNATIONAL CONFERENCE WCCCT-2016 Vl.No. 2016
An Integrated Inter-Mobility IPv4/IPv6 Address Translation Architecture for Corporate Networks IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO 2015) in association with National University of Kaohsiung-Taiwan, Oakland University-USA, IEEE Computational Intel Vl.No. 0 2015
An Integrated Seamless Mobility and IPv4/IPv6 Address Translation Architecture between IPv4 and IPv6 Networks Journal of Recent Research in Engineering and Technology (JRRET) Vl.No. Vol.2, Issue. 4 2015
An Integrated Security Architecture for Next Generation Networks International Journal of Computer Applications (IJCA) Vl.No. Vol.1 2015
Design and Development of Integrated, Secured and Intelligent Architecture for Internet of Things and Cloud Computing IEEE IEEE Xplore Digital Library Pages: 2015 Vl.No. DoI: 10.1109/FiCloud.2015.23 2015
An Architecture For Secure Mobile Database Transaction For Corporate Environment International Journal of Applied Engineering Research (IJAER) Vl.No. Vol.10 2015
Elliptic Curve Cryptography based Security Framework for Internet of Things and Cloud Computing International Journal of Computer Science and Technology (IJCST) Vl.No. Vol. 6, Issue 3 2015
Quality of Service Architecture for Internet of Things and Cloud Computing International Journal of Computer Applications (IJCA) Vl.No. Vol.128,Issue.7 2015
An Integrated Secure Inter-Mobility IPv4/IPv6 Address Translation Architecture for Corporate Networks International Journal of Future Computer and Communication (IJFCC) Vl.No. Vol. 4, Issue: 5 2015
An Integrated Secure Architecture for IPv4/IPv6 Address Translation Between IPv4 and IPv6 Networks Advances in Intelligent Systems and Computing, Springer Vl.No. Vol. 380 2015
Internet of Things (IoT) Architecture for Smart Services International Journal of Applied Engineering Research (IJAER) Vl.No. Vol.10 2015
Internet of Things (IoT) based Smart Environment Integrating various Business Applications International Journal of Computer Applications (IJCA) Vl.No. Vol.128 2015
An Intelligent Content Filter based framework for Mobile Web Services Recent Advances in Electrical Engineering Series, WSEAS, Lisbon, Portugal Vl.No. 0 2014
An Integrated Next Generation IP-MPLS Hybrid Architecture for Seamless Mobility Recent Advances in Electrical Engineering, WSEAS, Lisbon, Portugal Vl.No. 0 2014
Multi-Level Secure Architecture for Mobile Web Services using Intelligent Mobile Agents and Intelligent Content Filter ACM International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), Kaohsiung City, Taiwan Vl.No. 0 2014
An Integrated and Intelligent Secure Architecture for Mobile Web Services International Journal of Computer Science and Technology Vl.No. Vol.5, No.3, July-Sept 2014
An Integrated IP-MPLS Mobility Framework For Next Generation Networks International Journal of Computer Science and Technology Vl.No. Vol.5, No.4 2014
A Framework for Secure Mobile Database Transactions using Cryptographic Co-processor International Journal of Computer Applications (0975-8887) Vl.No. Vol.105 2014
An Integrated IP-MPLS Architecture for Next Generation Networks International Journal of Computer Applications(0975-8887) Vl.No. Vol.104, No.3 2014
Architecture for Integrated and Intelligent Security for Mobile Web Services Conference on Intelligent Infrastructure Vl.No. 1 2012
Performance Analysis of Addressing, Interoperability and Inter-Mobility Management Architecture Between IPv4 and IPv6 Networks (AIMM-I46) Springer Series: Advances in Computer Science, Engineering & Applications AISC Vl.No. Vol.167/2012 2012
Financial Transactions Over Wired and Wireless Networks: Technical Perspective Lecture Notes in Mechanical Engineering, Springer Vl.No. - 2012
SIM-Based Authentication for the integrated GPRS. WLAN Networks (USA)-World Wireless Congress Vl.No. - 0
Multi-Layer Security architecture for Wireless LANs in the Corporate Environment International Journal of Network Security, IJNS-2006-01-25-2. Vl.No. - 0
Multi-Layer Security architecture for Wireless LANs in the Corporate Network Proceedings of World Wireless Congress, Palo Alto, USA Vl.No. pp. 202-08 0
Modeling and Performance study of MPLS VPN Proceedings of the Internat. Conference on communications in Computing, Las Vega, Nevada, USA Vl.No. pp. 91-96 0
Reducing Delay during Handoff in Multi-Layered Security Architecture for Wireless LANs in the Corporate Network Proceedings of the IEEE Internat. Conference on Wireless Communica-tion - Networking and Mobile Computing, Wuhan, China Vl.No. 2: 1038 - 1043 0
A Model for Transaction Management with Concurrency Control for Multi-Level Secure Distributed Real-time Database systems. Proceedings of the WSEAS International Conference on Applied Computer Science, Italy. Vl.No. 2: 127-133 0
Public Key Infrastructure for Mobile Banking Security. Proceedings of the World Wireless Congress, WWC`2008, San Francisco Bay Area. Vl.No. ISSN 1558-7835, pp.70-75 0
SIM-Based Authentication for the Integrated GPRS-WLAN Networks. Affordable Computing Tata McGraw-Hill Publishing Co. Ltd., New Delhi. Vl.No. ISBN-0-07-062171-3,pp. 41-45 0
Improving Route Optimiza-tion in Mobile IP Proc. of International Conference of Emerging Applications of Infor-mation Technology, Kolkatta Vl.No. pp. 235-38 0
Multi-Level Secure Concurrency Control Model for Financial Applications Affordable Computing Tata McGraw-Hill Publishing Co. Ltd., New Delhi. Vl.No. ISBN-0-07-062171-3,pp. 95-99 0
Security Framework Architecture for Mobile Banking, In: Mobile Ubiquitous and Pervasive Computing Macmillan India Punlications Ltd., New Delhi. Vl.No. ISBN 10:0230-63011-1, 2: 114-120 0
Evolving a Model of Transaction Management with Concurrency Control for Multilevel Secure Distributed Real-time Database Systems. Proceedings of the 7th WSEAS International Conference on Applied Computer Science ?Computer Science Challenges Vl.No. ISBN: 978-960-6766-15-2,pp.127-133 0
Secured User Interface Algorithm for Mobile Banking Framework - In: Affordable Computing Affordable Computing Tata McGraw-Hill Publishing Co. Ltd., New Delhi. Vl.No. ISBN-0-07-062171-3,pp. 87-90 0
Wats ? SN: A Wireless Asset Tracking System using Sensor Networks IEEE International Conference on Personal Wrieless Communi-cations (ICPWC-2005), New Delhi Vl.No. ISBN:0-7803-8964-6, pp. 237-243 0
Dr.L.AROCKIAM
An enhanced sinkhole attacker node identification technique using successful link ration in IoT International Journal of Computer Science Vl.No. 5(1) 2017
EPCAMD: EPC Based Authentication for Secure Accessing of Medical Devices in the Smart Healthcare System Lecture Series in Communications in Computer and Information Science (Springer - in Press) Vl.No. 0 2017
Scheduling for Internet of Things Applications on Cloud: A Review. Imperial Journal of Interdisciplinary Research Vl.No. 3 (1 ) 2017
Role of Scheduling and Load Balancing Algorithms in cloud to improve the Quality of Services International Journal of Computer Science Vl.No. 5(1) 2017
E2TR2: Energy efficient transmission range routing for IoT networks Lecture Series in Communications in Computer and Information Science (Springer - in Press) Vl.No. 0 2017
A Novel Fuzzy based Energy Efficient Routing for Internet of Things IEEE Explorer(in Press) Vl.No. 0 2017
Device Authentication Mechanism for IoT enabled Healthcare system IEEE Explorer(in Press) Vl.No. 0 2017
Enhanced Encryption Algorithm(EEA) for protecting users credentials in Public Cloud IEEE Explorer(in Press) Vl.No. 0 2017
Hybrid Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets IJCSET Vl.No. 6 (6) 2016
Authentication in IoT Environment: A Survey International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE Vl.No. 6(10) 2016
A Neoteric Authentication Scheme for IoT Healthcare System International Journal of Engineering Sciences & Research Technology (IJESRT) Vl.No. 5(12) 2016
ARARO Framework for Confidentiality Techniques to Enhance Security of Numerical and Non-Numerical Data in Public Cloud Storage IJIREEICE Vl.No. 4(3) 2016
Deist: Dynamic Detection of Sinkhole Attack for Internet of Things International Journal of Engineering and Computer Science Vl.No. 5(12) 2016
"QRIC: QoS Aware Routing for Internet of Things in College Management system" International Journal of Engineering Research & Technology (IJERT) Vl.No. 4(29) 2016
Filling Fuel Quantity Measurement Systems Using Internet Of Things International Journal of Innovative Research and Advanced Studies (IJIRAS) Vl.No. 3(13) 2016
Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage In Proceedings of International Conference on Mechanical Engineering and Electrical Systems (ICMES 2015) Vl.No. 40 2016
Route Discovery Overhead Aware Routing Protocol for IoT to Enhance QoS IJCTA (SCOPUS Indexed) Vl.No. 9(27) 2016
Combining Lexicon and Machine Learning Based Approach to Enhance the Accuracy of Sentiment Analysis on Big Data International Journal of Computer Science and Information Technologies (IJCSIT) Vl.No. 5, No. 2 2016
A Novel Lexicon Based Approach to Enhance the Accuracy of Sentiment Analysis on Big Data International Journal of Emerging Research in Management and Technology (IJERMT) Vl.No. 5, No. 2 2016
Confidentiality Technique using Data Obfuscation to Enhance Security of Stored Data in Public Cloud Storage International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Vl.No. 5, No. 1 2016
Key Based Mutual Authentication (KBMA) Mechanism for Secured Access in MobiCloud Environment In Proceedings of International Conference on Mechanical Engineering and Electrical Systems (ICMES 2015) Vl.No. 40 2016
Security in IoT Environment: A Survey International Journal of Information Technology and Mechanical Engineering (IJITME) Vl.No. 2(7) 2016
Applications of Big Data Analytics for Diagnosing Diabetic Mellitus: Issues and Challenges International Journal of Resent Trends in Engineering and Research Vl.No. 2(6) 2016
A Study on Security Issues and Challenges in IoT International Journal of Engineering Sciences and Management Research Vl.No. 3(11) 2016
Lexicon Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets International Journal of Computer Science and Information Technology & Security (IJCSITS) Vl.No. 6 (3) 2016
Machine Learning Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets International Journal of Advance Research in Computer Science and Management Studies Vl.No. 4 (5) 2016
Parallel DBScan algorithm for removing noise in IoTBig data Fifth National Conference on Intelligent computing(FNCIC) Vl.No. 0 2016
Performance Improved Holt-Winter`s (PIHW) Prediction Algorithm for Big Data Environment International Journal on Intelligent Electronic System Vl.No. 10(2) 2016
Confidentiality technique to encrypt and Obfuscate non-numerical and numerical data to enhance security in public cloud storage IEEE Explorer Vl.No. 0 2016
A Novel Authentication Scheme for IoT enabled Smart Healthcare System International Journal of Engineering Research & Technology(IJERT) Vl.No. 4(29) 2016
A framework for ensuring data confidentiality in smart home system International conference on Emerging trends in Engineering & Technology Vl.No. 0 2016
A Unified Model for Cloud Data Confidentiality Fifth National Conference on Intelligent computing(FNCIC) Vl.No. 0 2016
EOCIPHER: A Hybrid Approach To Enhance Security Of Outsourced Data In Public Cloud Storage Proceeding of the 4th International Conference on Artificial Intelligence and Computer Science (AICS2016),28 - 29 November 2016, Langkawi, MALAYSIA Vl.No. 3 2016
Accentuating the necessity for new-fangled IoT missing data imputation technique International Journal of Computer Technology and Applications(I J C T A) (scopus indexed) Vl.No. 9(27) 2016
A Methodology for preprocessing and construction of Diabetic Mellitus Warehouse Fifth National Conference on Intelligent computing(FNCIC) Vl.No. 0 2016
Decode_HMM_MLCS: An efficient algorithm to identify Multiple Longest Common Subsequence (MLCS) in Large DNA Sequences by using Decoding HMM Journal of Chemical and Pharmaceutical Sciences (JCHPS) Vl.No. 9(1) 2016
A Survey on Noisy Data Elimination Using Clustering Techniques International Journal of Information Technology and Mechanical Engineering (IJITME) Vl.No. 2(8) 2016
Energy Efficiency in Internet of Things: An Overview INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH Vl.No. 2(6) 2016
EDSHA: An Efficient Data Skew Handling Approach For Mapreduce Model Using Time Series Data I J C T A (SCOPUS Indexed) Vl.No. 9(27) 2016
Big Data for Education in Students` Perspective IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4 2015
Cost Aware Dynamic Rule Based Auto-scaling of Infrastructure-as-a-Service in Cloud Environment IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4 2015
A Unified Cloud Authenticator for Mobile Cloud Computing Environment IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4 2015
A Novel Edu-CloudSec Framework for E-Learning IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4 2015
Enhanced Framework for Authentication as a Service to Ensure Security in Public Cloud Environment International Journal of Engineering Research and Technology (IJERT) Vl.No. 4 2015
PBCOPSO: A Parallel Optimization Algorithm for Task Scheduling in Cloud Environment Indian Journal of Science Technology Vl.No. 8 2015
A Novel Approach for Ensuring Data Confidentiality in Public Cloud Storage IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 5 2015
An Improved Particle Swarm Optimization Algorithm for Meta Task Scheduling In Cloud Environment International Journal of Computer Science Trends and Technology (IJCST) Vl.No. 3 2015
A Study of User Authentication Techniques in Cloud Computing International Journal of Emerging Technologies and Innovative Research (IJETIR) Vl.No. 2 2015
EnBloAES: A Unified Framework to Preserve Confidentiality of Data in Public Cloud Storage Indian Journal of Science Technology Vl.No. 8 2015
A Survey on User Authentication Mechanism in Mobile Cloud Environment International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT) Vl.No. 1 2015
A Study on Basic Concepts of Big Data International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT) Vl.No. 1 2015
AUTOPRED: An Architectural Framework to Predict the Service Requests to Enhance Scalability in Federated Clouds International Journal of Electronics Communication and Computer Technology (IJECCT) Vl.No. 5 2015
Performance Evaluation of Task Scheduling in Cloud Environment Using Soft Computing Algorithms International Journal of Computer Science and Network (IJCSN) Vl.No. 4 2015
A Secure Authentication Scheme for MobiCloud International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore Vl.No. 0 2015
Secure Sharing of E-Content in Cloud Environment for Educational Institutions International Journal of Computer & Communication Engineering Research Vl.No. 3 2015
Big Data Migration in the Cloud Environment - An Overview IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications ICACCTHPA 2014 Vl.No. 5 2015
A Review on Big Data Integration IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications ICACCTHPA 2014 Vl.No. 5 2015
Data Integration in Big Data Environment Bonfring International Journal of Data Mining Vl.No. 5 2015
AROcrypt: A Confidentiality Technique for Securing Enterprises` Data in Cloud International Journal of Engineering and Technology (IJET) (Scopus) Vl.No. 7 2015
SequentialPR_FCP: BigData Pattern decomposing algorithm to Identify Frequent Contiguous Patterns (FCP) from Large DNA Sequence Database using Permutations with Repetition (PR) International Journal of Applied Engineering and Research (IJAER) Vl.No. 10 2015
Analysis of Prediction Techniques in Time Series for Big Data using R International Journal of Applied Engineering Research Vl.No. 10 2015
AROMO Security Framework to Enhance Security of Data in Public Cloud International Journal of Applied Engineering Research Vl.No. 10 2015
SBCOHC: An Optimized Task Scheduling Approach for Public Cloud Environment International Journal of Applied Engineering Research Vl.No. 10 2015
A Novel Architectural Framework to Enhance Scalability in a Federated Heterogeneous Cloud Environment International Journal of Applied Engineering Research Vl.No. 10 2015
A Framework for Key Management for Data Confidentiality in Cloud Environment International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore Vl.No. 0 2015
Load Balancer Behavior Identifier (LoBBI) for Dynamic Threshold Based Auto-scaling in Cloud International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore Vl.No. 0 2015
AROMONcrypt: A Technique to Optimize the Security by Ensuring the Confidentiality of Outsourced Data in Cloud Storage Elixir International Journal Vl.No. 0 2015
Align_MLCS: A Sequence Alignment based Efficient Algorithm to Identify Multiple Longest Common Subsequence (MLCS) for DNA Sequences International Journal of Applied Engineering and Research (IJAER) Vl.No. 10 2015
AROMO Security Framework to Enhance Security of Data in Public Cloud Proceedings of 2nd International Conference on Engineering, Technology and Science Vl.No. 1 2015
Confidentiality Technique to Enhance Security of Data in Public Cloud Storage Using Data Obfuscation Proceedings of International Conference on Soft Computing in Applied Sciences & Engineering (ICSCASE-2015) Vl.No. 0 2015
A Study on Aspect based Sentiment Analysis on Big Data In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 2015
A Framework for Cloud Confidentiality in Public Cloud Storage In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 2015
A Study on Cloud Data Security Issues In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 2015
Enhanced Authentication Framework for Mobile Cloud Environment In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 2015
Issues and Challenges in Sentiment Analysis: A Survey In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 2015
EQOS-AODV: A Technique to Enhance Quality of Service using Half Transmission Area Towards Sender In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 2015
Large Scale Sentiment Analysis on Cloud Environment In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 2015
User Behavior Identifier (UBI) for Schedule Based Auto-scaling in Cloud Environment In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 2015
A Survey on the Metamorphosis of IoT Big Data into Quality Data using Pre-processing Techniques In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 2015
Enhanced Authentication Mechanism for Public Cloud In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 2015
Confidentiality Framework to Enhance Data Security in Public Cloud Storage International Journal of Applied Engineering Research (IJAER) Vl.No. 10 2015
Parallel Prediction Model for Big Data using MapReduce Programming Model International Journal of Applied Engineering Research (IJAER) Vl.No. 10 2015
Issues and Challenges hampering the evolution of IoT big data analytics International Journal of Applied Engineering Research (IJAER) Vl.No. 10 2015
Parallel Bottom-up Generalization Approach for Data Anonymization using Map Reduce for Security of Data in Public Cloud Indian Journal of Science Technology Vl.No. 8 2015
Confidentiality Technique to Enhance Security of Data in Public Cloud Storage Using Data Obfuscation Indian Journal of Science Technology Vl.No. 8 2015
Parallelized Contextual Valance Shifter Algorithm for Sentiment Analysis on Big Data International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 5 2015
A Hybrid Approach for Aspect Based Sentiment Analysis on Big Data International Research Journal of Engineering and Technology (IRJET) Vl.No. 2 2015
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environment International Journal of Computer and Communication System Engineering (IJCCSE) Vl.No. 2 2015
Virtual Machine Behavior Identifier (VMBI) for VM Level Auto-scaling in Cloud Environment International Journal of Emerging Technology and Advanced Engineering (IJETAE) Vl.No. 5 2015
Improved Parallel Time Series Based Algorithm for Big Data using MapReduce Programming Model International Journal of Applied Engineering Research (IJAER) Vl.No. 10 2015
Load Pattern Identifier (LoPI) for Threshold Based Auto-scaling in Cloud Environment International Journal of Emerging Research and Technology (IJERT) Vl.No. 10 2015
HMM_MLCS: Hidden Markov Model (HMM) based algorithm to identify Multiple Longest Common Subsequence (MLCS) in DNA Sequences Journal of Chemical and Pharmaceutical Sciences (JCHPS) Vl.No. 8 2015
A Predictive Model to Forecast and Pre-Treat Diabetes Mellitus using Clinical Big Data in Cloud International Journal of Applied Engineering Research (IJAER) Vl.No. 10 2015
A Dynamic Two Stage Authentication Framework to Enhance Security in Public EduCloud International Journal of Applied Engineering Research (IJAER) Vl.No. 10 2015
An Enhanced Qualitative Framework for Data Integration with Multiple Data Sources using Parallel Processing In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 2015
A Framework to optimize task scheduling in cloud environment International Journal of Computer Science and Information Technologies (IJCSIT) Vl.No. 5 2014
Big Data Analytics and its Important Concepts: A Review Proceedings of International Conference on Contemporary Trends in Computer Science (ICCTC 14) Vl.No. 0 2014
Authentication Mechanism to Enhance Security in the cloud environment International Journal of Current Engineering and Technology (IJCET) Vl.No. 4 2014
Performance Evaluation of Min-Min and Max-Min algorithms for job scheduling in federated cloud International Journal of Computer Applications (IJCA) Vl.No. 99 2014
A Unified Architecture for Optimal Resource Utilization in a Heterogeneous Cloud Environment International Journal of Machine Learning and Computing Vl.No. 4 2014
A Review on Dynamic Resource Allocation Strategies and Mechanisms in Cloud Computing International Journal of Advanced Research in Computer Science & Technology (IJARCST) Vl.No. 2 2014
A State-of-Art Load Balancing Algorithms in Cloud Computing International Journal of Computer Application (IJCA) Vl.No. 95 2014
A Comparative Analysis of Encryption Techniques and Data Security Issues in Cloud Computing International Journal of Computer Application (IJCA) Vl.No. 96 2014
Frequent Contiguous Pattern Mining Algorithms for biological Data Sequences International Journal of Computer Application (IJCA) Vl.No. 95 2014
Security Framework to Ensure the Confidentiality of Outsourced Data in Public Cloud Storage International Journal of Current Engineering and Technology (IJCET) Vl.No. 4 2014
Securing Data with Authentication in Mobile Cloud Environment: Methods, Models and Issues International Journal of Computer Application (IJCA) Vl.No. 94 2014
An Innovative Solution for Cloud Security through Quantitative Analysis of Various Visual Cryptography Schemes International Journal of Engineering and Innovative Technology (IJEIT) Vl.No. 3 2014
Enhanced User Access Control Architecture for Cloud Storage International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 4 2014
Cognitive Complexity Metrics Analysis Tool(CCMAT) International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 1 2014
Big Data Analytics and Cloud Based Solutions: A Survey International Conference on Research Trends in Computer Technologies (ICRTCT) Vl.No. - 2014
LASA-HEU: Heuristic Approach for Service Selection in Composite Web Services Proceedings of World Congress on Computing and Communication Technologies (WCCCT 14), IEEE (CPS) Vl.No. 0 2014
An extensive analysis on task scheduling Algorithms in cloud environment International Journal of emerging technologies in computational and applied science(IJETCAS) Vl.No. 10 2014
General Aspect of (Big) Data Migration Methodologies International Journal of Computer Science and Engineering (SSRG-IJCSE) Vl.No. 1 2014
A State of Art Scheduling Algorithms in Cloud Advance Research in Computer Science & Technology (IJARSCT) Vl.No. 2 2014
A Security Service Algorithm to Ensure the Confidentiality of Data in Cloud Storage International Journal of Engineering Research and Technology (IJERT) Vl.No. 3 2014
Obfuscrypt: A Novel Confidentiality Technique for Cloud Storage International Journal of Computer Applications Vl.No. 88 2014
Combining Top-Down and Bottom-Up: Scalable Multidimensional Anonymization over Big Data using Map reduce on Cloud National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0 2014
A Pioneering Approach on Cloud Data Security using Cryptography National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0 2014
A Framework to Ensure Data Security in Public Cloud Storage National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0 2014
A Novel Framework for an Authentication as a Service in Public Cloud Environment National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0 2014
A Cluster Based Task Scheduling in Cloud Computing National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0 2014
A Cluster Based Services for Load Balancing in Cloud Computing Environment National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0 2014
Positional_nFCP: Positions based Big Data algorithm to Identify n_length Frequent Contiguous Patterns (FCP) in a Large Human Genome Sequence Database International Journal of Applied Engineering and Research (IJAER), (Scopus) Vl.No. 9 2014
Automated Data Validation Framework for Data Quality in Big Data Migration Projects International Journal of Computer Science and Engineering (SSRG-IJCSE) Vl.No. 1 2014
IndexedFCP - An Index based approach to identify Frequent Contiguous Patterns (FCP) in Big Data IEEE International Conference on Intelligent Computing Applications (ICICA`14) Vl.No. 0 2014
An IoT Based Secured Smart Library System with NFC Based Book Tracking International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) Vl.No. 11 2014
Enhanced Anonymization Algorithm to Preserve Confidentiality of Data in Public Cloud International Conference on Information Society (i-Society 2014), IEEE Vl.No. 0 2014
Enhanced Architecture for Data Confidentiality in Cloud Computing National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0 2014
AAA Mechanism for Local Mobile Node in Network Mobility Environment International Journal of Computer Networks and Wireless Communications (IJCNWC) Vl.No. 3, No. 1 2013
AROSA- Reliability Evaluation Framework IET Software Vl.No. 0 2013
An improved Feature Selection Algorithm using Modified Fisher Score and Principal Feature Analysis Journal of Data Mining and Knowledge Discovery Vl.No. 0 2013
Modified Feature Selection algorithm to improve classification accuracy using MFS and PFA International Journal of Data Mining and Bioinformatics Vl.No. 0 2013
Secure and Robust Cloud Storage with Cryptography and Access Control International Journal of Computer Science and Engineering (Elixir) Vl.No. 56 2013
Fuzzy Weighted Ordered Weighted Average-Gaussian Mixture Model for Feature Reduction International Journal of Computers & Technology Vl.No. 4 2013
ArK Feature Selection Algorithm to resolve Small Sample Size Problem International Journal of Artificial Intelligent Systems and Machine Learning Vl.No. 0 2013
Fuzzy Weighted Gaussian Mixture Model for Feature Reduction International Journal of Computer Applications (IJCA) Vl.No. 64, Issue 18 2013
AAA Mechanism for Visiting Mobile Node in Network Mobility Environment International Journal of Advanced Research in Computer Science and Software Engineering Vl.No. 3, Issue 1 2013
Mathematical Modeling and Simulation Study of Delay-Sensitive Algorithm to Enhance Quality of Service in Mobile Networks International Journal of Future Generation Communication and Networking Vl.No. 5, No. 3 2013
A Quality of Service Performance Evaluation Strategy for Delay Classes in General Packet Radio Service International Journal of Advanced Science and Technology Vl.No. 50 2013
Security Algorithms to Prevent Denial of Service (DoS) Attacks in WLAN International Journal of Wireless Communications and Networking Technologies (IJWCNT) Vl.No. 2 No. 1 2013
User Interface Design for Effective E-Learning based on Personality Traits International Journal of Computer Applications (IJCA) Vl.No. 61, No. 14 2013
Cognition Based user Interface Design Framework For E-Learning International Journal of Advance Technology and Engineering Research (IJATER) Vl.No. 3, Issue 1 2013
Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2 2013
Medium Access Control Spoof Detection and Prevention Algorithm (MAC SDP DoS) for Spoofing Attacks in WLAN IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) Vl.No. 3 2013
Framework to Detect and Prevent Medium Access Control Layer Denial of Service Attacks in WLAN IRACST - International Journal of Computer Networks and Wireless Communications (IJCNWC) Vl.No. 3 2013
Pairwise- Fuzzy Ordered Weighted Average Algorithm- Gaussian Mixture Model for Feature Reduction International Journal of Computers & Technology Vl.No. 6 2013
Applying Data Mining Techniques on Soil Fertility Prediction International Journal of Computer Applications Technology and Research (IJCATR) Vl.No. 2 2013
An impact of learning behavior and creativity quotient in learning environment International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2 2013
Failure Management in Cloud: An Overview International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2 2013
Match Making Service (MMS): A Centralized Architecture to Enhance Scalability in a Heterogeneous Cloud International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 3 2013
Enhancing the Interpretability of Soil Classification Data from a Neural Network System by Using Fuzzy Approaches International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 3 2013
MSDoT- Memory Size and Depth of Tier Based Queuing Model for Scheduling a Multi-Tier Cloud Proceedings of International Conference on Emerging Trends and Applications in Computer Science (ICETACS), IEEE Xplore Vl.No. - 2013
A Novel LAS-Relief Feature Selection Algorithm for Enhancing Classification Accuracy in Data Mining International Journal of Computers & Technology (IJCT) Vl.No. 11 2013
A Systematic Approach on Data Pre-processing in Data Mining International Journal of Advanced Computer Technology (IJACT) Vl.No. 2 2013
Maintenance Effort Prediction Model Using Cognitive Complexity Metrics International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 3 2013
User Authentication Mechanism for Sharing E-resource in Educational Clouds International Journal of Computer Science and Network Security (IJCSNS) Vl.No. 13 2013
Enhancing Data Security During Transit in Public Cloud International Journal of Electronics and Information Technology (IJEIT) Vl.No. 3 2013
Cloud Service Tools: State of the Art International Journal of Electronics and Information Technology (IJEIT) Vl.No. 3 2013
SOM-ANN A novel approach to analyzing the Brown Plant Hopper International Journal of Computer Science & Applications Vl.No. 2 2013
Auto Scaling in Cloud Computing: An Overview International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2 2013
Mobile Cloud Security Issues and Challenges: A Perspective International Journal of Electronics and Information Technology (IJEIT) Vl.No. 3 2013
Vertical Scalability Issues and Challenges in Cloud Computing: An Overview International Journal of Networking and Communication Engineering Vl.No. 0 2012
A Study on Feature Selection using Machine Learning Techniques International Journal of Data Mining Knowledge Engineering Vl.No. 0 2012
Security Issues, Challenges and Solutions in Network Mobility: A Review International Journal of Computer Networks and Wireless Communications (IJCNWC) Vl.No. 2, No.2 2012
Survey on User Authentication for Cloud Computing International Journal of Networking and Communication Engineering Vl.No. 0 2012
User Authentication Mechanism for Sharing E-resource in Educational Clouds International Journal of Networking and Communication Engineering Vl.No. 0 2012
MFSPFA: An Enhanced Filter based Feature Selection Algorithm International Journal of Computer Applications Vl.No. 51, No. 12 2012
An Impact of Emotional Happiness in Students? Learning Environment International Journal of Data Mining Knowledge Engineering Vl.No. 0 2012
Feature Selection: A New Perspective International Journal of Data Mining Knowledge Engineering Vl.No. 0 2012
A Survey on Horizontal Scalability in Cloud Computing: An Overview International Journal of Networking and Communication Engineering Vl.No. 0 2012
AAA Mechanism for Mobile Router in Network Mobility Environment International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 1, Issue 10 2012
Enhanced Feature Selection Algorithm using Modified Fisher Criterion and Principal Feature Analysis International Journal of Advanced Research in Computer Science Vl.No. 3, No. 4 2012
HeurisFCP-A Heuristic Approach to Identify Frequent Contiguous Patterns (FCP) in Sequence Database Proceedings of the International Conference on Radar, Communication and Computing (ICRCC 2012) Vl.No. 0 2012
Positional - LCS: A Position based algorithm to find Longest Common Subsequence (LCS) in Sequence Database (SDB) IEEE International Conference on Computational Intelligence and Computing Research Vl.No. 0 2012
Privacy in Cloud Computing: A Survey Proceedings of the International Conference of Advanced Computer Science & Information (ACSIT- 2012) Vl.No. 0 2012
An Inverse Modified Fisher Criterion to solve under-sampled problem in Data Mining IEEE Transactions on Knowledge and Data Engineering (TKDE) Vl.No. 0 2012
Impact of Depression and Stress on the Programming Performance of the Students International Journal of Data Mining Knowledge Engineering Vl.No. 0 2012
A new methodology to overcome high dimensionality problem in data mining International Journal of Data Warehousing and Mining Vl.No. 0 2012
Importance of Association Rules in Data Mining : A Review International journal of Soft Computing Vl.No. 7,Issue 3 2012
Clustering Methods and Algorithms in Data Mining :review Asian Journal of information Technology Vl.No. 11, Issue 1 2012
Outlook of ANN in Agriculture Data Mining International journal of Soft Computing Vl.No. 7, Issue 1 2012
FTM-A Middle Layer Architecture for Fault Tolerance in Cloud Computing IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies ICNICT Vl.No. 0 2012
Dr. D. RAVINDRAN
Enhancing the Security for Multi-Owner Data Sharing (MODS) Groups in the Cloud with Improved Dynamism International Journal of Scientific Research in Science, Engineering and Technology (ijsrset.com) Vl.No. 2 2016
Monitoring and Normalization of the Loaded Servers By Load Balancing International Journal of Scientific Research in Science, Engineering and Technology (ijsrset.com) Vl.No. 2 2016
Performance Enhancement System for the Cloud with Multi Factor Resource Allocation Technique International Journal Of Engineering And Computer Science Vl.No. 5 2016
A Survey on Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 5 2016
Load Balancing in Cloud Computing : A Survey International Journal of Scientific Research in Science, Engineering and Technology (ijsrset.com) Vl.No. 2 2016
Dynamism in Cloud Resource Allocation : A Survey International Journal of Scientific Research in Science, Engineering and Technology (ijsrset.com) Vl.No. 2 2016
Survey On Scalability In Cloud Environment International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Vl.No. 5 2016
Enhancing the Interactions in an Engineering Job Outsourcing Environment (B2B System) with Composite web services International Journal of Computer Applications Vl.No. 47 2012
Service Discovery framework with functional and non-functional information (SDF) IJARCSSE Vl.No. 2 Issue 12 2012
Component based VR content generation in a multiserver environment IJERT Vl.No. 10 2012
QoS based Dynamic Service Composition IJCST Vl.No. 3, Issue 7 2012
Dr.S.BRITTO RAMESH KUMAR
Online Social Networking Services Impact on Big Data International Journal of Computer Science Vl.No. 5, Issue 1, No.17 2017
Security BM Techniques using in Digital Image Processing International Journal of Computer Science Vl.No. 5(1), No.18 2017
An Approach For Analyzing The Factors Recorded In The Tree Rings Using Image Processing Techniques 2nd World Congress on Computing and Communication Technologies (WCCCT `16) Vl.No. 0 2016
An Innovative Security Architecture and Algorithm for Social Network Services ARPN Journal of Engineering and Applied Sciences Vl.No. 11(2) 2016
Internet of Things: Data Management and Security International Journal of Computer Technology and Applications(IJCTA) Vl.No. 9(26) 2016
Security Issues in Web Services International Research Journal of Engineering and Technology (IRJET) Vl.No. 3(5) 2016
Security Issues in Context-Aware System International Research Journal of Engineering and Technology (IRJET) Vl.No. 3(5) 2016
Visualizing Big Datamining: Issues, Challenges and Opportunities International Journal of Computer Technology and Applications(IJCTA) Vl.No. 9(27) 2016
An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services International Journal of Computer Applications (IJCA) Vl.No. 146(15) 2016
PLIS: Proposed Language Independent Stemmer for Information Retrieval Systems Using Dynamic Programming 2nd World Congress on Computing and Communication Technologies (WCCCT `16) Vl.No. 0 2016
An Enhanced Architecture For Feature Based Opinion Mining From Product Reviews 2nd World Congress on Computing and Communication Technologies (WCCCT `16) Vl.No. 0 2016
IoT based Home Security through Digital Image Processing Algorithms 2nd World Congress on Computing and Communication Technologies (WCCCT `16) Vl.No. 0 2016
Survey on Privacy Preservation in context aware web services Indian Journal of Computer Science and Engineering Vl.No. 6(6) 2016
SECURITY ISSUES ON COMPOSITE WEB SERVICES International Research Journal of Engineering and Technology (IRJET) Vl.No. 3(6) 2016
A Framework for Language Independent Stemmer Using Dynamic Programming International Journal of Applied Engineering Research Vl.No. 10 2015
Conflict Resolution and Duplicate Elimination in Heterogeneous Datasets using Unified Data Retrieval Techniques Indian Journal of Science and Technology Vl.No. 8 2015
Feedback Based Conflict Identification and Resolution using Duplicate Elimination and Ranking Techniques International Journal Of Computers & Technology Vl.No. 113 2015
Proposed Hough Technique For Estimating Climatic Conditions Recorded In The Cross Section Of Tree Images IOSR Journal Of Computer Engineering (IOSR-JCE) Vl.No. 17 2015
Semi-Automatic Techniquesfor Estimating Climatic Conditions Recorded In The Tree Rings International Journal Of Computer Trends And Technology (IJCTT) Vl.No. 29 2015
Cloud Computing Data Security Issues, Challenges, Architecture and Methods- A Survey International Research Journal of Engineering and Technology Vl.No. 2 2015
Proposed Architecture for secure Distributed Data Transaction Management in Cloud Environment International Journal of Applied Engineering Research Vl.No. 10 2015
Enhanced Elliptical Curve Cryptography Based PKI for Secure Data Storage in a Cloud International Journal of Applied Engineering Research Vl.No. 10 2015
Security issues in Internet of Things using Next Generation Mobile Networks International Journal of Applied Engineering Research Vl.No. 10 2015
A Multi-Layered Secured Framework for Context-Aware Web services in Health care Industries International Journal of Applied Engineering Research Vl.No. 10 2015
Survey Paper On Mobile Social Networks International Research Journal of Engineering and Technology Vl.No. 2(6) 2015
Security on Mobile Social Networks International Journal of Advance Research in Computer Science and Management Studies Vl.No. 3(9) 2015
Context-Aware In PrivacyPreservation For Health Care Systems International Journal of Advanced Computer Technology Vl.No. 4 2015
Conflict Identification and Resolution in Heterogeneous Datasets: A Comprehensive Survey International Journal of Computer Applications Vl.No. 113 2015
Learning Behavior Analysis Using Data Mining Techniques International Journal of Applied Engineering Research Vl.No. 10 2015
An Implementation of Three Layered Net-Chk Two Factors Online Social Network Model for Privacy Electrical, Computer and Communication Technologies Vl.No. 2 2015
Enhanced Elliptic Curve Cryptography Indian Journal of Science and Technology Vl.No. 8 2015
A Security Framework for Social Network Services International Journal of Applied Engineering Research Vl.No. 10 2015
Issues and Challenges of Data Transaction Management in Cloud Environment International Research Journal of Engineering and Technology Vl.No. 2 2015
Resolving Data Inconsistency in Data Integration International Conference on Contemporary Computing and Informatics (IC3I) Vl.No. 0 2014
Inconsistency Resolution and Joint Information Extraction from Multiple Data Sources International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 3(7) 2014
Security analysis of future enterprise business intelligence World Congress on Computing And Communication Technologies(WCCCT `14) Vl.No. 0 2014
Rule Based Machine Translation System from English to Tamil World Congress on Computing And Communication Technologies(WCCCT `14) Vl.No. 0 2014
Systematic Optimization and Refinement of Stemmer Rule Set Using NLTK International Conference on Contemporary Trends in Computer Science(CTCS) Vl.No. 0 2014
An Approach for Dendroclimatology using image processing techniques World Congress on Computing And Communication Technologies(WCCCT `14) Vl.No. 2014
Two Factor Framework for Web Based Social Network using PKI International Journal on Advanced Computer Theory and Engineering(ACTE) Vl.No. 3(1) 2014
Social Network Services: An Overview International Journal of Innovative Research in Electrical, Electronics Instrumentation and Control Engineering(IJARCCE) Vl.No. 3(1) 2014
Security & Privacy issues in Social Network Services: An Overview International Journal of Innovative Research in Electrical, Electronics Instrumentation and Control Engineering(IJIREEICE) Vl.No. 2(1) 2014
Hybrid Algorithm for Web based Social Network National Conference on Information Technology Sustain Future (NCITSF) Vl.No. 1 2014
Security Challenges for Online Social Network using Multiparty Access Control International Journal of Computer Science Management Research(NCITCS) Vl.No. Vol. 1 2014
Multilingual Phonetic Based Stem Generation Second International Conference on Emerging Research in Computing, Information Communication and Applications (ERCICA-2014) Vl.No. Volume:1 2014
A Comprehensive Analyze of Stemming Algorithms for Indian and Non-Indian Languages International Journal of Computer Engineering & Applications (IJCEA) Vl.No. Volume 7, Issue 3 2014
A Novel Approach for Phonetic Based Stem Generation Using Edit Distance and Longest Common Subsequence International Journal of Engineering Research and technology (IJERT) Vl.No. 0 2014
An Improved Rule based Iterative Affix Stripping Stemmer for Tamil Language using K-Mean Clustering International Journal of Computer Applications (IJCA) Vl.No. 94(13) 2014
DESIGN OF A SECURE ARCHITECTURE FOR CONTEXT AWARE WEB SERVICES USING ACCESS CONTROL MECHANISM International Conference on Contemporary Computing and Informatics (IC3I) (IEEE) Vl.No. 0 2014
A Framework for Privacy Handler Mechanism in Context-aware Web Services International Journal of Advanced Research in Computer Science & Technology (IJARCST ) Vl.No. Vol. 2, Issue 3 2014
A Review on Privacy Control Techniques in Context-aware Web Services International Journal of Advanced Research in Computer Science & Technology (IJARCST ) Vl.No. Vol. 2, Issue 3 2014
Context-Aware Architecture for User Access Control International Journal of Advanced Research in Computer Science & Technology (IJARCST ) Vl.No. Vol. 2, Issue 3 2014
An Architecture for Securing Heterogeneous Web Services International Journal of Advanced Research in Computer Science & Technology (IJARCST ) Vl.No. Vol. 2, Issue 3 2014
Extending Social Privacy Protector for Twitter Social Network CIIT International Journal of Networking and Communication Engineering Vl.No. 1(1) 2013
A Context Aware System Based on Service Oriented Architecture International Conference on Recent Trends In Computer Applications(ICRTICA) Vl.No. 1 2013
Net-Chk A security Framework for Social Network Applications Internation Journal of Advance Research in Computer and communication Engineering(IJARCCE) Vl.No. 2(12) 2013
A Comparative Study on Variants of Classical Porter Stemmer Algorithm International Journal of Scientific Transactions in Environment and Techrovention(IJSTET) Vl.No. 6(4) 2013
A Comprehensive Study on Stemming Algorithms International Conference on Semantic E-Business and Enterprise Computing(SEEC) Vl.No. 0 2012
Architecture for Integrated and Intelligent Security for Mobile Web Services International Conference on Intelligent Infrastructure Vl.No. 1 2012
Dr.A. Aloysius
Sentiment Analysis using Mode Measure Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 6 2017
Statistical Analysis on Social media Usage in Students Education SSICACR-2017 Vl.No. 0 2017
A survey on Complexity Metrics in Object Oriented System SSICACR-2017 Vl.No. 0 2017
Concepts and Methods of Sentiment Analysis on Big Data International Journal of Innovative Research in Science, Engineering and Technology Vl.No. 5 2016
Models for Maintenance Effort Prediction with Object-Oriented Cognitive Complexity Metrics World Congress on Computing and Communication Technologies Vl.No. 0 2016
Big Data Prediction Using Evolutionary Techniques: A Survey Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 3 2016
DESIGN AND ANALYSIS OF ASPECT ORIENTED METRIC CWCoAR USING COGNITIVE APPROACH World Congress on Computing and Communication Technologies Vl.No. 0 2016
Cognitive Weighted Method Hiding Factor Complexity Metric International Journal of Computer Science and Software Engineering Vl.No. 4 2015
Cognitive Perspective Of Attribute Hiding Factor Complexity Metric International Journal of Engineering And Computer Science Vl.No. 4 2015
A Survey on User Authentication Mechanism in Mobile Cloud Computing International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 3 2015
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environment International Journal of Computer and Communication System Engineering (IJCCSE) Vl.No. 2 2015
Aspect oriented Programming Metrics - A Survey International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 1, 3 2015
Cognitive Weighted Polymorphism Factor: A New Cognitive Complexity Metric International Journal of Computer and Information Engineering Vl.No. 2 2015
Validation of Cognitive Weighted Methods Hiding Factor Complexity Metric International journal of Applied Engineering Research Vl.No. 10 no 82 2015
Cognitive Weighted Polymorphism Factor: A Comprehension Augmented Complexity Metric International Journal of Computer, electrical, Automation, Control Vl.No. 9 2015
A Review on Component Based Software Metrics International Journal of Fuzzy Mathematical Archive Vl.No. 7 2015
Analysis of Measuring the Complexity of Advice Using a Cognitive Approach International Journal of Applied Engineering Research Vl.No. 10 , 82 2015
Cognitive Complexity Metrics Analysis Tool (CCMAT) International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT), Vl.No. 1 2014
Maintenance Effort Prediction Model Using Cognitive Complexity Metrics International Journal of Advanced Research in Computer Science and Software Engineering Vl.No. Volume 3, Issue 11, 2013
Cognitive Weighted Response For a Class: A New Metric for Measuring Cognitive Complexity of OO Systems International Journal of Advanced Research in Computer Science Vl.No. volume 3 no 4 2012
Coupling Complexity Metric: A Cognitive Approach International Journal of Information Technology and Computer Science Vl.No. 4 2012
An Investigation into the Relationship between Intelligence Quotient and Debugging Ability of Component Based System International Journal of Software Engineering and Technology Vl.No. 0 2011
Attribute Weighted Class Complexity : A New Metric For Measuring Cognitive Complexity Of Oo Systems Proceedings of International Conference on Computational Intelligence and Cognitive Informatics, Vl.No. 0 2011
A Survey on Metrics of Software Cognitive Complexity for OO Design Proceedings of International Conference on Computational Intelligence and Cognitive Informatics Vl.No. 0 2011
Attribute Weighted Class Complexity: A New Metric For Measuring Cognitive Complexity Of OO Systems International Conference on Computational Intelligence and Cognitive Informatics Vl.No. 58 2011
An Analysis of Dependency between Personality Traits and Debugging Ability in Component Based System International Journal of Software Engineering and Technology Vl.No. 0 2011
A Survey on Metrics of Software Cognitive Complexity for OO Design, on International Conference on Computational Intelligence and Cognitive Informatics Vl.No. 58 2011
An Investigation into the impact of OO Design on Program Comprehension with individual and Collaborative Approach Proceeding of National Conference on Emerging Trends in Advance Computing (NCETAC �?? 2010) Vl.No. 0 2010
An Investigation into the impact of OO Design on Program Comprehension with individual and Collaborative Approach Proceeding of National Conference on Emerging Trends in Advance Computing, Vl.No. 0 2010
On Validating Class Level Cognitive Complexity Metrics International Journal of Software Engineering and Technology Vl.No. 0 2010
An Investigation into the Impact of OO Design on Program Debugging with Individual and Collaborative Approaches International Journal of Software Engineering and Technology Vl.No. 0 2010
, A Survey on the Complexity Metrics for Component Based System Proceeding of National Conference on Computer Science and Engineering (NCCSE-2010) Vl.No. 0 2010
A Survey on the Complexity Metrics for Component Based System Proceeding of National Conference on Computer Science and Engineering (NCCSE-2010) Vl.No. 0 2010
A Study on Impact of Emotional Quotient on Program Comprehension , Proceedings of International Conference on Communication and Computational Intelligence Vl.No. 0 2010
An Investigation into the Relationship between Personality traits and Recollection & Retention ability in object oriented Systems Proceedings of International Conference on Advanced Computing (ICAC) Vl.No. 0 2009
A Study on the Impact of Personality traits in program debugging of object oriented System proceeding on the National Conference on Advance Computing (NCAC) Vl.No. 0 2009
A Comparison of Proposed Cognitive weights for control structures and object oriented programming languages Proceedings of International Conference on Advanced Computing (ICAC) Vl.No. 0 2009
A study on the impact of Style elements in Recollection & Retention of Object oriented System Proceedings of International Conference on Semantic E-business and Enterprise computing (SEEC 2009) Vl.No. 0 2009
Extended Weighted Class Complexity: A new of software complexity for objected oriented systems, , Proceedings of International Conference on Semantic E-business and Enterprise computing SEEC Vl.No. 0 2009
, A Comparison of Proposed Cognitive weights for control structures and object oriented programming languages Proceedings of International Conference on Advanced Computing Vl.No. 0 2009
Using Gender Differences to Link Intelligent Quotient and Program Debugging of Object Oriented Systems Proceedings of National Conference on Software Engineering and Applications Vl.No. 0 2008
Using Gender Differences to Link Intelligent Quotient and Program Debugging of Object Oriented Systems Proceedings of National Conference on Software Engineering and Applications, Vl.No. 0 2008
Mr. V JUDE NIRMAL
Mobile Learning with Social Media: Next Paradigm Shift in Education National Conference on Higher Education in the Knowledge Age: Techno-Pedagogical Perspectives and Innovations Vl.No. 0 2016
Real-time Sentiment Prediction on Streaming Social Network Data using In-Memory Processing IEEE Explore (WCCCT 2016) Vl.No. 0 2016
Emoticon Based Sentiment Analysis using Parallel Analytics on Hadoop Indian Journal of Science and Technology (IJST) Vl.No. 9 (33) 2016
Parallel Implementation of Big Data Pre-processing Algorithims for Sentiment Analysis of Social Networking Data International Journal of Fuzzy Mathematical Archive Vl.No. 6, Number 1 & 2 2015
Parallelization Techniques in Pre-processing Phase for Sentiment Analysis in Big Data: A Comparative Analysis International Journal of Applied Engineering And Research (IJAER) Vl.No. 10 2015
Fast and Effective Real time Sentiment analysis on Streaming Big Data using Distributed Caching Techniques International Journal of Applied Engineering And Research (IJAER) Vl.No. 10 2015
SECCON: A Framework for Applying Access Control Policies in Context-Aware Wireless Networks World Congress on Computing and Communication Technologies (IEEE Xplore) Vl.No. 0 2014
Sentiment and Emotion Analysis for Context Sensitive Information Retrieval of Social Networking Sites: A Survey International Journal of Computer Applications (IJCA) Vl.No. 100, No. 10 2014
Context-Aware Data Retrieval using Mobile Social Network National Conference on Advanced Computing Vl.No. 0 2013
Rev Fr S Arul Oli SJ
Confidentiality Technique to Encrypt and Obfuscate Non-Numerical and Numerical Data to Enhance Security in Public Cloud Storage Institute of Electrical and Electronics Engineers (IEEE) Vl.No. 0 2017
Confidentiality Technique to Obfuscate the Numerical Data to Enhance Security in Public Cloud Storage Institute of Electrical and Electronics Engineers (IEEE) Vl.No. 0 2017
Confidentiality Technique to Encrypt Non-Numerical Data to Enhance Security in Public Cloud Storage Institute of Electrical and Electronics Engineers (IEEE) Vl.No. 0 2017
ARARO Framework for Confidentiality Techniques to Enhance Security of Numerical and Non-Numerical Data in Public Cloud Storage INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN ELECTRICAL, ELECTRONICS, INSTRUMENTATION AND CONTROL ENGINEERING (IJIREEICE) Vl.No. 4 2016
Confidentiality Technique for Enhancing Data Security using Encryption and Obfuscation in Public Cloud Storage International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 5 2016
Confidentilaity Technique using Data Obfuscation to Enhance Security of Stored Data in Public Cloud Storage International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Vl.No. 5 2016
Confidentiality Technique for Data Stored in Public Cloud Storage International Journal of Engineering Research & Technology (IJERT) Vl.No. 5 2016
Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage MATEC Web of Conferences Vl.No. 40 2016
Confidentiality Framework to Enhance Data Security in Public Cloud Storage International Journal of Applied Engineering Research (IJAER) Vl.No. 10 2015
A Framework for Data Confidentiality in Public Cloud Storage MISBAH Journal Vl.No. 15 2015
A Framework for Key Management for Data Confidentiality in Cloud Environment Institute of Electrical and Electronics Engineers (IEEE) Vl.No. 15 2015
A Novel Approach for Ensuring Data Confidentiality in Public Cloud Storage International Journal of Computer Applications Vl.No. 0975 ? 8887 2015
A Framework to Ensure Data Security in Public Cloud Storage ELSEVIER India Vl.No. 0 2014
Mobile Cloud Security Issues and Challenges - A Perspective International Journal of Engineering and Innovative Technology (IJEIT) Vl.No. 3 2013
Mr.K.R. MARTIN
Coupling on Field Access Metric: A Cognitive Approach International Journal of Advanced Research in Computer Science and Software Engineering Vl.No. 7 2017
Design and Analysis of Aspect Oriented Metric CWCAE using Cognitive Approach International Journal of Engineering Research & Technology (IJERT) Vl.No. 5 2016
A Review on Coupling Metrics in Aspect Oriented System International Conference on Computing Communication and Information Science (ICCCIS?16) Vl.No. 0 2016
Analysis of measuring the complexity of Advice using a Cognitive Approach IJAER Vl.No. 10-No.82 2015
Analysis of Measuring the Complexity of Advice using a Cognitive Approach International Journal of Applied Engineering Research Vl.No. 10 2015
Mr.K.MAHESWARAN
A Survey on Complexity Metrics in Object Oriented Design SSICACR-2017 Vl.No. 1 2017
A Review on Component Based Software Metrics International Journal of Fuzzy Mathematical Archive Vl.No. 7 2015
Mr.B.Rex Cyril
ENHANCED ELLIPTICAL CURVE CRYPTOGRAPHY BASED PKI FOR SECURE DATA STORAGE IN A CLOUD International Journal of Applied Engineering Research,(IJAER) Vl.No. Vol. 10 2015
Cloud Computing Data Security Issues, Challenges, Architecture and Methods - A Survey International Research Journal of Engineering and Technology (IRJET) Vl.No. 02 2015
Mr.J.ANTONY JOHN PRABU
Issues and Challenges of Data Transaction Management in Cloud Environment International Research Journal of Engineering and Technology (IRJET) Vl.No. Volume:02 Issue:04 2015
Proposed Architecture for Secure Distributed Data Transaction Management in Cloud Environment International Journal of Applied Engineering Research - (IJAER) Vl.No. Vol. 10 No.82 2015
Mr. A. VIMAL JERALD
Algorithmic Approach to security Architecture for Integrated IoT Smart Services Environment IEEE Digital Library Vl.No. 0 2016
Secure IoT Architecture for Smart Services Environment IEEE Digital Library Vl.No. 0 2016
AN ADAPTABLE SECURE SMART CARD ARCHITECTURE FOR INTERNET OF THINGS AND CLOUD COMPUTING IJRET (International Journal of Research in Engineering and Technology Vl.No. 05 2016
Secure IoT Architecture for Integrated Smart Services Environment Proceedings of the 10th INDIACom -2016, 3rd International Conference on "Computing for Sustainable Global Development" Vl.No. 0 2016
Elliptic Curve Cryptography based Security Framework for Internet of Things and Cloud Computing Recent Advances on Computer Engineering Vl.No. 0 2015
An Adoptable and Secure Intelligent Smart Card Framework for Internet of Things and Cloud Computing 50th Golden Jubilee Annual Convention on "Digital Life", CS_-2015 to be published by AISC Springer Vl.No. 0 2015
Quality of Service Architecture for Internet of Things and Cloud Computing International Journal of Computer Application Vl.No. 128-7 2015
Elliptic Curve Cryptography based Security Framework for Internet of Things and Cloud Computing International Journal of Computer Science and Technology (IJCST) Vl.No. 6.3 2015
Internet of Things for Smart Services International Journal Applied Engineering Research Vl.No. 10-82 2015
Internet of Things (IoT) based Smart Environment integrating various Business Applications International Journal for Computer Application Vl.No. 128 2015
A Framework for User Oriented Content Dissemination for E-Learning Proceedings of The Role of ICT in Higher Education: Quality, Accessibility and Security Vl.No. 0 2010
Mr.Y.Sunil Raj
Predictive Analytics On Political Data wccct2016 Vl.No. 0 2016
Classification Analysis on Corpus Data CiiT Data Mining and Knowledge Engineering Vl.No. 8, 5 2016
CLASSIFICATION ANALYSIS ON Medical Data CiiT International Journal of Data Mining and Knowledge Engineering. Vl.No. 7 2015
Clustering methods and algorithms in data mining: Concepts and a study JOURNAL OF COMPUTING TECHNOLOGIES Vl.No. 4 2015
Dr. T. Kokilavani
Reduced makespan task scheduling algorithm for Grid Computing International Journal of Control Theory and Applications Vl.No. 9(27) 2016
Extended Load Shared Ant Colony Optimization for Meta Task Scheduling in Grid Computing International Journal of Applied Engineering Research Vl.No. 10 2015
A Survey on the Allocation of Grid Resources Using Evolutionary Algorithms International Journal of Engineering and Applied Sciences (IJEAS) Vl.No. 2 2015
A study on Task Scheduling Algorithms in Grids International Journal Of Engineering And Computer Science Vl.No. 4 2015
Dual Objective Min-Min Algorithm for Meta Task Scheduling in Grid Computing European Journal of Scientific Research Vl.No. 101 2013
EMGEN - A Tool to Create ETC Matrix with Memory Characteristics for Meta Task Scheduling in Grid Environmentacteristics For Meta Task Scheduling In Grid Environment The International Journal of Computer Science & Applications (TIJCSA) Vl.No. 2 2013
Memory Constrained Ant Colony System for Task Scheduling in Grid Computing International Journal of Grid Computing and Applications Vl.No. 3 2012
An Ant Colony Optimization Based Load Sharing Technique for Meta Task Scheduling in Grid Computing Advances In Computing and Information Technology [Book Chapter] Vl.No. AISC177, Vol 2 2012
Ms. A. JENIFER JOTHI MARY
IMS: Imputation of Missing Sentiment in the Aspect Based Sentiment Analysis Lecture Series in Communications in Computer and Information Science (Springer - in Press) Vl.No. 0 2017
ASFuL: Aspect based Sentiment Summarization using Fuzzy Logic IEEE Explorer(in Press) Vl.No. 0 2017
A METHODOLOGICAL FRAMEWORK TO IDENTIFY THE STUDENTS` OPINION USING ASPECT BASED SENTIMENT ANALYSIS International Journal of Engineering Research & Technology (IJERT) Vl.No. 5 2016
A Framework for Aspect level Sentiment Analysis of Academic Results Data International Journal of Recent Trends in Engineering & Research (IJRTER) Vl.No. 2(7) 2016
Survey on Aspect Level Opinion Targets and Opinion Words from Online Reviews International Journal of Information Technology and Mechanical Engineering IJITME Vl.No. 2-8 2016
A newfangled IoT big data parallel preprocessing framework to facilitate quality IoT big data analytics IJERT Vl.No. 4(29) 2016
A methodology for identification on Flattery sentences in Sentence Level Classification Fifth National Conference on Intelligent computing(FNCIC) Vl.No. 2016
A Study on Basic Concepts of Big Data ijetcct Vl.No. 1 2015
Issues and Challenges in Sentiment Analysis : A Survey Misbah Niche of Knowledge Vl.No. 15 2015
Ms. B. FATHIMAMARY
Confidentiality Technique for Enhancing Data Security in Public Cloud Storage using Data Obfuscation IJCTA Vl.No. 9(27) 2016
CRBS-AN ARCHITECTURE FOR ACCESSING LOCATION BASED SERVICES(LBS) IN CLOUD International Journal of Fuzzy Mathematical Archive Vl.No. 6 2015
DMUCE- A Confidentiality Enabled Technique To Improve Cloud User Security International Journal of Applied Engineering Research Vl.No. 10 2015
eDSSuMRT- ENSURED DATA SECURITY STRATEGY USING MATRIX RANDOM TRAVERSAL IN CLOUD STORAGE ENVIRONMENT International Journal of Applied Engineering Research Vl.No. 10 2015
Security and Privacy issues in Location Based Services (LBS) -A Survey ELSEVIER Proceedings Vl.No. 0 2014


Copyright © St.Joseph's College, Trichy-02, TamilNadu, India. all rights reserved