Author(s) & Title |
Publications |
Year |
Rev.Dr. T. Francis Thamburaj S.J |
On Validating Cognitive Weighted Attribute Hidiing Factor Complexity Metric |
International Journal of Control Theory and Application (IJCTA) Vl.No. 9 |
2016 |
Cognitive Weighted Cohesion Complexity Metric |
International Journal of Control Theory and Application (IJCTA) Vl.No. 9 |
2016 |
Models for Maintenance Effort Prediction with Object-Oriented Cognitive Complexity Metrics |
IEEE CPS Vl.No. 54 |
2016 |
Validation of Cognitive Weighted Method Hiding Factor Complexity Metric |
International Conference on Advanced Computing (ICAC 2015) Vl.No. 10 |
2015 |
Cognitive Weighted Polymorphism Factor: A Comprehension Augmented Complexity Metric |
International Journal of Computer, Electrical, Automation, Control and Information Engineering (IJCEACIE) Vl.No. 9 |
2015 |
A Survey on Cohesion Metrics for Object-Oriented Software Systems |
National Conference on Recent Advancements in Software Development (NCRASD 2015) Vl.No. 0 |
2015 |
Cognitive Perspective of Attribute Hiding Factor Complexity Metric |
International Journal of Engineering and Computer Science (IJECS) Vl.No. 4 |
2015 |
Cognitive Weighted Method Hiding Factor Complexity Metric |
International Journal of Computer Science and Software Engineering (IJCSSE) Vl.No. 4 |
2015 |
Classification of Corona Viruses using Self-Organizing Maps |
RETELL-An Inter-disciplinary Research Journal Vl.No. 11(2) |
2011 |
Comparative Study of Random and Linear Initialization of Self-organizing Maps |
RETELL,St. Joseph`s College, Trichy Vl.No. 6(2) |
2006 |
Neighbourhood Study of Self-Organizing Maps |
Proc. Parallel and Distributed Computing,Cauvery College, Trichy Vl.No. 16-17 |
2006 |
Artificial Neural Networks for Software Quality Assessment |
Proc. Nat. Conf. on Software Engineering,Sacred Heart College, Tirupattur Vl.No. 14-16 |
2006 |
Similarity Metrics for Self-Organizing Neural Networks |
Proc. Nat. Conf. Frontier Research Area in Computer Science, BARD, Trichy Vl.No. 17-18 |
2006 |
The Initialization Problem of Self-Organizing Maps |
Proc. Recent Trends in Info. Tech.Jamal Mohamed College, Trichy Vl.No. - |
2006 |
Genomic Patterns of Adeno Viruses : Nucleotide Based Classification using Self -Organizing Maps |
RETELL-An Inter-disciplinary Research Journal Vl.No. 5(2) |
2005 |
Artificial Neural Network for Plant Taxonomy |
National Conference on the Frontiers of Research and Development in Medicinal Plants Vl.No. 0 |
2004 |
A Methodology to Analyze the Quality of Artificial Neural Network |
ReTICA, Recent Trends in Computing Advances Vl.No. 0 |
2003 |
Comparative Study of Self-organizing maps neighbourhoods |
Proc. Nat. Conf. Comp. Sci. & Commu. Tech.,St. Joseph`s College, Trichy Vl.No. 16-17 |
0 |
Analysis of Classification of Coding and Random Sequences using Organizing Maps |
RETELL,St. Joseph`s College, Trichy Vl.No. 8(1): 23-27 |
0 |
Mr.D.S.RAVI |
A SURVEY ON FAKE ACCOUNT DETECTION IN SOCIAL MEDIA USING AI |
INTERNATIONAL JOURNAL OF RESEARCH AND ANALYTICAL REVIEW Vl.No. 6 |
2019 |
An Architecture for avoiding repeated messages in Whatsapp messenger |
IJSRCSAMS Vl.No. 7 |
2018 |
EXPLORATION ON THE ALGORITHMS IN DATA MINING USING AI TECHNIQUES |
International Journal of Computer Sciences and Engineering Vl.No. 5 |
2018 |
An Architecture for detecting the Camera and Jamming the Frequency using Artificial Neural Network |
IJSRCSAMS Vl.No. 7 |
2018 |
A Study of Artificial Intelligence analytics in E-Learning |
National conference on Emerging Trends in Software Development Vl.No. - |
2016 |
A Study of Learning Standards in E-Learning using Artificial Intelligence |
International Journal of Advanced Research Trends in Engg. and Technology Vl.No. 3 |
2016 |
A study of learning methodology based on learner's in E-Learning using Artificial Intelligence |
Internation conference on Innovations in Computer Science & Technology Vl.No. 0 |
2016 |
Dr.L.AROCKIAM |
Enhancing Classification accuracy on Code-mixed and imbalanced data using an adaptive deep autoencoder and XGBoost |
Scientific Temper Vl.No. 15(3) |
2024 |
EMSMOTE: Ensemble Multi-Class Synthetic minority Oversampling Techniques to Improve accuracy of Multilingual Sentiment Analysis on Imbalance Data |
Scientific Temper Vl.No. 15(4) |
2024 |
Multi-Class Sunflower Disease Detection by Integrating Enhanced Jellyfish Search Algorithm |
INDIAN JOURNALOFSCIENCEANDTECHNOLOGY Vl.No. 17(44) |
2024 |
Optimizing Sunflower Disease Diagnosis with A Hybrid Transformer Model |
Indian Journal of Natural Sciences Vl.No. 15(87) |
2024 |
A lightweight selective stacking framework for IoT crop recommendation |
Scientific Temper Vl.No. 15(4) |
2024 |
DRMF: Optimizing machine learning accuracy in IoT crop recommendation with domain rules and MissForest imputation |
Scientific Temper Vl.No. 15(3) |
2024 |
INTERNET OF THINGS BASED COAL MINE SAFETY MONITORING AND ALERTING SYSTEM |
Journal of data acquisition and processing Vl.No. 38(3) |
2023 |
A Review on Intrusion Detection Systems to Secure IoT Networks |
International Journal of Computer Networks and Applications (IJCNA) Vl.No. 9 |
2022 |
VeNADet: Version Number Attack Detection for RPL based Internet of Things |
Solid State Technology Vl.No. 64 |
2021 |
DAVmS: Distance Aware Virtual Machine Scheduling approach for reducing the response time in cloud computing |
The Journal of Supercomputing Vl.No. 0 |
2021 |
ETLB: An Enhanced Throttled Load Balancing Approach for Reducing the Response Time in Cloud Computing |
Solid State Technology Vl.No. 64 |
2021 |
Location Based Rank Attack Detection Technique (LRADT) |
Webology Vl.No. 18 |
2021 |
The Security Challenges In The World Of Internet Of Things |
Webology Vl.No. 18 |
2021 |
IoT Data Preprocessing - A Survey |
Webology Vl.No. 18 |
2021 |
Blockchain Based Device Authentication For The Internet Of Things |
Webology Vl.No. 18 |
2021 |
Ada-IDS: AdaBoost Intrusion Detection System for ICMPv6 based Attacks in Internet of Things |
IJACSA) International Journal of Advanced Computer Science and Applications Vl.No. 12 |
2021 |
CID: Central Tendency Based Noise Removal Technique for IoT Data |
Webology Vl.No. 18 |
2021 |
Promoting a Clean and Hygienic Environment using IoT |
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8 |
2020 |
Priority Intensed Meta Task Scheduling Algorithm for Multi Cloud Environment (PIMTSA) |
Journal of Physics: Conference Series Vl.No. 1427 |
2020 |
MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage |
International Journal of Information and Computer Security Vl.No. 11,1 |
2019 |
A survey on Nutrition Monitoring and Dietary Management System |
International Journal of Research and Analytical Reviews (IJRAR) Vl.No. 6 |
2019 |
Cloud Computing : Opportunities and Challenges |
Retell Vl.No. 21 |
2019 |
Quality of Services in the Internet of Things (IOT) - A Survey |
Retell Vl.No. 21 |
2019 |
ANNIDS: Artificial Neural Network based Intrusion Detection System for Internet of Things |
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 8 |
2019 |
A Hybrid Method for Smart Irrigation System |
International Journal of Recent Technology and Engineering (IJRTE) Scopus Indexed Vl.No. 8 |
2019 |
Prevalence of Diabetes Mellitus in Tiruchirappalli District using Machine Learning |
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8 |
2019 |
Prevalence of Type-II Diabetics Association with PM 2.5 and PM 10 in Central Region of Tamil Nadu |
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8 |
2019 |
Nutrition Monitoring and Calorie Estimation using Internet of Things (IoT) |
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 8 |
2019 |
Entity Aware Association Rule Based Big Data Migration |
International Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 6 |
2019 |
A Novel Big Data Migration Framework with Reduced Database Downtime |
International Journal of Engineering Research and Applications (IJERA) Vl.No. 9 |
2019 |
Intrusion Detection System for Detecting Rank Attacks in RPL based 6LoWPAN Networks |
International Conference on Advances in Computer Science and Technology Vl.No. 0 |
2018 |
Non Adjacent Form based Scalar Multiplication Technique for Increasing Speed of ECC |
International Conference on Advances in Computer Science and Technology Vl.No. 0 |
2018 |
A Model To Predict and Pre-Treat Diabetes Mellitus |
International Conference on Advances in computer science and Technology Vl.No. 0 |
2018 |
Resource Based Load Balanced Min-Min Algorithm |
International Conference on Advances in Computer Science and Technology Vl.No. 0 |
2018 |
Predictive Model for Diabetes Mellitus in Tamil Nadu Using IoT Data |
National Conference on Transforming Technology Vl.No. 0 |
2018 |
A Survey of Algorithms for Scheduling in the cloud: In a metric basis |
National Conference on Transforming Technology Vl.No. 0 |
2018 |
ELT-EAPR: Expected Life Time of Energy Aware Parent Routing for IoT Networks |
International Journal of Pure and Applied Mathematics (SCOPUS) Vl.No. 118,8 |
2018 |
ORBUA: An Effective Data Access Model for MobiCloud Environment |
International Journal of Pure and Applied Mathematics (SCOPUS) Vl.No. 118,8 |
2018 |
Rate aware Meta task Scheduling Algorithm for multi cloud computing (RAMTSA) |
Journal of Physics: Conference Series Vl.No. 1142 |
2018 |
Spell Aware Meta Task Scheduling Algorithm (SAMTSA) for Multicloud |
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 7, 4 |
2018 |
LAHUBMAX -Priority Based Meta Task Scheduling Algorithm in multicloud |
International Journal of Computer Sciences and Engineering Vl.No. 6, 10 |
2018 |
Aro-Nims: A New-Fangled Framework for IoT Data Pre-processing |
International Journal of Research in Advent Technology(IJRAT) Vl.No. 6, 5 |
2018 |
Aro-Pri: A New-Fangled Architecture for IoT Data Pre-Processing |
International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) Vl.No. 7, 3 |
2018 |
A Novel Block Cipher for Enhancing Data Security in Healthcare Internet of Things |
Journal of Physics: Conference Series Vl.No. 1142, 1 |
2018 |
Architecture for Secure Data Management in Healthcare Internet of Things |
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 7, 3 |
2018 |
ANNA: A Unified Framework for Data Security in Healthcare Internet of Things |
ICTACT Journal on Communication Technology Vl.No. 9, 2 |
2018 |
An Algorithm to Detect Rank Attack in RPL based 6LoWPAN Networks |
International Journal of Computer Sciences and Engineering (IJCSE) Vl.No. 6, 2 |
2018 |
RDAID: Rank Decreased Attack Identification Algorithm for Internet of Things |
International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) Vl.No. 7, 3 |
2018 |
RIAIDRPL: Rank Increased Attack Identification Algorithm for Avoiding Loop in the RPL DODAG |
International Journal of Pure and Applied Mathematics (IJPAM) Vl.No. 119, 16 |
2018 |
E2V: Techniques for Detecting and Mitigating Rank Inconsistency Attack (RInA) in RPL based Internet of Things |
Journal of Physics: Conference Series (JPCS), IOP publishing Vl.No. 1142 |
2018 |
ARO_VID: A Unified Framework for Data Security in Internet of Things |
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 5, 7 |
2018 |
ARO_EDGE: A Technique to Ensure Data Security in Internet of Things (IoT) |
Asian Journal of Computer Science and Technology Vl.No. 7, 2 |
2018 |
Hybrid Security Techniques to Protect Sensitive Data in E-Healthcare Systems |
IEEE Digital Explorer Vl.No. 0 |
2018 |
An Enhanced Architecture for Imputing Missing Data in IoT Data using FRBIS Model |
Proceedings of the National Conference on Advanced Computing Technologies and Applications Vl.No. 0 |
2018 |
Key Generation Algorithm using Soft Set for data security in Internet of Things |
Proceedings of International Conference on Internet of Things and Connected Technologies (ICIoTCT), ELSEVIER Vl.No. 0 |
2018 |
EALBA: Energy Aware Load Balancing Algorithm for IoT Networks |
ACM Series , Scopus Vl.No. 0 |
2018 |
Energy Aware Routing Applications for Internet of Things |
Proceeding of the International Conference on Computer Networks, Springer Vl.No. 0 |
2018 |
Performance Analysis of Classification Algorithms for Diabetic Prediction using Pima-Indian Dataset |
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 5,12 |
2018 |
A Novel Technique to Enhance QoS using Location based Trust validation in 6LoWPAN for IoT Networks |
International Journal of Computer Sciences and Engineering Vl.No. 6,2 |
2018 |
TNLIQ: Trust Validation in Ad-Hoc Networks using Dynamic Location Identification to ensure QoS |
International Journal of Computer Sciences and Engineering Vl.No. 6,2 |
2018 |
FRND: False Rank Node Detection Algorithm in RPL Topology |
Proceedings of National Conference on Advanced Computing Technologies and Applications Vl.No. 0 |
2018 |
Scheduling for Internet of Things Applications on Cloud: A Review. |
Imperial Journal of Interdisciplinary Research Vl.No. 3 (1 ) |
2017 |
EPCAMD: EPC Based Authentication for Secure Accessing of Medical Devices in the Smart Healthcare System |
Lecture Series in Communications in Computer and Information Science (Springer - in Press) Vl.No. - |
2017 |
E2TR2: Energy efficient transmission range routing for IoT networks |
Lecture Series in Communications in Computer and Information Science (Springer - in Press) Vl.No. - |
2017 |
An enhanced sinkhole attacker node identification technique using successful link ration in IoT |
International Journal of Computer Science Vl.No. 5(1) |
2017 |
Role of Scheduling and Load Balancing Algorithms in cloud to improve the Quality of Services |
International Journal of Computer Science Vl.No. 5(1) |
2017 |
A Novel Fuzzy based Energy Efficient Routing for Internet of Things |
IEEE Explorer(in Press) Vl.No. - |
2017 |
Device Authentication Mechanism for IoT enabled Healthcare system |
IEEE Explorer(in Press) Vl.No. 0 |
2017 |
Enhanced Encryption Algorithm(EEA) for protecting users credentials in Public Cloud |
IEEE Explorer(in Press) Vl.No. - |
2017 |
USER AUTH Secure Two Tier User Authentication Mechanism for IoT Enabled Smart Healthcare System |
International Conference on Newer engineering concepts and technology Vl.No. - |
2017 |
Hybrid One Time Password Mechanism for User Authentication in Internet of Things Environment |
International Conference on Advanced Techniques in Engineering, Science Management Vl.No. - |
2017 |
Architectural Framework for Resource Management in Fog Computing |
International Journal of Engineering Research & Technology (IJERT) Vl.No. 5,13 |
2017 |
An Enhanced Technique to Detect Sinkhole Attack in Internet of Things |
International Journal of Engineering Research and Technology (IJERT) Vl.No. 5,13 |
2017 |
Secure Two-Tier User Authentication Mechanism For IoT Enabled Smart Healthcare System |
International Journal of Recent Scientific Research Vl.No. 8,7 |
2017 |
Issues and Challenges in Minimizing the response time in cloud service |
International Journal for Trends in Engineering and Technology Vl.No. 25,01 |
2017 |
E2TBR: Energy Efficient Transmission Based Routing for IoT |
International Journal of Computer Science Engineering Vl.No. 7,4 |
2017 |
EPC Based Authentication of Devices in the Smart Healthcare System |
International Journal of Electrical, Electronics & Computer Science Engineering Vl.No. 8,7 |
2017 |
Intrusion Detection System to detect sinkhole attack on RPL protocol in Internet of Things |
International Journal of Electrical Electronics and Computer Science Engineering Vl.No. 4,4 |
2017 |
A Secured Public key Exchange Technique for Elliptic Curve Cryptography |
International Journal of Engineering Research in Computer Science and Engineering Vl.No. 4,9 |
2017 |
ENNEGCC 3D Energy Efficient scheduling algorithm using 3-D Neural Network Predictor for Green Cloud Computing Environment |
IEEE Digital Explorer Vl.No. - |
2017 |
Detection of outliers in the IoT data using the STCPOD model |
International Journal of Engineering Research in Computer Science and Engineering Vl.No. 4,10 |
2017 |
A Pragmatic Study on Time Series Models for Big Data |
International Journal of Emerging Research in Management &Technology Vl.No. 6,8 |
2017 |
PAFHWKM: An Enhanced Parallel Approach to Forecast Time Series Data Using Holt-Winters and K-Means Algorithm |
International Journal on Future Revolution in Computer Science & Communication Engineering Vl.No. 3,8 |
2017 |
Device Authentication Mechanism For IoT Enabled Healthcare System |
IEEE Digital Explorer Vl.No. - |
2017 |
Research Issues on Data Security in Cloud Computing: A Survey |
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 6,5 |
2017 |
A Unified Model for Cloud Data Confidentiality |
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2,6 |
2017 |
Enhancing the Security of IoT Data using Multilevel Encryption |
International Journal of Advanced Research in Computer Science Vl.No. 8,9 |
2017 |
A Technique to Enhance Quality of Service using weighted Path Mechanism |
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2,4 |
2017 |
TOPQoS : TENSOR Based Optimum Path Selection in Internet of Things to Enhance Quality of Service |
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2,6 |
2017 |
A Novel Fuzzy Based Energy Efficient Routing for Internet of Things |
IEEE Digital Explorer Vl.No. 0 |
2017 |
Imputing the Missing Values in IoT Using ESTCP Model |
International Journal of Advanced Research in Computer Science Vl.No. 8,9 |
2017 |
A Robust Architecture for Detecting Outliers in IoT Data using STCPOD Model |
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2,6 |
2017 |
RESEARCH ISSUES ON WEB MINING |
State-Of-The-Art and Research Issues In Cloud Computing Vl.No. - |
2017 |
ARARO Framework for Confidentiality Techniques to Enhance Security of Numerical and Non-Numerical Data in Public Cloud Storage |
IJIREEICE Vl.No. 4(3) |
2016 |
Key Based Mutual Authentication (KBMA) Mechanism for Secured Access in MobiCloud Environment |
In Proceedings of International Conference on Mechanical Engineering and Electrical Systems (ICMES 2015) Vl.No. 40 |
2016 |
Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage |
In Proceedings of International Conference on Mechanical Engineering and Electrical Systems (ICMES 2015) Vl.No. 40 |
2016 |
Confidentiality Technique using Data Obfuscation to Enhance Security of Stored Data in Public Cloud Storage |
International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Vl.No. 5, No. 1 |
2016 |
A Novel Lexicon Based Approach to Enhance the Accuracy of Sentiment Analysis on Big Data |
International Journal of Emerging Research in Management and Technology (IJERMT) Vl.No. 5, No. 2 |
2016 |
Combining Lexicon and Machine Learning Method to Enhance the Accuracy of Sentiment Analysis on Big Data |
International Journal of Computer Science and Information Technologies (IJCSIT) Vl.No. 7(1) |
2016 |
Route Discovery Overhead Aware Routing Protocol for IoT to Enhance QoS |
IJCTA (SCOPUS Indexed) Vl.No. 9(27) |
2016 |
Filling Fuel Quantity Measurement Systems Using Internet Of Things |
International Journal of Innovative Research and Advanced Studies (IJIRAS) Vl.No. 3(13) |
2016 |
QRIC: QoS aware Routing for Internet of Things in College Management system |
International Journal of Engineering Research & Technology (IJERT) Vl.No. 4(29) |
2016 |
Deist: Dynamic Detection of Sinkhole Attack for Internet of Things |
International Journal of Engineering and Computer Science Vl.No. 5(12) |
2016 |
A Neoteric Authentication Scheme for IoT Healthcare System |
International Journal of Engineering Sciences & Research Technology (IJESRT) Vl.No. 5(12) |
2016 |
Authentication in IoT Environment: A Survey |
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE Vl.No. 6(10) |
2016 |
A Novel Authentication Scheme for IoT enabled Smart Healthcare System |
International Journal of Engineering Research & Technology(IJERT) Vl.No. 4(29) |
2016 |
Security in IoT Environment: A Survey |
International Journal of Information Technology and Mechanical Engineering (IJITME) Vl.No. 2(7) |
2016 |
Applications of Big Data Analytics for Diagnosing Diabetic Mellitus: Issues and Challenges |
International Journal of Resent Trends in Engineering and Research Vl.No. 2(6) |
2016 |
A Study on Security Issues and Challenges in IoT |
International Journal of Engineering Sciences and Management Research Vl.No. 3(11) |
2016 |
Accentuating the necessity for new-fangled IoT missing data imputation technique |
International Journal of Computer Technology and Applications(I J C T A) (scopus indexed) Vl.No. 9(27) |
2016 |
Decode_HMM_MLCS: An efficient algorithm to identify Multiple Longest Common Subsequence (MLCS) in Large DNA Sequences by using Decoding HMM |
Journal of Chemical and Pharmaceutical Sciences (JCHPS) Vl.No. 9(1) |
2016 |
A Survey on Noisy Data Elimination Using Clustering Techniques |
International Journal of Information Technology and Mechanical Engineering (IJITME) Vl.No. 2(8) |
2016 |
Energy Efficiency in Internet of Things: An Overview |
INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH Vl.No. 2(6) |
2016 |
EOCIPHER: A Hybrid Approach To Enhance Security Of Outsourced Data In Public Cloud Storage |
Proceeding of the 4th International Conference on Artificial Intelligence and Computer Science (AICS2016),28 - 29 November 2016, Langkawi, MALAYSIA Vl.No. 3 |
2016 |
A Unified Model for Cloud Data Confidentiality |
Fifth National Conference on Intelligent computing(FNCIC) Vl.No. - |
2016 |
A framework for ensuring data confidentiality in smart home system |
International conference on Emerging trends in Engineering & Technology Vl.No. - |
2016 |
Confidentiality technique to encrypt and Obfuscate non numerical and numerical data to enhance security in public cloud storage |
IEEE Explorer Vl.No. - |
2016 |
Performance Improved Holt-Winter`s (PIHW) Prediction Algorithm for Big Data Environment |
International Journal on Intelligent Electronic System Vl.No. 10(2) |
2016 |
EDSHA: An Efficient Data Skew Handling Approach For Mapreduce Model Using Time Series Data |
I J C T A (SCOPUS Indexed) Vl.No. 9(27) |
2016 |
Parallel DBScan algorithm for removing noise in IoTBig data |
Fifth National Conference on Intelligent computing(FNCIC) Vl.No. - |
2016 |
A Methodology for preprocessing and construction of Diabetic Mellitus Warehouse |
Fifth National Conference on Intelligent computing(FNCIC) Vl.No. - |
2016 |
Lexicon Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets |
International Journal of Computer Science and Information Technology & Security (IJCSITS) Vl.No. 6 (3) |
2016 |
Machine Learning Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets |
International Journal of Advance Research in Computer Science and Management Studies Vl.No. 4 (5) |
2016 |
Hybrid Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets |
IJCSET Vl.No. 6 (6) |
2016 |
Enhanced Authentication Mechanism for Securing the Cloud Services using AaaS |
International Advanced Research Journal in Science, Engineering and Technology Vl.No. 3 |
2016 |
User Demand Forecasting UDF for Dynamic Schedule Based Auto-scaling in Cloud Environment |
User Demand Forecasting (UDF) for Dynamic Schedule Based Auto-scaling in Cloud Environment Vl.No. - |
2016 |
A Unified Cloud Authenticator for Mobile Cloud Computing Environment |
IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4 |
2015 |
Cost Aware Dynamic Rule Based Auto-scaling of Infrastructure-as-a-Service in Cloud Environment |
IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4 |
2015 |
A Novel Approach for Ensuring Data Confidentiality in Public Cloud Storage |
IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 5 |
2015 |
A Novel Edu-CloudSec Framework for E-Learning |
IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4 |
2015 |
Big Data for Education in Students` Perspective |
IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4 |
2015 |
A Secure Authentication Scheme for MobiCloud |
International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore Vl.No. 0 |
2015 |
Load Balancer Behavior Identifier (LoBBI) for Dynamic Threshold Based Auto-scaling in Cloud |
International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore Vl.No. 0 |
2015 |
A Framework for Key Management for Data Confidentiality in Cloud Environment |
International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore Vl.No. 0 |
2015 |
AROMONcrypt: A Technique to Optimize the Security by Ensuring the Confidentiality of Outsourced Data in Cloud Storage |
Elixir International Journal Vl.No. 0 |
2015 |
Secure Sharing of E-Content in Cloud Environment for Educational Institutions |
International Journal of Computer & Communication Engineering Research Vl.No. 3 |
2015 |
Big Data Migration in the Cloud Environment - An Overview |
IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications ICACCTHPA 2014 Vl.No. 5 |
2015 |
A Review on Big Data Integration |
IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications ICACCTHPA 2014 Vl.No. 5 |
2015 |
Data Integration in Big Data Environment |
Bonfring International Journal of Data Mining Vl.No. 5 |
2015 |
AROcrypt A Confidentiality Technique for Securing Enterprises Data in Cloud |
International Journal of Engineering and Technology (IJET) (Scopus) Vl.No. 7 |
2015 |
SequentialPR_FCP: BigData Pattern decomposing algorithm to Identify Frequent Contiguous Patterns (FCP) from Large DNA Sequence Database using Permutations with Repetition (PR) |
International Journal of Applied Engineering and Research (IJAER) Vl.No. 10 |
2015 |
Analysis of Prediction Techniques in Time Series for Big Data using R |
International Journal of Applied Engineering Research Vl.No. 10 |
2015 |
AROMO Security Framework to Enhance Security of Data in Public Cloud |
International Journal of Applied Engineering Research Vl.No. 10 |
2015 |
SBCOHC: An Optimized Task Scheduling Approach for Public Cloud Environment |
International Journal of Applied Engineering Research Vl.No. 10 |
2015 |
A Novel Architectural Framework to Enhance Scalability in a Federated Heterogeneous Cloud Environment |
International Journal of Applied Engineering Research Vl.No. 10 |
2015 |
Performance Evaluation of Task Scheduling in Cloud Environment Using Soft Computing Algorithms |
International Journal of Computer Science and Network (IJCSN) Vl.No. 4 |
2015 |
AUTOPRED: An Architectural Framework to Predict the Service Requests to Enhance Scalability in Federated Clouds |
International Journal of Electronics Communication and Computer Technology (IJECCT) Vl.No. 5 |
2015 |
Enhanced Framework for Authentication as a Service to Ensure Security in Public Cloud Environment |
International Journal of Engineering Research and Technology (IJERT) Vl.No. 4 |
2015 |
PBCOPSO: A Parallel Optimization Algorithm for Task Scheduling in Cloud Environment |
Indian Journal of Science Technology Vl.No. 8 |
2015 |
An Improved Particle Swarm Optimization Algorithm for Meta Task Scheduling In Cloud Environment |
International Journal of Computer Science Trends and Technology (IJCST) Vl.No. 3 |
2015 |
A Study of User Authentication Techniques in Cloud Computing |
International Journal of Emerging Technologies and Innovative Research (IJETIR) Vl.No. 2 |
2015 |
EnBloAES: A Unified Framework to Preserve Confidentiality of Data in Public Cloud Storage |
Indian Journal of Science Technology Vl.No. 8 |
2015 |
A Survey on User Authentication Mechanism in Mobile Cloud Environment |
International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT) Vl.No. 1 |
2015 |
A Study on Basic Concepts of Big Data |
International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT) Vl.No. 1 |
2015 |
Align_MLCS: A Sequence Alignment based Efficient Algorithm to Identify Multiple Longest Common Subsequence (MLCS) for DNA Sequences |
International Journal of Applied Engineering and Research (IJAER) Vl.No. 10 |
2015 |
Parallel Bottom-up Generalization Approach for Data Anonymization using Map Reduce for Security of Data in Public Cloud |
Indian Journal of Science Technology Vl.No. 8 |
2015 |
Confidentiality Technique to Enhance Security of Data in Public Cloud Storage Using Data Obfuscation |
Indian Journal of Science Technology Vl.No. 8 |
2015 |
Parallelized Contextual Valance Shifter Algorithm for Sentiment Analysis on Big Data |
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 5 |
2015 |
A Hybrid Approach for Aspect Based Sentiment Analysis on Big Data |
International Research Journal of Engineering and Technology (IRJET) Vl.No. 2 |
2015 |
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environment |
International Journal of Computer and Communication System Engineering (IJCCSE) Vl.No. - |
2015 |
Virtual Machine Behavior Identifier (VMBI) for VM Level Auto-scaling in Cloud Environment |
International Journal of Emerging Technology and Advanced Engineering (IJETAE) Vl.No. 5 |
2015 |
Improved Parallel Time Series Based Algorithm for Big Data using MapReduce Programming Model |
International Journal of Applied Engineering Research (IJAER) Vl.No. 10 |
2015 |
Load Pattern Identifier (LoPI) for Threshold Based Auto-scaling in Cloud Environment |
International Journal of Emerging Research and Technology (IJERT) Vl.No. 10 |
2015 |
HMM_MLCS: Hidden Markov Model (HMM) based algorithm to identify Multiple Longest Common Subsequence (MLCS) in DNA Sequences |
Journal of Chemical and Pharmaceutical Sciences (JCHPS) Vl.No. 8 |
2015 |
A Predictive Model to Forecast and Pre-Treat Diabetes Mellitus using Clinical Big Data in Cloud |
International Journal of Applied Engineering Research (IJAER) Vl.No. 10 |
2015 |
A Dynamic Two Stage Authentication Framework to Enhance Security in Public EduCloud |
International Journal of Applied Engineering Research (IJAER) Vl.No. 10 |
2015 |
Issues and Challenges hampering the evolution of IoT big data analytics |
International Journal of Applied Engineering Research (IJAER) Vl.No. 10 |
2015 |
Parallel Prediction Model for Big Data using MapReduce Programming Model |
International Journal of Applied Engineering Research (IJAER) Vl.No. 10 |
2015 |
Confidentiality Framework to Enhance Data Security in Public Cloud Storage |
International Journal of Applied Engineering Research (IJAER) Vl.No. 10 |
2015 |
AROMO Security Framework to Enhance Security of Data in Public Cloud |
Proceedings of 2nd International Conference on Engineering, Technology and Science Vl.No. 1 |
2015 |
Confidentiality Technique to Enhance Security of Data in Public Cloud Storage Using Data Obfuscation |
Proceedings of International Conference on Soft Computing in Applied Sciences & Engineering (ICSCASE-2015) Vl.No. - |
2015 |
A Framework for Cloud Confidentiality in Public Cloud Storage |
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 |
2015 |
A Study on Cloud Data Security Issues |
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 |
2015 |
An Enhanced Qualitative Framework for Data Integration with Multiple Data Sources using Parallel Processing |
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 |
2015 |
Enhanced Authentication Framework for Mobile Cloud Environment |
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 |
2015 |
Issues and Challenges in Sentiment Analysis: A Survey |
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 |
2015 |
EQOS-AODV: A Technique to Enhance Quality of Service using Half Transmission Area Towards Sender |
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 |
2015 |
Large Scale Sentiment Analysis on Cloud Environment |
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 |
2015 |
User Behavior Identifier (UBI) for Schedule Based Auto-scaling in Cloud Environment |
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 |
2015 |
A Survey on the Metamorphosis of IoT Big Data into Quality Data using Pre-processing Techniques |
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 |
2015 |
Enhanced Authentication Mechanism for Public Cloud |
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 |
2015 |
A Study on Aspect based Sentiment Analysis on Big Data |
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15 |
2015 |
DNA-DRUG_FCP: AN EFFICIENT COMPUTATIONAL METHOD FOR DNA-DRUG DESIGN USING FREQUENTLY REPEATED PATTERNS IN A LARGE HUMAN GENOME DATABASE |
Journal of Chemical and Pharmaceutical Sciences Vl.No. 8 |
2015 |
FREQUENT CONTIGUOUS PATTERN (FCP) MINING IN GENOMIC SEQUENCE ANALYSIS AND PATTERN DISCOVERY |
Journal of Chemical and Pharmaceutical Sciences Vl.No. 8 |
2015 |
Big Data Analytics and its Important Concepts: A Review |
Proceedings of International Conference on Contemporary Trends in Computer Science (ICCTC 14) Vl.No. 0 |
2014 |
LASA HEU Heuristic Approach for Service Selection in Composite Web Services |
Proceedings of World Congress on Computing and Communication Technologies (WCCCT 14), IEEE (CPS) Vl.No. 0 |
2014 |
Big Data Analytics and Cloud Based Solutions A Survey |
International Conference on Research Trends in Computer Technologies (ICRTCT) Vl.No. - |
2014 |
Cognitive Complexity Metrics Analysis Tool(CCMAT) |
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 1 |
2014 |
Enhanced User Access Control Architecture for Cloud Storage |
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 4 |
2014 |
An Innovative Solution for Cloud Security through Quantitative Analysis of Various Visual Cryptography Schemes |
International Journal of Engineering and Innovative Technology (IJEIT) Vl.No. 3 |
2014 |
Securing Data with Authentication in Mobile Cloud Environment: Methods, Models and Issues |
International Journal of Computer Application (IJCA) Vl.No. 94 |
2014 |
Security Framework to Ensure the Confidentiality of Outsourced Data in Public Cloud Storage |
International Journal of Current Engineering and Technology (IJCET) Vl.No. 4 |
2014 |
Frequent Contiguous Pattern Mining Algorithms for biological Data Sequences |
International Journal of Computer Application (IJCA) Vl.No. 95 |
2014 |
A Comparative Analysis of Encryption Techniques and Data Security Issues in Cloud Computing |
International Journal of Computer Application (IJCA) Vl.No. 96 |
2014 |
A State-of-Art Load Balancing Algorithms in Cloud Computing |
International Journal of Computer Application (IJCA) Vl.No. 95 |
2014 |
A Review on Dynamic Resource Allocation Strategies and Mechanisms in Cloud Computing |
International Journal of Advanced Research in Computer Science & Technology (IJARCST) Vl.No. 2 |
2014 |
A Unified Architecture for Optimal Resource Utilization in a Heterogeneous Cloud Environment |
International Journal of Machine Learning and Computing Vl.No. 4 |
2014 |
Performance Evaluation of Min-Min and Max-Min algorithms for job scheduling in federated cloud |
International Journal of Computer Applications (IJCA) Vl.No. 99 |
2014 |
Authentication Mechanism to Enhance Security in the cloud environment |
International Journal of Current Engineering and Technology (IJCET) Vl.No. 4 |
2014 |
A Framework to optimize task scheduling in cloud environment |
International Journal of Computer Science and Information Technologies (IJCSIT) Vl.No. 5 |
2014 |
An extensive analysis on task scheduling Algorithms in cloud environment |
International Journal of emerging technologies in computational and applied science(IJETCAS) Vl.No. 10 |
2014 |
General Aspect of (Big) Data Migration Methodologies |
International Journal of Computer Science and Engineering (SSRG-IJCSE) Vl.No. 1 |
2014 |
Positional_nFCP Positions based Big Data algorithm to Identify n_length Frequent Contiguous Patterns FCP in a Large Human Genome Sequence Database |
International Journal of Applied Engineering and Research (IJAER), (Scopus) Vl.No. 9 |
2014 |
Automated Data Validation Framework for Data Quality in Big Data Migration Projects |
International Journal of Computer Science and Engineering (SSRG-IJCSE) Vl.No. 1 |
2014 |
IndexedFCP An Index based approach to identify Frequent Contiguous Patterns FCP in Big Data |
IEEE International Conference on Intelligent Computing Applications (ICICA`14) Vl.No. 0 |
2014 |
An IoT Based Secured Smart Library System with NFC Based Book Tracking |
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) Vl.No. 11 |
2014 |
Enhanced Anonymization Algorithm to Preserve Confidentiality of Data in Public Cloud |
International Conference on Information Society (i-Society 2014), IEEE Vl.No. 0 |
2014 |
Enhanced Architecture for Data Confidentiality in Cloud Computing |
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0 |
2014 |
A Cluster Based Services for Load Balancing in Cloud Computing Environment |
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0 |
2014 |
A Cluster Based Task Scheduling in Cloud Computing |
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0 |
2014 |
A Novel Framework for an Authentication as a Service in Public Cloud Environment |
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. - |
2014 |
A Framework to Ensure Data Security in Public Cloud Storage |
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0 |
2014 |
A Pioneering Approach on Cloud Data Security using Cryptography |
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0 |
2014 |
Combining Top-Down and Bottom-Up Scalable Multidimensional Anonymization over Big Data using Map reduce on Cloud |
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0 |
2014 |
Obfuscrypt: A Novel Confidentiality Technique for Cloud Storage |
International Journal of Computer Applications Vl.No. 88 |
2014 |
A State of Art Scheduling Algorithms in Cloud |
Advance Research in Computer Science & Technology (IJARSCT) Vl.No. 2 |
2014 |
A Security Service Algorithm to Ensure the Confidentiality of Data in Cloud Storage |
International Journal of Engineering Research and Technology (IJERT) Vl.No. 3 |
2014 |
User Authentication Mechanism for Sharing E resource in Educational Clouds |
International Journal of Networking and Communication Engineering Vl.No. 0 |
2013 |
Cognition Based user Interface Design Framework For E-Learning |
International Journal of Advance Technology and Engineering Research (IJATER) Vl.No. 3, Issue 1 |
2013 |
User Interface Design for Effective E-Learning based on Personality Traits |
International Journal of Computer Applications (IJCA) Vl.No. 61, No. 14 |
2013 |
Security Algorithms to Prevent Denial of Service (DoS) Attacks in WLAN |
International Journal of Wireless Communications and Networking Technologies (IJWCNT) Vl.No. 2 No. 1 |
2013 |
A Quality of Service Performance Evaluation Strategy for Delay Classes in General Packet Radio Service |
International Journal of Advanced Science and Technology Vl.No. 50 |
2013 |
Mathematical Modeling and Simulation Study of Delay-Sensitive Algorithm to Enhance Quality of Service in Mobile Networks |
International Journal of Future Generation Communication and Networking Vl.No. 5, No. 3 |
2013 |
AAA Mechanism for Visiting Mobile Node in Network Mobility Environment |
International Journal of Advanced Research in Computer Science and Software Engineering Vl.No. 3, Issue 1 |
2013 |
Fuzzy Weighted Gaussian Mixture Model for Feature Reduction |
International Journal of Computer Applications (IJCA) Vl.No. 64, Issue 18 |
2013 |
ArK Feature Selection Algorithm to resolve Small Sample Size Problem |
International Journal of Artificial Intelligent Systems and Machine Learning Vl.No. 0 |
2013 |
AAA Mechanism for Local Mobile Node in Network Mobility Environment |
International Journal of Computer Networks and Wireless Communications (IJCNWC) Vl.No. 3, No. 1 |
2013 |
AROSA- Reliability Evaluation Framework |
IET Software Vl.No. 0 |
2013 |
An improved Feature Selection Algorithm using Modified Fisher Score and Principal Feature Analysis |
Journal of Data Mining and Knowledge Discovery Vl.No. 0 |
2013 |
Modified Feature Selection algorithm to improve classification accuracy using MFS and PFA |
International Journal of Data Mining and Bioinformatics Vl.No. 0 |
2013 |
Secure and Robust Cloud Storage with Cryptography and Access Control |
International Journal of Computer Science and Engineering (Elixir) Vl.No. 56 |
2013 |
Fuzzy Weighted Ordered Weighted Average Gaussian Mixture Model for Feature Reduction |
International Journal of Computers & Technology Vl.No. 4 |
2013 |
Medium Access Control Spoof Detection and Prevention Algorithm (MAC SDP DoS) for Spoofing Attacks in WLAN |
IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) Vl.No. 3 |
2013 |
Framework to Detect and Prevent Medium Access Control Layer Denial of Service Attacks in WLAN |
IRACST - International Journal of Computer Networks and Wireless Communications (IJCNWC) Vl.No. 3 |
2013 |
Pairwise Fuzzy Ordered Weighted Average Algorithm Gaussian Mixture Model for Feature Reduction |
International Journal of Computers & Technology Vl.No. 6 |
2013 |
SOM ANN A novel approach to analyzing the Brown Plant Hopper |
International Journal of Computer Science & Applications Vl.No. 2 |
2013 |
Auto Scaling in Cloud Computing An Overview |
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2 |
2013 |
Mobile Cloud Security Issues and Challenges: A Perspective |
International Journal of Electronics and Information Technology (IJEIT) Vl.No. 3 |
2013 |
Cloud Service Tools State of the Art |
International Journal of Electronics and Information Technology (IJEIT) Vl.No. 3 |
2013 |
Enhancing Data Security During Transit in Public Cloud |
International Journal of Electronics and Information Technology (IJEIT) Vl.No. 3 |
2013 |
Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm |
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2 |
2013 |
User Authentication Mechanism for Sharing E-resource in Educational Clouds |
International Journal of Computer Science and Network Security (IJCSNS) Vl.No. 13 |
2013 |
An impact of learning behavior and creativity quotient in learning environment |
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2 |
2013 |
Failure Management in Cloud An Overview |
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2 |
2013 |
Match Making Service MMS A Centralized Architecture to Enhance Scalability in a Heterogeneous Cloud |
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 3 |
2013 |
Enhancing the Interpretability of Soil Classification Data from a Neural Network System by Using Fuzzy Approaches |
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 3 |
2013 |
A Novel LAS Relief Feature Selection Algorithm for Enhancing Classification Accuracy in Data Mining |
International Journal of Computers & Technology (IJCT) Vl.No. 11 |
2013 |
A Systematic Approach on Data Pre processing in Data Mining |
International Journal of Advanced Computer Technology (IJACT) Vl.No. 2 |
2013 |
Maintenance Effort Prediction Model Using Cognitive Complexity Metrics |
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 3 |
2013 |
Applying Data Mining Techniques on Soil Fertility Prediction |
International Journal of Computer Applications Technology and Research (IJCATR) Vl.No. 2 |
2013 |
MSDoT Memory Size and Depth of Tier Based Queuing Model for Scheduling a Multi-Tier Cloud |
Proceedings of International Conference on Emerging Trends and Applications in Computer Science (ICETACS), IEEE Xplore Vl.No. - |
2013 |
Impact of Depression and Stress on the Programming Performance of the Students |
International Journal of Data Mining Knowledge Engineering Vl.No. 0 |
2012 |
A Study on Feature Selection using Machine Learning Techniques |
International Journal of Data Mining Knowledge Engineering Vl.No. 0 |
2012 |
MFSPFA: An Enhanced Filter based Feature Selection Algorithm |
International Journal of Computer Applications Vl.No. 51, No. 12 |
2012 |
An Impact of Emotional Happiness in Students? Learning Environment |
International Journal of Data Mining Knowledge Engineering Vl.No. 0 |
2012 |
Feature Selection: A New Perspective |
International Journal of Data Mining Knowledge Engineering Vl.No. 0 |
2012 |
Vertical Scalability Issues and Challenges in Cloud Computing: An Overview |
International Journal of Networking and Communication Engineering Vl.No. 0 |
2012 |
A Survey on Horizontal Scalability in Cloud Computing An Overview |
International Journal of Networking and Communication Engineering Vl.No. 0 |
2012 |
Survey on User Authentication for Cloud Computing |
International Journal of Networking and Communication Engineering Vl.No. 0 |
2012 |
SECURITY ISSUES CHALLENGES AND SOLUTIONS IN NETWORK MOBILITY A REVIEW |
International Journal of Computer Networks and Wireless Communications (IJCNWC) Vl.No. 2, No.2 |
2012 |
FTM A Middle Layer Architecture for Fault Tolerance in Cloud Computing |
IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies ICNICT Vl.No. 0 |
2012 |
AAA Mechanism for Mobile Router in Network Mobility Environment |
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 1, Issue 10 |
2012 |
Enhanced Feature Selection Algorithm using Modified Fisher Criterion and Principal Feature Analysis |
International Journal of Advanced Research in Computer Science Vl.No. 3, No. 4 |
2012 |
Outlook of ANN in Agriculture Data Mining |
International journal of Soft Computing Vl.No. 7, Issue 1 |
2012 |
Clustering Methods and Algorithms in Data Mining :review |
Asian Journal of information Technology Vl.No. 11, Issue 1 |
2012 |
Importance of Association Rules in Data Mining : A Review |
International journal of Soft Computing Vl.No. 7,Issue 3 |
2012 |
A new methodology to overcome high dimensionality problem in data mining |
International Journal of Data Warehousing and Mining Vl.No. 0 |
2012 |
An Inverse Modified Fisher Criterion to solve under-sampled problem in Data Mining |
IEEE Transactions on Knowledge and Data Engineering (TKDE) Vl.No. 0 |
2012 |
Privacy in Cloud Computing: A Survey |
Proceedings of the International Conference of Advanced Computer Science & Information (ACSIT- 2012) Vl.No. 0 |
2012 |
Positional - LCS: A Position based algorithm to find Longest Common Subsequence (LCS) in Sequence Database (SDB) |
IEEE International Conference on Computational Intelligence and Computing Research Vl.No. 0 |
2012 |
HeurisFCP-A Heuristic Approach to Identify Frequent Contiguous Patterns (FCP) in Sequence Database |
Proceedings of the International Conference on Radar, Communication and Computing (ICRCC 2012) Vl.No. 0 |
2012 |
Dr.D.P.JEYAPALAN |
Agent based Parallelized Intrusion Detection System using Ant Colony Optimization |
International Journal of Computer Applications(0975-8887) Vl.No. Vol-105-No_10 |
2014 |
A Co-operative Game Theoretic Approach to Improve the Intrusion Detection System in a Network using Ant Colony Clustering |
International Journal of Computer Applications(0975-8887) Vl.No. Vol-87, No-14 |
2014 |
High Performance Network Intrusion Detection Model Using Graph Databases |
International Journal of Computational Intelligence and Information Security Vl.No. Vol 5, No. 9 |
2014 |
Performance Analysis of Intrusion Detection System on WSN Based on Euler Graph |
International Journal of Advanced Research in Computer Science & Technology Vl.No. Vol 2, Issue 3 |
2014 |
A Novel Graph Based Clustering Approach for Network Intrusion Detection |
International Journal of Computational Intelligence and Information Security Vl.No. Vol-4, No-4 |
2013 |
Dr.S.ALBERT RABARA |
Integrated Architecture to Enhance the Security in IoT Cloud Using ECC DNA |
Proceedings Intelligent Computing Systems Vl.No. 0 |
2021 |
An Integrated Secure Cloud Storage Architecture for Ensuring Integrity of Data using Hybrid Encryption Schemes in Cloud IoT Environment |
Journal of Shanghai Jiaotong University Vl.No. 16 |
2020 |
Secured Architecture for Internet of Things (IoT) Based Smart Healthcare |
Fifth International Conference on Inventive Computation Technologies (ICICT-2020), IEEE Explore Vl.No. 0 |
2020 |
ENHANCED TPA BASED DATA INTEGRITY MECHANISM FOR OBJECT STORAGE ARCHITECTURE ON INTEGRATEDIOT CLOUDSMART ENVIRONMENT |
Journal of Shanghai Jiaotong University Vl.No. 16 |
2020 |
End-to-End Secured Architecture for Internet of Things Information Kendra (IoT_IK) Integrating IoT-Enabled Smart Services and Applications |
International Conference on Mobile Computing and Sustainable Informatics (ICMCSI) Vl.No. 0 |
2020 |
TECHNIQUES AND NUANCES OF TEACHING TAMIL LANGUAGE USING INFORMATION COMMUNICAITON TECHNOLOGY (ICT) IN HIGHER LEARNING INSTITUTION |
INTERNATIONAL CONFERENCE ON TECHNIQUES AND NUNACES TEACHING TAMIL LANGUAGE IN HIGHER EDUCATION Vl.No. 0 |
2020 |
Shield Advanced Mitigation System of Distributed Denial of Service Attack in integration of Internet of Things and Cloud Computing Environment |
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 9 |
2019 |
Taxonomy of Distributed Denial of Service Attacks and Popular Defense Mechanism using Integration of IoT and Cloud Environment |
International Journal of Innovative Research in Science, Engineering and Technology Vl.No. 8 |
2019 |
Mitigation Of Distributed Denial Of Service Attack Using Dynamic Captcha With Equal Probability Algorithm In Integration Of Internet Of Things And Cloud Environment |
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vl.No. 8 |
2019 |
An Effective Distributed Denial Of Service Attack Detection Model In Integration Of Internet Of Things And Cloud Computing Using Binary Fire Fly Optimization Algorithm |
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vl.No. 8 |
2019 |
An Integrated Architecture For Iot Based Data Storage In Secure Smart Monitoring Environment |
International Journal of Scientific & Technology Research Vl.No. 8 |
2019 |
ENHANCED CLOUD IDENTITY MANAGEMENT ENABLING SECURE ACCESS IN CROSS CLOUD ENVIRONMENT |
ADALYA JOURNAL Vl.No. 8 |
2019 |
Integrated Device Cloud Architecture for a Secure Cloud of Things Environment |
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8 |
2019 |
Secure Data Transaction using ECC in Corporate Environment |
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8 |
2019 |
Secure Smart Card Based Parking System (SSCPS) for IOT-Smart Cities |
IEEE Conference Proceedings Vl.No. 0 |
2018 |
An Integrated IPv6 Architecture for smart environment using IoT and Cloud Computing |
Journal of Emerging Technologies and Innovative Research Vl.No. 5 |
2018 |
Elliptic Curve Cryptography based Security Framework for Internet of Things (IoT) Enabled Smart Card |
IEEE INTERNATIONAL CONFERENCE WCCCT-2017 Vl.No. - |
2017 |
A Secure Architecture for Mobile Web Service (SAMWS) |
IEEE INTERNATIONAL CONFERENCE WCCCT-2017 Vl.No. - |
2017 |
Enhanced Security Architecture for IPv6 Transition |
IEEE INTERNATIONAL CONFERENCE WCCCT-2017 Vl.No. - |
2017 |
Algorithmic Approach to security Architecture for Integrated IoT Smart Services Environment |
IEEE INTERNATIONAL CONFERENCE WCCCT-2017 Vl.No. - |
2017 |
An Integrated Inter-Mobility IPv4/IPv6 Address Translation Architecture for Corporate Networks |
IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO 2015) in association with National University of Kaohsiung-Taiwan, Oakland University-USA, IEEE Computational Intel Vl.No. 10 |
2015 |
An Integrated Seamless Mobility and IPv4/IPv6 Address Translation Architecture between IPv4 and IPv6 Networks |
Journal of Recent Research in Engineering and Technology (JRRET) Vl.No. Vol.2, Issue. 4 |
2015 |
An Integrated Security Architecture for Next Generation Networks |
International Journal of Computer Applications (IJCA) Vl.No. Vol.1 |
2015 |
Design and Development of Integrated, Secured and Intelligent Architecture for Internet of Things and Cloud Computing |
IEEE IEEE Xplore Digital Library Pages: 2015 Vl.No. DoI: 10.1109/FiCloud.2015.23 |
2015 |
An Architecture For Secure Mobile Database Transaction For Corporate Environment |
International Journal of Applied Engineering Research (IJAER) Vl.No. 10 |
2015 |
Elliptic Curve Cryptography based Security Framework for Internet of Things and Cloud Computing |
International Journal of Computer Science and Technology (IJCST) Vl.No. Vol. 6, Issue 3 |
2015 |
Quality of Service Architecture for Internet of Things and Cloud Computing |
International Journal of Computer Applications (IJCA) Vl.No. Vol.128,Issue.7 |
2015 |
An Integrated Secure Inter-Mobility IPv4/IPv6 Address Translation Architecture for Corporate Networks |
International Journal of Future Computer and Communication (IJFCC) Vl.No. Vol. 4, Issue: 5 |
2015 |
An Integrated Secure Architecture for IPv4/IPv6 Address Translation Between IPv4 and IPv6 Networks |
Advances in Intelligent Systems and Computing, Springer Vl.No. Vol. 380 |
2015 |
Internet of Things (IoT) Architecture for Smart Services |
International Journal of Applied Engineering Research (IJAER) Vl.No. Vol.10 |
2015 |
Internet of Things (IoT) based Smart Environment Integrating various Business Applications |
International Journal of Computer Applications (IJCA) Vl.No. Vol.128 |
2015 |
An Integrated IP-MPLS Architecture for Next Generation Networks |
International Journal of Computer Applications(0975-8887) Vl.No. Vol.104, No.3 |
2014 |
A Framework for Secure Mobile Database Transactions using Cryptographic Co-processor |
International Journal of Computer Applications (0975-8887) Vl.No. Vol.105 |
2014 |
An Integrated IP-MPLS Mobility Framework For Next Generation Networks |
International Journal of Computer Science and Technology Vl.No. Vol.5, No.4 |
2014 |
An Integrated and Intelligent Secure Architecture for Mobile Web Services |
International Journal of Computer Science and Technology Vl.No. Vol.5, No.3, July-Sept |
2014 |
Multi Level Secure Architecture for Mobile Web Services using Intelligent Mobile Agents and Intelligent Content Filter |
ACM International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), Kaohsiung City, Taiwan Vl.No. 0 |
2014 |
An Integrated Next Generation IP-MPLS Hybrid Architecture for Seamless Mobility |
Recent Advances in Electrical Engineering, WSEAS, Lisbon, Portugal Vl.No. 0 |
2014 |
An Intelligent Content Filter based framework for Mobile Web Services |
Recent Advances in Electrical Engineering Series, WSEAS, Lisbon, Portugal Vl.No. 0 |
2014 |
Financial Transactions Over Wired and Wireless Networks: Technical Perspective |
Lecture Notes in Mechanical Engineering, Springer Vl.No. - |
2012 |
Performance Analysis of Addressing, Interoperability and Inter-Mobility Management Architecture Between IPv4 and IPv6 Networks (AIMM-I46) |
Springer Series: Advances in Computer Science, Engineering & Applications AISC Vl.No. Vol.167/2012 |
2012 |
Architecture for Integrated and Intelligent Security for Mobile Web Services |
Conference on Intelligent Infrastructure Vl.No. 1 |
2012 |
A Security Architecture for Cloud Data Using Hybrid Security Scheme |
IEEE Xplore & Proceedings 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) Vl.No. 0 |
202 |
Novel Hybrid Technique Enhancing Data Privacy and Security |
Springer IFIP and Proceedings 6th International Conference on Computer, Communication, and Signal Processing Vl.No. 651 |
202 |
Reducing Delay during Handoff in Multi-Layered Security Architecture for Wireless LANs in the Corporate Network |
Proceedings of the IEEE Internat. Conference on Wireless Communica-tion - Networking and Mobile Computing, Wuhan, China Vl.No. 2: 1038 - 1043 |
0 |
Modeling and Performance study of MPLS VPN |
Proceedings of the Internat. Conference on communications in Computing, Las Vega, Nevada, USA Vl.No. pp. 91-96 |
0 |
Multi-Layer Security architecture for Wireless LANs in the Corporate Network |
Proceedings of World Wireless Congress, Palo Alto, USA Vl.No. pp. 202-08 |
0 |
Multi-Layer Security architecture for Wireless LANs in the Corporate Environment |
International Journal of Network Security, IJNS-2006-01-25-2. Vl.No. - |
0 |
SIM-Based Authentication for the integrated GPRS. |
WLAN Networks (USA)-World Wireless Congress Vl.No. - |
0 |
A Model for Transaction Management with Concurrency Control for Multi-Level Secure Distributed Real-time Database systems. |
Proceedings of the WSEAS International Conference on Applied Computer Science, Italy. Vl.No. 2: 127-133 |
0 |
Public Key Infrastructure for Mobile Banking Security. |
Proceedings of the World Wireless Congress, WWC`2008, San Francisco Bay Area. Vl.No. ISSN 1558-7835, pp.70-75 |
0 |
SIM-Based Authentication for the Integrated GPRS-WLAN Networks. |
Affordable Computing Tata McGraw-Hill Publishing Co. Ltd., New Delhi. Vl.No. ISBN-0-07-062171-3,pp. 41-45 |
0 |
Improving Route Optimiza-tion in Mobile IP |
Proc. of International Conference of Emerging Applications of Infor-mation Technology, Kolkatta Vl.No. pp. 235-38 |
0 |
Multi-Level Secure Concurrency Control Model for Financial Applications |
Affordable Computing Tata McGraw-Hill Publishing Co. Ltd., New Delhi. Vl.No. ISBN-0-07-062171-3,pp. 95-99 |
0 |
Security Framework Architecture for Mobile Banking, In: Mobile Ubiquitous and Pervasive Computing |
Macmillan India Punlications Ltd., New Delhi. Vl.No. ISBN 10:0230-63011-1, 2: 114-120 |
0 |
Evolving a Model of Transaction Management with Concurrency Control for Multilevel Secure Distributed Real-time Database Systems. |
Proceedings of the 7th WSEAS International Conference on Applied Computer Science �Computer Science Challenges Vl.No. ISBN: 978-960-6766-15-2,pp.127-133 |
0 |
Secured User Interface Algorithm for Mobile Banking Framework - In: Affordable Computing |
Affordable Computing Tata McGraw-Hill Publishing Co. Ltd., New Delhi. Vl.No. ISBN-0-07-062171-3,pp. 87-90 |
0 |
Dr.S.BRITTO RAMESH KUMAR |
Transmission Deviation?based Windowed Training for Intrusion Detection on Streaming Data |
International Journal of Computer Trends and Technology Vl.No. 72 |
2024 |
Machine Learning Techniques For Effective Cloud Anomaly Detection -A Comprehensive Review |
Fuzzy Systems and Soft Computing Vl.No. 19(02) |
2024 |
Viability Assessment about Applicability of Machine Learning in Cloud Anomaly Detection |
Journal of Computational Analysis and Applications Vl.No. 33(07) |
2024 |
Intrusion Detection System Using Ensemble LearningApproaches |
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 12 |
2023 |
A Feature Selection Method using FSPSO |
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 12 |
2023 |
SC-CVAR: Intrusion Detection Using Feature Selection and Machine Learning Techniques on UNSW-NB15 Dataset. |
IJCSNS International Journal of Computer Science and Network Vl.No. 22 |
2022 |
An Efficient Britwari Technique to Enhance Canny Edge Detection Algorithm using Deep Learning |
ICTACT Journal of Soft Computing Vl.No. 12 |
2022 |
Domain Specific ANN Heuristic Edge Detection Algorithm for CNN based MRI Classification [DAHEDA} |
JOURNAL OF ALGEBRAIC STATISTIC Vl.No. 13 |
2022 |
A COMPARATIVE STUDY ON VARIOUS EDGE DETECTION METHODS USING DEEP LEARNING |
Journal of Fundamental & Comparative Research Vl.No. VIII |
2022 |
A Comparative Study and Survey on Different Types of Methods in Edge Detection Algorithms |
International Advanced Research Journal in Science, Engineering and Technology Vl.No. 9 |
2022 |
Intrusion detection on Cloud Computing |
International journal of Advanced Research in Computer and communication Engineering Vl.No. 11 |
2022 |
Sine Cosine Optimization Algorithm for Feature Selection |
Journal of Fundamental & Comparative Research Vl.No. VIII |
2022 |
Machine Learning Algorithm using AR for Intrusion detection system |
IARJSET Vl.No. 9 |
2022 |
An Effective Way of Cloud Intrusion Detection System Using Decision tree |
NeuroQuantology Vl.No. 20 |
2022 |
Intrusion Detection using Attribute Subset Selector Bagging (ASUB) to Handle Imbalance and Noise |
IJCSNS International Journal of Computer Science and Network Security Vl.No. 22 |
2022 |
Sampling Integrated Boosting Classifier for Network Intrusion Detection |
International Research Journal of Education and Technology Vl.No. 4 Issue: 12 | Dec-2022 |
2022 |
Semi-Supervised Intrusion Detection Based on Stacking and Feature-Engineering to Handle Data Imbalance |
INDIAN JOURNAL OF SCIENCE AND TECHNOLOGY Vl.No. 15(46) |
2022 |
PREDICTION OF RHABDOMYOSARCOMAUSING TRANSFER LEARNING ON PATHOLOGY AND RADIOLOGY IMAGES |
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 11(8) |
2022 |
Optimized Encryption Based Elliptical Curve Diffie- Hellman Approach for secure heart disease prediction |
International Journal Advanced Technology and Engineering Exploration (IJATEE) Vl.No. 8 |
2021 |
An Enhancing Canny Edge Detection using SUSAN Filter based on Deep Learning Algorithm for improved image Edge Detection |
Webology Vl.No. 6 |
2021 |
Intrusion Detection on the UNSW-NB15 dataset using Feature Selection and Machine Learning Techniques |
Webology Vl.No. 18 |
2021 |
Biometric Security for Cloud Data Using Fingerprint |
Science, Technology And Development Journal Vl.No. IX |
2020 |
Text-based Encryption (TBEnc) Technique to Secure Data in Cloud Storage Server |
Journal of Shanghai Jiaotong University Vl.No. 16, Issue 10 |
2020 |
Survey: Web Security Services in Cloud Computing |
International Journal for Scientific Research & Development Vl.No. 8, Issue 8 |
2020 |
Security Framework for Context Aware Mobile Web Services |
Springer Lecture Notes on Data Engineering and Communication Technologies Vl.No. 26 |
2019 |
DORBRI: An Architecture for the DoD Security Breaches Through Quantum IoT |
Springer Lecture Notes on Data Engineering and Communication Technologies Vl.No. 26 |
2019 |
A Security Architecture for a Smart Home Ecosystem using Permissioned Blockchain |
International Journal of Research and Analytical Reviews (IJRAR) Vl.No. 6(1) |
2019 |
Security Threats in Cloud Computing |
Asian Journal of Computer Science and Technology Vl.No. 8 |
2019 |
Dom_classi: An enhanced weighting mechanism for Domain Specific Words |
International Journal of Applied Engineering Research Vl.No. 14(1) |
2019 |
An Architecture to Enable Secure Firmware Updates on a Distributed-Trust IoT Network Using Blockchain |
Springer Lecture Notes on Data Engineering and Communications Technologies Vl.No. 1 |
2019 |
A Security Framework for A Sustainable Smart Ecosystem using Permissioned Blockchain: Performance Evaluation |
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 8(10) |
2019 |
Performance Analysis Of Proposed D1FTBC Approach For Improving Consistency In Cloud Data Transactions |
International Journal Of Scientific & Technology Research Vl.No. 8(08) |
2019 |
Performance of Proposed Architecture for Data Transactions in Cloud using D1FTBC |
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8(02) |
2019 |
Predicting Student Dropouts for Better Decision Making Using Sentiment Analysis |
International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) Vl.No. 8(04) |
2019 |
NIC_LBA: Negations and Intensifier Classification of microblog data using Lexicon Based Approach |
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 6(06) |
2019 |
SECON: Secured Confidentiality Framework To Protect Data Stored In Public Cloud Systems |
International Journal Of Information And Computing Science Vl.No. 6(05) |
2019 |
Hybrid Text and Value Based Ncryption and Obfuscation (Tvbencobfus) To Safeguard Data in Cloud Storage Server |
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 8(10) |
2019 |
An Approach For IoT Security Using Quantum Key Distribution |
International Journal Of Scientific & Technology Research Vl.No. 8(08) |
2019 |
A Survey on Web Service Prediction Techniques |
INTERNATIONAL JOURNAL OF RESEARCH AND ANALYTICAL REVIEWS (IJRAR) Vl.No. 6(02) |
2019 |
Enhancing Channel Security By Error Detection And Correction During Quantum Key Distribution Using Hamming Code With Modified Elgamal |
International Journal Of Scientific & Technology Research Vl.No. 8(12) |
2019 |
An Enhanced Multi-Layered Secured Architecture for Context-Aware Web Services |
World Wide Journal of Multidisciplinary Research and Development Vl.No. 4(2) |
2018 |
Cloud Computing Data Security using Hybrid |
National Conference on INNOVATIONS IN COMPUTER TECHNOLOGY AND ITS APPLICATIONS Vl.No. 1 |
2018 |
Security Architecture of Cloud Computing |
International Journal of Electrical Electronics & Computer Science Engineering Vl.No. 1 |
2018 |
Cloud Network Security using Biometrics |
Journal of Innovative Research and Solutions (JIRAS) Vl.No. 4(1) |
2018 |
An Architecture for Improving the QoS in Composite Web Service Selection |
International Journal of Scientific Research in Computer Science, Applications and Management Studies (IJSRCSAMS) Vl.No. 7(4) |
2018 |
Survey on QoS Metrics in Web Services |
International Journal of Science and Advance Research in Technology(IJSART) Vl.No. 4(9) |
2018 |
Comparative Study of Conflict Identification and Resolution in Heterogeneous Datasets |
Springer Lecture Notes on Data Engineering and Communication Technologies Vl.No. 26 |
2018 |
A Study on various tools to overcome Security Issues in Big Data |
International Journal of Scientific Research in Computer Science, Applications and Management Studies (IJSRCSAMS) Vl.No. 7(4) |
2018 |
Dictionary based Approach for improving the Accuracy of opinion mining on Big data |
International Journal Of Research and Analytical Reviews Vl.No. 5(4) |
2018 |
Opinion Mining using Hybrid Approach on Big Data : A Perspective |
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 7(5) |
2018 |
A Methodological Framework for Opinion Mining |
International Journal of Computer Sciences and Engineering Vl.No. 5(8) |
2018 |
Cloud Network Security using Biometrics |
National Conference Vl.No. 0 |
2018 |
Cloud Computeing Data Security using Hybrid |
National Conference on Innovations in Computer Technology and its Applications Vl.No. 0 |
2018 |
Security Architecture of Cloud Computing |
International Conferece Vl.No. 0 |
2018 |
An Enhanced Multi-Layered Secured Architecture for Context-Aware Web Services |
World Wide Jouranl of Multidisciplinary Research and Development Vl.No. 04-02 |
2018 |
Online Social Networking Services Impact on Big Data |
International Journal of Computer Science Vl.No. 5(17) |
2017 |
Security BM Techniques using in Digital Image Processing |
International Journal of Computer Science Vl.No. 5(18) |
2017 |
Ant Colony Model (AnCoMoDaS) for Data Security in Cloud |
International Research Journal of Engineering and Technology (IRJET) Vl.No. 4(5) |
2017 |
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA) for Cloud Data Encoding, Encrypting and Forwarding |
International e-Journal for Technology and Research Vl.No. 1(6) |
2017 |
Data Division in Cloud for secured Data Storage using RSA Algorithm |
International Research Journal of Engineering and Technology (IRJET) Vl.No. 4(6) |
2017 |
An Efficient Depth Fixed Tree Consistency (DIFTC) Method for Distributed Data Transactions in Cloud Environment |
International Journal of Advanced Research in Computer science Vl.No. 8(7) |
2017 |
Dynamic and Scalable Architecture for Accessing the Cloud Databases and Securing Cloud Services Using Public Key Infrastructure |
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2(6) |
2017 |
Proposed Architecture for Improving Security and Consistency of Data Transactions in Cloud Database using Tree-Based Consistency Approach |
International Journal of Computer Science and Information Security (IJCSIS) Vl.No. 15(12) |
2017 |
Issues and Challenges in Big Data Security |
International Conference on Newer Engineering Concepts and Technology Vl.No. 1 |
2017 |
A Survey on Big Data Security |
National Conference on Big Data Analytics and Mobile Technologies (NCBM 2017) Vl.No. 1 |
2017 |
Issues and Challenges In Big Data Security |
International Conferece on Newer Engeneering concepts and Technology Vl.No. 0 |
2017 |
A Survey on Big Data Security |
National Conference on Big Data Analytics and Mobile Technologies Vl.No. 0 |
2017 |
Ant Colony Model (AnCoMoDaS) for Data Security in Cloud |
International Research Journal of Engineering and Technology (IRJET) Vl.No. 04(05) |
2017 |
Security BM Technique using in Digital Image Processing |
International Journal of Computer Science (IJCS) Vl.No. 5(1), 18 |
2017 |
Online Social Networking Services Impact on Big Data |
International Journal of Computer Science (IJCS) Vl.No. 5(1), 18 |
2017 |
An Innovative Security Architecture and Algorithm for Social Network Services |
ARPN Journal of Engineering and Applied Sciences Vl.No. 11(2) |
2016 |
Internet of Things: Data Management and Security |
International Journal of Computer Technology and Applications(IJCTA) Vl.No. 9(26) |
2016 |
Security Issues in Web Services |
International Research Journal of Engineering and Technology (IRJET) Vl.No. 3(5) |
2016 |
Security Issues in Context-Aware System |
International Research Journal of Engineering and Technology (IRJET) Vl.No. 3(5) |
2016 |
Visualizing Big Datamining: Issues, Challenges and Opportunities |
International Journal of Computer Technology and Applications(IJCTA) Vl.No. 9(27) |
2016 |
An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services |
International Journal of Computer Applications (IJCA) Vl.No. 146(15) |
2016 |
SECURITY ISSUES ON COMPOSITE WEB SERVICES |
International Research Journal of Engineering and Technology (IRJET) Vl.No. 3(6) |
2016 |
Survey on Privacy Preservation in context aware web services |
Indian Journal of Computer Science and Engineering Vl.No. 6(6) |
2016 |
IoT based Home Security through Digital Image Processing Algorithms |
2nd World Congress on Computing and Communication Technologies (WCCCT `16) Vl.No. 1 |
2016 |
PLIS: Proposed Language Independent Stemmer for Information Retrieval Systems Using Dynamic Programming |
2nd World Congress on Computing and Communication Technologies (WCCCT `16) Vl.No. 5 |
2016 |
An Approach For Analyzing The Factors Recorded In The Tree Rings Using Image Processing Techniques |
2nd World Congress on Computing and Communication Technologies (WCCCT `16) Vl.No. 1 |
2016 |
An Approach For Analyzing The Factors Recorded In The Tree Rings Using Image Processing Techniques |
World Congress on Computing and Communication Technologies (WCCCT) Vl.No. 0 |
2016 |
PLIS: Proposed Language Independent Stemmer for Information Retrieval Systems Using Dynamic Programming |
World Congress on Computing and Communication Technologies (WCCCT) Vl.No. 0 |
2016 |
An Enhanced Architecture For Feature Based Opinion Mining From Product Reviews |
World Congress on Computing and Communication Technologies (WCCCT) Vl.No. 0 |
2016 |
IoT based Home Security through Digital Image Processing Algorithms |
World Congress on Computing and Communication Technologies (WCCCT) Vl.No. 0 |
2016 |
Visualizing Big Data Mining: Issues, Challenges and Opportunities |
International Journal of Control Theory and Applications (IJCTA) Vl.No. 9(10) |
2016 |
Internet of Things: Data Management and Security |
International Journal of Control Theory and Applications (IJCTA) Vl.No. 9(10) |
2016 |
An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services |
International Journal of Computer Applications (IJCA) Vl.No. 146(15) |
2016 |
Security Issues On Composite Web Services |
International Research Journal of Engineering and Technology (IRJET) Vl.No. 03(06) |
2016 |
Security Issues in Web Services |
International Research Journal of Engineering and Technology (IRJET) Vl.No. 03(05) |
2016 |
Security Issues in Context- Aware System |
International Research Journal of Engineering and Technology (IRJET) Vl.No. 03(05) |
2016 |
A Security Framework for Social Network Services |
International Journal of Applied Engineering Research Vl.No. 10 |
2015 |
Enhanced Elliptic Curve Cryptography |
Indian Journal of Science and Technology Vl.No. 8 |
2015 |
An Implementation of Three Layered Net-Chk Two Factors Online Social Network Model for Privacy |
International Conference on Electrical, Computer and Communication Technologies Vl.No. 2 |
2015 |
Learning Behavior Analysis Using Data Mining Techniques |
International Journal of Applied Engineering Research Vl.No. 10 |
2015 |
A Framework for Language Independent Stemmer Using Dynamic Programming |
International Journal of Applied Engineering Research Vl.No. 10 |
2015 |
Conflict Resolution and Duplicate Elimination in Heterogeneous Datasets using Unified Data Retrieval Techniques |
Indian Journal of Science and Technology Vl.No. 8 |
2015 |
Feedback Based Conflict Identification and Resolution using Duplicate Elimination and Ranking Techniques |
International Journal Of Computers & Technology Vl.No. 14(9) |
2015 |
Proposed Hough Technique For Estimating Climatic Conditions Recorded In The Cross Section Of Tree Images |
IOSR Journal Of Computer Engineering (IOSR-JCE) Vl.No. 17 |
2015 |
Semi-Automatic Techniquesfor Estimating Climatic Conditions Recorded In The Tree Rings |
International Journal Of Computer Trends And Technology (IJCTT) Vl.No. 29 |
2015 |
Issues and Challenges of Data Transaction Management in Cloud Environment |
International Research Journal of Engineering and Technology Vl.No. 2 |
2015 |
Cloud Computing Data Security Issues, Challenges, Architecture and Methods- A Survey |
International Research Journal of Engineering and Technology Vl.No. 2 |
2015 |
Proposed Architecture for secure Distributed Data Transaction Management in Cloud Environment |
International Journal of Applied Engineering Research Vl.No. 10 |
2015 |
Enhanced Elliptical Curve Cryptography Based PKI for Secure Data Storage in a Cloud |
International Journal of Applied Engineering Research Vl.No. 10 |
2015 |
Security issues in Internet of Things using Next Generation Mobile Networks |
International Journal of Applied Engineering Research Vl.No. 10 |
2015 |
A Multi-Layered Secured Framework for Context-Aware Web services in Health care Industries |
International Journal of Applied Engineering Research Vl.No. 10 |
2015 |
Survey Paper On Mobile Social Networks |
International Research Journal of Engineering and Technology Vl.No. 2(6) |
2015 |
Security on Mobile Social Networks |
International Journal of Advance Research in Computer Science and Management Studies Vl.No. 3(9) |
2015 |
Context-Aware In PrivacyPreservation For Health Care Systems |
International Journal of Advanced Computer Technology Vl.No. 4 |
2015 |
Conflict Identification and Resolution in Heterogeneous Datasets: A Comprehensive Survey |
International Journal of Computer Applications Vl.No. 14(9) |
2015 |
Security & Privacy issues in Social Network Services An Overview |
International Journal of Innovative Research in Electrical, Electronics Instrumentation and Control Engineering(IJIREEICE) Vl.No. 2(1) |
2014 |
Social Network Services An Overview |
International Journal of Innovative Research in Electrical, Electronics Instrumentation and Control Engineering(IJARCCE) Vl.No. 3(1) |
2014 |
Two Factor Framework for Web Based Social Network using PKI |
International Journal on Advanced Computer Theory and Engineering(ACTE) Vl.No. 3(1) |
2014 |
Systematic Optimization and Refinement of Stemmer Rule Set Using NLTK |
International Conference on Contemporary Trends in Computer Science(CTCS) Vl.No. 1 |
2014 |
Rule Based Machine Translation System from English to Tamil |
World Congress on Computing And Communication Technologies(WCCCT `14) Vl.No. 1 |
2014 |
Security analysis of future enterprise business intelligence |
World Congress on Computing And Communication Technologies(WCCCT `14) Vl.No. 1 |
2014 |
Inconsistency Resolution and Joint Information Extraction from Multiple Data Sources |
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 3(7) |
2014 |
Resolving Data Inconsistency in Data Integration |
International Conference on Contemporary Computing and Informatics (IC3I) Vl.No. 1 |
2014 |
Hybrid Algorithm for Web based Social Network |
National Conference on Information Technology Sustain Future (NCITSF) Vl.No. 1 |
2014 |
Security Challenges for Online Social Network using Multiparty Access Control |
International Journal of Computer Science Management Research(NCITCS) Vl.No. 1 |
2014 |
An Architecture for Securing Heterogeneous Web Services |
International Journal of Advanced Research in Computer Science & Technology (IJARCST ) Vl.No. 2(3) |
2014 |
Context-Aware Architecture for User Access Control |
International Journal of Advanced Research in Computer Science & Technology (IJARCST ) Vl.No. 2(3) |
2014 |
A Review on Privacy Control Techniques in Context-aware Web Services |
International Journal of Advanced Research in Computer Science & Technology (IJARCST ) Vl.No. 2(3) |
2014 |
DESIGN OF A SECURE ARCHITECTURE FOR CONTEXT AWARE WEB SERVICES USING ACCESS CONTROL MECHANISM |
International Conference on Contemporary Computing and Informatics (IC3I) (IEEE) Vl.No. 1 |
2014 |
An Improved Rule based Iterative Affix Stripping Stemmer for Tamil Language using K-Mean Clustering |
International Journal of Computer Applications (IJCA) Vl.No. 94(13) |
2014 |
A Novel Approach for Phonetic Based Stem Generation Using Edit Distance and Longest Common Subsequence |
International Journal of Engineering Research and technology (IJERT) Vl.No. 1 |
2014 |
A Comprehensive Analyze of Stemming Algorithms for Indian and Non-Indian Languages |
International Journal of Computer Engineering & Applications (IJCEA) Vl.No. 7(3) |
2014 |
Multilingual Phonetic Based Stem Generation |
Second International Conference on Emerging Research in Computing, Information Communication and Applications (ERCICA-2014) Vl.No. 1 |
2014 |
A Study Of Image Processing In Analysing Tree Ring Structure |
International Journal Of Research In Humanities, Arts And Literature Vl.No. 90(19) |
2014 |
An Approach For Dendroclimatology Using Image Processing Techniques |
Proceedings of the IEEE World Congress on Computing and Communication Technologies (WCCCT?14 Vl.No. 0 |
2014 |
A Framework for Privacy Handler Mechanism in Context-aware Web Services |
International Journal of Advanced Research in Computer Science & Technology (IJARCST) Vl.No. 2 |
2014 |
SMIWBSN: Security Mechanism in Web Based Social Network |
International Journal of Emerging Trends in Computing and Communication Technology(IJETCCT) Vl.No. 1 |
2014 |
Comparison Of Various Edge Detection Techniques In Tree Ring Structure |
International Journal of Computer Applications Vl.No. 90?19 |
2014 |
Extending Social Privacy Protector for Twitter Social Network |
CIIT International Journal of Networking and Communication Engineering Vl.No. 1(1) |
2013 |
A Context Aware System Based on Service Oriented Architecture |
International Conference on Recent Trends In Computer Applications(ICRTICA) Vl.No. 1 |
2013 |
Net Chk A security Framework for Social Network Applications |
Internation Journal of Advance Research in Computer and communication Engineering(IJARCCE) Vl.No. 2(12) |
2013 |
A Comparative Study on Variants of Classical Porter Stemmer Algorithm |
International Journal of Scientific Transactions in Environment and Techrovention(IJSTET) Vl.No. 6(4) |
2013 |
Categorization of Metabolic Syndrome X Among Adults Using Learning Techniques |
CiiT - International Journal of Data Mining and Knowledge Engineering Vl.No. 5(05) |
2013 |
Extending Social Privacy Protector for Twitter Social Network |
International Journal of Networking and Communication Engineering Vl.No. 5(01) |
2013 |
Architecture for Integrated and Intelligent Security for Mobile Web Services |
International Conference on Intelligent Infrastructure Vl.No. 1 |
2012 |
A Comprehensive Study on Stemming Algorithms |
International Conference on Semantic E-Business and Enterprise Computing(SEEC) Vl.No. 1 |
2012 |
An End-to-End Secure Mobile Payment System using Public Key Infrastructure |
Journal of Algorithms and Computational Technology (JACT) Vl.No. 6 |
2012 |
Dr. A. ALOYSIUS |
Advancing IoT Security through Blockchain-Driven Dynamic Trust Evaluation |
INDIAN JOURNAL OF SCIENCE AND TECHNOLOGY Vl.No. 18 |
2025 |
Data Reduction Based Truth Discovery Analysis by Resolving the Conflicts in Big Data Using Continuous Data |
Internatonal Journal for Innovative Engineering and Management Research Vl.No. 12 |
2023 |
SENTIMENT ANALYSIS IN MELANOMA CANCER DETECTION USING ENSEMBLE LEARNING MODEL |
ICTACT JOURNAL ON SOFT COMPUTING Vl.No. VOLUME: 13 |
2023 |
Task Scheduling with Altered Grey Wolf Optimization (AGWO) in Mobile Cloud Computing using Cloudlet |
Journal of Communications Software and Systems Vl.No. 19 |
2023 |
Mobility and Execution Time Aware Task Offloading in Mobile Cloud Computing |
The International Journal of Interactive Mobile Technologies (iJIM) Vl.No. 16 |
2022 |
Sentiment Analysis Using Voting Base Unsupervisied Ensemble Machine Learning in Cancer Detection |
ICTACT Journal on Image and Video Processing Vl.No. 13 |
2022 |
Textual Sentiment Analysis using Lexicon Based Approaches |
Annals of the Romanian Society for Cell Biology Vl.No. 25 |
2021 |
Hybrid Approaches Based Emotion Detection in Memes Sentiment Analysis |
International Journal of Engineering Research and Technology Vl.No. 14 |
2021 |
Multi-Modal Sentiment Analysis To Improve The Techniques In Lexicon Based Approach And Machine Learning Approach |
Webology Vl.No. 18 |
2021 |
Empirical Study on Distance Based Data Reduction for Truth Discovery using Conflicted Data |
Mukt Shabd Journal Vl.No. 9 |
2020 |
HADOOP BASED PARADIGM USING HYBRID FEATURE SELECTION APPROACH TO ENHANCE PERFORMANCE IN SUPERVISED LEARNING CLASSIFICATION |
International Journal of Advanced Science and Technology Vl.No. 20 |
2020 |
Mobility Aware Offloading and Scheduling of Tasks using Cloudlet in Mobile Cloud Computing: A Survey |
International Journal of Advanced Science and Technology Vl.No. 20 |
2020 |
Applications, Approaches, and Challenges in Sentiment Analysis (AACSA) |
International Research Journal of Modernization in Engineering Technology and Science Vl.No. 2 |
2020 |
Emotion Detection for Memes Sentiment Analysis Using Hybrid Approaches (EMSA-HAP |
Alochana Chakra Journal Vl.No. 9 |
2020 |
A Survey on Fake Data Identification in Big Data using Artificial Intelligence Techniques |
International Journal of Multidisciplinary Educational Research Vl.No. 9 |
2020 |
Distance Based Measurement Approach for Truth Discovery by Resolving the Conflicts in Big Data |
Journal of Physics: Conference Series Vl.No. 0 |
2019 |
DATA PREPROCESSING IN SENTIMENT ANALYSIS USING TWITTER DATA |
INTERNATIONAL EDUCATIONAL APPLIED RESEARCH JOURNAL (IEARJ) Vl.No. 3 |
2019 |
A Comparative study of Lexicon based and Machine learning based classifications in Sentiment analysis |
International Journal of Data Mining Techniques and Applications INT Vl.No. 8 |
2019 |
A SURVEY ON MOBILE COMPUTING SECURITY |
International Journal of Research and Analytical Reviews (IJRAR) Vl.No. 6 |
2019 |
Analysis of Various Machine Learning Algorithms to Predict the Type II Diabetes Disease |
International Journal of Computing Algorithm Vl.No. 8 |
2019 |
An Enhanced Preprocessing Algorithms And Accuracy Prediction Of Machine Learning Algortihms |
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vl.No. 8 |
2019 |
A NOVEL HADOOP MAP REDUCE PARADIGM USING AN EFFECTIVE EPCA APPROACH |
Journal of Analysis and Computation (JAC) Vl.No. 8 |
2019 |
DATA SECURITY ON HADOOP DISTRIBUTED FILE SYSTEM USING RSA ENCRYPTION |
"International Journal of Research and Analytical Reviews (IJRAR) " Vl.No. 6 |
2019 |
Architecture Design for Hadoop No-SQL and Hive |
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 3 |
2018 |
Maintenance Effort Prediction Model using Aspect-Oriented Cognitive Complexity Metrics |
International Journal of Advanced Research in Computer Science (IJARCS) Vl.No. 8 |
2018 |
Aspect Oriented Programming Cognitive Complexity Metric Analysis Tool |
International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT) Vl.No. 3 |
2018 |
Empirical Validation Of Object Oriented Cognitive Complexity Metrics Using Maintenance Effort Prediction |
nternational Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 7 |
2018 |
Quality Enhancement by Resolving Conflict using Optimization in Big data |
International Journal of Computer Sciences and Engineering Vl.No. 6 |
2018 |
Big Data: Challenges and Opportunities |
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 03 |
2018 |
An Approach for Truth Discovery by Resolving the Conflicts on Categorical Data |
Journal of Physics: Conference Series Vl.No. 0 |
2018 |
Concept of MapReduce Scheduling and Processing Techniques |
JETIR Vl.No. 05 |
2018 |
ISSUES & CHALLENGES FOR HDFS & MAPREDUCE |
IJRAR Vl.No. 05 |
2018 |
An Architecture Design and concept of Security in Hadoop Environment |
IJRAR Vl.No. 05 |
2018 |
An Enchanced Data Cleaning Algorithm for Twitter Data |
International Journal of Research in Computer Science Application and Managemetn Studies Vl.No. 7 |
2018 |
Sentiment Analysis using Mode Measure |
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 6 |
2017 |
Statistical Analysis on Social media Usage in Students Education |
SSICACR-2017 Vl.No. - |
2017 |
A survey on Complexity Metrics in Object Oriented System |
SSICACR-2017 Vl.No. 0 |
2017 |
Sentiment Analysis A Review |
International Journal of Engineering Technology and Computer Research (IJETCR) Vl.No. 5 |
2017 |
An Analysis of Object Oriented Complexity Metrics |
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2 |
2017 |
A Heuristics on Interface Complexity |
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Vl.No. 6 |
2017 |
Lexicon based Acronyms and Emoticons Classification of Sentiment Analysis (SA) on Big Data |
International Journal of Database Theory and Application Vl.No. 10 |
2017 |
Polarity Detection of Lexicon based Sentiment Analysis with Negation Handling |
Journal of Advanced Research in Dynamical & Control Systems Vl.No. 13 |
2017 |
Pre-Processing Concepts and Techniques for Sentiment Analysis |
International Journal of Scientific Research in Computer Science, Engineering and Information Technology (UGC) Vl.No. 2 |
2017 |
A SURVEY ON TRUTH DISCOVERY METHODS FOR BIG DATA |
International Journal of Engineering Technology and Computer Research (IJETCR) Vl.No. 5 |
2017 |
PREDICTIVE ANALYTICS CONCEPTS IN BIG DATA- A SURVEY |
International Journal of Advanced Research in Computer Science Vl.No. 8 |
2017 |
Social Network Prediction Measurement in Education |
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2 |
2017 |
Cognitive Weighted Inherited Class Complexity Metric |
Procedia Computer Science Vl.No. 125 |
2017 |
Survey of MapReduce on BigData |
International Journal of Engineering and Computer Science Vl.No. 6 |
2017 |
Usage and impact of social media in students education |
IJCRT Vl.No. 5 |
2017 |
Sentiment Analysis Using Measuring Modes |
International Journal of Engineering and Computer Science Vl.No. 6 |
2017 |
Pre-Processing Concepts and Techniques for Sentiment Analysis |
International Journal of Scientific Research in Computer Science, Engineering , and Information Technology Vl.No. 02 |
2017 |
Cognitive Weighted Polymorphism Factor: A New Cognitive Complexity Metric |
International Journal of Computer and Information Engineering Vl.No. 2 |
2016 |
Concepts and Methods of Sentiment Analysis on Big Data |
International Journal of Innovative Research in Science, Engineering and Technology Vl.No. 5 |
2016 |
Big Data Prediction Using Evolutionary Techniques: A Survey |
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 3 |
2016 |
Models for Maintenance Effort Prediction with Object-Oriented Cognitive Complexity Metrics |
World Congress on Computing and Communication Technologies Vl.No. - |
2016 |
DESIGN AND ANALYSIS OF ASPECT ORIENTED METRIC CWCoAR USING COGNITIVE APPROACH |
World Congress on Computing and Communication Technologies Vl.No. - |
2016 |
A Metric for identifying incoming outgoing interactions Complexitya of a Component |
Emerging Treands in software Denelopment Vl.No. - |
2016 |
A Survey on Complexity Metric OOD |
Advances in Computing resource Vl.No. - |
2016 |
An Enhanced Sinkhole Attacker Node Identification Technique using Successful Link Ratio in IoT Environment |
IT Skills Show & International Conference on Advancements in Computing Resources (SSICACR-2017) Vl.No. 5 |
2016 |
CONCEPTS AND METHODS OF SENTIMENT ANALYSIS ON BIG DATA |
INTER NATIONAL JOURNAL INNOVATIVE RESEARCH IN SCIENCE ENGINEERING AND TECHNOLOGY Vl.No. 5 |
2016 |
A Survey on User Authentication Mechanism in Mobile Cloud Computing |
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 1 |
2015 |
A Review on Component Based Software Metrics |
International Journal of Fuzzy Mathematical Archive Vl.No. 7 |
2015 |
Cognitive Weighted Polymorphism Factor: A Comprehension Augmented Complexity Metric |
International Journal of Computer, electrical, Automation, Control Vl.No. 9 |
2015 |
Aspect oriented Programming Metrics - A Survey |
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 1, 3 |
2015 |
Analysis of Measuring the Complexity of Advice Using a Cognitive Approach |
International Journal of Applied Engineering Research Vl.No. 10 , 82 |
2015 |
Cognitive Perspective Of Attribute Hiding Factor Complexity Metric |
International Journal of Engineering And Computer Science Vl.No. 4 |
2015 |
Cognitive Weighted Method Hiding Factor Complexity Metric |
International Journal of Computer Science and Software Engineering Vl.No. 4 |
2015 |
Validation of Cognitive Weighted Methods Hiding Factor Complexity Metric |
International journal of Applied Engineering Research Vl.No. 10 no 82 |
2015 |
A Survey on User Authentication Mechanism in Mobile Cloud Computing |
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 3 |
2015 |
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environment |
International Journal of Computer and Communication System Engineering (IJCCSE) Vl.No. 2 |
2015 |
Cognitive Weighted Polymorphism Factor: A New Cognitive Complexity Metric |
International Journal of Computer and Information Engineering Vl.No. 02 |
2015 |
cognitive Weighted Polymorphism Factor: A Comprehension Augmented Complexity Metric |
International Journal of Computer and Information Engineering Vl.No. 9 |
2015 |
Analysis of Measuring the complexity of Advice using a Cognitive Approach |
International Journal of Applied Engineering Research Vl.No. 10 |
2015 |
Aspect Oriented Programming Metrics - A Survey |
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 01 |
2015 |
Cognitive Complexity Metrics Analysis Tool (CCMAT) |
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 01 |
2014 |
Cognitive Complexity Metrics Analysis Tool (CCMAT) |
International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT), Vl.No. 1 |
2014 |
Maintenance Effort Prediction Model Using Cognitive Complexity Metrics |
International Journal of Advanced Research in Computer Science and Software Engineering Vl.No. Volume 3, Issue 11, |
2013 |
An Investigation into the Relationship between Intelligence Quotient and Debugging Ability of Component Based System |
International Journal of Software Engineering and Technology Vl.No. 4 |
2012 |
Coupling Complexity Metric: A Cognitive Approach |
International Journal of Information Technology and Computer Science Vl.No. 4 |
2012 |
Cognitive Weighted Response For a Class: A New Metric for Measuring Cognitive Complexity of OO Systems |
International Journal of Advanced Research in Computer Science Vl.No. volume 3 no 4 |
2012 |
A Survey on Metrics of Software Cognitive Complexity for OO Design, |
on International Conference on Computational Intelligence and Cognitive Informatics Vl.No. 58 |
2011 |
Attribute Weighted Class Complexity: A New Metric For Measuring Cognitive Complexity Of OO Systems |
International Conference on Computational Intelligence and Cognitive Informatics Vl.No. 58 |
2011 |
An Analysis of Dependency between Personality Traits and Debugging Ability in Component Based System |
International Journal of Software Engineering and Technology Vl.No. 0 |
2011 |
Attribute Weighted Class Complexity : A New Metric For Measuring Cognitive Complexity Of Oo Systems |
Proceedings of International Conference on Computational Intelligence and Cognitive Informatics, Vl.No. 0 |
2011 |
A Survey on Metrics of Software Cognitive Complexity for OO Design |
Proceedings of International Conference on Computational Intelligence and Cognitive Informatics Vl.No. 0 |
2011 |
An Investigation into the Impact of OO Design on Program Debugging with Individual and Collaborative Approaches |
International Journal of Software Engineering and Technology Vl.No. 0 |
2010 |
On Validating Class Level Cognitive Complexity Metrics |
International Journal of Software Engineering and Technology Vl.No. 0 |
2010 |
A Study on Impact of Emotional Quotient on Program Comprehension |
, Proceedings of International Conference on Communication and Computational Intelligence Vl.No. 0 |
2010 |
, A Survey on the Complexity Metrics for Component Based System |
Proceeding of National Conference on Computer Science and Engineering (NCCSE-2010) Vl.No. 0 |
2010 |
An Investigation into the impact of OO Design on Program Comprehension with individual and Collaborative Approach |
Proceeding of National Conference on Emerging Trends in Advance Computing, Vl.No. 0 |
2010 |
A Survey on the Complexity Metrics for Component Based System |
Proceeding of National Conference on Computer Science and Engineering (NCCSE-2010) Vl.No. 0 |
2010 |
An Investigation into the impact of OO Design on Program Comprehension with individual and Collaborative Approach |
Proceeding of National Conference on Emerging Trends in Advance Computing (NCETAC 2010) Vl.No. 0 |
2010 |
Extended Weighted Class Complexity: A new of software complexity for objected oriented systems, |
, Proceedings of International Conference on Semantic E-business and Enterprise computing SEEC Vl.No. 0 |
2009 |
, A Comparison of Proposed Cognitive weights for control structures and object oriented programming languages |
Proceedings of International Conference on Advanced Computing Vl.No. 0 |
2009 |
An Investigation into the Relationship between Personality traits and Recollection & Retention ability in object oriented Systems |
Proceedings of International Conference on Advanced Computing (ICAC) Vl.No. 0 |
2009 |
A Comparison of Proposed Cognitive weights for control structures and object oriented programming languages |
Proceedings of International Conference on Advanced Computing (ICAC) Vl.No. 0 |
2009 |
A study on the impact of Style elements in Recollection & Retention of Object oriented System |
Proceedings of International Conference on Semantic E-business and Enterprise computing (SEEC 2009) Vl.No. 0 |
2009 |
A Study on the Impact of Personality traits in program debugging of object oriented System |
proceeding on the National Conference on Advance Computing (NCAC) Vl.No. 0 |
2009 |
Using Gender Differences to Link Intelligent Quotient and Program Debugging of Object Oriented Systems |
Proceedings of National Conference on Software Engineering and Applications Vl.No. 0 |
2008 |
Using Gender Differences to Link Intelligent Quotient and Program Debugging of Object Oriented Systems |
Proceedings of National Conference on Software Engineering and Applications, Vl.No. 0 |
2008 |
Dr.V.JUDE NIRMAL |
Hierarchical Attention and Contextual Embedding for Robust Sarcasm Detection |
Indian Journal of Science and Technology Vl.No. Vol:17(40) |
2024 |
A Profit-Driven Stacking Model for Effective Churn Prediction |
International Journal on "Technical and Physical Problems of Engineering" (IJTPE) Vl.No. 14 |
2022 |
Minimax Probability based Churn Prediction for Profit Maximization |
ICTACT Journal on Soft Computing Vl.No. 12 |
2021 |
A survey on Big Data Tools and Applications |
International Journal of Research and Analytical Reviews (IJRAR) Vl.No. 6 |
2019 |
Mobile Learning with Social Media: Next Paradigm Shift in Education |
National Conference on Higher Education in the Knowledge Age: Techno-Pedagogical Perspectives and Innovations Vl.No. 0 |
2016 |
Real-time Sentiment Prediction on Streaming Social Network Data using In-Memory Processing |
IEEE Explore (WCCCT 2016) Vl.No. 0 |
2016 |
Emoticon Based Sentiment Analysis using Parallel Analytics on Hadoop |
Indian Journal of Science and Technology (IJST) Vl.No. 9 (33) |
2016 |
Real-Time Sentiment Prediction on Streaming Social Network Data Using In-Memory Processing |
World Congress on Computing and Communication Technologies (WCCCT Vl.No. - |
2016 |
Parallel Implementation of Big Data Pre-processing Algorithims for Sentiment Analysis of Social Networking Data |
International Journal of Fuzzy Mathematical Archive Vl.No. 6, Number 1 & 2 |
2015 |
Parallelization Techniques in Pre-processing Phase for Sentiment Analysis in Big Data: A Comparative Analysis |
International Journal of Applied Engineering And Research (IJAER) Vl.No. 10 |
2015 |
Fast and Effective Real time Sentiment analysis on Streaming Big Data using Distributed Caching Techniques |
International Journal of Applied Engineering And Research (IJAER) Vl.No. 10 |
2015 |
SECCON: A Framework for Applying Access Control Policies in Context-Aware Wireless Networks |
World Congress on Computing and Communication Technologies (IEEE Xplore) Vl.No. - |
2014 |
Sentiment and Emotion Analysis for Context Sensitive Information Retrieval of Social Networking Sites: A Survey |
International Journal of Computer Applications (IJCA) Vl.No. 100, No. 10 |
2014 |
Context-Aware Data Retrieval using Mobile Social Network |
National Conference on Advanced Computing Vl.No. 0 |
2013 |
Rev.Dr.S.ARUL OLI SJ |
Confidentiality Technique to Encrypt Non-Numerical Data to Enhance Security in Public Cloud Storage |
Institute of Electrical and Electronics Engineers (IEEE) Vl.No. 0 |
2017 |
Confidentiality Technique to Obfuscate the Numerical Data to Enhance Security in Public Cloud Storage |
Institute of Electrical and Electronics Engineers (IEEE) Vl.No. - |
2017 |
Confidentiality Technique to Encrypt and Obfuscate Non-Numerical and Numerical Data to Enhance Security in Public Cloud Storage |
Institute of Electrical and Electronics Engineers (IEEE) Vl.No. - |
2017 |
Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage |
MATEC Web of Conferences Vl.No. 40 |
2016 |
Confidentiality Technique for Data Stored in Public Cloud Storage |
International Journal of Engineering Research & Technology (IJERT) Vl.No. 5 |
2016 |
Confidentilaity Technique using Data Obfuscation to Enhance Security of Stored Data in Public Cloud Storage |
International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Vl.No. 5 |
2016 |
Confidentiality Technique for Enhancing Data Security using Encryption and Obfuscation in Public Cloud Storage |
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 5 |
2016 |
ARARO Framework for Confidentiality Techniques to Enhance Security of Numerical and Non-Numerical Data in Public Cloud Storage |
INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN ELECTRICAL, ELECTRONICS, INSTRUMENTATION AND CONTROL ENGINEERING (IJIREEICE) Vl.No. 4 |
2016 |
A Novel Approach for Ensuring Data Confidentiality in Public Cloud Storage |
International Journal of Computer Applications Vl.No. 0975 ? 8887 |
2015 |
A Framework for Key Management for Data Confidentiality in Cloud Environment |
Institute of Electrical and Electronics Engineers (IEEE) Vl.No. 15 |
2015 |
A Framework for Data Confidentiality in Public Cloud Storage |
MISBAH Journal Vl.No. 15 |
2015 |
Confidentiality Framework to Enhance Data Security in Public Cloud Storage |
International Journal of Applied Engineering Research (IJAER) Vl.No. 10 |
2015 |
A Framework to Ensure Data Security in Public Cloud Storage |
ELSEVIER India Vl.No. 0 |
2014 |
Mobile Cloud Security Issues and Challenges A Perspective |
International Journal of Engineering and Innovative Technology (IJEIT) Vl.No. 3 |
2013 |
Dr.A.VIMAL JERALD |
End to End Secured Architecture for Internet of Things Information Kendra (IoT_IK) Integrating IoT Enabled Smart Services and Applications |
International Conference on Mobile Computing and Sustainable Informatics - ICMCSI 2020 Vl.No. 0 |
2021 |
End-to-End Secured Architecture for Internet of Things Information Kendra (IoT_IK) Integrating IoT-Enabled Smart Services and Applications |
International Conference on Mobile Computing and Sustainable Informatics (ICMCSI) Vl.No. 0 |
2021 |
Secured Architecture for Internet of Things (ioT) Enabled Smart Agriculture |
International Journal of Scientific & Technology Research (IJSTR) Vl.No. 9 |
2020 |
Techniques and Nuances of Teaching Tamil Language Literature using Information Communication Technology (ICT) in Higher Education |
International Seminar on the methods and techniques of Teaching Tamil in Higher Education Vl.No. 0 |
2020 |
?Secured Architecture for Internet of Things (IoT) Based Smart Health Care? |
5th International Conference on Inventive Computation Technologies [ICICT 2020] Vl.No. 0 |
2020 |
Secured Architecture for Internet of Things (IoT) Based Smart Healthcare |
Fifth International Conference on Inventive Computation Technologies (ICICT-2020) Vl.No. 0 |
2020 |
TECHNIQUES AND NUANCES OF TEACHING TAMIL LANGUAGE USING INFORMATION COMMUNICAITON TECHNOLOGY (ICT) IN HIGHER LEARNING INSTITUTION |
INTERNATIONAL CONFERENCE ON TECHNIQUES AND NUNACES TEACHING TAMIL LANGUAGE IN HIGHER EDUCATION Vl.No. 0 |
2020 |
Taxonomy of Distributed Denial of Service Attacks and Popular Defense Mechanism using Integration of IoT and Cloud Environment |
International Journal of Innovative Research in Science, Engineering and Technology Vl.No. 8 |
2019 |
Secured Architecture for Integrated IoT Enabled Smart Services |
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8 |
2019 |
A Review on Security Issues Arise During Integration of Cloud Computing and Internet of Things |
International Journal of Scientific Research in Computer Science Application and Management Studies Vl.No. 7 |
2018 |
Algorithmic Approach to Security Architecture for Integrated IoT Smart Services Environment |
IEEE CPS - Computing and Communication Technologies (WCCCT), 2017 World Congress Vl.No. 0 |
2017 |
Secure IoT Architecture for Integrated Smart Services Environment |
Proceedings of the 10th INDIACom -2016, 3rd International Conference on Vl.No. 5 |
2016 |
AN ADAPTABLE SECURE SMART CARD ARCHITECTURE FOR INTERNET OF THINGS AND CLOUD COMPUTING |
IJRET (International Journal of Research in Engineering and Technology Vl.No. 05 |
2016 |
Secure IoT Architecture for Smart Services Environment |
IEEE Digital Library Vl.No. 0 |
2016 |
Algorithmic Approach to security Architecture for Integrated IoT Smart Services Environment |
IEEE Digital Library Vl.No. - |
2016 |
AN ADAPTABLE SECURE SMART CARD ARCHITECTURE FOR INTERNET OF THINGS AND CLOUD COMPUTING |
IJRET: International Journal of Research in Engineering and Technology Vl.No. 5 - 5 |
2016 |
Green Computing, a Remedy for Global Warming |
Proceedings of National Conference on Emerging Trends in Software Development by Alagappa University Vl.No. 0 |
2016 |
Internet of Things (IoT) based Smart Environment integrating various Business Applications |
International Journal for Computer Application Vl.No. 128 |
2015 |
Internet of Things for Smart Services |
International Journal Applied Engineering Research Vl.No. 10-82 |
2015 |
Elliptic Curve Cryptography based Security Framework for Internet of Things and Cloud Computing |
International Journal of Computer Science and Technology (IJCST) Vl.No. 6.3 |
2015 |
Quality of Service Architecture for Internet of Things and Cloud Computing |
International Journal of Computer Application Vl.No. 128-7 |
2015 |
An Adoptable and Secure Intelligent Smart Card Framework for Internet of Things and Cloud Computing |
50th Golden Jubilee Annual Convention on "Digital Life", CS_-2015 to be published by AISC Springer Vl.No. 0 |
2015 |
Elliptic Curve Cryptography based Security Framework for Internet of Things and Cloud Computing |
Recent Advances on Computer Engineering Vl.No. 0 |
2015 |
Internet of Things (IoT) based Smart Environment integrating various Business Applications |
International Journal of Computer Applications Vl.No. 128 |
2015 |
Quality of service architecture for internet of things and cloud computing |
International Journal of Computer Applications Vl.No. 128-8 |
2015 |
Elliptic curve cryptography based security framework for internet of things and cloud computing |
International Journal of Computer Science and Technologies Vl.No. 6 issue 3 |
2015 |
A Framework for User Oriented Content Dissemination for E-Learning |
Proceedings of The Role of ICT in Higher Education: Quality, Accessibility and Security Vl.No. 0 |
2010 |
Dr. George Gabriel Richard Roy |
A Security Architecture for a Smart Home Ecosystem using Permissioned Blockchain |
International Journal of Research and Analytical Reviews Vl.No. 6 |
2019 |
A Security Framework for a Sustainable Smart Ecosystem using Permissioned Blockchain: Performance Evaluation |
International Journal of Innovative Technology and Exploring Engineering Vl.No. 8 |
2019 |
A Security Framework for a Sustainable Smart Ecosystem using Permissioned Blockchain |
Journal of Emerging Technologies and Innovative Research Vl.No. 6 |
2019 |
A Survey on Threats and Challenges in Blue Eyes Technology |
Journal of Emerging Technologies and Innovative Research Vl.No. 5 |
2018 |
An Overview of Threats and Challenges in Smart Wi-Fi Ad-Hoc Networks |
Internation Journal for Research in Applied Science and Engineering Technology Vl.No. 6 |
2018 |
An Architecture to Enable Secure Firmware Updates on a Distributed-Trust IoT Network Using Blockchain |
Lecture Notes on Data Engineering and Communications Technologies book series Vl.No. 15 |
2018 |
Security Issues in Internet of Things using Next Generation Mobile Networks |
International Journal of Applied Engineering Research Vl.No. 10 Number 82 |
2015 |
A Cloud Model for Effective E-Learning |
IEEE - CPS Vl.No. 10 |
2014 |
Security analysis of future Enterprise Business Intelligence |
IEEE-CPS Vl.No. 0 |
2014 |
Dr.A.ANGELPREETHI |
Improved Moth Flame Optimization with Deep Convolutional Neural Network for Colorectal Cancer Classification using Biomedical Images |
IEEE Xplore Vl.No. 1 |
2024 |
Lexicon and Machine Learning Based Comparative Analysis to Classify the Students Opinions on Covid-19 Pandemic |
International Journal for Innovative Engineering and Management Research Vl.No. 12 |
2023 |
Dom_classi: An enhanced weighting mechanism for Domain Specific Words |
International Journal of Applied Engineering Research Vl.No. 14 |
2019 |
NIC_LBA: Negations and Intensifier Classification of microblog data using Lexicon Based Approach |
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 6 |
2019 |
Predicting Student Dropouts for Better Decision Making Using Sentiment Analysis |
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 8 |
2019 |
Traffic Redundancy and Elimination Approach to Reduce Cloud Bandwidth and Costs |
International Journal of Computer Sciences and Engineering (UGC approved Journal) Vl.No. 6 |
2018 |
A Methodological Framework for Opinion Mining |
International Journal of Computer Sciences and Engineering (UGC approved Journal) Vl.No. 2 |
2018 |
PHYCHOLOGICAL ANALYSIS OF EMOTICONS AND EMOJI IDEOGRAMS IN SENTIMENT ANALYSIS |
Proceedings of the National conference Vl.No. 0 |
2018 |
Opinion Mining using Hybrid Approach on Big Data : A Perspective |
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 7 |
2018 |
Dictionary based Approach for improving the Accuracy of opinion mining on Big data |
International Journal Of Research and Analytical Reviews Vl.No. 5 |
2018 |
An Enhanced Architecture for Feature Based Opinion Mining From Product Reviews |
IEEE Xplore Vl.No. - |
2017 |
Visualizing Big Datamining: Issues, Challenges and Opportunities |
International Journal of Control Theory and Applications Vl.No. 9 |
2016 |
An Impact of Intelligent Quotient and Learning Behavior of Students in Learning Environment |
CIIT International Journal of Artificial Intelligent System and Machine Learning Vl.No. Vol 7 (1) Vl.No. 7 |
2015 |
A survey on big data and its charactristics using 3v`s |
IJERT International Journal of Engineering Research and Technology proceedings of the conference 3rd National Conference On Innovation In Computing And Communication Technology Vl.No. 3 |
2015 |
Green computing |
Proceedings of the national conference on recent trends in computing Vl.No. 0 |
2012 |
Dr. G AROCKIA SAHAYA SHEELA |
Predictive Modeling of the Impact of Smartphone Addiction on Students? Academic Performance Using Machine Learning |
Next Generation Technologies for Sustainable Computing Vl.No. 1 |
2025 |
Survey of Machine Learning Techniques in Pancreatic Disease Diagnosis and Prediction |
Emerging Trends in Research Frontiers in Information Technology Vl.No. 0 |
2025 |
Exploring Machine Learning Algorithms for Early Prediction of Hypothyroidis m Diagnosis |
Emerging Trends in Research Frontiers in Information Technology Vl.No. 1 |
2025 |
Improving Academic Performance through Machine Learning- Driven Personalized Tutoring Systems |
Emerging Trends in Research Frontiers in Information Technology Vl.No. 1 |
2025 |
Kinded Pointcut Complexity Metric: A Cognitive Approach |
Webology Vl.No. 0 |
2021 |
An Estimation Of Measuring The Complexity Of Advice Using Fuzzy Logic Technique, |
Webology Vl.No. 9 |
2021 |
E-Illegal Voting Detector |
Journal of MultiDimensional Research and Review (JMRR) Vl.No. 0 |
2021 |
Coal Mine Workers Smart Safety Nursing Security System |
International Research Journal of Modernization in Engineering Technology and Science (IRJMETS) Vl.No. 0 |
2020 |
Study on Advancement on Android and its Versions |
International Research Journal of Modernization in Engineering Technology and Science (IRJMETS) Vl.No. 0 |
2020 |
Aspect Oriented Programming - Cognitive Complexity Metric Analysis Tool |
International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT) Vl.No. 3 |
2018 |
Design and Analysis of Aspect Oriented Metric CWCoAR using Cognitive Approach |
Computing and Communication Technologies - IEEE Vl.No. 9 |
2017 |
Maintenance Effort Prediction Model using Aspect- Oriented Cognitive Complexity Metrics |
International Journal of Advanced Research in Computer Science (IJARCS) Vl.No. 8 |
2017 |
Empirical Validation of DAAOMT using Maintenance Effort Prediction |
International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) Vl.No. 7 |
2017 |
Design and Analysis of Aspect Oriented Metric CWCAE using Cognitive Approach |
International Journal of Engineering Research &Technology (IJERT) Vl.No. 5 |
2016 |
Statistical Analysis of Pointcut Complexity Metric using Cognitive Approach |
International Journal of Control Theory and Applications (IJCTA) Vl.No. 9 |
2016 |
Aspect Oriented Metrics A survey |
International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT) Vl.No. 2 |
2015 |
Analysis of Measuring the Complexity of Advice using a Cognitive Approach |
International Journal of Applied Engineering Research (IJAER) Vl.No. 10 |
2015 |
Dr.P.JOSEPH CHARLES |
survey Analysis on Secured User Authentication through Biometric Recognition |
International Conference on Disruptive Technologies Vl.No. 1 |
2024 |
A Study on SDN Based Load Balancing Techniques in IoT Network |
International Conference on Disruptive Technologies Vl.No. 1 |
2024 |
Prediction of Learning Disabilities in School-Going Children Using Deep Learning Technique |
International Conference on Disruptive Technologies Vl.No. 1 |
2024 |
DNASecured EdgeComputing for Heterogeneous IoT |
Journal of Electrical Systems. Vl.No. 1 |
2024 |
Multi-objective nature inspired hybrid optimization algorithm to improve prediction accuracy on imbalance medical datasets |
The scientific Temper Vl.No. 15(3) |
2024 |
Comparative Analysis of Convolutional Neural Network Transfer Learning Models for Predicting Learning Diaability |
Journal of Electrical Systems Vl.No. 1 |
2024 |
Homomorphic DNA Security in IoT EdgeData |
International Research Journal of Multidiscipilinary Scope Vl.No. 0 |
2024 |
Survey Analysis on Secured User authentication Through Biometric Recognition |
International Journal on Recent and Innovation Trends in Computing and Communication Vl.No. Volume: 11 Issue: 9 |
2023 |
A study on emerging approaches for cyber physical system security |
International journal for innovative engineering and management research Vl.No. 12 |
2023 |
A Survey on Big Data Analytics: Tools, Issues and Challenges |
Chinese Journal Of Computational Mechanics Vl.No. 5 |
2023 |
Secure Virtual Machine Migration using ANT colony Algorithm |
IEEE Vl.No. 0 |
2021 |
Experimental Analysis Of Securing Context Aware Web Services |
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vl.No. VOLUME 9, ISSUE 01 |
2020 |
STUDY ON SECURITY MANAGEMENT FOR PATIENT HEALTH RECORDS IN HEALTH CLOUD |
The International journal of analytical and experimental modal analysis Vl.No. Volume XII, Issue I |
2020 |
Semantic Survey on 6th Generation of Wireless Mobile Communication |
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. Vol. 9, Issue 1, J |
2020 |
Dynamic Resource Allocation For Cloud Computing Using Live Migration Of Virtual Machines |
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 5 Issue 2 |
2019 |
INTRUSION DETECTION Mechanism in Data Mining |
INTERNATIONAL JOURNAL FOR RESEARCH & DEVELOPMENT IN TECHNOLOGY Vl.No. 11(2) |
2019 |
Proposed Multilevel Architecture for Securing Context Aware Mobile Web Services |
The International journal of analytical and experimental modal analysis Vl.No. Volume XI, Issue IX |
2019 |
BIG DATA CONCEPTS ANALYTICS ARCHITECTURES OVERVIEW |
International Research Journal of Engineering and Technology Vl.No. 05 |
2018 |
Big Data Security an Overview |
International Research Journal of Engineering and Technology (IRJET Vl.No. 05 |
2018 |
A Study on Three Service Model of Cloud Computing?, International Journal of Electrical Electronics & Computer Science Engineering |
International Journal of Electrical Electronics & Computer Science Engineering Vl.No. 1 |
2018 |
Security Issues in Hybrid Cloud Computing |
International Journal of Electrical Electronics & Computer Science Engineering Vl.No. 1 |
2018 |
Research Issues on Web Mining |
International Journal of Computer Sciences and Engineering Vl.No. Volume-6, Special Issue-2 |
2018 |
Traffic Redundancy and Elimination Approach to Reduce Cloud Bandwidth and Costs |
International Journal of Computer Sciences and Engineering Vl.No. Volume-6, Special Issue-2 |
2018 |
Towards Secure and Dependable Storage Services in Cloud Computing |
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 4 Issue 3 |
2018 |
Implications of Big Data Analytics |
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 3 Issue 5 |
2018 |
Private Cloud Computing Security Issues |
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 4 Issue 6 |
2018 |
Data Security Using Authentication And Authorization In Cloud Computing |
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 4 Issue 6 |
2018 |
An Architecture for Improving the QoS in Composite Web Service Selection |
International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) Vl.No. Volume 4 Issue 9 |
2018 |
Survey on QoS Metrics in Web Services |
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 4 Issue 9 |
2018 |
Security Framework for Context Aware Mobile Web Services |
International Conference on Computer Networks and Communication Technologies, Lecture Notes on Data Engineering and Communications Technologies Springer Nature Vl.No. 1 |
2018 |
IoT- New Perspectives and its Security |
International Journal of Computer Sciences and Engineering (IJCSE) Vl.No. Vol.6, Special Issue.11 |
2018 |
Security Issues in Cloud Computing |
International Journal of Emerging Trends in Science and Technology Vl.No. 04||Issue||06| |
2017 |
Survey on Privacy Preservation in context aware web services |
Indian Journal of Computer Science and Engineering (IJCSE) Vl.No. vol 6 Issue 6 |
2016 |
A CONTEXT-AWARE MULTI-AGENT SYSTEM AS A MIDDLEWARE FOR AMBIENT INTELLIGENCE |
Roots International Journal of Multidisciplinary Researches Vl.No. 2 |
2016 |
An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services |
International Journal of Computer Applications Vl.No. 146-15 |
2016 |
Security Issues in Web Services |
International Research Journal of Engineering and Technology Vl.No. 3(5) |
2016 |
Security Issues in Context Aware System |
International Research Journal of Engineering and Technology Vl.No. 2(6) |
2016 |
Security Issues on Composite Web Services |
International Research Journal of Engineering and Technology Vl.No. 3(6) |
2016 |
A Novel Security FAN SHAPECO Password on Social Networking Services |
International Journal of Advent Research in Computer and Electronics (IJARCE Vl.No. 3(4) |
2016 |
A Multi-Layered Secured Framework for Context-Aware Web Services in Health Care Industries |
International Journal of Applied Engineering Research Vl.No. vol 10 Issue 82 |
2015 |
SURVEY PAPER ON MOBILE SOCIAL NETWORKS |
International Research Journal of Engineering and Technology (IRJET) Vl.No. vol 2 Issue 6 |
2015 |
Security on Mobile Social Networks |
International Journal of Advance Research in Computer Science and Management Studies Vl.No. vol 3 Issue 9 |
2015 |
CONTEXT-AWARE IN PRIVACY PRESERVATION FOR HEALTH CARE SYSTEMS |
International Journal of Advanced Computer Technology (IJACT) Vl.No. vol 4 Issue 5 |
2015 |
SMIWBSN Security Mechanism in Web Based Social Network |
IJETCCT2014 Vl.No. 1 |
2014 |
Automated Secured Disaster Recovery with Hyper-V Replica and PoweShell |
IEEE CPS -- WCCCT2014 Vl.No. - |
2014 |
Design of a secure architecture for context aware web services using access control mechanism |
International conference on contemporary computing and informatics(IC3I) IEEE Vl.No. - |
2014 |
A review on privacy control techniques in context-aware web services |
International journal of advanced research in computer science & technology (IJARCST) Vl.No. vol 2 Issue 3 |
2014 |
Context-aware architecture for user access control |
International journal of advanced research in computer science & technology (IJARCST) Vl.No. vol 2 Issue 3 |
2014 |
An architecture for securing hetrogeneous web services |
International journal of advanced research in computer science & technology (IJARCST) Vl.No. vol 2 Issue 3 |
2014 |
A framework for privacy handler mechanism in context-aware web services |
International journal of advanced research in computer science & technology (IJARCST) Vl.No. vol 2 Issue 3 |
2014 |
Extending Social Privacy protector for Twitter Social Network |
CIIT Vl.No. 1 |
2013 |
A Context Aware System Based on Service Oriented Architecture |
ICRTICA`13 Vl.No. 1 |
2013 |
Dr.K.MAHESWARAN |
Maintainability Index Computation Based on Cyclomatic Complexity and Halstead Measure for Python |
Mukt Shabd Journal Vl.No. IX Issue X |
2020 |
Empirical Validation of CWICC and ICWCC Metrics using Maintenance Effort Estimation Model |
Mukt Shabd Journal Vl.No. IX Issue XII |
2020 |
Theoretical Validation of the Cognitive Complexity Metrics CWICC and ICWCC |
International Conference on Advances in IoT, High Performance and Edge Computing (ICIHPE), Vl.No. - |
2020 |
An interface based cognitive weighted class complexity measure for object oriented desigin |
International Conference on Advances in Computer Science, Engineering and Technology, ICACSET-18 Vl.No. - |
2018 |
Empirical Validation Of Object Oriented Cognitive Complexity Metrics Using Maintenance Effort Prediction |
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. Vol. 7 Issue 4 |
2018 |
A Survey on Complexity Metrics in Object Oriented Design |
SSICACR-2017 Vl.No. 1 |
2017 |
Predicting Maintainability with Object Oriented Metrics An Empirical Comparison |
International Journal of Advanced Engineering and Global Technology Vl.No. 5 |
2017 |
Software Cognitive Complexity Metrics for OO Design: A Survey |
International Journal of Scientific Research in Science, Engineering and Technology Vl.No. 3 |
2017 |
A Software Cohesion Metrics Survey |
International Journal of Advanced Engineering and Global Technology Vl.No. 5 |
2017 |
An Analysis of Object Oriented Complexity Metrics |
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2 |
2017 |
A Heuristics on Interface Complexity |
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Vl.No. 6 |
2017 |
Cognitive Weighted Inherited Class Complexity Metric |
Procedia Computer Science Vl.No. 125 |
2017 |
A Review on Component Based Software Metrics |
International Journal of Fuzzy Mathematical Archive Vl.No. 7 |
2015 |
Dr.B.REX CYRIL |
TEXT-BASED ENCRYPTION (TBEnc) TECHNIQUE TO SECURE DATA IN CLOUD STORAGE SERVER |
Journal of Shanghai Jioatong University Vl.No. 16 issues10, October 2020 |
2020 |
SECON: SECURED CONFIDENTIALITY FRAMEWORK TO PROTECT DATA STORED IN PUBLIC CLOUD SYSTEMS |
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTING SCIENCE Vl.No. Volume 6 |
2019 |
Hybrid Text and Value Based Ncryption and Obfuscation (Tvbencobfus) To Safeguard Data in Cloud Storage Server |
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 8 |
2019 |
Ant Colony Model (AnCoMoDaS) for Data Security in Cloud |
International Research Journal of Engineering and Technology (IRJET Vl.No. 04 Issue |
2017 |
DATA DIVISION IN CLOUD FOR SECURED DATA STORAGE USING RSA ALGORITHM |
International Research Journal of Engineering and Technology (IRJET) Vl.No. 04 Issue |
2017 |
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA) For Cloud Data Encoding, Encrypting and Forwarding |
International e-Journal For Technology And Research Vl.No. 1 |
2017 |
Dynamic and Scalable Architecture for Accessing the Cloud Databases and Securing Cloud Services Using Public Key Infrastructure |
International journal of scientific research in computer science, Engineering information technology(IJSRCSEIT) Vl.No. 2 ISSUE 6 |
2017 |
ENHANCED ELLIPTICAL CURVE CRYPTOGRAPHY BASED PKI FOR SECURE DATA STORAGE IN A CLOUD |
International Journal of Applied Engineering Research,(IJAER) Vl.No. Vol. 10 |
2015 |
Cloud Computing Data Security Issues, Challenges, Architecture and Methods - A Survey |
International Research Journal of Engineering and Technology (IRJET) Vl.No. 02 |
2015 |
Dr.J.ANTONY JOHN PRABU |
D1FTBC FRAMEWORK FOR CLOUD DATA TRANSACTIONS |
International Journal of Applied Engineering & Technology Vl.No. Vol. 5 No.4, |
2023 |
An Integrated Architecture For Secured Cloud Data Transactions With Consistency Enhancements |
Annals of R.S.C.B Vl.No. 25 |
2021 |
Performance of Proposed Architecture for Data Transactions in Cloud using D1FTBC |
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8 |
2019 |
Performance Analysis Of Proposed D1FTBC Approach For Improving Consistency In Cloud Data Transactions |
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vl.No. 8 |
2019 |
Proposed Architecture for Improving Security and Consistency of Data Transactions in Cloud Database using Tree-Based Consistency Approach |
International Journal of Computer Science and Information Security (IJCSIS) Vl.No. Vol. 15, No. 12, |
2017 |
AN EFFICIENT DEPTH 1 FIXED TREE CONSISTENCY D1FTC METHOD FOR DISTRIBUTED DATA TRANSACTIONS IN CLOUD ENVIRONMENT |
International Journal of Advanced Research in Computer Science Vl.No. Volume 8, No. 7, |
2017 |
Issues and Challenges of Data Transaction Management in Cloud Environment |
International Research Journal of Engineering and Technology (IRJET) Vl.No. Volume:02 Issue:04 |
2015 |
Proposed Architecture for Secure Distributed Data Transaction Management in Cloud Environment |
International Journal of Applied Engineering Research - (IJAER) Vl.No. Vol. 10 No.82 |
2015 |
Dr.A.JENIFER JOTHI MARY |
Machine Learning Algorithms for Predictive Maintenance in Industrial Internet of Things (IoT) Systems: A Case Study in Anomaly Detection |
The Indian Journal of Technical Education Vl.No. 47 |
2024 |
Natural Language Processing for Sentiment Analysis on Social Media: Techniques and Applications in Brand Reputation Management |
The Indian Journal of Technical Education Vl.No. 47 |
2024 |
Utilizing Finite Element Analysis for Structural Integrity Assessment in Bridge Design |
The Indian Journal of Technical Education Vl.No. 47 |
2024 |
A novel approach for detection of diabetes patients using machine learning techniques |
IEEE Explorer Vl.No. 0 |
2023 |
An Analysis On School Dropouts During Covid-19 Using Machine Learning Algorithms |
Journal of Harbin Engineering University Vl.No. 44(11) |
2023 |
Development of hybrid technology using Machine Learning and Block chain Technology to prevent from COVID 19 through the proper information gathering |
IEEE Xplore Vl.No. 0 |
2023 |
Drowsiness Detection System Using the Movement of the Eye of A Human Through Machine Learning Algorithms in Order to Avoid Accidents |
IEEE Xplore Vl.No. 0 |
2023 |
Efficiency of online classes in Tamil Nādu during Covid-19 lockdown: A statistical analysis |
AIP Conference Proceedings Vl.No. 2418 |
2022 |
Security analysis of hybrid one time password generation algorithm for IoT data |
AIP Conference Proceedings Vl.No. 2418(1) |
2022 |
Aspect Based Sentiment Analysis of Students? Opinion Using Big Data Analytics |
Our Heritage Journal Vl.No. 68 |
2020 |
An Analysis of The Status of The Women?s Career After Marriage Using Big Data Analytics |
Our Heritage Journal Vl.No. 68 |
2020 |
A Survey on Data Analytics in Higher Education |
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 8(1) |
2019 |
A FRAMEWORK FOR ASPECT BASED SENTIMENT ANALYSIS USING FUZZY LOGIC |
ICTACT JOURNAL ON SOFT COMPUTING Vl.No. 8(2) |
2018 |
KNOWLEDGE BASED IMPUTATION TECHNIQUE FOR NON OPINIONATED SENTENCES IN SENTIMENT ANALYSIS |
International Journal of Current Advanced Research Vl.No. 7(3) |
2018 |
FDSS: Fuzzy Based Decision Support System for Aspect Based Sentiment Analysis in Big Data |
Advances in Computing and Data Sciences. ICACDS 2018. Communications in Computer and Information Science, Springer Vl.No. 906 |
2018 |
IMS: Imputation of Missing Sentiment in the Aspect Based Sentiment Analysis |
Lecture Series in Communications in Computer and Information Science (Springer - in Press) Vl.No. 1 |
2017 |
ASFuL: Aspect based Sentiment Summarization using Fuzzy Logic |
Proceedings of ICAMMAET? 2017 Vl.No. - |
2017 |
A Methodology to Enhance the Accuracy of Aspect Level Sentiment Analysis using Imputation of Missing Sentiment |
International Journal of Recent Scientific Research (IJRSFP) Vl.No. 8(7) |
2017 |
Aspect based Parsing for Sentiment Analysis in Big Data |
International Journal of Computer Science and Mobile Applications Vl.No. 5(12) |
2017 |
Aspect Based Sentiment Analysis of Twitter Product Reviews Using Imputation of Missing Sentiment |
Proceedings of International Conference on Advanced Techniques in Engineering, Science & Management (Advanced Techniques - 2017) Vl.No. 19 |
2017 |
Jen-Ton: A Framework to enhance the Accuracy of Aspect level Sentiment Analysis in Big Data |
Proceedings of the International Conference on Inventive Computing and Informatics Vl.No. - |
2017 |
ASFuL: Aspect based Sentiment Summarization using Fuzzy Logic |
ICAMMAET Vl.No. 1 |
2017 |
A METHODOLOGICAL FRAMEWORK TO IDENTIFY THE STUDENTS` OPINION USING ASPECT BASED SENTIMENT ANALYSIS |
International Journal of Engineering Research & Technology (IJERT) Vl.No. 5 |
2016 |
A Framework for Aspect level Sentiment Analysis of Academic Results Data |
International Journal of Recent Trends in Engineering & Research (IJRTER) Vl.No. 2(7) |
2016 |
Survey on Aspect Level Opinion Targets and Opinion Words from Online Reviews |
International Journal of Information Technology and Mechanical Engineering IJITME Vl.No. 2-8 |
2016 |
A newfangled IoT big data parallel preprocessing framework to facilitate quality IoT big data analytics |
IJERT Vl.No. 4(29) |
2016 |
A methodology for identification on Flattery sentences in Sentence Level Classification |
Fifth National Conference on Intelligent computing(FNCIC) Vl.No. - |
2016 |
A Study on Basic Concepts of Big Data |
ijetcct Vl.No. 1 |
2015 |
Issues and Challenges in Sentiment Analysis : A Survey |
Misbah Niche of Knowledge Vl.No. 15 |
2015 |
Dr.S.JOSEPHINE THERESA |
Class Based Oversampling with Integrated Bagging For Handling Data Imbalance In Sensitive Data |
International Journal of Applied Engineering Research Vl.No. 06 |
2021 |
Feature Sub spacing Based Stacking For Effective Imbalance Handling In Sensitive Data |
ICTACT -SOFT COMPUTING Vl.No. 12 |
2021 |
Classification of Diabetes Milletus Using Naive Bayes Algorithm |
Springer Vl.No. 2021, Volume 1167 |
2020 |
A survey on Insight of Big Data |
IJETAE Vl.No. volume 8 |
2018 |
Mrs.S.THULASI BHARATHI |
Hybrid attention network-based students behavior data analytics framework with enhanced capuchin search algorithm using multimodal data |
Social Network Analysis and Mining Vl.No. 13 |
2023 |
Survey on Online Shopping Websites Using Sentiment Analysis |
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN COMPUTER AND COMMUNICATION ENGINEERING Vl.No. 9 |
2020 |
CLASSIFICATION LEVELS, APPROACHES,TOOLS,APPLICATIONS AND CHALLENGES IN SENTIMENTAL ANALYSIS- A SURVEY |
INTERNATIONAL JOURNAL OF COMPUTER SCIENCES AND ENGINEERING Vl.No. 6 |
2018 |
A STUDY OF BIG DATA CHALLENGES AND ITS TECHNOLOGIES |
Proceeding of National Conference on MOBILE TECHNOLOGIES, BIG DATA & DATA ANALYTICS Vl.No. - |
2018 |
BIG DATA ? CONCEPTS, ANALYTICS, ARCHITECTURES ? OVERVIEW |
International Research Journal of Engineering and Technology Vl.No. 05 |
2018 |
Dr.S.SATHYAPRIYA |
Prediction of Heart Disease using AI?Enhanced Naive Ensemble Decision Classifier |
International Journal of Business and Economics Research (IJBER): Vl.No. special issue |
2025 |
Ms.M.MERLA AGNES MARY |
Prediction of Rhabdomyosarcoma Using Transfer Learning on Pathology and Radiology Images |
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 11(8) |
2022 |
Heart Disease Prediction using Machine Learning Techniques: A Survey |
International Journal for Research in Applied Science and Engineering Technology Vl.No. 8 |
2020 |
A Study on Three Service Model of Cloud Computing |
International Journal of Electrical Electronics and Computer Science and Engineering Vl.No. 0 |
2018 |
IOT- New Perspectives and its Security |
International Journal of Computer Sciences and Engineering Vl.No. 6 |
2018 |
Dr.J.HIRUDHAYA MARY ASHA |
ExclusiveOR-Discrete Cosine Transform-A Chaotic Algorithm for Image Encryption and Decryption |
Image Processing and Capsule Networks: ICIPCN 2020 Vl.No. 0 |
2022 |
The Appraised Structure for Improving Quality in the Compressed Image Using EQI-AC Algorithm |
Image Processing and Capsule Networks: ICIPCN 2020 Vl.No. 1200 |
2022 |
Fuzzy probability based person recognition in smart environments |
Journal of Intelligent & Fuzzy Systems Vl.No. 40 |
2021 |
Interoperability in smart living network?a survey |
International Conference on Communication, computing and Electronics systems Vl.No. 0 |
2020 |
The internet of things (IoT) routing security?a study |
International Conference on Communication, Computing and Electronics Systems Vl.No. 0 |
2020 |
Hiding Methods for Preventing Jamming attacks on wireless Networks |
Intermational Journal of Scientific Research Publications Vl.No. 4 |
2014 |
Dr. K. SUBASH |
Blockchain based Security Management of Internet of Medical Things (IoMT) using Homomorphic Encryption using Metaheuristics with a Deep Learning Model |
International Conference on Trends in Quantum Computing and Emerging Business Technologies Vl.No. 0 |
2024 |
Oral Cancer Detections and Classification Using Region Based Convolutional Neural Network |
International Conference on Trends in Quantum Computing and Emerging Business Technologies Vl.No. 0 |
2024 |
Predicting Cervical Cancer Using Deep Learning Mutation-based Atom Search Optimization (MASO) Algorithm |
International Conference on Trends in Quantum Computing and Emerging Business Technologies Vl.No. 0 |
2024 |
Dr. SUNIL RAJ Y |
Integrated Architecture to Enhance the Security in IoT Cloud Using ECC DNA |
International Conference on Intelligent Computing Systems Vl.No. 0 |
2021 |
Security Enhancing Techniques for Data in IoT Cloud : Analysis |
International Journal of Advances in Engineering and Management Vl.No. 3 |
2021 |
A Security Architecture for Cloud Data Using Hybrid Security Scheme |
IEEE Xplore & Proceedings 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) Vl.No. 1 |
2021 |
An Integrated Secure Cloud Storage Architecture for Ensuring Integrity of Data using Hybrid Encryption Schemes in Cloud IoT Environment |
Journal of Shanghai Jiaotong University Vl.No. 16 |
2020 |
DNA Based Hybrid Approach for Data Integrity on Integrated Cloud Based Smart Environment: An Analysis |
International Journal of Scientific Development and Research Vl.No. 10 |
2020 |
ENHANCED TPA BASED DATA INTEGRITY MECHANISM FOR OBJECT STORAGE ARCHITECTURE ON INTEGRATEDIOT CLOUDSMART ENVIRONMENT |
Journal of Shanghai Jiaotong University Vl.No. 16 |
2020 |
Taxonomy of Distributed Denial of Service Attacks and Popular Defense Mechanism using Integration of IoT and Cloud Environment |
INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN SCIENCE, ENGINEERING AND TECHNOLOGY Vl.No. 8 |
2019 |
AN INTEGRATED ARCHITECTURE FOR IoT BASED DATA STORAGE IN SECURE SMART MONITORING ENVIRONMENT |
International Journal of Scientific & Technology Research Vl.No. 8 |
2019 |
AN EFFECTIVE DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION MODEL IN INTEGRATION OF INTERNET OF THINGS AND CLOUD COMPUTING USING BINARY FIRE FLY OPTIMIZATION ALGORITHM |
International Journal of Scientific & Technology Research Vl.No. 8 |
2019 |
Classification Based Analysis on Cancer Datasets Using Predictor Measures |
Computer Engineering and Intelligent Systems Vl.No. 10 |
2019 |
Integrated Device Cloud Architecture for a Secure Cloud of Things Environment |
International Journal of Recent Technology and Engineering Vl.No. 8 |
2019 |
ENHANCED CLOUD IDENTITY MANAGEMENT ENABLING SECURE ACCESS IN CROSS CLOUD ENVIRONMENT |
ADALYA JOURNAL Vl.No. 8 |
2019 |
Predictive Analytics On Facebook Data |
IEEE Vl.No. - |
2016 |
Classification Analysis on Corpus Data |
CiiT Data Mining and Knowledge Engineering Vl.No. 8, 5 |
2016 |
CLASSIFICATION ANALYSIS ON Medical Data |
CiiT International Journal of Data Mining and Knowledge Engineering. Vl.No. 7 |
2015 |
Clustering methods and algorithms in data mining: Concepts and a study |
JOURNAL OF COMPUTING TECHNOLOGIES Vl.No. 4, 7 |
2015 |
Novel Hybrid Technique Enhancing Data Privacy and Security |
Springer IFIP and Proceedings 6th International Conference on Computer, Communication, and Signal Processing Vl.No. 651 |
22 |
Ms.SHERINE DOMINICK |
Enhancing Moving Object Detection Through Frame Differential Summation for Efficient Analysis of Dynamic Scenes |
IJCEE Vl.No. 12 |
2024 |
Artificial Intelligence enabled Traffic Monitoring System |
Special Issue: International Journal of Business and Economics Research (IJBER) Vl.No. Special issue |
2024 |
Video Analytics: A Quick Review |
Journal of Emerging Technologies and Innovative Research Vl.No. 10 |
2023 |