SJC Press
Quick Links
CoE | Reporting Issues to
Library
Certificate Verifi.
Drone View
Downloads
SJC ERP Account
Administrators
Faculty
Ph.D
Student
Parent
About us
Introducing SJC
Jesuits
Founder
College Church
Society Office
Jesuit curia
Jesuit Colleges
Administrators
Rector
Secretary
Principal
Deputy Principal
Vice Principals S-I
Vice Principals S-II
Deans
Directors
Profile of the College
Autonomy
Board of Management
Statutory Committees
NAAC
NIRF
CPE
DST FIST
DBT STAR Status
Heritage Status
Awards
Infrastructure
Illustrious alumni/ae
Annual Reports
Why St. Joseph's
Admission
Prospectus 2024 - 25
Streams
MBA
MCA
MBA Twinning Programme
CA Foundation course - ICAI
Transfer Programs
International Students
Academics
Research
Rapinat Herbarium
Schools
Departments
Faculty
Staff
Aided
Management
Technical
Programmes
Under Graduate
Post Graduate
M.Phil.
Ph.D.
Diploma
Certificate
Vocational
Course Pattern
Syllabus
Programme outcomes
Programme Specific Outcomes
Centers and Institutes
Library
Physical Education
Calendar
Examinations
Office of the CoE
Examinations
CIA
Semester
Rules and Regulations
CoE Down the Years
IQAC
NIRF
Services
IAS Academy
Committees
College Office
Shepherd
Training and Placement
Capability Enhancement Schemes
Hostels
Campus Ministry
JASS
Fine Arts
Counsellor
Students Council
Student Clubs
Scholarships
Committee for PwD
Alumni/ae
Contact us
About us
Introducing SJC
Jesuits
Founder
College Church
Society Office
Jesuit curia
Jesuit Colleges
Administrators
Rector
Secretary
Principal
Deputy Principal
Vice Principals S-I
Vice Principals S-II
Deans
Directors
Profile of the College
Autonomy
Board of Management
Statutory Committees
NAAC
NIRF
CPE
DST FIST
DBT STAR Status
Heritage Status
Awards
Infrastructure
Illustrious alumni/ae
Annual Reports
Why St. Joseph's
Admission
Prospectus 2024 - 25
Streams
MBA
MCA
MBA Twinning Programme
CA Foundation course - ICAI
Transfer Programs
International Students
Academics
Research
Rapinat Herbarium
Schools
Departments
Faculty
Staff
Aided
Management
Technical
Programmes
Under Graduate
Post Graduate
M.Phil.
Ph.D.
Diploma
Certificate
Vocational
Course Pattern
Syllabus
Programme outcomes
Programme Specific Outcomes
Centers and Institutes
Library
Physical Education
Calendar
Examinations
Office of the CoE
Examinations
CIA
Semester
Rules and Regulations
CoE Down the Years
IQAC
NIRF
Services
IAS Academy
Committees
College Office
Shepherd
Training and Placement
Capability Enhancement Schemes
Hostels
Campus Ministry
JASS
Fine Arts
Counsellor
Students Council
Student Clubs
Scholarships
Committee for PwD
Alumni/ae
Contact us
SJC ERP Account
Administrators
Faculty
Student
Parent
Ph.D
Online Payment
Shift I
Shift II
Exam
PU-SJC MBA Exam Fees
TC and Alumni Fees
COMPUTER SCIENCE
Profile
Vision & Mission
Programmes
Programme Specific Outcomes
Faculty
Syllabus
Doctoral Degree Awarded
Association
Endowments
Publications
Awards
Alumni
Placement
Projects
Research Advisors
Book Publications
Retired Faculty
Papers Published by the Faculty
Author(s) & Title
Publications
Year
Rev.Dr. T. Francis Thamburaj S.J
On Validating Cognitive Weighted Attribute Hidiing Factor Complexity Metric
International Journal of Control Theory and Application (IJCTA) Vl.No. 9
2016
Cognitive Weighted Cohesion Complexity Metric
International Journal of Control Theory and Application (IJCTA) Vl.No. 9
2016
Models for Maintenance Effort Prediction with Object-Oriented Cognitive Complexity Metrics
IEEE CPS Vl.No. 54
2016
Validation of Cognitive Weighted Method Hiding Factor Complexity Metric
International Conference on Advanced Computing (ICAC 2015) Vl.No. 10
2015
Cognitive Weighted Polymorphism Factor: A Comprehension Augmented Complexity Metric
International Journal of Computer, Electrical, Automation, Control and Information Engineering (IJCEACIE) Vl.No. 9
2015
A Survey on Cohesion Metrics for Object-Oriented Software Systems
National Conference on Recent Advancements in Software Development (NCRASD 2015) Vl.No. 0
2015
Cognitive Perspective of Attribute Hiding Factor Complexity Metric
International Journal of Engineering and Computer Science (IJECS) Vl.No. 4
2015
Cognitive Weighted Method Hiding Factor Complexity Metric
International Journal of Computer Science and Software Engineering (IJCSSE) Vl.No. 4
2015
Classification of Corona Viruses using Self-Organizing Maps
RETELL-An Inter-disciplinary Research Journal Vl.No. 11(2)
2011
Comparative Study of Random and Linear Initialization of Self-organizing Maps
RETELL,St. Joseph`s College, Trichy Vl.No. 6(2)
2006
Neighbourhood Study of Self-Organizing Maps
Proc. Parallel and Distributed Computing,Cauvery College, Trichy Vl.No. 16-17
2006
Artificial Neural Networks for Software Quality Assessment
Proc. Nat. Conf. on Software Engineering,Sacred Heart College, Tirupattur Vl.No. 14-16
2006
Similarity Metrics for Self-Organizing Neural Networks
Proc. Nat. Conf. Frontier Research Area in Computer Science, BARD, Trichy Vl.No. 17-18
2006
The Initialization Problem of Self-Organizing Maps
Proc. Recent Trends in Info. Tech.Jamal Mohamed College, Trichy Vl.No. -
2006
Genomic Patterns of Adeno Viruses : Nucleotide Based Classification using Self -Organizing Maps
RETELL-An Inter-disciplinary Research Journal Vl.No. 5(2)
2005
Artificial Neural Network for Plant Taxonomy
National Conference on the Frontiers of Research and Development in Medicinal Plants Vl.No. 0
2004
A Methodology to Analyze the Quality of Artificial Neural Network
ReTICA, Recent Trends in Computing Advances Vl.No. 0
2003
Comparative Study of Self-organizing maps neighbourhoods
Proc. Nat. Conf. Comp. Sci. & Commu. Tech.,St. Joseph`s College, Trichy Vl.No. 16-17
0
Analysis of Classification of Coding and Random Sequences using Organizing Maps
RETELL,St. Joseph`s College, Trichy Vl.No. 8(1): 23-27
0
Mr.D.S.RAVI
A SURVEY ON FAKE ACCOUNT DETECTION IN SOCIAL MEDIA USING AI
INTERNATIONAL JOURNAL OF RESEARCH AND ANALYTICAL REVIEW Vl.No. 6
2019
An Architecture for avoiding repeated messages in Whatsapp messenger
IJSRCSAMS Vl.No. 7
2018
EXPLORATION ON THE ALGORITHMS IN DATA MINING USING AI TECHNIQUES
International Journal of Computer Sciences and Engineering Vl.No. 5
2018
An Architecture for detecting the Camera and Jamming the Frequency using Artificial Neural Network
IJSRCSAMS Vl.No. 7
2018
A Study of Artificial Intelligence analytics in E-Learning
National conference on Emerging Trends in Software Development Vl.No. -
2016
A Study of Learning Standards in E-Learning using Artificial Intelligence
International Journal of Advanced Research Trends in Engg. and Technology Vl.No. 3
2016
A study of learning methodology based on learner's in E-Learning using Artificial Intelligence
Internation conference on Innovations in Computer Science & Technology Vl.No. 0
2016
Dr.L.AROCKIAM
INTERNET OF THINGS BASED COAL MINE SAFETY MONITORING AND ALERTING SYSTEM
Journal of data acquisition and processing Vl.No. 38(3)
2023
A Review on Intrusion Detection Systems to Secure IoT Networks
International Journal of Computer Networks and Applications (IJCNA) Vl.No. 9
2022
VeNADet: Version Number Attack Detection for RPL based Internet of Things
Solid State Technology Vl.No. 64
2021
DAVmS: Distance Aware Virtual Machine Scheduling approach for reducing the response time in cloud computing
The Journal of Supercomputing Vl.No. 0
2021
ETLB: An Enhanced Throttled Load Balancing Approach for Reducing the Response Time in Cloud Computing
Solid State Technology Vl.No. 64
2021
Location Based Rank Attack Detection Technique (LRADT)
Webology Vl.No. 18
2021
The Security Challenges In The World Of Internet Of Things
Webology Vl.No. 18
2021
IoT Data Preprocessing - A Survey
Webology Vl.No. 18
2021
Blockchain Based Device Authentication For The Internet Of Things
Webology Vl.No. 18
2021
Ada-IDS: AdaBoost Intrusion Detection System for ICMPv6 based Attacks in Internet of Things
IJACSA) International Journal of Advanced Computer Science and Applications Vl.No. 12
2021
CID: Central Tendency Based Noise Removal Technique for IoT Data
Webology Vl.No. 18
2021
Promoting a Clean and Hygienic Environment using IoT
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8
2020
Priority Intensed Meta Task Scheduling Algorithm for Multi Cloud Environment (PIMTSA)
Journal of Physics: Conference Series Vl.No. 1427
2020
MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage
International Journal of Information and Computer Security Vl.No. 11,1
2019
A survey on Nutrition Monitoring and Dietary Management System
International Journal of Research and Analytical Reviews (IJRAR) Vl.No. 6
2019
Cloud Computing : Opportunities and Challenges
Retell Vl.No. 21
2019
Quality of Services in the Internet of Things (IOT) - A Survey
Retell Vl.No. 21
2019
ANNIDS: Artificial Neural Network based Intrusion Detection System for Internet of Things
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 8
2019
A Hybrid Method for Smart Irrigation System
International Journal of Recent Technology and Engineering (IJRTE) Scopus Indexed Vl.No. 8
2019
Prevalence of Diabetes Mellitus in Tiruchirappalli District using Machine Learning
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8
2019
Prevalence of Type-II Diabetics Association with PM 2.5 and PM 10 in Central Region of Tamil Nadu
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8
2019
Nutrition Monitoring and Calorie Estimation using Internet of Things (IoT)
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 8
2019
Entity Aware Association Rule Based Big Data Migration
International Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 6
2019
A Novel Big Data Migration Framework with Reduced Database Downtime
International Journal of Engineering Research and Applications (IJERA) Vl.No. 9
2019
Intrusion Detection System for Detecting Rank Attacks in RPL based 6LoWPAN Networks
International Conference on Advances in Computer Science and Technology Vl.No. 0
2018
Non Adjacent Form based Scalar Multiplication Technique for Increasing Speed of ECC
International Conference on Advances in Computer Science and Technology Vl.No. 0
2018
A Model To Predict and Pre-Treat Diabetes Mellitus
International Conference on Advances in computer science and Technology Vl.No. 0
2018
Resource Based Load Balanced Min-Min Algorithm
International Conference on Advances in Computer Science and Technology Vl.No. 0
2018
Predictive Model for Diabetes Mellitus in Tamil Nadu Using IoT Data
National Conference on Transforming Technology Vl.No. 0
2018
A Survey of Algorithms for Scheduling in the cloud: In a metric basis
National Conference on Transforming Technology Vl.No. 0
2018
ELT-EAPR: Expected Life Time of Energy Aware Parent Routing for IoT Networks
International Journal of Pure and Applied Mathematics (SCOPUS) Vl.No. 118,8
2018
ORBUA: An Effective Data Access Model for MobiCloud Environment
International Journal of Pure and Applied Mathematics (SCOPUS) Vl.No. 118,8
2018
Rate aware Meta task Scheduling Algorithm for multi cloud computing (RAMTSA)
Journal of Physics: Conference Series Vl.No. 1142
2018
Spell Aware Meta Task Scheduling Algorithm (SAMTSA) for Multicloud
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 7, 4
2018
LAHUBMAX -Priority Based Meta Task Scheduling Algorithm in multicloud
International Journal of Computer Sciences and Engineering Vl.No. 6, 10
2018
Aro-Nims: A New-Fangled Framework for IoT Data Pre-processing
International Journal of Research in Advent Technology(IJRAT) Vl.No. 6, 5
2018
Aro-Pri: A New-Fangled Architecture for IoT Data Pre-Processing
International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) Vl.No. 7, 3
2018
A Novel Block Cipher for Enhancing Data Security in Healthcare Internet of Things
Journal of Physics: Conference Series Vl.No. 1142, 1
2018
Architecture for Secure Data Management in Healthcare Internet of Things
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 7, 3
2018
ANNA: A Unified Framework for Data Security in Healthcare Internet of Things
ICTACT Journal on Communication Technology Vl.No. 9, 2
2018
An Algorithm to Detect Rank Attack in RPL based 6LoWPAN Networks
International Journal of Computer Sciences and Engineering (IJCSE) Vl.No. 6, 2
2018
RDAID: Rank Decreased Attack Identification Algorithm for Internet of Things
International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) Vl.No. 7, 3
2018
RIAIDRPL: Rank Increased Attack Identification Algorithm for Avoiding Loop in the RPL DODAG
International Journal of Pure and Applied Mathematics (IJPAM) Vl.No. 119, 16
2018
E2V: Techniques for Detecting and Mitigating Rank Inconsistency Attack (RInA) in RPL based Internet of Things
Journal of Physics: Conference Series (JPCS), IOP publishing Vl.No. 1142
2018
ARO_VID: A Unified Framework for Data Security in Internet of Things
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 5, 7
2018
ARO_EDGE: A Technique to Ensure Data Security in Internet of Things (IoT)
Asian Journal of Computer Science and Technology Vl.No. 7, 2
2018
Hybrid Security Techniques to Protect Sensitive Data in E-Healthcare Systems
IEEE Digital Explorer Vl.No. 0
2018
An Enhanced Architecture for Imputing Missing Data in IoT Data using FRBIS Model
Proceedings of the National Conference on Advanced Computing Technologies and Applications Vl.No. 0
2018
Key Generation Algorithm using Soft Set for data security in Internet of Things
Proceedings of International Conference on Internet of Things and Connected Technologies (ICIoTCT), ELSEVIER Vl.No. 0
2018
EALBA: Energy Aware Load Balancing Algorithm for IoT Networks
ACM Series , Scopus Vl.No. 0
2018
Energy Aware Routing Applications for Internet of Things
Proceeding of the International Conference on Computer Networks, Springer Vl.No. 0
2018
Performance Analysis of Classification Algorithms for Diabetic Prediction using Pima-Indian Dataset
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 5,12
2018
A Novel Technique to Enhance QoS using Location based Trust validation in 6LoWPAN for IoT Networks
International Journal of Computer Sciences and Engineering Vl.No. 6,2
2018
TNLIQ: Trust Validation in Ad-Hoc Networks using Dynamic Location Identification to ensure QoS
International Journal of Computer Sciences and Engineering Vl.No. 6,2
2018
FRND: False Rank Node Detection Algorithm in RPL Topology
Proceedings of National Conference on Advanced Computing Technologies and Applications Vl.No. 0
2018
Scheduling for Internet of Things Applications on Cloud: A Review.
Imperial Journal of Interdisciplinary Research Vl.No. 3 (1 )
2017
EPCAMD: EPC Based Authentication for Secure Accessing of Medical Devices in the Smart Healthcare System
Lecture Series in Communications in Computer and Information Science (Springer - in Press) Vl.No. -
2017
E2TR2: Energy efficient transmission range routing for IoT networks
Lecture Series in Communications in Computer and Information Science (Springer - in Press) Vl.No. -
2017
An enhanced sinkhole attacker node identification technique using successful link ration in IoT
International Journal of Computer Science Vl.No. 5(1)
2017
Role of Scheduling and Load Balancing Algorithms in cloud to improve the Quality of Services
International Journal of Computer Science Vl.No. 5(1)
2017
A Novel Fuzzy based Energy Efficient Routing for Internet of Things
IEEE Explorer(in Press) Vl.No. -
2017
Device Authentication Mechanism for IoT enabled Healthcare system
IEEE Explorer(in Press) Vl.No. 0
2017
Enhanced Encryption Algorithm(EEA) for protecting users credentials in Public Cloud
IEEE Explorer(in Press) Vl.No. -
2017
USER AUTH Secure Two Tier User Authentication Mechanism for IoT Enabled Smart Healthcare System
International Conference on Newer engineering concepts and technology Vl.No. -
2017
Hybrid One Time Password Mechanism for User Authentication in Internet of Things Environment
International Conference on Advanced Techniques in Engineering, Science Management Vl.No. -
2017
Architectural Framework for Resource Management in Fog Computing
International Journal of Engineering Research & Technology (IJERT) Vl.No. 5,13
2017
An Enhanced Technique to Detect Sinkhole Attack in Internet of Things
International Journal of Engineering Research and Technology (IJERT) Vl.No. 5,13
2017
Secure Two-Tier User Authentication Mechanism For IoT Enabled Smart Healthcare System
International Journal of Recent Scientific Research Vl.No. 8,7
2017
Issues and Challenges in Minimizing the response time in cloud service
International Journal for Trends in Engineering and Technology Vl.No. 25,01
2017
E2TBR: Energy Efficient Transmission Based Routing for IoT
International Journal of Computer Science Engineering Vl.No. 7,4
2017
EPC Based Authentication of Devices in the Smart Healthcare System
International Journal of Electrical, Electronics & Computer Science Engineering Vl.No. 8,7
2017
Intrusion Detection System to detect sinkhole attack on RPL protocol in Internet of Things
International Journal of Electrical Electronics and Computer Science Engineering Vl.No. 4,4
2017
A Secured Public key Exchange Technique for Elliptic Curve Cryptography
International Journal of Engineering Research in Computer Science and Engineering Vl.No. 4,9
2017
ENNEGCC 3D Energy Efficient scheduling algorithm using 3-D Neural Network Predictor for Green Cloud Computing Environment
IEEE Digital Explorer Vl.No. -
2017
Detection of outliers in the IoT data using the STCPOD model
International Journal of Engineering Research in Computer Science and Engineering Vl.No. 4,10
2017
A Pragmatic Study on Time Series Models for Big Data
International Journal of Emerging Research in Management &Technology Vl.No. 6,8
2017
PAFHWKM: An Enhanced Parallel Approach to Forecast Time Series Data Using Holt-Winters and K-Means Algorithm
International Journal on Future Revolution in Computer Science & Communication Engineering Vl.No. 3,8
2017
Device Authentication Mechanism For IoT Enabled Healthcare System
IEEE Digital Explorer Vl.No. -
2017
Research Issues on Data Security in Cloud Computing: A Survey
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 6,5
2017
A Unified Model for Cloud Data Confidentiality
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2,6
2017
Enhancing the Security of IoT Data using Multilevel Encryption
International Journal of Advanced Research in Computer Science Vl.No. 8,9
2017
A Technique to Enhance Quality of Service using weighted Path Mechanism
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2,4
2017
TOPQoS : TENSOR Based Optimum Path Selection in Internet of Things to Enhance Quality of Service
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2,6
2017
A Novel Fuzzy Based Energy Efficient Routing for Internet of Things
IEEE Digital Explorer Vl.No. 0
2017
Imputing the Missing Values in IoT Using ESTCP Model
International Journal of Advanced Research in Computer Science Vl.No. 8,9
2017
A Robust Architecture for Detecting Outliers in IoT Data using STCPOD Model
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2,6
2017
RESEARCH ISSUES ON WEB MINING
State-Of-The-Art and Research Issues In Cloud Computing Vl.No. -
2017
ARARO Framework for Confidentiality Techniques to Enhance Security of Numerical and Non-Numerical Data in Public Cloud Storage
IJIREEICE Vl.No. 4(3)
2016
Key Based Mutual Authentication (KBMA) Mechanism for Secured Access in MobiCloud Environment
In Proceedings of International Conference on Mechanical Engineering and Electrical Systems (ICMES 2015) Vl.No. 40
2016
Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage
In Proceedings of International Conference on Mechanical Engineering and Electrical Systems (ICMES 2015) Vl.No. 40
2016
Confidentiality Technique using Data Obfuscation to Enhance Security of Stored Data in Public Cloud Storage
International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Vl.No. 5, No. 1
2016
A Novel Lexicon Based Approach to Enhance the Accuracy of Sentiment Analysis on Big Data
International Journal of Emerging Research in Management and Technology (IJERMT) Vl.No. 5, No. 2
2016
Combining Lexicon and Machine Learning Method to Enhance the Accuracy of Sentiment Analysis on Big Data
International Journal of Computer Science and Information Technologies (IJCSIT) Vl.No. 7(1)
2016
Route Discovery Overhead Aware Routing Protocol for IoT to Enhance QoS
IJCTA (SCOPUS Indexed) Vl.No. 9(27)
2016
Filling Fuel Quantity Measurement Systems Using Internet Of Things
International Journal of Innovative Research and Advanced Studies (IJIRAS) Vl.No. 3(13)
2016
QRIC: QoS aware Routing for Internet of Things in College Management system
International Journal of Engineering Research & Technology (IJERT) Vl.No. 4(29)
2016
Deist: Dynamic Detection of Sinkhole Attack for Internet of Things
International Journal of Engineering and Computer Science Vl.No. 5(12)
2016
A Neoteric Authentication Scheme for IoT Healthcare System
International Journal of Engineering Sciences & Research Technology (IJESRT) Vl.No. 5(12)
2016
Authentication in IoT Environment: A Survey
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE Vl.No. 6(10)
2016
A Novel Authentication Scheme for IoT enabled Smart Healthcare System
International Journal of Engineering Research & Technology(IJERT) Vl.No. 4(29)
2016
Security in IoT Environment: A Survey
International Journal of Information Technology and Mechanical Engineering (IJITME) Vl.No. 2(7)
2016
Applications of Big Data Analytics for Diagnosing Diabetic Mellitus: Issues and Challenges
International Journal of Resent Trends in Engineering and Research Vl.No. 2(6)
2016
A Study on Security Issues and Challenges in IoT
International Journal of Engineering Sciences and Management Research Vl.No. 3(11)
2016
Accentuating the necessity for new-fangled IoT missing data imputation technique
International Journal of Computer Technology and Applications(I J C T A) (scopus indexed) Vl.No. 9(27)
2016
Decode_HMM_MLCS: An efficient algorithm to identify Multiple Longest Common Subsequence (MLCS) in Large DNA Sequences by using Decoding HMM
Journal of Chemical and Pharmaceutical Sciences (JCHPS) Vl.No. 9(1)
2016
A Survey on Noisy Data Elimination Using Clustering Techniques
International Journal of Information Technology and Mechanical Engineering (IJITME) Vl.No. 2(8)
2016
Energy Efficiency in Internet of Things: An Overview
INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH Vl.No. 2(6)
2016
EOCIPHER: A Hybrid Approach To Enhance Security Of Outsourced Data In Public Cloud Storage
Proceeding of the 4th International Conference on Artificial Intelligence and Computer Science (AICS2016),28 - 29 November 2016, Langkawi, MALAYSIA Vl.No. 3
2016
A Unified Model for Cloud Data Confidentiality
Fifth National Conference on Intelligent computing(FNCIC) Vl.No. -
2016
A framework for ensuring data confidentiality in smart home system
International conference on Emerging trends in Engineering & Technology Vl.No. -
2016
Confidentiality technique to encrypt and Obfuscate non numerical and numerical data to enhance security in public cloud storage
IEEE Explorer Vl.No. -
2016
Performance Improved Holt-Winter`s (PIHW) Prediction Algorithm for Big Data Environment
International Journal on Intelligent Electronic System Vl.No. 10(2)
2016
EDSHA: An Efficient Data Skew Handling Approach For Mapreduce Model Using Time Series Data
I J C T A (SCOPUS Indexed) Vl.No. 9(27)
2016
Parallel DBScan algorithm for removing noise in IoTBig data
Fifth National Conference on Intelligent computing(FNCIC) Vl.No. -
2016
A Methodology for preprocessing and construction of Diabetic Mellitus Warehouse
Fifth National Conference on Intelligent computing(FNCIC) Vl.No. -
2016
Lexicon Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets
International Journal of Computer Science and Information Technology & Security (IJCSITS) Vl.No. 6 (3)
2016
Machine Learning Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets
International Journal of Advance Research in Computer Science and Management Studies Vl.No. 4 (5)
2016
Hybrid Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets
IJCSET Vl.No. 6 (6)
2016
Enhanced Authentication Mechanism for Securing the Cloud Services using AaaS
International Advanced Research Journal in Science, Engineering and Technology Vl.No. 3
2016
User Demand Forecasting UDF for Dynamic Schedule Based Auto-scaling in Cloud Environment
User Demand Forecasting (UDF) for Dynamic Schedule Based Auto-scaling in Cloud Environment Vl.No. -
2016
A Unified Cloud Authenticator for Mobile Cloud Computing Environment
IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4
2015
Cost Aware Dynamic Rule Based Auto-scaling of Infrastructure-as-a-Service in Cloud Environment
IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4
2015
A Novel Approach for Ensuring Data Confidentiality in Public Cloud Storage
IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 5
2015
A Novel Edu-CloudSec Framework for E-Learning
IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4
2015
Big Data for Education in Students` Perspective
IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4
2015
A Secure Authentication Scheme for MobiCloud
International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore Vl.No. 0
2015
Load Balancer Behavior Identifier (LoBBI) for Dynamic Threshold Based Auto-scaling in Cloud
International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore Vl.No. 0
2015
A Framework for Key Management for Data Confidentiality in Cloud Environment
International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore Vl.No. 0
2015
AROMONcrypt: A Technique to Optimize the Security by Ensuring the Confidentiality of Outsourced Data in Cloud Storage
Elixir International Journal Vl.No. 0
2015
Secure Sharing of E-Content in Cloud Environment for Educational Institutions
International Journal of Computer & Communication Engineering Research Vl.No. 3
2015
Big Data Migration in the Cloud Environment - An Overview
IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications ICACCTHPA 2014 Vl.No. 5
2015
A Review on Big Data Integration
IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications ICACCTHPA 2014 Vl.No. 5
2015
Data Integration in Big Data Environment
Bonfring International Journal of Data Mining Vl.No. 5
2015
AROcrypt A Confidentiality Technique for Securing Enterprises Data in Cloud
International Journal of Engineering and Technology (IJET) (Scopus) Vl.No. 7
2015
SequentialPR_FCP: BigData Pattern decomposing algorithm to Identify Frequent Contiguous Patterns (FCP) from Large DNA Sequence Database using Permutations with Repetition (PR)
International Journal of Applied Engineering and Research (IJAER) Vl.No. 10
2015
Analysis of Prediction Techniques in Time Series for Big Data using R
International Journal of Applied Engineering Research Vl.No. 10
2015
AROMO Security Framework to Enhance Security of Data in Public Cloud
International Journal of Applied Engineering Research Vl.No. 10
2015
SBCOHC: An Optimized Task Scheduling Approach for Public Cloud Environment
International Journal of Applied Engineering Research Vl.No. 10
2015
A Novel Architectural Framework to Enhance Scalability in a Federated Heterogeneous Cloud Environment
International Journal of Applied Engineering Research Vl.No. 10
2015
Performance Evaluation of Task Scheduling in Cloud Environment Using Soft Computing Algorithms
International Journal of Computer Science and Network (IJCSN) Vl.No. 4
2015
AUTOPRED: An Architectural Framework to Predict the Service Requests to Enhance Scalability in Federated Clouds
International Journal of Electronics Communication and Computer Technology (IJECCT) Vl.No. 5
2015
Enhanced Framework for Authentication as a Service to Ensure Security in Public Cloud Environment
International Journal of Engineering Research and Technology (IJERT) Vl.No. 4
2015
PBCOPSO: A Parallel Optimization Algorithm for Task Scheduling in Cloud Environment
Indian Journal of Science Technology Vl.No. 8
2015
An Improved Particle Swarm Optimization Algorithm for Meta Task Scheduling In Cloud Environment
International Journal of Computer Science Trends and Technology (IJCST) Vl.No. 3
2015
A Study of User Authentication Techniques in Cloud Computing
International Journal of Emerging Technologies and Innovative Research (IJETIR) Vl.No. 2
2015
EnBloAES: A Unified Framework to Preserve Confidentiality of Data in Public Cloud Storage
Indian Journal of Science Technology Vl.No. 8
2015
A Survey on User Authentication Mechanism in Mobile Cloud Environment
International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT) Vl.No. 1
2015
A Study on Basic Concepts of Big Data
International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT) Vl.No. 1
2015
Align_MLCS: A Sequence Alignment based Efficient Algorithm to Identify Multiple Longest Common Subsequence (MLCS) for DNA Sequences
International Journal of Applied Engineering and Research (IJAER) Vl.No. 10
2015
Parallel Bottom-up Generalization Approach for Data Anonymization using Map Reduce for Security of Data in Public Cloud
Indian Journal of Science Technology Vl.No. 8
2015
Confidentiality Technique to Enhance Security of Data in Public Cloud Storage Using Data Obfuscation
Indian Journal of Science Technology Vl.No. 8
2015
Parallelized Contextual Valance Shifter Algorithm for Sentiment Analysis on Big Data
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 5
2015
A Hybrid Approach for Aspect Based Sentiment Analysis on Big Data
International Research Journal of Engineering and Technology (IRJET) Vl.No. 2
2015
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environment
International Journal of Computer and Communication System Engineering (IJCCSE) Vl.No. -
2015
Virtual Machine Behavior Identifier (VMBI) for VM Level Auto-scaling in Cloud Environment
International Journal of Emerging Technology and Advanced Engineering (IJETAE) Vl.No. 5
2015
Improved Parallel Time Series Based Algorithm for Big Data using MapReduce Programming Model
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
Load Pattern Identifier (LoPI) for Threshold Based Auto-scaling in Cloud Environment
International Journal of Emerging Research and Technology (IJERT) Vl.No. 10
2015
HMM_MLCS: Hidden Markov Model (HMM) based algorithm to identify Multiple Longest Common Subsequence (MLCS) in DNA Sequences
Journal of Chemical and Pharmaceutical Sciences (JCHPS) Vl.No. 8
2015
A Predictive Model to Forecast and Pre-Treat Diabetes Mellitus using Clinical Big Data in Cloud
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
A Dynamic Two Stage Authentication Framework to Enhance Security in Public EduCloud
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
Issues and Challenges hampering the evolution of IoT big data analytics
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
Parallel Prediction Model for Big Data using MapReduce Programming Model
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
Confidentiality Framework to Enhance Data Security in Public Cloud Storage
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
AROMO Security Framework to Enhance Security of Data in Public Cloud
Proceedings of 2nd International Conference on Engineering, Technology and Science Vl.No. 1
2015
Confidentiality Technique to Enhance Security of Data in Public Cloud Storage Using Data Obfuscation
Proceedings of International Conference on Soft Computing in Applied Sciences & Engineering (ICSCASE-2015) Vl.No. -
2015
A Framework for Cloud Confidentiality in Public Cloud Storage
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
A Study on Cloud Data Security Issues
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
An Enhanced Qualitative Framework for Data Integration with Multiple Data Sources using Parallel Processing
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
Enhanced Authentication Framework for Mobile Cloud Environment
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
Issues and Challenges in Sentiment Analysis: A Survey
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
EQOS-AODV: A Technique to Enhance Quality of Service using Half Transmission Area Towards Sender
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
Large Scale Sentiment Analysis on Cloud Environment
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
User Behavior Identifier (UBI) for Schedule Based Auto-scaling in Cloud Environment
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
A Survey on the Metamorphosis of IoT Big Data into Quality Data using Pre-processing Techniques
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
Enhanced Authentication Mechanism for Public Cloud
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
A Study on Aspect based Sentiment Analysis on Big Data
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
DNA-DRUG_FCP: AN EFFICIENT COMPUTATIONAL METHOD FOR DNA-DRUG DESIGN USING FREQUENTLY REPEATED PATTERNS IN A LARGE HUMAN GENOME DATABASE
Journal of Chemical and Pharmaceutical Sciences Vl.No. 8
2015
FREQUENT CONTIGUOUS PATTERN (FCP) MINING IN GENOMIC SEQUENCE ANALYSIS AND PATTERN DISCOVERY
Journal of Chemical and Pharmaceutical Sciences Vl.No. 8
2015
Big Data Analytics and its Important Concepts: A Review
Proceedings of International Conference on Contemporary Trends in Computer Science (ICCTC 14) Vl.No. 0
2014
LASA HEU Heuristic Approach for Service Selection in Composite Web Services
Proceedings of World Congress on Computing and Communication Technologies (WCCCT 14), IEEE (CPS) Vl.No. 0
2014
Big Data Analytics and Cloud Based Solutions A Survey
International Conference on Research Trends in Computer Technologies (ICRTCT) Vl.No. -
2014
Cognitive Complexity Metrics Analysis Tool(CCMAT)
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 1
2014
Enhanced User Access Control Architecture for Cloud Storage
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 4
2014
An Innovative Solution for Cloud Security through Quantitative Analysis of Various Visual Cryptography Schemes
International Journal of Engineering and Innovative Technology (IJEIT) Vl.No. 3
2014
Securing Data with Authentication in Mobile Cloud Environment: Methods, Models and Issues
International Journal of Computer Application (IJCA) Vl.No. 94
2014
Security Framework to Ensure the Confidentiality of Outsourced Data in Public Cloud Storage
International Journal of Current Engineering and Technology (IJCET) Vl.No. 4
2014
Frequent Contiguous Pattern Mining Algorithms for biological Data Sequences
International Journal of Computer Application (IJCA) Vl.No. 95
2014
A Comparative Analysis of Encryption Techniques and Data Security Issues in Cloud Computing
International Journal of Computer Application (IJCA) Vl.No. 96
2014
A State-of-Art Load Balancing Algorithms in Cloud Computing
International Journal of Computer Application (IJCA) Vl.No. 95
2014
A Review on Dynamic Resource Allocation Strategies and Mechanisms in Cloud Computing
International Journal of Advanced Research in Computer Science & Technology (IJARCST) Vl.No. 2
2014
A Unified Architecture for Optimal Resource Utilization in a Heterogeneous Cloud Environment
International Journal of Machine Learning and Computing Vl.No. 4
2014
Performance Evaluation of Min-Min and Max-Min algorithms for job scheduling in federated cloud
International Journal of Computer Applications (IJCA) Vl.No. 99
2014
Authentication Mechanism to Enhance Security in the cloud environment
International Journal of Current Engineering and Technology (IJCET) Vl.No. 4
2014
A Framework to optimize task scheduling in cloud environment
International Journal of Computer Science and Information Technologies (IJCSIT) Vl.No. 5
2014
An extensive analysis on task scheduling Algorithms in cloud environment
International Journal of emerging technologies in computational and applied science(IJETCAS) Vl.No. 10
2014
General Aspect of (Big) Data Migration Methodologies
International Journal of Computer Science and Engineering (SSRG-IJCSE) Vl.No. 1
2014
Positional_nFCP Positions based Big Data algorithm to Identify n_length Frequent Contiguous Patterns FCP in a Large Human Genome Sequence Database
International Journal of Applied Engineering and Research (IJAER), (Scopus) Vl.No. 9
2014
Automated Data Validation Framework for Data Quality in Big Data Migration Projects
International Journal of Computer Science and Engineering (SSRG-IJCSE) Vl.No. 1
2014
IndexedFCP An Index based approach to identify Frequent Contiguous Patterns FCP in Big Data
IEEE International Conference on Intelligent Computing Applications (ICICA`14) Vl.No. 0
2014
An IoT Based Secured Smart Library System with NFC Based Book Tracking
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) Vl.No. 11
2014
Enhanced Anonymization Algorithm to Preserve Confidentiality of Data in Public Cloud
International Conference on Information Society (i-Society 2014), IEEE Vl.No. 0
2014
Enhanced Architecture for Data Confidentiality in Cloud Computing
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0
2014
A Cluster Based Services for Load Balancing in Cloud Computing Environment
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0
2014
A Cluster Based Task Scheduling in Cloud Computing
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0
2014
A Novel Framework for an Authentication as a Service in Public Cloud Environment
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. -
2014
A Framework to Ensure Data Security in Public Cloud Storage
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0
2014
A Pioneering Approach on Cloud Data Security using Cryptography
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0
2014
Combining Top-Down and Bottom-Up Scalable Multidimensional Anonymization over Big Data using Map reduce on Cloud
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0
2014
Obfuscrypt: A Novel Confidentiality Technique for Cloud Storage
International Journal of Computer Applications Vl.No. 88
2014
A State of Art Scheduling Algorithms in Cloud
Advance Research in Computer Science & Technology (IJARSCT) Vl.No. 2
2014
A Security Service Algorithm to Ensure the Confidentiality of Data in Cloud Storage
International Journal of Engineering Research and Technology (IJERT) Vl.No. 3
2014
User Authentication Mechanism for Sharing E resource in Educational Clouds
International Journal of Networking and Communication Engineering Vl.No. 0
2013
Cognition Based user Interface Design Framework For E-Learning
International Journal of Advance Technology and Engineering Research (IJATER) Vl.No. 3, Issue 1
2013
User Interface Design for Effective E-Learning based on Personality Traits
International Journal of Computer Applications (IJCA) Vl.No. 61, No. 14
2013
Security Algorithms to Prevent Denial of Service (DoS) Attacks in WLAN
International Journal of Wireless Communications and Networking Technologies (IJWCNT) Vl.No. 2 No. 1
2013
A Quality of Service Performance Evaluation Strategy for Delay Classes in General Packet Radio Service
International Journal of Advanced Science and Technology Vl.No. 50
2013
Mathematical Modeling and Simulation Study of Delay-Sensitive Algorithm to Enhance Quality of Service in Mobile Networks
International Journal of Future Generation Communication and Networking Vl.No. 5, No. 3
2013
AAA Mechanism for Visiting Mobile Node in Network Mobility Environment
International Journal of Advanced Research in Computer Science and Software Engineering Vl.No. 3, Issue 1
2013
Fuzzy Weighted Gaussian Mixture Model for Feature Reduction
International Journal of Computer Applications (IJCA) Vl.No. 64, Issue 18
2013
ArK Feature Selection Algorithm to resolve Small Sample Size Problem
International Journal of Artificial Intelligent Systems and Machine Learning Vl.No. 0
2013
AAA Mechanism for Local Mobile Node in Network Mobility Environment
International Journal of Computer Networks and Wireless Communications (IJCNWC) Vl.No. 3, No. 1
2013
AROSA- Reliability Evaluation Framework
IET Software Vl.No. 0
2013
An improved Feature Selection Algorithm using Modified Fisher Score and Principal Feature Analysis
Journal of Data Mining and Knowledge Discovery Vl.No. 0
2013
Modified Feature Selection algorithm to improve classification accuracy using MFS and PFA
International Journal of Data Mining and Bioinformatics Vl.No. 0
2013
Secure and Robust Cloud Storage with Cryptography and Access Control
International Journal of Computer Science and Engineering (Elixir) Vl.No. 56
2013
Fuzzy Weighted Ordered Weighted Average Gaussian Mixture Model for Feature Reduction
International Journal of Computers & Technology Vl.No. 4
2013
Medium Access Control Spoof Detection and Prevention Algorithm (MAC SDP DoS) for Spoofing Attacks in WLAN
IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) Vl.No. 3
2013
Framework to Detect and Prevent Medium Access Control Layer Denial of Service Attacks in WLAN
IRACST - International Journal of Computer Networks and Wireless Communications (IJCNWC) Vl.No. 3
2013
Pairwise Fuzzy Ordered Weighted Average Algorithm Gaussian Mixture Model for Feature Reduction
International Journal of Computers & Technology Vl.No. 6
2013
SOM ANN A novel approach to analyzing the Brown Plant Hopper
International Journal of Computer Science & Applications Vl.No. 2
2013
Auto Scaling in Cloud Computing An Overview
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2
2013
Mobile Cloud Security Issues and Challenges: A Perspective
International Journal of Electronics and Information Technology (IJEIT) Vl.No. 3
2013
Cloud Service Tools State of the Art
International Journal of Electronics and Information Technology (IJEIT) Vl.No. 3
2013
Enhancing Data Security During Transit in Public Cloud
International Journal of Electronics and Information Technology (IJEIT) Vl.No. 3
2013
Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2
2013
User Authentication Mechanism for Sharing E-resource in Educational Clouds
International Journal of Computer Science and Network Security (IJCSNS) Vl.No. 13
2013
An impact of learning behavior and creativity quotient in learning environment
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2
2013
Failure Management in Cloud An Overview
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2
2013
Match Making Service MMS A Centralized Architecture to Enhance Scalability in a Heterogeneous Cloud
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 3
2013
Enhancing the Interpretability of Soil Classification Data from a Neural Network System by Using Fuzzy Approaches
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 3
2013
A Novel LAS Relief Feature Selection Algorithm for Enhancing Classification Accuracy in Data Mining
International Journal of Computers & Technology (IJCT) Vl.No. 11
2013
A Systematic Approach on Data Pre processing in Data Mining
International Journal of Advanced Computer Technology (IJACT) Vl.No. 2
2013
Maintenance Effort Prediction Model Using Cognitive Complexity Metrics
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 3
2013
Applying Data Mining Techniques on Soil Fertility Prediction
International Journal of Computer Applications Technology and Research (IJCATR) Vl.No. 2
2013
MSDoT Memory Size and Depth of Tier Based Queuing Model for Scheduling a Multi-Tier Cloud
Proceedings of International Conference on Emerging Trends and Applications in Computer Science (ICETACS), IEEE Xplore Vl.No. -
2013
Impact of Depression and Stress on the Programming Performance of the Students
International Journal of Data Mining Knowledge Engineering Vl.No. 0
2012
A Study on Feature Selection using Machine Learning Techniques
International Journal of Data Mining Knowledge Engineering Vl.No. 0
2012
MFSPFA: An Enhanced Filter based Feature Selection Algorithm
International Journal of Computer Applications Vl.No. 51, No. 12
2012
An Impact of Emotional Happiness in Students? Learning Environment
International Journal of Data Mining Knowledge Engineering Vl.No. 0
2012
Feature Selection: A New Perspective
International Journal of Data Mining Knowledge Engineering Vl.No. 0
2012
Vertical Scalability Issues and Challenges in Cloud Computing: An Overview
International Journal of Networking and Communication Engineering Vl.No. 0
2012
A Survey on Horizontal Scalability in Cloud Computing An Overview
International Journal of Networking and Communication Engineering Vl.No. 0
2012
Survey on User Authentication for Cloud Computing
International Journal of Networking and Communication Engineering Vl.No. 0
2012
SECURITY ISSUES CHALLENGES AND SOLUTIONS IN NETWORK MOBILITY A REVIEW
International Journal of Computer Networks and Wireless Communications (IJCNWC) Vl.No. 2, No.2
2012
FTM A Middle Layer Architecture for Fault Tolerance in Cloud Computing
IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies ICNICT Vl.No. 0
2012
AAA Mechanism for Mobile Router in Network Mobility Environment
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 1, Issue 10
2012
Enhanced Feature Selection Algorithm using Modified Fisher Criterion and Principal Feature Analysis
International Journal of Advanced Research in Computer Science Vl.No. 3, No. 4
2012
Outlook of ANN in Agriculture Data Mining
International journal of Soft Computing Vl.No. 7, Issue 1
2012
Clustering Methods and Algorithms in Data Mining :review
Asian Journal of information Technology Vl.No. 11, Issue 1
2012
Importance of Association Rules in Data Mining : A Review
International journal of Soft Computing Vl.No. 7,Issue 3
2012
A new methodology to overcome high dimensionality problem in data mining
International Journal of Data Warehousing and Mining Vl.No. 0
2012
An Inverse Modified Fisher Criterion to solve under-sampled problem in Data Mining
IEEE Transactions on Knowledge and Data Engineering (TKDE) Vl.No. 0
2012
Privacy in Cloud Computing: A Survey
Proceedings of the International Conference of Advanced Computer Science & Information (ACSIT- 2012) Vl.No. 0
2012
Positional - LCS: A Position based algorithm to find Longest Common Subsequence (LCS) in Sequence Database (SDB)
IEEE International Conference on Computational Intelligence and Computing Research Vl.No. 0
2012
HeurisFCP-A Heuristic Approach to Identify Frequent Contiguous Patterns (FCP) in Sequence Database
Proceedings of the International Conference on Radar, Communication and Computing (ICRCC 2012) Vl.No. 0
2012
Dr.D.P.JEYAPALAN
Agent based Parallelized Intrusion Detection System using Ant Colony Optimization
International Journal of Computer Applications(0975-8887) Vl.No. Vol-105-No_10
2014
A Co-operative Game Theoretic Approach to Improve the Intrusion Detection System in a Network using Ant Colony Clustering
International Journal of Computer Applications(0975-8887) Vl.No. Vol-87, No-14
2014
High Performance Network Intrusion Detection Model Using Graph Databases
International Journal of Computational Intelligence and Information Security Vl.No. Vol 5, No. 9
2014
Performance Analysis of Intrusion Detection System on WSN Based on Euler Graph
International Journal of Advanced Research in Computer Science & Technology Vl.No. Vol 2, Issue 3
2014
A Novel Graph Based Clustering Approach for Network Intrusion Detection
International Journal of Computational Intelligence and Information Security Vl.No. Vol-4, No-4
2013
Dr.S.ALBERT RABARA
Integrated Architecture to Enhance the Security in IoT Cloud Using ECC DNA
Proceedings Intelligent Computing Systems Vl.No. 0
2021
An Integrated Secure Cloud Storage Architecture for Ensuring Integrity of Data using Hybrid Encryption Schemes in Cloud IoT Environment
Journal of Shanghai Jiaotong University Vl.No. 16
2020
Secured Architecture for Internet of Things (IoT) Based Smart Healthcare
Fifth International Conference on Inventive Computation Technologies (ICICT-2020), IEEE Explore Vl.No. 0
2020
ENHANCED TPA BASED DATA INTEGRITY MECHANISM FOR OBJECT STORAGE ARCHITECTURE ON INTEGRATEDIOT CLOUDSMART ENVIRONMENT
Journal of Shanghai Jiaotong University Vl.No. 16
2020
End-to-End Secured Architecture for Internet of Things Information Kendra (IoT_IK) Integrating IoT-Enabled Smart Services and Applications
International Conference on Mobile Computing and Sustainable Informatics (ICMCSI) Vl.No. 0
2020
TECHNIQUES AND NUANCES OF TEACHING TAMIL LANGUAGE USING INFORMATION COMMUNICAITON TECHNOLOGY (ICT) IN HIGHER LEARNING INSTITUTION
INTERNATIONAL CONFERENCE ON TECHNIQUES AND NUNACES TEACHING TAMIL LANGUAGE IN HIGHER EDUCATION Vl.No. 0
2020
Shield Advanced Mitigation System of Distributed Denial of Service Attack in integration of Internet of Things and Cloud Computing Environment
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 9
2019
Taxonomy of Distributed Denial of Service Attacks and Popular Defense Mechanism using Integration of IoT and Cloud Environment
International Journal of Innovative Research in Science, Engineering and Technology Vl.No. 8
2019
Mitigation Of Distributed Denial Of Service Attack Using Dynamic Captcha With Equal Probability Algorithm In Integration Of Internet Of Things And Cloud Environment
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vl.No. 8
2019
An Effective Distributed Denial Of Service Attack Detection Model In Integration Of Internet Of Things And Cloud Computing Using Binary Fire Fly Optimization Algorithm
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vl.No. 8
2019
An Integrated Architecture For Iot Based Data Storage In Secure Smart Monitoring Environment
International Journal of Scientific & Technology Research Vl.No. 8
2019
ENHANCED CLOUD IDENTITY MANAGEMENT ENABLING SECURE ACCESS IN CROSS CLOUD ENVIRONMENT
ADALYA JOURNAL Vl.No. 8
2019
Integrated Device Cloud Architecture for a Secure Cloud of Things Environment
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8
2019
Secure Data Transaction using ECC in Corporate Environment
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8
2019
Secure Smart Card Based Parking System (SSCPS) for IOT-Smart Cities
IEEE Conference Proceedings Vl.No. 0
2018
An Integrated IPv6 Architecture for smart environment using IoT and Cloud Computing
Journal of Emerging Technologies and Innovative Research Vl.No. 5
2018
Elliptic Curve Cryptography based Security Framework for Internet of Things (IoT) Enabled Smart Card
IEEE INTERNATIONAL CONFERENCE WCCCT-2017 Vl.No. -
2017
A Secure Architecture for Mobile Web Service (SAMWS)
IEEE INTERNATIONAL CONFERENCE WCCCT-2017 Vl.No. -
2017
Enhanced Security Architecture for IPv6 Transition
IEEE INTERNATIONAL CONFERENCE WCCCT-2017 Vl.No. -
2017
Algorithmic Approach to security Architecture for Integrated IoT Smart Services Environment
IEEE INTERNATIONAL CONFERENCE WCCCT-2017 Vl.No. -
2017
An Integrated Inter-Mobility IPv4/IPv6 Address Translation Architecture for Corporate Networks
IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO 2015) in association with National University of Kaohsiung-Taiwan, Oakland University-USA, IEEE Computational Intel Vl.No. 10
2015
An Integrated Seamless Mobility and IPv4/IPv6 Address Translation Architecture between IPv4 and IPv6 Networks
Journal of Recent Research in Engineering and Technology (JRRET) Vl.No. Vol.2, Issue. 4
2015
An Integrated Security Architecture for Next Generation Networks
International Journal of Computer Applications (IJCA) Vl.No. Vol.1
2015
Design and Development of Integrated, Secured and Intelligent Architecture for Internet of Things and Cloud Computing
IEEE IEEE Xplore Digital Library Pages: 2015 Vl.No. DoI: 10.1109/FiCloud.2015.23
2015
An Architecture For Secure Mobile Database Transaction For Corporate Environment
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
Elliptic Curve Cryptography based Security Framework for Internet of Things and Cloud Computing
International Journal of Computer Science and Technology (IJCST) Vl.No. Vol. 6, Issue 3
2015
Quality of Service Architecture for Internet of Things and Cloud Computing
International Journal of Computer Applications (IJCA) Vl.No. Vol.128,Issue.7
2015
An Integrated Secure Inter-Mobility IPv4/IPv6 Address Translation Architecture for Corporate Networks
International Journal of Future Computer and Communication (IJFCC) Vl.No. Vol. 4, Issue: 5
2015
An Integrated Secure Architecture for IPv4/IPv6 Address Translation Between IPv4 and IPv6 Networks
Advances in Intelligent Systems and Computing, Springer Vl.No. Vol. 380
2015
Internet of Things (IoT) Architecture for Smart Services
International Journal of Applied Engineering Research (IJAER) Vl.No. Vol.10
2015
Internet of Things (IoT) based Smart Environment Integrating various Business Applications
International Journal of Computer Applications (IJCA) Vl.No. Vol.128
2015
An Integrated IP-MPLS Architecture for Next Generation Networks
International Journal of Computer Applications(0975-8887) Vl.No. Vol.104, No.3
2014
A Framework for Secure Mobile Database Transactions using Cryptographic Co-processor
International Journal of Computer Applications (0975-8887) Vl.No. Vol.105
2014
An Integrated IP-MPLS Mobility Framework For Next Generation Networks
International Journal of Computer Science and Technology Vl.No. Vol.5, No.4
2014
An Integrated and Intelligent Secure Architecture for Mobile Web Services
International Journal of Computer Science and Technology Vl.No. Vol.5, No.3, July-Sept
2014
Multi Level Secure Architecture for Mobile Web Services using Intelligent Mobile Agents and Intelligent Content Filter
ACM International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), Kaohsiung City, Taiwan Vl.No. 0
2014
An Integrated Next Generation IP-MPLS Hybrid Architecture for Seamless Mobility
Recent Advances in Electrical Engineering, WSEAS, Lisbon, Portugal Vl.No. 0
2014
An Intelligent Content Filter based framework for Mobile Web Services
Recent Advances in Electrical Engineering Series, WSEAS, Lisbon, Portugal Vl.No. 0
2014
Financial Transactions Over Wired and Wireless Networks: Technical Perspective
Lecture Notes in Mechanical Engineering, Springer Vl.No. -
2012
Performance Analysis of Addressing, Interoperability and Inter-Mobility Management Architecture Between IPv4 and IPv6 Networks (AIMM-I46)
Springer Series: Advances in Computer Science, Engineering & Applications AISC Vl.No. Vol.167/2012
2012
Architecture for Integrated and Intelligent Security for Mobile Web Services
Conference on Intelligent Infrastructure Vl.No. 1
2012
A Security Architecture for Cloud Data Using Hybrid Security Scheme
IEEE Xplore & Proceedings 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) Vl.No. 0
202
Novel Hybrid Technique Enhancing Data Privacy and Security
Springer IFIP and Proceedings 6th International Conference on Computer, Communication, and Signal Processing Vl.No. 651
202
Reducing Delay during Handoff in Multi-Layered Security Architecture for Wireless LANs in the Corporate Network
Proceedings of the IEEE Internat. Conference on Wireless Communica-tion - Networking and Mobile Computing, Wuhan, China Vl.No. 2: 1038 - 1043
0
Modeling and Performance study of MPLS VPN
Proceedings of the Internat. Conference on communications in Computing, Las Vega, Nevada, USA Vl.No. pp. 91-96
0
Multi-Layer Security architecture for Wireless LANs in the Corporate Network
Proceedings of World Wireless Congress, Palo Alto, USA Vl.No. pp. 202-08
0
Multi-Layer Security architecture for Wireless LANs in the Corporate Environment
International Journal of Network Security, IJNS-2006-01-25-2. Vl.No. -
0
SIM-Based Authentication for the integrated GPRS.
WLAN Networks (USA)-World Wireless Congress Vl.No. -
0
A Model for Transaction Management with Concurrency Control for Multi-Level Secure Distributed Real-time Database systems.
Proceedings of the WSEAS International Conference on Applied Computer Science, Italy. Vl.No. 2: 127-133
0
Public Key Infrastructure for Mobile Banking Security.
Proceedings of the World Wireless Congress, WWC`2008, San Francisco Bay Area. Vl.No. ISSN 1558-7835, pp.70-75
0
SIM-Based Authentication for the Integrated GPRS-WLAN Networks.
Affordable Computing Tata McGraw-Hill Publishing Co. Ltd., New Delhi. Vl.No. ISBN-0-07-062171-3,pp. 41-45
0
Improving Route Optimiza-tion in Mobile IP
Proc. of International Conference of Emerging Applications of Infor-mation Technology, Kolkatta Vl.No. pp. 235-38
0
Multi-Level Secure Concurrency Control Model for Financial Applications
Affordable Computing Tata McGraw-Hill Publishing Co. Ltd., New Delhi. Vl.No. ISBN-0-07-062171-3,pp. 95-99
0
Security Framework Architecture for Mobile Banking, In: Mobile Ubiquitous and Pervasive Computing
Macmillan India Punlications Ltd., New Delhi. Vl.No. ISBN 10:0230-63011-1, 2: 114-120
0
Evolving a Model of Transaction Management with Concurrency Control for Multilevel Secure Distributed Real-time Database Systems.
Proceedings of the 7th WSEAS International Conference on Applied Computer Science –Computer Science Challenges Vl.No. ISBN: 978-960-6766-15-2,pp.127-133
0
Secured User Interface Algorithm for Mobile Banking Framework - In: Affordable Computing
Affordable Computing Tata McGraw-Hill Publishing Co. Ltd., New Delhi. Vl.No. ISBN-0-07-062171-3,pp. 87-90
0
Dr.S.BRITTO RAMESH KUMAR
Transmission Deviation?based Windowed Training for Intrusion Detection on Streaming Data
International Journal of Computer Trends and Technology Vl.No. 72
2024
Intrusion Detection System Using Ensemble LearningApproaches
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 12
2023
A Feature Selection Method using FSPSO
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 12
2023
SC-CVAR: Intrusion Detection Using Feature Selection and Machine Learning Techniques on UNSW-NB15 Dataset.
IJCSNS International Journal of Computer Science and Network Vl.No. 22
2022
An Efficient Britwari Technique to Enhance Canny Edge Detection Algorithm using Deep Learning
ICTACT Journal of Soft Computing Vl.No. 12
2022
Domain Specific ANN Heuristic Edge Detection Algorithm for CNN based MRI Classification [DAHEDA}
JOURNAL OF ALGEBRAIC STATISTIC Vl.No. 13
2022
A COMPARATIVE STUDY ON VARIOUS EDGE DETECTION METHODS USING DEEP LEARNING
Journal of Fundamental & Comparative Research Vl.No. VIII
2022
A Comparative Study and Survey on Different Types of Methods in Edge Detection Algorithms
International Advanced Research Journal in Science, Engineering and Technology Vl.No. 9
2022
Intrusion detection on Cloud Computing
International journal of Advanced Research in Computer and communication Engineering Vl.No. 11
2022
Sine Cosine Optimization Algorithm for Feature Selection
Journal of Fundamental & Comparative Research Vl.No. VIII
2022
Machine Learning Algorithm using AR for Intrusion detection system
IARJSET Vl.No. 9
2022
An Effective Way of Cloud Intrusion Detection System Using Decision tree
NeuroQuantology Vl.No. 20
2022
Intrusion Detection using Attribute Subset Selector Bagging (ASUB) to Handle Imbalance and Noise
IJCSNS International Journal of Computer Science and Network Security Vl.No. 22
2022
Sampling Integrated Boosting Classifier for Network Intrusion Detection
International Research Journal of Education and Technology Vl.No. 4 Issue: 12 | Dec-2022
2022
Semi-Supervised Intrusion Detection Based on Stacking and Feature-Engineering to Handle Data Imbalance
INDIAN JOURNAL OF SCIENCE AND TECHNOLOGY Vl.No. 15(46)
2022
PREDICTION OF RHABDOMYOSARCOMAUSING TRANSFER LEARNING ON PATHOLOGY AND RADIOLOGY IMAGES
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 11(8)
2022
Optimized Encryption Based Elliptical Curve Diffie- Hellman Approach for secure heart disease prediction
International Journal Advanced Technology and Engineering Exploration (IJATEE) Vl.No. 8
2021
An Enhancing Canny Edge Detection using SUSAN Filter based on Deep Learning Algorithm for improved image Edge Detection
Webology Vl.No. 6
2021
Intrusion Detection on the UNSW-NB15 dataset using Feature Selection and Machine Learning Techniques
Webology Vl.No. 18
2021
Biometric Security for Cloud Data Using Fingerprint
Science, Technology And Development Journal Vl.No. IX
2020
Text-based Encryption (TBEnc) Technique to Secure Data in Cloud Storage Server
Journal of Shanghai Jiaotong University Vl.No. 16, Issue 10
2020
Survey: Web Security Services in Cloud Computing
International Journal for Scientific Research & Development Vl.No. 8, Issue 8
2020
Security Framework for Context Aware Mobile Web Services
Springer Lecture Notes on Data Engineering and Communication Technologies Vl.No. 26
2019
DORBRI: An Architecture for the DoD Security Breaches Through Quantum IoT
Springer Lecture Notes on Data Engineering and Communication Technologies Vl.No. 26
2019
A Security Architecture for a Smart Home Ecosystem using Permissioned Blockchain
International Journal of Research and Analytical Reviews (IJRAR) Vl.No. 6(1)
2019
Security Threats in Cloud Computing
Asian Journal of Computer Science and Technology Vl.No. 8
2019
Dom_classi: An enhanced weighting mechanism for Domain Specific Words
International Journal of Applied Engineering Research Vl.No. 14(1)
2019
An Architecture to Enable Secure Firmware Updates on a Distributed-Trust IoT Network Using Blockchain
Springer Lecture Notes on Data Engineering and Communications Technologies Vl.No. 1
2019
A Security Framework for A Sustainable Smart Ecosystem using Permissioned Blockchain: Performance Evaluation
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 8(10)
2019
Performance Analysis Of Proposed D1FTBC Approach For Improving Consistency In Cloud Data Transactions
International Journal Of Scientific & Technology Research Vl.No. 8(08)
2019
Performance of Proposed Architecture for Data Transactions in Cloud using D1FTBC
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8(02)
2019
Predicting Student Dropouts for Better Decision Making Using Sentiment Analysis
International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) Vl.No. 8(04)
2019
NIC_LBA: Negations and Intensifier Classification of microblog data using Lexicon Based Approach
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 6(06)
2019
SECON: Secured Confidentiality Framework To Protect Data Stored In Public Cloud Systems
International Journal Of Information And Computing Science Vl.No. 6(05)
2019
Hybrid Text and Value Based Ncryption and Obfuscation (Tvbencobfus) To Safeguard Data in Cloud Storage Server
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 8(10)
2019
An Approach For IoT Security Using Quantum Key Distribution
International Journal Of Scientific & Technology Research Vl.No. 8(08)
2019
A Survey on Web Service Prediction Techniques
INTERNATIONAL JOURNAL OF RESEARCH AND ANALYTICAL REVIEWS (IJRAR) Vl.No. 6(02)
2019
Enhancing Channel Security By Error Detection And Correction During Quantum Key Distribution Using Hamming Code With Modified Elgamal
International Journal Of Scientific & Technology Research Vl.No. 8(12)
2019
An Enhanced Multi-Layered Secured Architecture for Context-Aware Web Services
World Wide Journal of Multidisciplinary Research and Development Vl.No. 4(2)
2018
Cloud Computing Data Security using Hybrid
National Conference on INNOVATIONS IN COMPUTER TECHNOLOGY AND ITS APPLICATIONS Vl.No. 1
2018
Security Architecture of Cloud Computing
International Journal of Electrical Electronics & Computer Science Engineering Vl.No. 1
2018
Cloud Network Security using Biometrics
Journal of Innovative Research and Solutions (JIRAS) Vl.No. 4(1)
2018
An Architecture for Improving the QoS in Composite Web Service Selection
International Journal of Scientific Research in Computer Science, Applications and Management Studies (IJSRCSAMS) Vl.No. 7(4)
2018
Survey on QoS Metrics in Web Services
International Journal of Science and Advance Research in Technology(IJSART) Vl.No. 4(9)
2018
Comparative Study of Conflict Identification and Resolution in Heterogeneous Datasets
Springer Lecture Notes on Data Engineering and Communication Technologies Vl.No. 26
2018
A Study on various tools to overcome Security Issues in Big Data
International Journal of Scientific Research in Computer Science, Applications and Management Studies (IJSRCSAMS) Vl.No. 7(4)
2018
Dictionary based Approach for improving the Accuracy of opinion mining on Big data
International Journal Of Research and Analytical Reviews Vl.No. 5(4)
2018
Opinion Mining using Hybrid Approach on Big Data : A Perspective
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 7(5)
2018
A Methodological Framework for Opinion Mining
International Journal of Computer Sciences and Engineering Vl.No. 5(8)
2018
Cloud Network Security using Biometrics
National Conference Vl.No. 0
2018
Cloud Computeing Data Security using Hybrid
National Conference on Innovations in Computer Technology and its Applications Vl.No. 0
2018
Security Architecture of Cloud Computing
International Conferece Vl.No. 0
2018
An Enhanced Multi-Layered Secured Architecture for Context-Aware Web Services
World Wide Jouranl of Multidisciplinary Research and Development Vl.No. 04-02
2018
Online Social Networking Services Impact on Big Data
International Journal of Computer Science Vl.No. 5(17)
2017
Security BM Techniques using in Digital Image Processing
International Journal of Computer Science Vl.No. 5(18)
2017
Ant Colony Model (AnCoMoDaS) for Data Security in Cloud
International Research Journal of Engineering and Technology (IRJET) Vl.No. 4(5)
2017
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA) for Cloud Data Encoding, Encrypting and Forwarding
International e-Journal for Technology and Research Vl.No. 1(6)
2017
Data Division in Cloud for secured Data Storage using RSA Algorithm
International Research Journal of Engineering and Technology (IRJET) Vl.No. 4(6)
2017
An Efficient Depth Fixed Tree Consistency (DIFTC) Method for Distributed Data Transactions in Cloud Environment
International Journal of Advanced Research in Computer science Vl.No. 8(7)
2017
Dynamic and Scalable Architecture for Accessing the Cloud Databases and Securing Cloud Services Using Public Key Infrastructure
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2(6)
2017
Proposed Architecture for Improving Security and Consistency of Data Transactions in Cloud Database using Tree-Based Consistency Approach
International Journal of Computer Science and Information Security (IJCSIS) Vl.No. 15(12)
2017
Issues and Challenges in Big Data Security
International Conference on Newer Engineering Concepts and Technology Vl.No. 1
2017
A Survey on Big Data Security
National Conference on Big Data Analytics and Mobile Technologies (NCBM 2017) Vl.No. 1
2017
Issues and Challenges In Big Data Security
International Conferece on Newer Engeneering concepts and Technology Vl.No. 0
2017
A Survey on Big Data Security
National Conference on Big Data Analytics and Mobile Technologies Vl.No. 0
2017
Ant Colony Model (AnCoMoDaS) for Data Security in Cloud
International Research Journal of Engineering and Technology (IRJET) Vl.No. 04(05)
2017
Security BM Technique using in Digital Image Processing
International Journal of Computer Science (IJCS) Vl.No. 5(1), 18
2017
Online Social Networking Services Impact on Big Data
International Journal of Computer Science (IJCS) Vl.No. 5(1), 18
2017
An Innovative Security Architecture and Algorithm for Social Network Services
ARPN Journal of Engineering and Applied Sciences Vl.No. 11(2)
2016
Internet of Things: Data Management and Security
International Journal of Computer Technology and Applications(IJCTA) Vl.No. 9(26)
2016
Security Issues in Web Services
International Research Journal of Engineering and Technology (IRJET) Vl.No. 3(5)
2016
Security Issues in Context-Aware System
International Research Journal of Engineering and Technology (IRJET) Vl.No. 3(5)
2016
Visualizing Big Datamining: Issues, Challenges and Opportunities
International Journal of Computer Technology and Applications(IJCTA) Vl.No. 9(27)
2016
An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services
International Journal of Computer Applications (IJCA) Vl.No. 146(15)
2016
SECURITY ISSUES ON COMPOSITE WEB SERVICES
International Research Journal of Engineering and Technology (IRJET) Vl.No. 3(6)
2016
Survey on Privacy Preservation in context aware web services
Indian Journal of Computer Science and Engineering Vl.No. 6(6)
2016
IoT based Home Security through Digital Image Processing Algorithms
2nd World Congress on Computing and Communication Technologies (WCCCT `16) Vl.No. 1
2016
PLIS: Proposed Language Independent Stemmer for Information Retrieval Systems Using Dynamic Programming
2nd World Congress on Computing and Communication Technologies (WCCCT `16) Vl.No. 5
2016
An Approach For Analyzing The Factors Recorded In The Tree Rings Using Image Processing Techniques
2nd World Congress on Computing and Communication Technologies (WCCCT `16) Vl.No. 1
2016
An Approach For Analyzing The Factors Recorded In The Tree Rings Using Image Processing Techniques
World Congress on Computing and Communication Technologies (WCCCT) Vl.No. 0
2016
PLIS: Proposed Language Independent Stemmer for Information Retrieval Systems Using Dynamic Programming
World Congress on Computing and Communication Technologies (WCCCT) Vl.No. 0
2016
An Enhanced Architecture For Feature Based Opinion Mining From Product Reviews
World Congress on Computing and Communication Technologies (WCCCT) Vl.No. 0
2016
IoT based Home Security through Digital Image Processing Algorithms
World Congress on Computing and Communication Technologies (WCCCT) Vl.No. 0
2016
Visualizing Big Data Mining: Issues, Challenges and Opportunities
International Journal of Control Theory and Applications (IJCTA) Vl.No. 9(10)
2016
Internet of Things: Data Management and Security
International Journal of Control Theory and Applications (IJCTA) Vl.No. 9(10)
2016
An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services
International Journal of Computer Applications (IJCA) Vl.No. 146(15)
2016
Security Issues On Composite Web Services
International Research Journal of Engineering and Technology (IRJET) Vl.No. 03(06)
2016
Security Issues in Web Services
International Research Journal of Engineering and Technology (IRJET) Vl.No. 03(05)
2016
Security Issues in Context- Aware System
International Research Journal of Engineering and Technology (IRJET) Vl.No. 03(05)
2016
A Security Framework for Social Network Services
International Journal of Applied Engineering Research Vl.No. 10
2015
Enhanced Elliptic Curve Cryptography
Indian Journal of Science and Technology Vl.No. 8
2015
An Implementation of Three Layered Net-Chk Two Factors Online Social Network Model for Privacy
International Conference on Electrical, Computer and Communication Technologies Vl.No. 2
2015
Learning Behavior Analysis Using Data Mining Techniques
International Journal of Applied Engineering Research Vl.No. 10
2015
A Framework for Language Independent Stemmer Using Dynamic Programming
International Journal of Applied Engineering Research Vl.No. 10
2015
Conflict Resolution and Duplicate Elimination in Heterogeneous Datasets using Unified Data Retrieval Techniques
Indian Journal of Science and Technology Vl.No. 8
2015
Feedback Based Conflict Identification and Resolution using Duplicate Elimination and Ranking Techniques
International Journal Of Computers & Technology Vl.No. 14(9)
2015
Proposed Hough Technique For Estimating Climatic Conditions Recorded In The Cross Section Of Tree Images
IOSR Journal Of Computer Engineering (IOSR-JCE) Vl.No. 17
2015
Semi-Automatic Techniquesfor Estimating Climatic Conditions Recorded In The Tree Rings
International Journal Of Computer Trends And Technology (IJCTT) Vl.No. 29
2015
Issues and Challenges of Data Transaction Management in Cloud Environment
International Research Journal of Engineering and Technology Vl.No. 2
2015
Cloud Computing Data Security Issues, Challenges, Architecture and Methods- A Survey
International Research Journal of Engineering and Technology Vl.No. 2
2015
Proposed Architecture for secure Distributed Data Transaction Management in Cloud Environment
International Journal of Applied Engineering Research Vl.No. 10
2015
Enhanced Elliptical Curve Cryptography Based PKI for Secure Data Storage in a Cloud
International Journal of Applied Engineering Research Vl.No. 10
2015
Security issues in Internet of Things using Next Generation Mobile Networks
International Journal of Applied Engineering Research Vl.No. 10
2015
A Multi-Layered Secured Framework for Context-Aware Web services in Health care Industries
International Journal of Applied Engineering Research Vl.No. 10
2015
Survey Paper On Mobile Social Networks
International Research Journal of Engineering and Technology Vl.No. 2(6)
2015
Security on Mobile Social Networks
International Journal of Advance Research in Computer Science and Management Studies Vl.No. 3(9)
2015
Context-Aware In PrivacyPreservation For Health Care Systems
International Journal of Advanced Computer Technology Vl.No. 4
2015
Conflict Identification and Resolution in Heterogeneous Datasets: A Comprehensive Survey
International Journal of Computer Applications Vl.No. 14(9)
2015
Security & Privacy issues in Social Network Services An Overview
International Journal of Innovative Research in Electrical, Electronics Instrumentation and Control Engineering(IJIREEICE) Vl.No. 2(1)
2014
Social Network Services An Overview
International Journal of Innovative Research in Electrical, Electronics Instrumentation and Control Engineering(IJARCCE) Vl.No. 3(1)
2014
Two Factor Framework for Web Based Social Network using PKI
International Journal on Advanced Computer Theory and Engineering(ACTE) Vl.No. 3(1)
2014
Systematic Optimization and Refinement of Stemmer Rule Set Using NLTK
International Conference on Contemporary Trends in Computer Science(CTCS) Vl.No. 1
2014
Rule Based Machine Translation System from English to Tamil
World Congress on Computing And Communication Technologies(WCCCT `14) Vl.No. 1
2014
Security analysis of future enterprise business intelligence
World Congress on Computing And Communication Technologies(WCCCT `14) Vl.No. 1
2014
Inconsistency Resolution and Joint Information Extraction from Multiple Data Sources
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 3(7)
2014
Resolving Data Inconsistency in Data Integration
International Conference on Contemporary Computing and Informatics (IC3I) Vl.No. 1
2014
Hybrid Algorithm for Web based Social Network
National Conference on Information Technology Sustain Future (NCITSF) Vl.No. 1
2014
Security Challenges for Online Social Network using Multiparty Access Control
International Journal of Computer Science Management Research(NCITCS) Vl.No. 1
2014
An Architecture for Securing Heterogeneous Web Services
International Journal of Advanced Research in Computer Science & Technology (IJARCST ) Vl.No. 2(3)
2014
Context-Aware Architecture for User Access Control
International Journal of Advanced Research in Computer Science & Technology (IJARCST ) Vl.No. 2(3)
2014
A Review on Privacy Control Techniques in Context-aware Web Services
International Journal of Advanced Research in Computer Science & Technology (IJARCST ) Vl.No. 2(3)
2014
DESIGN OF A SECURE ARCHITECTURE FOR CONTEXT AWARE WEB SERVICES USING ACCESS CONTROL MECHANISM
International Conference on Contemporary Computing and Informatics (IC3I) (IEEE) Vl.No. 1
2014
An Improved Rule based Iterative Affix Stripping Stemmer for Tamil Language using K-Mean Clustering
International Journal of Computer Applications (IJCA) Vl.No. 94(13)
2014
A Novel Approach for Phonetic Based Stem Generation Using Edit Distance and Longest Common Subsequence
International Journal of Engineering Research and technology (IJERT) Vl.No. 1
2014
A Comprehensive Analyze of Stemming Algorithms for Indian and Non-Indian Languages
International Journal of Computer Engineering & Applications (IJCEA) Vl.No. 7(3)
2014
Multilingual Phonetic Based Stem Generation
Second International Conference on Emerging Research in Computing, Information Communication and Applications (ERCICA-2014) Vl.No. 1
2014
A Study Of Image Processing In Analysing Tree Ring Structure
International Journal Of Research In Humanities, Arts And Literature Vl.No. 90(19)
2014
An Approach For Dendroclimatology Using Image Processing Techniques
Proceedings of the IEEE World Congress on Computing and Communication Technologies (WCCCT?14 Vl.No. 0
2014
A Framework for Privacy Handler Mechanism in Context-aware Web Services
International Journal of Advanced Research in Computer Science & Technology (IJARCST) Vl.No. 2
2014
SMIWBSN: Security Mechanism in Web Based Social Network
International Journal of Emerging Trends in Computing and Communication Technology(IJETCCT) Vl.No. 1
2014
Comparison Of Various Edge Detection Techniques In Tree Ring Structure
International Journal of Computer Applications Vl.No. 90?19
2014
Extending Social Privacy Protector for Twitter Social Network
CIIT International Journal of Networking and Communication Engineering Vl.No. 1(1)
2013
A Context Aware System Based on Service Oriented Architecture
International Conference on Recent Trends In Computer Applications(ICRTICA) Vl.No. 1
2013
Net Chk A security Framework for Social Network Applications
Internation Journal of Advance Research in Computer and communication Engineering(IJARCCE) Vl.No. 2(12)
2013
A Comparative Study on Variants of Classical Porter Stemmer Algorithm
International Journal of Scientific Transactions in Environment and Techrovention(IJSTET) Vl.No. 6(4)
2013
Categorization of Metabolic Syndrome X Among Adults Using Learning Techniques
CiiT - International Journal of Data Mining and Knowledge Engineering Vl.No. 5(05)
2013
Extending Social Privacy Protector for Twitter Social Network
International Journal of Networking and Communication Engineering Vl.No. 5(01)
2013
Architecture for Integrated and Intelligent Security for Mobile Web Services
International Conference on Intelligent Infrastructure Vl.No. 1
2012
A Comprehensive Study on Stemming Algorithms
International Conference on Semantic E-Business and Enterprise Computing(SEEC) Vl.No. 1
2012
An End-to-End Secure Mobile Payment System using Public Key Infrastructure
Journal of Algorithms and Computational Technology (JACT) Vl.No. 6
2012
Dr. A. ALOYSIUS
Data Reduction Based Truth Discovery Analysis by Resolving the Conflicts in Big Data Using Continuous Data
Internatonal Journal for Innovative Engineering and Management Research Vl.No. 12
2023
SENTIMENT ANALYSIS IN MELANOMA CANCER DETECTION USING ENSEMBLE LEARNING MODEL
ICTACT JOURNAL ON SOFT COMPUTING Vl.No. VOLUME: 13
2023
Task Scheduling with Altered Grey Wolf Optimization (AGWO) in Mobile Cloud Computing using Cloudlet
Journal of Communications Software and Systems Vl.No. 19
2023
Mobility and Execution Time Aware Task Offloading in Mobile Cloud Computing
The International Journal of Interactive Mobile Technologies (iJIM) Vl.No. 16
2022
Sentiment Analysis Using Voting Base Unsupervisied Ensemble Machine Learning in Cancer Detection
ICTACT Journal on Image and Video Processing Vl.No. 13
2022
Textual Sentiment Analysis using Lexicon Based Approaches
Annals of the Romanian Society for Cell Biology Vl.No. 25
2021
Hybrid Approaches Based Emotion Detection in Memes Sentiment Analysis
International Journal of Engineering Research and Technology Vl.No. 14
2021
Multi-Modal Sentiment Analysis To Improve The Techniques In Lexicon Based Approach And Machine Learning Approach
Webology Vl.No. 18
2021
Empirical Study on Distance Based Data Reduction for Truth Discovery using Conflicted Data
Mukt Shabd Journal Vl.No. 9
2020
HADOOP BASED PARADIGM USING HYBRID FEATURE SELECTION APPROACH TO ENHANCE PERFORMANCE IN SUPERVISED LEARNING CLASSIFICATION
International Journal of Advanced Science and Technology Vl.No. 20
2020
Mobility Aware Offloading and Scheduling of Tasks using Cloudlet in Mobile Cloud Computing: A Survey
International Journal of Advanced Science and Technology Vl.No. 20
2020
Applications, Approaches, and Challenges in Sentiment Analysis (AACSA)
International Research Journal of Modernization in Engineering Technology and Science Vl.No. 2
2020
Emotion Detection for Memes Sentiment Analysis Using Hybrid Approaches (EMSA-HAP
Alochana Chakra Journal Vl.No. 9
2020
A Survey on Fake Data Identification in Big Data using Artificial Intelligence Techniques
International Journal of Multidisciplinary Educational Research Vl.No. 9
2020
Distance Based Measurement Approach for Truth Discovery by Resolving the Conflicts in Big Data
Journal of Physics: Conference Series Vl.No. 0
2019
DATA PREPROCESSING IN SENTIMENT ANALYSIS USING TWITTER DATA
INTERNATIONAL EDUCATIONAL APPLIED RESEARCH JOURNAL (IEARJ) Vl.No. 3
2019
A Comparative study of Lexicon based and Machine learning based classifications in Sentiment analysis
International Journal of Data Mining Techniques and Applications INT Vl.No. 8
2019
A SURVEY ON MOBILE COMPUTING SECURITY
International Journal of Research and Analytical Reviews (IJRAR) Vl.No. 6
2019
Analysis of Various Machine Learning Algorithms to Predict the Type II Diabetes Disease
International Journal of Computing Algorithm Vl.No. 8
2019
An Enhanced Preprocessing Algorithms And Accuracy Prediction Of Machine Learning Algortihms
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vl.No. 8
2019
A NOVEL HADOOP MAP REDUCE PARADIGM USING AN EFFECTIVE EPCA APPROACH
Journal of Analysis and Computation (JAC) Vl.No. 8
2019
DATA SECURITY ON HADOOP DISTRIBUTED FILE SYSTEM USING RSA ENCRYPTION
"International Journal of Research and Analytical Reviews (IJRAR) " Vl.No. 6
2019
Architecture Design for Hadoop No-SQL and Hive
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 3
2018
Maintenance Effort Prediction Model using Aspect-Oriented Cognitive Complexity Metrics
International Journal of Advanced Research in Computer Science (IJARCS) Vl.No. 8
2018
Aspect Oriented Programming Cognitive Complexity Metric Analysis Tool
International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT) Vl.No. 3
2018
Empirical Validation Of Object Oriented Cognitive Complexity Metrics Using Maintenance Effort Prediction
nternational Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 7
2018
Quality Enhancement by Resolving Conflict using Optimization in Big data
International Journal of Computer Sciences and Engineering Vl.No. 6
2018
Big Data: Challenges and Opportunities
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 03
2018
An Approach for Truth Discovery by Resolving the Conflicts on Categorical Data
Journal of Physics: Conference Series Vl.No. 0
2018
Concept of MapReduce Scheduling and Processing Techniques
JETIR Vl.No. 05
2018
ISSUES & CHALLENGES FOR HDFS & MAPREDUCE
IJRAR Vl.No. 05
2018
An Architecture Design and concept of Security in Hadoop Environment
IJRAR Vl.No. 05
2018
An Enchanced Data Cleaning Algorithm for Twitter Data
International Journal of Research in Computer Science Application and Managemetn Studies Vl.No. 7
2018
Sentiment Analysis using Mode Measure
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 6
2017
Statistical Analysis on Social media Usage in Students Education
SSICACR-2017 Vl.No. -
2017
A survey on Complexity Metrics in Object Oriented System
SSICACR-2017 Vl.No. 0
2017
Sentiment Analysis A Review
International Journal of Engineering Technology and Computer Research (IJETCR) Vl.No. 5
2017
An Analysis of Object Oriented Complexity Metrics
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2
2017
A Heuristics on Interface Complexity
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Vl.No. 6
2017
Lexicon based Acronyms and Emoticons Classification of Sentiment Analysis (SA) on Big Data
International Journal of Database Theory and Application Vl.No. 10
2017
Polarity Detection of Lexicon based Sentiment Analysis with Negation Handling
Journal of Advanced Research in Dynamical & Control Systems Vl.No. 13
2017
Pre-Processing Concepts and Techniques for Sentiment Analysis
International Journal of Scientific Research in Computer Science, Engineering and Information Technology (UGC) Vl.No. 2
2017
A SURVEY ON TRUTH DISCOVERY METHODS FOR BIG DATA
International Journal of Engineering Technology and Computer Research (IJETCR) Vl.No. 5
2017
PREDICTIVE ANALYTICS CONCEPTS IN BIG DATA- A SURVEY
International Journal of Advanced Research in Computer Science Vl.No. 8
2017
Social Network Prediction Measurement in Education
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2
2017
Cognitive Weighted Inherited Class Complexity Metric
Procedia Computer Science Vl.No. 125
2017
Survey of MapReduce on BigData
International Journal of Engineering and Computer Science Vl.No. 6
2017
Usage and impact of social media in students education
IJCRT Vl.No. 5
2017
Sentiment Analysis Using Measuring Modes
International Journal of Engineering and Computer Science Vl.No. 6
2017
Pre-Processing Concepts and Techniques for Sentiment Analysis
International Journal of Scientific Research in Computer Science, Engineering , and Information Technology Vl.No. 02
2017
Cognitive Weighted Polymorphism Factor: A New Cognitive Complexity Metric
International Journal of Computer and Information Engineering Vl.No. 2
2016
Concepts and Methods of Sentiment Analysis on Big Data
International Journal of Innovative Research in Science, Engineering and Technology Vl.No. 5
2016
Big Data Prediction Using Evolutionary Techniques: A Survey
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 3
2016
Models for Maintenance Effort Prediction with Object-Oriented Cognitive Complexity Metrics
World Congress on Computing and Communication Technologies Vl.No. -
2016
DESIGN AND ANALYSIS OF ASPECT ORIENTED METRIC CWCoAR USING COGNITIVE APPROACH
World Congress on Computing and Communication Technologies Vl.No. -
2016
A Metric for identifying incoming outgoing interactions Complexitya of a Component
Emerging Treands in software Denelopment Vl.No. -
2016
A Survey on Complexity Metric OOD
Advances in Computing resource Vl.No. -
2016
An Enhanced Sinkhole Attacker Node Identification Technique using Successful Link Ratio in IoT Environment
IT Skills Show & International Conference on Advancements in Computing Resources (SSICACR-2017) Vl.No. 5
2016
CONCEPTS AND METHODS OF SENTIMENT ANALYSIS ON BIG DATA
INTER NATIONAL JOURNAL INNOVATIVE RESEARCH IN SCIENCE ENGINEERING AND TECHNOLOGY Vl.No. 5
2016
A Survey on User Authentication Mechanism in Mobile Cloud Computing
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 1
2015
A Review on Component Based Software Metrics
International Journal of Fuzzy Mathematical Archive Vl.No. 7
2015
Cognitive Weighted Polymorphism Factor: A Comprehension Augmented Complexity Metric
International Journal of Computer, electrical, Automation, Control Vl.No. 9
2015
Aspect oriented Programming Metrics - A Survey
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 1, 3
2015
Analysis of Measuring the Complexity of Advice Using a Cognitive Approach
International Journal of Applied Engineering Research Vl.No. 10 , 82
2015
Cognitive Perspective Of Attribute Hiding Factor Complexity Metric
International Journal of Engineering And Computer Science Vl.No. 4
2015
Cognitive Weighted Method Hiding Factor Complexity Metric
International Journal of Computer Science and Software Engineering Vl.No. 4
2015
Validation of Cognitive Weighted Methods Hiding Factor Complexity Metric
International journal of Applied Engineering Research Vl.No. 10 no 82
2015
A Survey on User Authentication Mechanism in Mobile Cloud Computing
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 3
2015
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environment
International Journal of Computer and Communication System Engineering (IJCCSE) Vl.No. 2
2015
Cognitive Weighted Polymorphism Factor: A New Cognitive Complexity Metric
International Journal of Computer and Information Engineering Vl.No. 02
2015
cognitive Weighted Polymorphism Factor: A Comprehension Augmented Complexity Metric
International Journal of Computer and Information Engineering Vl.No. 9
2015
Analysis of Measuring the complexity of Advice using a Cognitive Approach
International Journal of Applied Engineering Research Vl.No. 10
2015
Aspect Oriented Programming Metrics - A Survey
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 01
2015
Cognitive Complexity Metrics Analysis Tool (CCMAT)
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 01
2014
Cognitive Complexity Metrics Analysis Tool (CCMAT)
International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT), Vl.No. 1
2014
Maintenance Effort Prediction Model Using Cognitive Complexity Metrics
International Journal of Advanced Research in Computer Science and Software Engineering Vl.No. Volume 3, Issue 11,
2013
An Investigation into the Relationship between Intelligence Quotient and Debugging Ability of Component Based System
International Journal of Software Engineering and Technology Vl.No. 4
2012
Coupling Complexity Metric: A Cognitive Approach
International Journal of Information Technology and Computer Science Vl.No. 4
2012
Cognitive Weighted Response For a Class: A New Metric for Measuring Cognitive Complexity of OO Systems
International Journal of Advanced Research in Computer Science Vl.No. volume 3 no 4
2012
A Survey on Metrics of Software Cognitive Complexity for OO Design,
on International Conference on Computational Intelligence and Cognitive Informatics Vl.No. 58
2011
Attribute Weighted Class Complexity: A New Metric For Measuring Cognitive Complexity Of OO Systems
International Conference on Computational Intelligence and Cognitive Informatics Vl.No. 58
2011
An Analysis of Dependency between Personality Traits and Debugging Ability in Component Based System
International Journal of Software Engineering and Technology Vl.No. 0
2011
Attribute Weighted Class Complexity : A New Metric For Measuring Cognitive Complexity Of Oo Systems
Proceedings of International Conference on Computational Intelligence and Cognitive Informatics, Vl.No. 0
2011
A Survey on Metrics of Software Cognitive Complexity for OO Design
Proceedings of International Conference on Computational Intelligence and Cognitive Informatics Vl.No. 0
2011
An Investigation into the Impact of OO Design on Program Debugging with Individual and Collaborative Approaches
International Journal of Software Engineering and Technology Vl.No. 0
2010
On Validating Class Level Cognitive Complexity Metrics
International Journal of Software Engineering and Technology Vl.No. 0
2010
A Study on Impact of Emotional Quotient on Program Comprehension
, Proceedings of International Conference on Communication and Computational Intelligence Vl.No. 0
2010
, A Survey on the Complexity Metrics for Component Based System
Proceeding of National Conference on Computer Science and Engineering (NCCSE-2010) Vl.No. 0
2010
An Investigation into the impact of OO Design on Program Comprehension with individual and Collaborative Approach
Proceeding of National Conference on Emerging Trends in Advance Computing, Vl.No. 0
2010
A Survey on the Complexity Metrics for Component Based System
Proceeding of National Conference on Computer Science and Engineering (NCCSE-2010) Vl.No. 0
2010
An Investigation into the impact of OO Design on Program Comprehension with individual and Collaborative Approach
Proceeding of National Conference on Emerging Trends in Advance Computing (NCETAC 2010) Vl.No. 0
2010
Extended Weighted Class Complexity: A new of software complexity for objected oriented systems,
, Proceedings of International Conference on Semantic E-business and Enterprise computing SEEC Vl.No. 0
2009
, A Comparison of Proposed Cognitive weights for control structures and object oriented programming languages
Proceedings of International Conference on Advanced Computing Vl.No. 0
2009
An Investigation into the Relationship between Personality traits and Recollection & Retention ability in object oriented Systems
Proceedings of International Conference on Advanced Computing (ICAC) Vl.No. 0
2009
A Comparison of Proposed Cognitive weights for control structures and object oriented programming languages
Proceedings of International Conference on Advanced Computing (ICAC) Vl.No. 0
2009
A study on the impact of Style elements in Recollection & Retention of Object oriented System
Proceedings of International Conference on Semantic E-business and Enterprise computing (SEEC 2009) Vl.No. 0
2009
A Study on the Impact of Personality traits in program debugging of object oriented System
proceeding on the National Conference on Advance Computing (NCAC) Vl.No. 0
2009
Using Gender Differences to Link Intelligent Quotient and Program Debugging of Object Oriented Systems
Proceedings of National Conference on Software Engineering and Applications Vl.No. 0
2008
Using Gender Differences to Link Intelligent Quotient and Program Debugging of Object Oriented Systems
Proceedings of National Conference on Software Engineering and Applications, Vl.No. 0
2008
Dr.V.JUDE NIRMAL
A Profit-Driven Stacking Model for Effective Churn Prediction
International Journal on "Technical and Physical Problems of Engineering" (IJTPE) Vl.No. 14
2022
Minimax Probability based Churn Prediction for Profit Maximization
ICTACT Journal on Soft Computing Vl.No. 12
2021
A survey on Big Data Tools and Applications
International Journal of Research and Analytical Reviews (IJRAR) Vl.No. 6
2019
Mobile Learning with Social Media: Next Paradigm Shift in Education
National Conference on Higher Education in the Knowledge Age: Techno-Pedagogical Perspectives and Innovations Vl.No. 0
2016
Real-time Sentiment Prediction on Streaming Social Network Data using In-Memory Processing
IEEE Explore (WCCCT 2016) Vl.No. 0
2016
Emoticon Based Sentiment Analysis using Parallel Analytics on Hadoop
Indian Journal of Science and Technology (IJST) Vl.No. 9 (33)
2016
Real-Time Sentiment Prediction on Streaming Social Network Data Using In-Memory Processing
World Congress on Computing and Communication Technologies (WCCCT Vl.No. -
2016
Parallel Implementation of Big Data Pre-processing Algorithims for Sentiment Analysis of Social Networking Data
International Journal of Fuzzy Mathematical Archive Vl.No. 6, Number 1 & 2
2015
Parallelization Techniques in Pre-processing Phase for Sentiment Analysis in Big Data: A Comparative Analysis
International Journal of Applied Engineering And Research (IJAER) Vl.No. 10
2015
Fast and Effective Real time Sentiment analysis on Streaming Big Data using Distributed Caching Techniques
International Journal of Applied Engineering And Research (IJAER) Vl.No. 10
2015
SECCON: A Framework for Applying Access Control Policies in Context-Aware Wireless Networks
World Congress on Computing and Communication Technologies (IEEE Xplore) Vl.No. -
2014
Sentiment and Emotion Analysis for Context Sensitive Information Retrieval of Social Networking Sites: A Survey
International Journal of Computer Applications (IJCA) Vl.No. 100, No. 10
2014
Context-Aware Data Retrieval using Mobile Social Network
National Conference on Advanced Computing Vl.No. 0
2013
Rev.Dr.S.ARUL OLI SJ
Confidentiality Technique to Encrypt Non-Numerical Data to Enhance Security in Public Cloud Storage
Institute of Electrical and Electronics Engineers (IEEE) Vl.No. 0
2017
Confidentiality Technique to Obfuscate the Numerical Data to Enhance Security in Public Cloud Storage
Institute of Electrical and Electronics Engineers (IEEE) Vl.No. -
2017
Confidentiality Technique to Encrypt and Obfuscate Non-Numerical and Numerical Data to Enhance Security in Public Cloud Storage
Institute of Electrical and Electronics Engineers (IEEE) Vl.No. -
2017
Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage
MATEC Web of Conferences Vl.No. 40
2016
Confidentiality Technique for Data Stored in Public Cloud Storage
International Journal of Engineering Research & Technology (IJERT) Vl.No. 5
2016
Confidentilaity Technique using Data Obfuscation to Enhance Security of Stored Data in Public Cloud Storage
International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Vl.No. 5
2016
Confidentiality Technique for Enhancing Data Security using Encryption and Obfuscation in Public Cloud Storage
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 5
2016
ARARO Framework for Confidentiality Techniques to Enhance Security of Numerical and Non-Numerical Data in Public Cloud Storage
INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN ELECTRICAL, ELECTRONICS, INSTRUMENTATION AND CONTROL ENGINEERING (IJIREEICE) Vl.No. 4
2016
A Novel Approach for Ensuring Data Confidentiality in Public Cloud Storage
International Journal of Computer Applications Vl.No. 0975 ? 8887
2015
A Framework for Key Management for Data Confidentiality in Cloud Environment
Institute of Electrical and Electronics Engineers (IEEE) Vl.No. 15
2015
A Framework for Data Confidentiality in Public Cloud Storage
MISBAH Journal Vl.No. 15
2015
Confidentiality Framework to Enhance Data Security in Public Cloud Storage
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
A Framework to Ensure Data Security in Public Cloud Storage
ELSEVIER India Vl.No. 0
2014
Mobile Cloud Security Issues and Challenges A Perspective
International Journal of Engineering and Innovative Technology (IJEIT) Vl.No. 3
2013
Dr.A.VIMAL JERALD
End to End Secured Architecture for Internet of Things Information Kendra (IoT_IK) Integrating IoT Enabled Smart Services and Applications
International Conference on Mobile Computing and Sustainable Informatics - ICMCSI 2020 Vl.No. 0
2021
End-to-End Secured Architecture for Internet of Things Information Kendra (IoT_IK) Integrating IoT-Enabled Smart Services and Applications
International Conference on Mobile Computing and Sustainable Informatics (ICMCSI) Vl.No. 0
2021
Secured Architecture for Internet of Things (ioT) Enabled Smart Agriculture
International Journal of Scientific & Technology Research (IJSTR) Vl.No. 9
2020
Techniques and Nuances of Teaching Tamil Language Literature using Information Communication Technology (ICT) in Higher Education
International Seminar on the methods and techniques of Teaching Tamil in Higher Education Vl.No. 0
2020
?Secured Architecture for Internet of Things (IoT) Based Smart Health Care?
5th International Conference on Inventive Computation Technologies [ICICT 2020] Vl.No. 0
2020
Secured Architecture for Internet of Things (IoT) Based Smart Healthcare
Fifth International Conference on Inventive Computation Technologies (ICICT-2020) Vl.No. 0
2020
TECHNIQUES AND NUANCES OF TEACHING TAMIL LANGUAGE USING INFORMATION COMMUNICAITON TECHNOLOGY (ICT) IN HIGHER LEARNING INSTITUTION
INTERNATIONAL CONFERENCE ON TECHNIQUES AND NUNACES TEACHING TAMIL LANGUAGE IN HIGHER EDUCATION Vl.No. 0
2020
Taxonomy of Distributed Denial of Service Attacks and Popular Defense Mechanism using Integration of IoT and Cloud Environment
International Journal of Innovative Research in Science, Engineering and Technology Vl.No. 8
2019
Secured Architecture for Integrated IoT Enabled Smart Services
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8
2019
A Review on Security Issues Arise During Integration of Cloud Computing and Internet of Things
International Journal of Scientific Research in Computer Science Application and Management Studies Vl.No. 7
2018
Algorithmic Approach to Security Architecture for Integrated IoT Smart Services Environment
IEEE CPS - Computing and Communication Technologies (WCCCT), 2017 World Congress Vl.No. 0
2017
Secure IoT Architecture for Integrated Smart Services Environment
Proceedings of the 10th INDIACom -2016, 3rd International Conference on Vl.No. 5
2016
AN ADAPTABLE SECURE SMART CARD ARCHITECTURE FOR INTERNET OF THINGS AND CLOUD COMPUTING
IJRET (International Journal of Research in Engineering and Technology Vl.No. 05
2016
Secure IoT Architecture for Smart Services Environment
IEEE Digital Library Vl.No. 0
2016
Algorithmic Approach to security Architecture for Integrated IoT Smart Services Environment
IEEE Digital Library Vl.No. -
2016
AN ADAPTABLE SECURE SMART CARD ARCHITECTURE FOR INTERNET OF THINGS AND CLOUD COMPUTING
IJRET: International Journal of Research in Engineering and Technology Vl.No. 5 - 5
2016
Green Computing, a Remedy for Global Warming
Proceedings of National Conference on Emerging Trends in Software Development by Alagappa University Vl.No. 0
2016
Internet of Things (IoT) based Smart Environment integrating various Business Applications
International Journal for Computer Application Vl.No. 128
2015
Internet of Things for Smart Services
International Journal Applied Engineering Research Vl.No. 10-82
2015
Elliptic Curve Cryptography based Security Framework for Internet of Things and Cloud Computing
International Journal of Computer Science and Technology (IJCST) Vl.No. 6.3
2015
Quality of Service Architecture for Internet of Things and Cloud Computing
International Journal of Computer Application Vl.No. 128-7
2015
An Adoptable and Secure Intelligent Smart Card Framework for Internet of Things and Cloud Computing
50th Golden Jubilee Annual Convention on "Digital Life", CS_-2015 to be published by AISC Springer Vl.No. 0
2015
Elliptic Curve Cryptography based Security Framework for Internet of Things and Cloud Computing
Recent Advances on Computer Engineering Vl.No. 0
2015
Internet of Things (IoT) based Smart Environment integrating various Business Applications
International Journal of Computer Applications Vl.No. 128
2015
Quality of service architecture for internet of things and cloud computing
International Journal of Computer Applications Vl.No. 128-8
2015
Elliptic curve cryptography based security framework for internet of things and cloud computing
International Journal of Computer Science and Technologies Vl.No. 6 issue 3
2015
A Framework for User Oriented Content Dissemination for E-Learning
Proceedings of The Role of ICT in Higher Education: Quality, Accessibility and Security Vl.No. 0
2010
Dr. George Gabriel Richard Roy
A Security Architecture for a Smart Home Ecosystem using Permissioned Blockchain
International Journal of Research and Analytical Reviews Vl.No. 6
2019
A Security Framework for a Sustainable Smart Ecosystem using Permissioned Blockchain: Performance Evaluation
International Journal of Innovative Technology and Exploring Engineering Vl.No. 8
2019
A Security Framework for a Sustainable Smart Ecosystem using Permissioned Blockchain
Journal of Emerging Technologies and Innovative Research Vl.No. 6
2019
A Survey on Threats and Challenges in Blue Eyes Technology
Journal of Emerging Technologies and Innovative Research Vl.No. 5
2018
An Overview of Threats and Challenges in Smart Wi-Fi Ad-Hoc Networks
Internation Journal for Research in Applied Science and Engineering Technology Vl.No. 6
2018
An Architecture to Enable Secure Firmware Updates on a Distributed-Trust IoT Network Using Blockchain
Lecture Notes on Data Engineering and Communications Technologies book series Vl.No. 15
2018
Security Issues in Internet of Things using Next Generation Mobile Networks
International Journal of Applied Engineering Research Vl.No. 10 Number 82
2015
A Cloud Model for Effective E-Learning
IEEE - CPS Vl.No. 10
2014
Security analysis of future Enterprise Business Intelligence
IEEE-CPS Vl.No. 0
2014
Dr.A.ANGELPREETHI
Lexicon and Machine Learning Based Comparative Analysis to Classify the Students Opinions on Covid-19 Pandemic
International Journal for Innovative Engineering and Management Research Vl.No. 12
2023
Dom_classi: An enhanced weighting mechanism for Domain Specific Words
International Journal of Applied Engineering Research Vl.No. 14
2019
NIC_LBA: Negations and Intensifier Classification of microblog data using Lexicon Based Approach
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 6
2019
Predicting Student Dropouts for Better Decision Making Using Sentiment Analysis
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 8
2019
Traffic Redundancy and Elimination Approach to Reduce Cloud Bandwidth and Costs
International Journal of Computer Sciences and Engineering (UGC approved Journal) Vl.No. 6
2018
A Methodological Framework for Opinion Mining
International Journal of Computer Sciences and Engineering (UGC approved Journal) Vl.No. 2
2018
PHYCHOLOGICAL ANALYSIS OF EMOTICONS AND EMOJI IDEOGRAMS IN SENTIMENT ANALYSIS
Proceedings of the National conference Vl.No. 0
2018
Opinion Mining using Hybrid Approach on Big Data : A Perspective
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 7
2018
Dictionary based Approach for improving the Accuracy of opinion mining on Big data
International Journal Of Research and Analytical Reviews Vl.No. 5
2018
An Enhanced Architecture for Feature Based Opinion Mining From Product Reviews
IEEE Xplore Vl.No. -
2017
Visualizing Big Datamining: Issues, Challenges and Opportunities
International Journal of Control Theory and Applications Vl.No. 9
2016
An Impact of Intelligent Quotient and Learning Behavior of Students in Learning Environment
CIIT International Journal of Artificial Intelligent System and Machine Learning Vl.No. Vol 7 (1) Vl.No. 7
2015
A survey on big data and its charactristics using 3v`s
IJERT International Journal of Engineering Research and Technology proceedings of the conference 3rd National Conference On Innovation In Computing And Communication Technology Vl.No. 3
2015
Green computing
Proceedings of the national conference on recent trends in computing Vl.No. 0
2012
Dr. G AROCKIA SAHAYA SHEELA
Kinded Pointcut Complexity Metric: A Cognitive Approach
Webology Vl.No. 0
2021
An Estimation Of Measuring The Complexity Of Advice Using Fuzzy Logic Technique,
Webology Vl.No. 9
2021
E-Illegal Voting Detector
Journal of MultiDimensional Research and Review (JMRR) Vl.No. 0
2021
Coal Mine Workers Smart Safety Nursing Security System
International Research Journal of Modernization in Engineering Technology and Science (IRJMETS) Vl.No. 0
2020
Study on Advancement on Android and its Versions
International Research Journal of Modernization in Engineering Technology and Science (IRJMETS) Vl.No. 0
2020
Aspect Oriented Programming - Cognitive Complexity Metric Analysis Tool
International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT) Vl.No. 3
2018
Design and Analysis of Aspect Oriented Metric CWCoAR using Cognitive Approach
Computing and Communication Technologies - IEEE Vl.No. 9
2017
Maintenance Effort Prediction Model using Aspect- Oriented Cognitive Complexity Metrics
International Journal of Advanced Research in Computer Science (IJARCS) Vl.No. 8
2017
Empirical Validation of DAAOMT using Maintenance Effort Prediction
International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) Vl.No. 7
2017
Design and Analysis of Aspect Oriented Metric CWCAE using Cognitive Approach
International Journal of Engineering Research &Technology (IJERT) Vl.No. 5
2016
Statistical Analysis of Pointcut Complexity Metric using Cognitive Approach
International Journal of Control Theory and Applications (IJCTA) Vl.No. 9
2016
Aspect Oriented Metrics A survey
International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT) Vl.No. 2
2015
Analysis of Measuring the Complexity of Advice using a Cognitive Approach
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
Dr.P.JOSEPH CHARLES
survey Analysis on Secured User Authentication through Biometric Recognition
International Conference on Disruptive Technologies Vl.No. 1
2024
A Study on SDN Based Load Balancing Techniques in IoT Network
International Conference on Disruptive Technologies Vl.No. 1
2024
Prediction of Learning Disabilities in School-Going Children Using Deep Learning Technique
International Conference on Disruptive Technologies Vl.No. 1
2024
Survey Analysis on Secured User authentication Through Biometric Recognition
International Journal on Recent and Innovation Trends in Computing and Communication Vl.No. Volume: 11 Issue: 9
2023
A study on emerging approaches for cyber physical system security
International journal for innovative engineering and management research Vl.No. 12
2023
A Survey on Big Data Analytics: Tools, Issues and Challenges
Chinese Journal Of Computational Mechanics Vl.No. 5
2023
Secure Virtual Machine Migration using ANT colony Algorithm
IEEE Vl.No. 0
2021
Experimental Analysis Of Securing Context Aware Web Services
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vl.No. VOLUME 9, ISSUE 01
2020
STUDY ON SECURITY MANAGEMENT FOR PATIENT HEALTH RECORDS IN HEALTH CLOUD
The International journal of analytical and experimental modal analysis Vl.No. Volume XII, Issue I
2020
Semantic Survey on 6th Generation of Wireless Mobile Communication
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. Vol. 9, Issue 1, J
2020
Dynamic Resource Allocation For Cloud Computing Using Live Migration Of Virtual Machines
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 5 Issue 2
2019
INTRUSION DETECTION Mechanism in Data Mining
INTERNATIONAL JOURNAL FOR RESEARCH & DEVELOPMENT IN TECHNOLOGY Vl.No. 11(2)
2019
Proposed Multilevel Architecture for Securing Context Aware Mobile Web Services
The International journal of analytical and experimental modal analysis Vl.No. Volume XI, Issue IX
2019
BIG DATA CONCEPTS ANALYTICS ARCHITECTURES OVERVIEW
International Research Journal of Engineering and Technology Vl.No. 05
2018
Big Data Security an Overview
International Research Journal of Engineering and Technology (IRJET Vl.No. 05
2018
A Study on Three Service Model of Cloud Computing?, International Journal of Electrical Electronics & Computer Science Engineering
International Journal of Electrical Electronics & Computer Science Engineering Vl.No. 1
2018
Security Issues in Hybrid Cloud Computing
International Journal of Electrical Electronics & Computer Science Engineering Vl.No. 1
2018
Research Issues on Web Mining
International Journal of Computer Sciences and Engineering Vl.No. Volume-6, Special Issue-2
2018
Traffic Redundancy and Elimination Approach to Reduce Cloud Bandwidth and Costs
International Journal of Computer Sciences and Engineering Vl.No. Volume-6, Special Issue-2
2018
Towards Secure and Dependable Storage Services in Cloud Computing
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 4 Issue 3
2018
Implications of Big Data Analytics
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 3 Issue 5
2018
Private Cloud Computing Security Issues
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 4 Issue 6
2018
Data Security Using Authentication And Authorization In Cloud Computing
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 4 Issue 6
2018
An Architecture for Improving the QoS in Composite Web Service Selection
International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) Vl.No. Volume 4 Issue 9
2018
Survey on QoS Metrics in Web Services
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 4 Issue 9
2018
Security Framework for Context Aware Mobile Web Services
International Conference on Computer Networks and Communication Technologies, Lecture Notes on Data Engineering and Communications Technologies Springer Nature Vl.No. 1
2018
IoT- New Perspectives and its Security
International Journal of Computer Sciences and Engineering (IJCSE) Vl.No. Vol.6, Special Issue.11
2018
Security Issues in Cloud Computing
International Journal of Emerging Trends in Science and Technology Vl.No. 04||Issue||06|
2017
Survey on Privacy Preservation in context aware web services
Indian Journal of Computer Science and Engineering (IJCSE) Vl.No. vol 6 Issue 6
2016
A CONTEXT-AWARE MULTI-AGENT SYSTEM AS A MIDDLEWARE FOR AMBIENT INTELLIGENCE
Roots International Journal of Multidisciplinary Researches Vl.No. 2
2016
An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services
International Journal of Computer Applications Vl.No. 146-15
2016
Security Issues in Web Services
International Research Journal of Engineering and Technology Vl.No. 3(5)
2016
Security Issues in Context Aware System
International Research Journal of Engineering and Technology Vl.No. 2(6)
2016
Security Issues on Composite Web Services
International Research Journal of Engineering and Technology Vl.No. 3(6)
2016
A Novel Security FAN SHAPECO Password on Social Networking Services
International Journal of Advent Research in Computer and Electronics (IJARCE Vl.No. 3(4)
2016
A Multi-Layered Secured Framework for Context-Aware Web Services in Health Care Industries
International Journal of Applied Engineering Research Vl.No. vol 10 Issue 82
2015
SURVEY PAPER ON MOBILE SOCIAL NETWORKS
International Research Journal of Engineering and Technology (IRJET) Vl.No. vol 2 Issue 6
2015
Security on Mobile Social Networks
International Journal of Advance Research in Computer Science and Management Studies Vl.No. vol 3 Issue 9
2015
CONTEXT-AWARE IN PRIVACY PRESERVATION FOR HEALTH CARE SYSTEMS
International Journal of Advanced Computer Technology (IJACT) Vl.No. vol 4 Issue 5
2015
SMIWBSN Security Mechanism in Web Based Social Network
IJETCCT2014 Vl.No. 1
2014
Automated Secured Disaster Recovery with Hyper-V Replica and PoweShell
IEEE CPS -- WCCCT2014 Vl.No. -
2014
Design of a secure architecture for context aware web services using access control mechanism
International conference on contemporary computing and informatics(IC3I) IEEE Vl.No. -
2014
A review on privacy control techniques in context-aware web services
International journal of advanced research in computer science & technology (IJARCST) Vl.No. vol 2 Issue 3
2014
Context-aware architecture for user access control
International journal of advanced research in computer science & technology (IJARCST) Vl.No. vol 2 Issue 3
2014
An architecture for securing hetrogeneous web services
International journal of advanced research in computer science & technology (IJARCST) Vl.No. vol 2 Issue 3
2014
A framework for privacy handler mechanism in context-aware web services
International journal of advanced research in computer science & technology (IJARCST) Vl.No. vol 2 Issue 3
2014
Extending Social Privacy protector for Twitter Social Network
CIIT Vl.No. 1
2013
A Context Aware System Based on Service Oriented Architecture
ICRTICA`13 Vl.No. 1
2013
Dr.K.MAHESWARAN
Maintainability Index Computation Based on Cyclomatic Complexity and Halstead Measure for Python
Mukt Shabd Journal Vl.No. IX Issue X
2020
Empirical Validation of CWICC and ICWCC Metrics using Maintenance Effort Estimation Model
Mukt Shabd Journal Vl.No. IX Issue XII
2020
Theoretical Validation of the Cognitive Complexity Metrics CWICC and ICWCC
International Conference on Advances in IoT, High Performance and Edge Computing (ICIHPE), Vl.No. -
2020
An interface based cognitive weighted class complexity measure for object oriented desigin
International Conference on Advances in Computer Science, Engineering and Technology, ICACSET-18 Vl.No. -
2018
Empirical Validation Of Object Oriented Cognitive Complexity Metrics Using Maintenance Effort Prediction
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. Vol. 7 Issue 4
2018
A Survey on Complexity Metrics in Object Oriented Design
SSICACR-2017 Vl.No. 1
2017
Predicting Maintainability with Object Oriented Metrics An Empirical Comparison
International Journal of Advanced Engineering and Global Technology Vl.No. 5
2017
Software Cognitive Complexity Metrics for OO Design: A Survey
International Journal of Scientific Research in Science, Engineering and Technology Vl.No. 3
2017
A Software Cohesion Metrics Survey
International Journal of Advanced Engineering and Global Technology Vl.No. 5
2017
An Analysis of Object Oriented Complexity Metrics
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2
2017
A Heuristics on Interface Complexity
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Vl.No. 6
2017
Cognitive Weighted Inherited Class Complexity Metric
Procedia Computer Science Vl.No. 125
2017
A Review on Component Based Software Metrics
International Journal of Fuzzy Mathematical Archive Vl.No. 7
2015
Dr.B.REX CYRIL
TEXT-BASED ENCRYPTION (TBEnc) TECHNIQUE TO SECURE DATA IN CLOUD STORAGE SERVER
Journal of Shanghai Jioatong University Vl.No. 16 issues10, October 2020
2020
SECON: SECURED CONFIDENTIALITY FRAMEWORK TO PROTECT DATA STORED IN PUBLIC CLOUD SYSTEMS
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTING SCIENCE Vl.No. Volume 6
2019
Hybrid Text and Value Based Ncryption and Obfuscation (Tvbencobfus) To Safeguard Data in Cloud Storage Server
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 8
2019
Ant Colony Model (AnCoMoDaS) for Data Security in Cloud
International Research Journal of Engineering and Technology (IRJET Vl.No. 04 Issue
2017
DATA DIVISION IN CLOUD FOR SECURED DATA STORAGE USING RSA ALGORITHM
International Research Journal of Engineering and Technology (IRJET) Vl.No. 04 Issue
2017
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA) For Cloud Data Encoding, Encrypting and Forwarding
International e-Journal For Technology And Research Vl.No. 1
2017
Dynamic and Scalable Architecture for Accessing the Cloud Databases and Securing Cloud Services Using Public Key Infrastructure
International journal of scientific research in computer science, Engineering information technology(IJSRCSEIT) Vl.No. 2 ISSUE 6
2017
ENHANCED ELLIPTICAL CURVE CRYPTOGRAPHY BASED PKI FOR SECURE DATA STORAGE IN A CLOUD
International Journal of Applied Engineering Research,(IJAER) Vl.No. Vol. 10
2015
Cloud Computing Data Security Issues, Challenges, Architecture and Methods - A Survey
International Research Journal of Engineering and Technology (IRJET) Vl.No. 02
2015
Dr.J.ANTONY JOHN PRABU
D1FTBC FRAMEWORK FOR CLOUD DATA TRANSACTIONS
International Journal of Applied Engineering & Technology Vl.No. Vol. 5 No.4,
2023
An Integrated Architecture For Secured Cloud Data Transactions With Consistency Enhancements
Annals of R.S.C.B Vl.No. 25
2021
Performance of Proposed Architecture for Data Transactions in Cloud using D1FTBC
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8
2019
Performance Analysis Of Proposed D1FTBC Approach For Improving Consistency In Cloud Data Transactions
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vl.No. 8
2019
Proposed Architecture for Improving Security and Consistency of Data Transactions in Cloud Database using Tree-Based Consistency Approach
International Journal of Computer Science and Information Security (IJCSIS) Vl.No. Vol. 15, No. 12,
2017
AN EFFICIENT DEPTH 1 FIXED TREE CONSISTENCY D1FTC METHOD FOR DISTRIBUTED DATA TRANSACTIONS IN CLOUD ENVIRONMENT
International Journal of Advanced Research in Computer Science Vl.No. Volume 8, No. 7,
2017
Issues and Challenges of Data Transaction Management in Cloud Environment
International Research Journal of Engineering and Technology (IRJET) Vl.No. Volume:02 Issue:04
2015
Proposed Architecture for Secure Distributed Data Transaction Management in Cloud Environment
International Journal of Applied Engineering Research - (IJAER) Vl.No. Vol. 10 No.82
2015
Dr.A.JENIFER JOTHI MARY
A novel approach for detection of diabetes patients using machine learning techniques
IEEE Explorer Vl.No. 0
2023
An Analysis On School Dropouts During Covid-19 Using Machine Learning Algorithms
Journal of Harbin Engineering University Vl.No. 44(11)
2023
Development of hybrid technology using Machine Learning and Block chain Technology to prevent from COVID 19 through the proper information gathering
IEEE Xplore Vl.No. 0
2023
Drowsiness Detection System Using the Movement of the Eye of A Human Through Machine Learning Algorithms in Order to Avoid Accidents
IEEE Xplore Vl.No. 0
2023
Efficiency of online classes in Tamil Nādu during Covid-19 lockdown: A statistical analysis
AIP Conference Proceedings Vl.No. 2418
2022
Security analysis of hybrid one time password generation algorithm for IoT data
AIP Conference Proceedings Vl.No. 2418(1)
2022
Aspect Based Sentiment Analysis of Students? Opinion Using Big Data Analytics
Our Heritage Journal Vl.No. 68
2020
An Analysis of The Status of The Women?s Career After Marriage Using Big Data Analytics
Our Heritage Journal Vl.No. 68
2020
A Survey on Data Analytics in Higher Education
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 8(1)
2019
A FRAMEWORK FOR ASPECT BASED SENTIMENT ANALYSIS USING FUZZY LOGIC
ICTACT JOURNAL ON SOFT COMPUTING Vl.No. 8(2)
2018
KNOWLEDGE BASED IMPUTATION TECHNIQUE FOR NON OPINIONATED SENTENCES IN SENTIMENT ANALYSIS
International Journal of Current Advanced Research Vl.No. 7(3)
2018
FDSS: Fuzzy Based Decision Support System for Aspect Based Sentiment Analysis in Big Data
Advances in Computing and Data Sciences. ICACDS 2018. Communications in Computer and Information Science, Springer Vl.No. 906
2018
IMS: Imputation of Missing Sentiment in the Aspect Based Sentiment Analysis
Lecture Series in Communications in Computer and Information Science (Springer - in Press) Vl.No. 1
2017
ASFuL: Aspect based Sentiment Summarization using Fuzzy Logic
Proceedings of ICAMMAET? 2017 Vl.No. -
2017
A Methodology to Enhance the Accuracy of Aspect Level Sentiment Analysis using Imputation of Missing Sentiment
International Journal of Recent Scientific Research (IJRSFP) Vl.No. 8(7)
2017
Aspect based Parsing for Sentiment Analysis in Big Data
International Journal of Computer Science and Mobile Applications Vl.No. 5(12)
2017
Aspect Based Sentiment Analysis of Twitter Product Reviews Using Imputation of Missing Sentiment
Proceedings of International Conference on Advanced Techniques in Engineering, Science & Management (Advanced Techniques - 2017) Vl.No. 19
2017
Jen-Ton: A Framework to enhance the Accuracy of Aspect level Sentiment Analysis in Big Data
Proceedings of the International Conference on Inventive Computing and Informatics Vl.No. -
2017
ASFuL: Aspect based Sentiment Summarization using Fuzzy Logic
ICAMMAET Vl.No. 1
2017
A METHODOLOGICAL FRAMEWORK TO IDENTIFY THE STUDENTS` OPINION USING ASPECT BASED SENTIMENT ANALYSIS
International Journal of Engineering Research & Technology (IJERT) Vl.No. 5
2016
A Framework for Aspect level Sentiment Analysis of Academic Results Data
International Journal of Recent Trends in Engineering & Research (IJRTER) Vl.No. 2(7)
2016
Survey on Aspect Level Opinion Targets and Opinion Words from Online Reviews
International Journal of Information Technology and Mechanical Engineering IJITME Vl.No. 2-8
2016
A newfangled IoT big data parallel preprocessing framework to facilitate quality IoT big data analytics
IJERT Vl.No. 4(29)
2016
A methodology for identification on Flattery sentences in Sentence Level Classification
Fifth National Conference on Intelligent computing(FNCIC) Vl.No. -
2016
A Study on Basic Concepts of Big Data
ijetcct Vl.No. 1
2015
Issues and Challenges in Sentiment Analysis : A Survey
Misbah Niche of Knowledge Vl.No. 15
2015
Dr.S.JOSEPHINE THERESA
Class Based Oversampling with Integrated Bagging For Handling Data Imbalance In Sensitive Data
International Journal of Applied Engineering Research Vl.No. 06
2021
Feature Sub spacing Based Stacking For Effective Imbalance Handling In Sensitive Data
ICTACT -SOFT COMPUTING Vl.No. 12
2021
Classification of Diabetes Milletus Using Naive Bayes Algorithm
Springer Vl.No. 2021, Volume 1167
2020
A survey on Insight of Big Data
IJETAE Vl.No. volume 8
2018
Mrs.S.THULASI BHARATHI
Hybrid attention network-based students behavior data analytics framework with enhanced capuchin search algorithm using multimodal data
Social Network Analysis and Mining Vl.No. 13
2023
Survey on Online Shopping Websites Using Sentiment Analysis
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN COMPUTER AND COMMUNICATION ENGINEERING Vl.No. 9
2020
CLASSIFICATION LEVELS, APPROACHES,TOOLS,APPLICATIONS AND CHALLENGES IN SENTIMENTAL ANALYSIS- A SURVEY
INTERNATIONAL JOURNAL OF COMPUTER SCIENCES AND ENGINEERING Vl.No. 6
2018
A STUDY OF BIG DATA CHALLENGES AND ITS TECHNOLOGIES
Proceeding of National Conference on MOBILE TECHNOLOGIES, BIG DATA & DATA ANALYTICS Vl.No. -
2018
BIG DATA ? CONCEPTS, ANALYTICS, ARCHITECTURES ? OVERVIEW
International Research Journal of Engineering and Technology Vl.No. 05
2018
Dr.J.HIRUDHAYA MARY ASHA
ExclusiveOR-Discrete Cosine Transform-A Chaotic Algorithm for Image Encryption and Decryption
Image Processing and Capsule Networks: ICIPCN 2020 Vl.No. 0
2022
The Appraised Structure for Improving Quality in the Compressed Image Using EQI-AC Algorithm
Image Processing and Capsule Networks: ICIPCN 2020 Vl.No. 1200
2022
Fuzzy probability based person recognition in smart environments
Journal of Intelligent & Fuzzy Systems Vl.No. 40
2021
Interoperability in smart living network?a survey
International Conference on Communication, computing and Electronics systems Vl.No. 0
2020
The internet of things (IoT) routing security?a study
International Conference on Communication, Computing and Electronics Systems Vl.No. 0
2020
Hiding Methods for Preventing Jamming attacks on wireless Networks
Intermational Journal of Scientific Research Publications Vl.No. 4
2014
Dr. SUNIL RAJ Y
Integrated Architecture to Enhance the Security in IoT Cloud Using ECC DNA
International Conference on Intelligent Computing Systems Vl.No. 0
2021
Security Enhancing Techniques for Data in IoT Cloud : Analysis
International Journal of Advances in Engineering and Management Vl.No. 3
2021
A Security Architecture for Cloud Data Using Hybrid Security Scheme
IEEE Xplore & Proceedings 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) Vl.No. 1
2021
An Integrated Secure Cloud Storage Architecture for Ensuring Integrity of Data using Hybrid Encryption Schemes in Cloud IoT Environment
Journal of Shanghai Jiaotong University Vl.No. 16
2020
DNA Based Hybrid Approach for Data Integrity on Integrated Cloud Based Smart Environment: An Analysis
International Journal of Scientific Development and Research Vl.No. 10
2020
ENHANCED TPA BASED DATA INTEGRITY MECHANISM FOR OBJECT STORAGE ARCHITECTURE ON INTEGRATEDIOT CLOUDSMART ENVIRONMENT
Journal of Shanghai Jiaotong University Vl.No. 16
2020
Taxonomy of Distributed Denial of Service Attacks and Popular Defense Mechanism using Integration of IoT and Cloud Environment
INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN SCIENCE, ENGINEERING AND TECHNOLOGY Vl.No. 8
2019
AN INTEGRATED ARCHITECTURE FOR IoT BASED DATA STORAGE IN SECURE SMART MONITORING ENVIRONMENT
International Journal of Scientific & Technology Research Vl.No. 8
2019
AN EFFECTIVE DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION MODEL IN INTEGRATION OF INTERNET OF THINGS AND CLOUD COMPUTING USING BINARY FIRE FLY OPTIMIZATION ALGORITHM
International Journal of Scientific & Technology Research Vl.No. 8
2019
Classification Based Analysis on Cancer Datasets Using Predictor Measures
Computer Engineering and Intelligent Systems Vl.No. 10
2019
Integrated Device Cloud Architecture for a Secure Cloud of Things Environment
International Journal of Recent Technology and Engineering Vl.No. 8
2019
ENHANCED CLOUD IDENTITY MANAGEMENT ENABLING SECURE ACCESS IN CROSS CLOUD ENVIRONMENT
ADALYA JOURNAL Vl.No. 8
2019
Predictive Analytics On Facebook Data
IEEE Vl.No. -
2016
Classification Analysis on Corpus Data
CiiT Data Mining and Knowledge Engineering Vl.No. 8, 5
2016
CLASSIFICATION ANALYSIS ON Medical Data
CiiT International Journal of Data Mining and Knowledge Engineering. Vl.No. 7
2015
Clustering methods and algorithms in data mining: Concepts and a study
JOURNAL OF COMPUTING TECHNOLOGIES Vl.No. 4, 7
2015
Novel Hybrid Technique Enhancing Data Privacy and Security
Springer IFIP and Proceedings 6th International Conference on Computer, Communication, and Signal Processing Vl.No. 651
22
Ms.SHERINE DOMINICK
Video Analytics: A Quick Review
Journal of Emerging Technologies and Innovative Research Vl.No. 10
2023