Department of Physics - To our students for qualifying IIT-JAM 2024
|
Semester Examinations Time Table April 2024
|
List of Prize Winners Convocation Day - Batch 2023
|
Graduation Day (For the Graduates passed out in 2023)
|
II UG Internship Formats
|
Period of Course Completion - Students admitted before 2018-2019 academic year.
|
175 Years of Excellence in Education
|
Press Reports-2022
|
Summary of UGC Research Project
|
SWAYAM Courses
|
SWAYAM Video
|
Dodransbicentennial Videos
SJC Press
Quick Links
CoE | Reporting Issues to
Library
Certificate Verifi.
360
o
view of campus
Downloads
SJC ERP Account
Administrators
Faculty
Ph.D
Student
Parent
About us
Introducing SJC
Jesuits
Founder
College Church
Community in SJC
Society Office
Madurai Province
Jesuit curia
Jesuit Colleges in TN
Administrators
Rector
Secretary
Principal
Deputy Principal
Vice Principals S-I
Vice Principals S-II
Deans
Profile of the College
Autonomy
Board of Management
Statutory Committees
NAAC
CPE
NIRF
Heritage Status
Awards
Infrastructure
Illustrious alumni/ae
Annual Reports
Why St. Joseph's
Admission
Prospectus 2024 - 25
Streams
MBA
MCA
Twinning Programme
CPT Programme - ICAI
Transfer Programs
International Students
Academics
Research
Schools
Departments
Faculty
Staff
Aided
Management
Technical
Programmes
Under Graduate
Post Graduate
M.Phil.
Ph.D.
Diploma
Certificate
Vocational
Course Pattern
Syllabus
Programme outcomes
Programme Specific Outcomes
Centers and Institutes
Library
Physical Education
Calendar
Examinations
Office of the CoE
Examinations
CIA
Semester
Rules and Regulations
CoE Down the Years
IQAC
NIRF
Services
IAS Academy
Committees
College Office
Shepherd
Training and Placement
Capability Enhancement Schemes
Hostels
Campus Ministry
JASS
Fine Arts
Counsellor
Students Council
Student Clubs
Scholarships
Committee for PwD
Alumni/ae
Contact us
About us
Introducing SJC
Jesuits
Founder
College Church
Community in SJC
Society Office
Madurai Province
Jesuit curia
Jesuit Colleges in TN
Administrators
Rector
Secretary
Principal
Deputy Principal
Vice Principals S-I
Vice Principals S-II
Deans
Profile of the College
Autonomy
Board of Management
Statutory Committees
NAAC
CPE
NIRF
Heritage Status
Awards
Infrastructure
Illustrious alumni/ae
Annual Reports
Why St. Joseph's
Admission
Prospectus 2024 - 25
Streams
MBA
MCA
Twinning Programme
CPT Programme - ICAI
Transfer Programs
International Students
Academics
Research
Schools
Departments
Faculty
Staff
Aided
Management
Technical
Programmes
Under Graduate
Post Graduate
M.Phil.
Ph.D.
Diploma
Certificate
Vocational
Course Pattern
Syllabus
Programme outcomes
Programme Specific Outcomes
Centers and Institutes
Library
Physical Education
Calendar
Examinations
Office of the CoE
Examinations
CIA
Semester
Rules and Regulations
CoE Down the Years
IQAC
NIRF
Services
IAS Academy
Committees
College Office
Shepherd
Training and Placement
Capability Enhancement Schemes
Hostels
Campus Ministry
JASS
Fine Arts
Counsellor
Students Council
Student Clubs
Scholarships
Committee for PwD
Alumni/ae
Contact us
SJC ERP Account
Administrators
Faculty
Student
Parent
Ph.D
Online Payment
Shift I
Shift II
Exam
PU-SJC MBA Exam Fees
TC and Alumni Fees
DATA SCIENCE
Profile
Vision & Mission
Programmes
Programme Specific Outcomes
Faculty
Syllabus
Publications
Awards
Placement
Projects
Book Publications
Events Conducted
Papers Published by the Faculty
Author(s) & Title
Publications
Year
Dr.L.AROCKIAM
INTERNET OF THINGS BASED COAL MINE SAFETY MONITORING AND ALERTING SYSTEM
Journal of data acquisition and processing Vl.No. 38(3)
2023
A Review on Intrusion Detection Systems to Secure IoT Networks
International Journal of Computer Networks and Applications (IJCNA) Vl.No. 9
2022
VeNADet: Version Number Attack Detection for RPL based Internet of Things
Solid State Technology Vl.No. 64
2021
DAVmS: Distance Aware Virtual Machine Scheduling approach for reducing the response time in cloud computing
The Journal of Supercomputing Vl.No. 0
2021
ETLB: An Enhanced Throttled Load Balancing Approach for Reducing the Response Time in Cloud Computing
Solid State Technology Vl.No. 64
2021
Location Based Rank Attack Detection Technique (LRADT)
Webology Vl.No. 18
2021
The Security Challenges In The World Of Internet Of Things
Webology Vl.No. 18
2021
IoT Data Preprocessing - A Survey
Webology Vl.No. 18
2021
Blockchain Based Device Authentication For The Internet Of Things
Webology Vl.No. 18
2021
Ada-IDS: AdaBoost Intrusion Detection System for ICMPv6 based Attacks in Internet of Things
IJACSA) International Journal of Advanced Computer Science and Applications Vl.No. 12
2021
CID: Central Tendency Based Noise Removal Technique for IoT Data
Webology Vl.No. 18
2021
Promoting a Clean and Hygienic Environment using IoT
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8
2020
Priority Intensed Meta Task Scheduling Algorithm for Multi Cloud Environment (PIMTSA)
Journal of Physics: Conference Series Vl.No. 1427
2020
MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage
International Journal of Information and Computer Security Vl.No. 11,1
2019
A survey on Nutrition Monitoring and Dietary Management System
International Journal of Research and Analytical Reviews (IJRAR) Vl.No. 6
2019
Cloud Computing : Opportunities and Challenges
Retell Vl.No. 21
2019
Quality of Services in the Internet of Things (IOT) - A Survey
Retell Vl.No. 21
2019
ANNIDS: Artificial Neural Network based Intrusion Detection System for Internet of Things
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 8
2019
A Hybrid Method for Smart Irrigation System
International Journal of Recent Technology and Engineering (IJRTE) Scopus Indexed Vl.No. 8
2019
Prevalence of Diabetes Mellitus in Tiruchirappalli District using Machine Learning
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8
2019
Prevalence of Type-II Diabetics Association with PM 2.5 and PM 10 in Central Region of Tamil Nadu
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8
2019
Nutrition Monitoring and Calorie Estimation using Internet of Things (IoT)
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 8
2019
Entity Aware Association Rule Based Big Data Migration
International Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 6
2019
A Novel Big Data Migration Framework with Reduced Database Downtime
International Journal of Engineering Research and Applications (IJERA) Vl.No. 9
2019
Intrusion Detection System for Detecting Rank Attacks in RPL based 6LoWPAN Networks
International Conference on Advances in Computer Science and Technology Vl.No. 0
2018
Non Adjacent Form based Scalar Multiplication Technique for Increasing Speed of ECC
International Conference on Advances in Computer Science and Technology Vl.No. 0
2018
A Model To Predict and Pre-Treat Diabetes Mellitus
International Conference on Advances in computer science and Technology Vl.No. 0
2018
Resource Based Load Balanced Min-Min Algorithm
International Conference on Advances in Computer Science and Technology Vl.No. 0
2018
Predictive Model for Diabetes Mellitus in Tamil Nadu Using IoT Data
National Conference on Transforming Technology Vl.No. 0
2018
A Survey of Algorithms for Scheduling in the cloud: In a metric basis
National Conference on Transforming Technology Vl.No. 0
2018
ELT-EAPR: Expected Life Time of Energy Aware Parent Routing for IoT Networks
International Journal of Pure and Applied Mathematics (SCOPUS) Vl.No. 118,8
2018
ORBUA: An Effective Data Access Model for MobiCloud Environment
International Journal of Pure and Applied Mathematics (SCOPUS) Vl.No. 118,8
2018
Rate aware Meta task Scheduling Algorithm for multi cloud computing (RAMTSA)
Journal of Physics: Conference Series Vl.No. 1142
2018
Spell Aware Meta Task Scheduling Algorithm (SAMTSA) for Multicloud
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 7, 4
2018
LAHUBMAX -Priority Based Meta Task Scheduling Algorithm in multicloud
International Journal of Computer Sciences and Engineering Vl.No. 6, 10
2018
Aro-Nims: A New-Fangled Framework for IoT Data Pre-processing
International Journal of Research in Advent Technology(IJRAT) Vl.No. 6, 5
2018
Aro-Pri: A New-Fangled Architecture for IoT Data Pre-Processing
International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) Vl.No. 7, 3
2018
A Novel Block Cipher for Enhancing Data Security in Healthcare Internet of Things
Journal of Physics: Conference Series Vl.No. 1142, 1
2018
Architecture for Secure Data Management in Healthcare Internet of Things
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 7, 3
2018
ANNA: A Unified Framework for Data Security in Healthcare Internet of Things
ICTACT Journal on Communication Technology Vl.No. 9, 2
2018
An Algorithm to Detect Rank Attack in RPL based 6LoWPAN Networks
International Journal of Computer Sciences and Engineering (IJCSE) Vl.No. 6, 2
2018
RDAID: Rank Decreased Attack Identification Algorithm for Internet of Things
International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) Vl.No. 7, 3
2018
RIAIDRPL: Rank Increased Attack Identification Algorithm for Avoiding Loop in the RPL DODAG
International Journal of Pure and Applied Mathematics (IJPAM) Vl.No. 119, 16
2018
E2V: Techniques for Detecting and Mitigating Rank Inconsistency Attack (RInA) in RPL based Internet of Things
Journal of Physics: Conference Series (JPCS), IOP publishing Vl.No. 1142
2018
ARO_VID: A Unified Framework for Data Security in Internet of Things
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 5, 7
2018
ARO_EDGE: A Technique to Ensure Data Security in Internet of Things (IoT)
Asian Journal of Computer Science and Technology Vl.No. 7, 2
2018
Hybrid Security Techniques to Protect Sensitive Data in E-Healthcare Systems
IEEE Digital Explorer Vl.No. 0
2018
An Enhanced Architecture for Imputing Missing Data in IoT Data using FRBIS Model
Proceedings of the National Conference on Advanced Computing Technologies and Applications Vl.No. 0
2018
Key Generation Algorithm using Soft Set for data security in Internet of Things
Proceedings of International Conference on Internet of Things and Connected Technologies (ICIoTCT), ELSEVIER Vl.No. 0
2018
EALBA: Energy Aware Load Balancing Algorithm for IoT Networks
ACM Series , Scopus Vl.No. 0
2018
Energy Aware Routing Applications for Internet of Things
Proceeding of the International Conference on Computer Networks, Springer Vl.No. 0
2018
Performance Analysis of Classification Algorithms for Diabetic Prediction using Pima-Indian Dataset
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 5,12
2018
A Novel Technique to Enhance QoS using Location based Trust validation in 6LoWPAN for IoT Networks
International Journal of Computer Sciences and Engineering Vl.No. 6,2
2018
TNLIQ: Trust Validation in Ad-Hoc Networks using Dynamic Location Identification to ensure QoS
International Journal of Computer Sciences and Engineering Vl.No. 6,2
2018
FRND: False Rank Node Detection Algorithm in RPL Topology
Proceedings of National Conference on Advanced Computing Technologies and Applications Vl.No. 0
2018
Scheduling for Internet of Things Applications on Cloud: A Review.
Imperial Journal of Interdisciplinary Research Vl.No. 3 (1 )
2017
EPCAMD: EPC Based Authentication for Secure Accessing of Medical Devices in the Smart Healthcare System
Lecture Series in Communications in Computer and Information Science (Springer - in Press) Vl.No. -
2017
E2TR2: Energy efficient transmission range routing for IoT networks
Lecture Series in Communications in Computer and Information Science (Springer - in Press) Vl.No. -
2017
An enhanced sinkhole attacker node identification technique using successful link ration in IoT
International Journal of Computer Science Vl.No. 5(1)
2017
Role of Scheduling and Load Balancing Algorithms in cloud to improve the Quality of Services
International Journal of Computer Science Vl.No. 5(1)
2017
A Novel Fuzzy based Energy Efficient Routing for Internet of Things
IEEE Explorer(in Press) Vl.No. -
2017
Device Authentication Mechanism for IoT enabled Healthcare system
IEEE Explorer(in Press) Vl.No. 0
2017
Enhanced Encryption Algorithm(EEA) for protecting users credentials in Public Cloud
IEEE Explorer(in Press) Vl.No. -
2017
USER AUTH Secure Two Tier User Authentication Mechanism for IoT Enabled Smart Healthcare System
International Conference on Newer engineering concepts and technology Vl.No. -
2017
Hybrid One Time Password Mechanism for User Authentication in Internet of Things Environment
International Conference on Advanced Techniques in Engineering, Science Management Vl.No. -
2017
Architectural Framework for Resource Management in Fog Computing
International Journal of Engineering Research & Technology (IJERT) Vl.No. 5,13
2017
An Enhanced Technique to Detect Sinkhole Attack in Internet of Things
International Journal of Engineering Research and Technology (IJERT) Vl.No. 5,13
2017
Secure Two-Tier User Authentication Mechanism For IoT Enabled Smart Healthcare System
International Journal of Recent Scientific Research Vl.No. 8,7
2017
Issues and Challenges in Minimizing the response time in cloud service
International Journal for Trends in Engineering and Technology Vl.No. 25,01
2017
E2TBR: Energy Efficient Transmission Based Routing for IoT
International Journal of Computer Science Engineering Vl.No. 7,4
2017
EPC Based Authentication of Devices in the Smart Healthcare System
International Journal of Electrical, Electronics & Computer Science Engineering Vl.No. 8,7
2017
Intrusion Detection System to detect sinkhole attack on RPL protocol in Internet of Things
International Journal of Electrical Electronics and Computer Science Engineering Vl.No. 4,4
2017
A Secured Public key Exchange Technique for Elliptic Curve Cryptography
International Journal of Engineering Research in Computer Science and Engineering Vl.No. 4,9
2017
ENNEGCC 3D Energy Efficient scheduling algorithm using 3-D Neural Network Predictor for Green Cloud Computing Environment
IEEE Digital Explorer Vl.No. -
2017
Detection of outliers in the IoT data using the STCPOD model
International Journal of Engineering Research in Computer Science and Engineering Vl.No. 4,10
2017
A Pragmatic Study on Time Series Models for Big Data
International Journal of Emerging Research in Management &Technology Vl.No. 6,8
2017
PAFHWKM: An Enhanced Parallel Approach to Forecast Time Series Data Using Holt-Winters and K-Means Algorithm
International Journal on Future Revolution in Computer Science & Communication Engineering Vl.No. 3,8
2017
Device Authentication Mechanism For IoT Enabled Healthcare System
IEEE Digital Explorer Vl.No. -
2017
Research Issues on Data Security in Cloud Computing: A Survey
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 6,5
2017
A Unified Model for Cloud Data Confidentiality
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2,6
2017
Enhancing the Security of IoT Data using Multilevel Encryption
International Journal of Advanced Research in Computer Science Vl.No. 8,9
2017
A Technique to Enhance Quality of Service using weighted Path Mechanism
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2,4
2017
TOPQoS : TENSOR Based Optimum Path Selection in Internet of Things to Enhance Quality of Service
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2,6
2017
A Novel Fuzzy Based Energy Efficient Routing for Internet of Things
IEEE Digital Explorer Vl.No. 0
2017
Imputing the Missing Values in IoT Using ESTCP Model
International Journal of Advanced Research in Computer Science Vl.No. 8,9
2017
A Robust Architecture for Detecting Outliers in IoT Data using STCPOD Model
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2,6
2017
RESEARCH ISSUES ON WEB MINING
State-Of-The-Art and Research Issues In Cloud Computing Vl.No. -
2017
ARARO Framework for Confidentiality Techniques to Enhance Security of Numerical and Non-Numerical Data in Public Cloud Storage
IJIREEICE Vl.No. 4(3)
2016
Key Based Mutual Authentication (KBMA) Mechanism for Secured Access in MobiCloud Environment
In Proceedings of International Conference on Mechanical Engineering and Electrical Systems (ICMES 2015) Vl.No. 40
2016
Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage
In Proceedings of International Conference on Mechanical Engineering and Electrical Systems (ICMES 2015) Vl.No. 40
2016
Confidentiality Technique using Data Obfuscation to Enhance Security of Stored Data in Public Cloud Storage
International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Vl.No. 5, No. 1
2016
A Novel Lexicon Based Approach to Enhance the Accuracy of Sentiment Analysis on Big Data
International Journal of Emerging Research in Management and Technology (IJERMT) Vl.No. 5, No. 2
2016
Combining Lexicon and Machine Learning Method to Enhance the Accuracy of Sentiment Analysis on Big Data
International Journal of Computer Science and Information Technologies (IJCSIT) Vl.No. 7(1)
2016
Route Discovery Overhead Aware Routing Protocol for IoT to Enhance QoS
IJCTA (SCOPUS Indexed) Vl.No. 9(27)
2016
Filling Fuel Quantity Measurement Systems Using Internet Of Things
International Journal of Innovative Research and Advanced Studies (IJIRAS) Vl.No. 3(13)
2016
QRIC: QoS aware Routing for Internet of Things in College Management system
International Journal of Engineering Research & Technology (IJERT) Vl.No. 4(29)
2016
Deist: Dynamic Detection of Sinkhole Attack for Internet of Things
International Journal of Engineering and Computer Science Vl.No. 5(12)
2016
A Neoteric Authentication Scheme for IoT Healthcare System
International Journal of Engineering Sciences & Research Technology (IJESRT) Vl.No. 5(12)
2016
Authentication in IoT Environment: A Survey
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE Vl.No. 6(10)
2016
A Novel Authentication Scheme for IoT enabled Smart Healthcare System
International Journal of Engineering Research & Technology(IJERT) Vl.No. 4(29)
2016
Security in IoT Environment: A Survey
International Journal of Information Technology and Mechanical Engineering (IJITME) Vl.No. 2(7)
2016
Applications of Big Data Analytics for Diagnosing Diabetic Mellitus: Issues and Challenges
International Journal of Resent Trends in Engineering and Research Vl.No. 2(6)
2016
A Study on Security Issues and Challenges in IoT
International Journal of Engineering Sciences and Management Research Vl.No. 3(11)
2016
Accentuating the necessity for new-fangled IoT missing data imputation technique
International Journal of Computer Technology and Applications(I J C T A) (scopus indexed) Vl.No. 9(27)
2016
Decode_HMM_MLCS: An efficient algorithm to identify Multiple Longest Common Subsequence (MLCS) in Large DNA Sequences by using Decoding HMM
Journal of Chemical and Pharmaceutical Sciences (JCHPS) Vl.No. 9(1)
2016
A Survey on Noisy Data Elimination Using Clustering Techniques
International Journal of Information Technology and Mechanical Engineering (IJITME) Vl.No. 2(8)
2016
Energy Efficiency in Internet of Things: An Overview
INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH Vl.No. 2(6)
2016
EOCIPHER: A Hybrid Approach To Enhance Security Of Outsourced Data In Public Cloud Storage
Proceeding of the 4th International Conference on Artificial Intelligence and Computer Science (AICS2016),28 - 29 November 2016, Langkawi, MALAYSIA Vl.No. 3
2016
A Unified Model for Cloud Data Confidentiality
Fifth National Conference on Intelligent computing(FNCIC) Vl.No. -
2016
A framework for ensuring data confidentiality in smart home system
International conference on Emerging trends in Engineering & Technology Vl.No. -
2016
Confidentiality technique to encrypt and Obfuscate non numerical and numerical data to enhance security in public cloud storage
IEEE Explorer Vl.No. -
2016
Performance Improved Holt-Winter`s (PIHW) Prediction Algorithm for Big Data Environment
International Journal on Intelligent Electronic System Vl.No. 10(2)
2016
EDSHA: An Efficient Data Skew Handling Approach For Mapreduce Model Using Time Series Data
I J C T A (SCOPUS Indexed) Vl.No. 9(27)
2016
Parallel DBScan algorithm for removing noise in IoTBig data
Fifth National Conference on Intelligent computing(FNCIC) Vl.No. -
2016
A Methodology for preprocessing and construction of Diabetic Mellitus Warehouse
Fifth National Conference on Intelligent computing(FNCIC) Vl.No. -
2016
Lexicon Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets
International Journal of Computer Science and Information Technology & Security (IJCSITS) Vl.No. 6 (3)
2016
Machine Learning Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets
International Journal of Advance Research in Computer Science and Management Studies Vl.No. 4 (5)
2016
Hybrid Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets
IJCSET Vl.No. 6 (6)
2016
Enhanced Authentication Mechanism for Securing the Cloud Services using AaaS
International Advanced Research Journal in Science, Engineering and Technology Vl.No. 3
2016
User Demand Forecasting UDF for Dynamic Schedule Based Auto-scaling in Cloud Environment
User Demand Forecasting (UDF) for Dynamic Schedule Based Auto-scaling in Cloud Environment Vl.No. -
2016
A Unified Cloud Authenticator for Mobile Cloud Computing Environment
IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4
2015
Cost Aware Dynamic Rule Based Auto-scaling of Infrastructure-as-a-Service in Cloud Environment
IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4
2015
A Novel Approach for Ensuring Data Confidentiality in Public Cloud Storage
IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 5
2015
A Novel Edu-CloudSec Framework for E-Learning
IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4
2015
Big Data for Education in Students` Perspective
IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) Vl.No. 4
2015
A Secure Authentication Scheme for MobiCloud
International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore Vl.No. 0
2015
Load Balancer Behavior Identifier (LoBBI) for Dynamic Threshold Based Auto-scaling in Cloud
International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore Vl.No. 0
2015
A Framework for Key Management for Data Confidentiality in Cloud Environment
International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore Vl.No. 0
2015
AROMONcrypt: A Technique to Optimize the Security by Ensuring the Confidentiality of Outsourced Data in Cloud Storage
Elixir International Journal Vl.No. 0
2015
Secure Sharing of E-Content in Cloud Environment for Educational Institutions
International Journal of Computer & Communication Engineering Research Vl.No. 3
2015
Big Data Migration in the Cloud Environment - An Overview
IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications ICACCTHPA 2014 Vl.No. 5
2015
A Review on Big Data Integration
IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications ICACCTHPA 2014 Vl.No. 5
2015
Data Integration in Big Data Environment
Bonfring International Journal of Data Mining Vl.No. 5
2015
AROcrypt A Confidentiality Technique for Securing Enterprises Data in Cloud
International Journal of Engineering and Technology (IJET) (Scopus) Vl.No. 7
2015
SequentialPR_FCP: BigData Pattern decomposing algorithm to Identify Frequent Contiguous Patterns (FCP) from Large DNA Sequence Database using Permutations with Repetition (PR)
International Journal of Applied Engineering and Research (IJAER) Vl.No. 10
2015
Analysis of Prediction Techniques in Time Series for Big Data using R
International Journal of Applied Engineering Research Vl.No. 10
2015
AROMO Security Framework to Enhance Security of Data in Public Cloud
International Journal of Applied Engineering Research Vl.No. 10
2015
SBCOHC: An Optimized Task Scheduling Approach for Public Cloud Environment
International Journal of Applied Engineering Research Vl.No. 10
2015
A Novel Architectural Framework to Enhance Scalability in a Federated Heterogeneous Cloud Environment
International Journal of Applied Engineering Research Vl.No. 10
2015
Performance Evaluation of Task Scheduling in Cloud Environment Using Soft Computing Algorithms
International Journal of Computer Science and Network (IJCSN) Vl.No. 4
2015
AUTOPRED: An Architectural Framework to Predict the Service Requests to Enhance Scalability in Federated Clouds
International Journal of Electronics Communication and Computer Technology (IJECCT) Vl.No. 5
2015
Enhanced Framework for Authentication as a Service to Ensure Security in Public Cloud Environment
International Journal of Engineering Research and Technology (IJERT) Vl.No. 4
2015
PBCOPSO: A Parallel Optimization Algorithm for Task Scheduling in Cloud Environment
Indian Journal of Science Technology Vl.No. 8
2015
An Improved Particle Swarm Optimization Algorithm for Meta Task Scheduling In Cloud Environment
International Journal of Computer Science Trends and Technology (IJCST) Vl.No. 3
2015
A Study of User Authentication Techniques in Cloud Computing
International Journal of Emerging Technologies and Innovative Research (IJETIR) Vl.No. 2
2015
EnBloAES: A Unified Framework to Preserve Confidentiality of Data in Public Cloud Storage
Indian Journal of Science Technology Vl.No. 8
2015
A Survey on User Authentication Mechanism in Mobile Cloud Environment
International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT) Vl.No. 1
2015
A Study on Basic Concepts of Big Data
International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT) Vl.No. 1
2015
Align_MLCS: A Sequence Alignment based Efficient Algorithm to Identify Multiple Longest Common Subsequence (MLCS) for DNA Sequences
International Journal of Applied Engineering and Research (IJAER) Vl.No. 10
2015
Parallel Bottom-up Generalization Approach for Data Anonymization using Map Reduce for Security of Data in Public Cloud
Indian Journal of Science Technology Vl.No. 8
2015
Confidentiality Technique to Enhance Security of Data in Public Cloud Storage Using Data Obfuscation
Indian Journal of Science Technology Vl.No. 8
2015
Parallelized Contextual Valance Shifter Algorithm for Sentiment Analysis on Big Data
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 5
2015
A Hybrid Approach for Aspect Based Sentiment Analysis on Big Data
International Research Journal of Engineering and Technology (IRJET) Vl.No. 2
2015
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environment
International Journal of Computer and Communication System Engineering (IJCCSE) Vl.No. -
2015
Virtual Machine Behavior Identifier (VMBI) for VM Level Auto-scaling in Cloud Environment
International Journal of Emerging Technology and Advanced Engineering (IJETAE) Vl.No. 5
2015
Improved Parallel Time Series Based Algorithm for Big Data using MapReduce Programming Model
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
Load Pattern Identifier (LoPI) for Threshold Based Auto-scaling in Cloud Environment
International Journal of Emerging Research and Technology (IJERT) Vl.No. 10
2015
HMM_MLCS: Hidden Markov Model (HMM) based algorithm to identify Multiple Longest Common Subsequence (MLCS) in DNA Sequences
Journal of Chemical and Pharmaceutical Sciences (JCHPS) Vl.No. 8
2015
A Predictive Model to Forecast and Pre-Treat Diabetes Mellitus using Clinical Big Data in Cloud
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
A Dynamic Two Stage Authentication Framework to Enhance Security in Public EduCloud
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
Issues and Challenges hampering the evolution of IoT big data analytics
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
Parallel Prediction Model for Big Data using MapReduce Programming Model
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
Confidentiality Framework to Enhance Data Security in Public Cloud Storage
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
AROMO Security Framework to Enhance Security of Data in Public Cloud
Proceedings of 2nd International Conference on Engineering, Technology and Science Vl.No. 1
2015
Confidentiality Technique to Enhance Security of Data in Public Cloud Storage Using Data Obfuscation
Proceedings of International Conference on Soft Computing in Applied Sciences & Engineering (ICSCASE-2015) Vl.No. -
2015
A Framework for Cloud Confidentiality in Public Cloud Storage
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
A Study on Cloud Data Security Issues
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
An Enhanced Qualitative Framework for Data Integration with Multiple Data Sources using Parallel Processing
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
Enhanced Authentication Framework for Mobile Cloud Environment
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
Issues and Challenges in Sentiment Analysis: A Survey
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
EQOS-AODV: A Technique to Enhance Quality of Service using Half Transmission Area Towards Sender
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
Large Scale Sentiment Analysis on Cloud Environment
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
User Behavior Identifier (UBI) for Schedule Based Auto-scaling in Cloud Environment
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
A Survey on the Metamorphosis of IoT Big Data into Quality Data using Pre-processing Techniques
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
Enhanced Authentication Mechanism for Public Cloud
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
A Study on Aspect based Sentiment Analysis on Big Data
In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal Vl.No. 15
2015
DNA-DRUG_FCP: AN EFFICIENT COMPUTATIONAL METHOD FOR DNA-DRUG DESIGN USING FREQUENTLY REPEATED PATTERNS IN A LARGE HUMAN GENOME DATABASE
Journal of Chemical and Pharmaceutical Sciences Vl.No. 8
2015
FREQUENT CONTIGUOUS PATTERN (FCP) MINING IN GENOMIC SEQUENCE ANALYSIS AND PATTERN DISCOVERY
Journal of Chemical and Pharmaceutical Sciences Vl.No. 8
2015
Big Data Analytics and its Important Concepts: A Review
Proceedings of International Conference on Contemporary Trends in Computer Science (ICCTC 14) Vl.No. 0
2014
LASA HEU Heuristic Approach for Service Selection in Composite Web Services
Proceedings of World Congress on Computing and Communication Technologies (WCCCT 14), IEEE (CPS) Vl.No. 0
2014
Big Data Analytics and Cloud Based Solutions A Survey
International Conference on Research Trends in Computer Technologies (ICRTCT) Vl.No. -
2014
Cognitive Complexity Metrics Analysis Tool(CCMAT)
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 1
2014
Enhanced User Access Control Architecture for Cloud Storage
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 4
2014
An Innovative Solution for Cloud Security through Quantitative Analysis of Various Visual Cryptography Schemes
International Journal of Engineering and Innovative Technology (IJEIT) Vl.No. 3
2014
Securing Data with Authentication in Mobile Cloud Environment: Methods, Models and Issues
International Journal of Computer Application (IJCA) Vl.No. 94
2014
Security Framework to Ensure the Confidentiality of Outsourced Data in Public Cloud Storage
International Journal of Current Engineering and Technology (IJCET) Vl.No. 4
2014
Frequent Contiguous Pattern Mining Algorithms for biological Data Sequences
International Journal of Computer Application (IJCA) Vl.No. 95
2014
A Comparative Analysis of Encryption Techniques and Data Security Issues in Cloud Computing
International Journal of Computer Application (IJCA) Vl.No. 96
2014
A State-of-Art Load Balancing Algorithms in Cloud Computing
International Journal of Computer Application (IJCA) Vl.No. 95
2014
A Review on Dynamic Resource Allocation Strategies and Mechanisms in Cloud Computing
International Journal of Advanced Research in Computer Science & Technology (IJARCST) Vl.No. 2
2014
A Unified Architecture for Optimal Resource Utilization in a Heterogeneous Cloud Environment
International Journal of Machine Learning and Computing Vl.No. 4
2014
Performance Evaluation of Min-Min and Max-Min algorithms for job scheduling in federated cloud
International Journal of Computer Applications (IJCA) Vl.No. 99
2014
Authentication Mechanism to Enhance Security in the cloud environment
International Journal of Current Engineering and Technology (IJCET) Vl.No. 4
2014
A Framework to optimize task scheduling in cloud environment
International Journal of Computer Science and Information Technologies (IJCSIT) Vl.No. 5
2014
An extensive analysis on task scheduling Algorithms in cloud environment
International Journal of emerging technologies in computational and applied science(IJETCAS) Vl.No. 10
2014
General Aspect of (Big) Data Migration Methodologies
International Journal of Computer Science and Engineering (SSRG-IJCSE) Vl.No. 1
2014
Positional_nFCP Positions based Big Data algorithm to Identify n_length Frequent Contiguous Patterns FCP in a Large Human Genome Sequence Database
International Journal of Applied Engineering and Research (IJAER), (Scopus) Vl.No. 9
2014
Automated Data Validation Framework for Data Quality in Big Data Migration Projects
International Journal of Computer Science and Engineering (SSRG-IJCSE) Vl.No. 1
2014
IndexedFCP An Index based approach to identify Frequent Contiguous Patterns FCP in Big Data
IEEE International Conference on Intelligent Computing Applications (ICICA`14) Vl.No. 0
2014
An IoT Based Secured Smart Library System with NFC Based Book Tracking
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) Vl.No. 11
2014
Enhanced Anonymization Algorithm to Preserve Confidentiality of Data in Public Cloud
International Conference on Information Society (i-Society 2014), IEEE Vl.No. 0
2014
Enhanced Architecture for Data Confidentiality in Cloud Computing
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0
2014
A Cluster Based Services for Load Balancing in Cloud Computing Environment
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0
2014
A Cluster Based Task Scheduling in Cloud Computing
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0
2014
A Novel Framework for an Authentication as a Service in Public Cloud Environment
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. -
2014
A Framework to Ensure Data Security in Public Cloud Storage
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0
2014
A Pioneering Approach on Cloud Data Security using Cryptography
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0
2014
Combining Top-Down and Bottom-Up Scalable Multidimensional Anonymization over Big Data using Map reduce on Cloud
National Conference on Data Science and Engineering (NCDS 2014) Vl.No. 0
2014
Obfuscrypt: A Novel Confidentiality Technique for Cloud Storage
International Journal of Computer Applications Vl.No. 88
2014
A State of Art Scheduling Algorithms in Cloud
Advance Research in Computer Science & Technology (IJARSCT) Vl.No. 2
2014
A Security Service Algorithm to Ensure the Confidentiality of Data in Cloud Storage
International Journal of Engineering Research and Technology (IJERT) Vl.No. 3
2014
User Authentication Mechanism for Sharing E resource in Educational Clouds
International Journal of Networking and Communication Engineering Vl.No. 0
2013
Cognition Based user Interface Design Framework For E-Learning
International Journal of Advance Technology and Engineering Research (IJATER) Vl.No. 3, Issue 1
2013
User Interface Design for Effective E-Learning based on Personality Traits
International Journal of Computer Applications (IJCA) Vl.No. 61, No. 14
2013
Security Algorithms to Prevent Denial of Service (DoS) Attacks in WLAN
International Journal of Wireless Communications and Networking Technologies (IJWCNT) Vl.No. 2 No. 1
2013
A Quality of Service Performance Evaluation Strategy for Delay Classes in General Packet Radio Service
International Journal of Advanced Science and Technology Vl.No. 50
2013
Mathematical Modeling and Simulation Study of Delay-Sensitive Algorithm to Enhance Quality of Service in Mobile Networks
International Journal of Future Generation Communication and Networking Vl.No. 5, No. 3
2013
AAA Mechanism for Visiting Mobile Node in Network Mobility Environment
International Journal of Advanced Research in Computer Science and Software Engineering Vl.No. 3, Issue 1
2013
Fuzzy Weighted Gaussian Mixture Model for Feature Reduction
International Journal of Computer Applications (IJCA) Vl.No. 64, Issue 18
2013
ArK Feature Selection Algorithm to resolve Small Sample Size Problem
International Journal of Artificial Intelligent Systems and Machine Learning Vl.No. 0
2013
AAA Mechanism for Local Mobile Node in Network Mobility Environment
International Journal of Computer Networks and Wireless Communications (IJCNWC) Vl.No. 3, No. 1
2013
AROSA- Reliability Evaluation Framework
IET Software Vl.No. 0
2013
An improved Feature Selection Algorithm using Modified Fisher Score and Principal Feature Analysis
Journal of Data Mining and Knowledge Discovery Vl.No. 0
2013
Modified Feature Selection algorithm to improve classification accuracy using MFS and PFA
International Journal of Data Mining and Bioinformatics Vl.No. 0
2013
Secure and Robust Cloud Storage with Cryptography and Access Control
International Journal of Computer Science and Engineering (Elixir) Vl.No. 56
2013
Fuzzy Weighted Ordered Weighted Average Gaussian Mixture Model for Feature Reduction
International Journal of Computers & Technology Vl.No. 4
2013
Medium Access Control Spoof Detection and Prevention Algorithm (MAC SDP DoS) for Spoofing Attacks in WLAN
IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) Vl.No. 3
2013
Framework to Detect and Prevent Medium Access Control Layer Denial of Service Attacks in WLAN
IRACST - International Journal of Computer Networks and Wireless Communications (IJCNWC) Vl.No. 3
2013
Pairwise Fuzzy Ordered Weighted Average Algorithm Gaussian Mixture Model for Feature Reduction
International Journal of Computers & Technology Vl.No. 6
2013
SOM ANN A novel approach to analyzing the Brown Plant Hopper
International Journal of Computer Science & Applications Vl.No. 2
2013
Auto Scaling in Cloud Computing An Overview
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2
2013
Mobile Cloud Security Issues and Challenges: A Perspective
International Journal of Electronics and Information Technology (IJEIT) Vl.No. 3
2013
Cloud Service Tools State of the Art
International Journal of Electronics and Information Technology (IJEIT) Vl.No. 3
2013
Enhancing Data Security During Transit in Public Cloud
International Journal of Electronics and Information Technology (IJEIT) Vl.No. 3
2013
Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2
2013
User Authentication Mechanism for Sharing E-resource in Educational Clouds
International Journal of Computer Science and Network Security (IJCSNS) Vl.No. 13
2013
An impact of learning behavior and creativity quotient in learning environment
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2
2013
Failure Management in Cloud An Overview
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 2
2013
Match Making Service MMS A Centralized Architecture to Enhance Scalability in a Heterogeneous Cloud
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 3
2013
Enhancing the Interpretability of Soil Classification Data from a Neural Network System by Using Fuzzy Approaches
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 3
2013
A Novel LAS Relief Feature Selection Algorithm for Enhancing Classification Accuracy in Data Mining
International Journal of Computers & Technology (IJCT) Vl.No. 11
2013
A Systematic Approach on Data Pre processing in Data Mining
International Journal of Advanced Computer Technology (IJACT) Vl.No. 2
2013
Maintenance Effort Prediction Model Using Cognitive Complexity Metrics
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vl.No. 3
2013
Applying Data Mining Techniques on Soil Fertility Prediction
International Journal of Computer Applications Technology and Research (IJCATR) Vl.No. 2
2013
MSDoT Memory Size and Depth of Tier Based Queuing Model for Scheduling a Multi-Tier Cloud
Proceedings of International Conference on Emerging Trends and Applications in Computer Science (ICETACS), IEEE Xplore Vl.No. -
2013
Impact of Depression and Stress on the Programming Performance of the Students
International Journal of Data Mining Knowledge Engineering Vl.No. 0
2012
A Study on Feature Selection using Machine Learning Techniques
International Journal of Data Mining Knowledge Engineering Vl.No. 0
2012
MFSPFA: An Enhanced Filter based Feature Selection Algorithm
International Journal of Computer Applications Vl.No. 51, No. 12
2012
An Impact of Emotional Happiness in Students? Learning Environment
International Journal of Data Mining Knowledge Engineering Vl.No. 0
2012
Feature Selection: A New Perspective
International Journal of Data Mining Knowledge Engineering Vl.No. 0
2012
Vertical Scalability Issues and Challenges in Cloud Computing: An Overview
International Journal of Networking and Communication Engineering Vl.No. 0
2012
A Survey on Horizontal Scalability in Cloud Computing An Overview
International Journal of Networking and Communication Engineering Vl.No. 0
2012
Survey on User Authentication for Cloud Computing
International Journal of Networking and Communication Engineering Vl.No. 0
2012
SECURITY ISSUES CHALLENGES AND SOLUTIONS IN NETWORK MOBILITY A REVIEW
International Journal of Computer Networks and Wireless Communications (IJCNWC) Vl.No. 2, No.2
2012
FTM A Middle Layer Architecture for Fault Tolerance in Cloud Computing
IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies ICNICT Vl.No. 0
2012
AAA Mechanism for Mobile Router in Network Mobility Environment
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 1, Issue 10
2012
Enhanced Feature Selection Algorithm using Modified Fisher Criterion and Principal Feature Analysis
International Journal of Advanced Research in Computer Science Vl.No. 3, No. 4
2012
Outlook of ANN in Agriculture Data Mining
International journal of Soft Computing Vl.No. 7, Issue 1
2012
Clustering Methods and Algorithms in Data Mining :review
Asian Journal of information Technology Vl.No. 11, Issue 1
2012
Importance of Association Rules in Data Mining : A Review
International journal of Soft Computing Vl.No. 7,Issue 3
2012
A new methodology to overcome high dimensionality problem in data mining
International Journal of Data Warehousing and Mining Vl.No. 0
2012
An Inverse Modified Fisher Criterion to solve under-sampled problem in Data Mining
IEEE Transactions on Knowledge and Data Engineering (TKDE) Vl.No. 0
2012
Privacy in Cloud Computing: A Survey
Proceedings of the International Conference of Advanced Computer Science & Information (ACSIT- 2012) Vl.No. 0
2012
Positional - LCS: A Position based algorithm to find Longest Common Subsequence (LCS) in Sequence Database (SDB)
IEEE International Conference on Computational Intelligence and Computing Research Vl.No. 0
2012
HeurisFCP-A Heuristic Approach to Identify Frequent Contiguous Patterns (FCP) in Sequence Database
Proceedings of the International Conference on Radar, Communication and Computing (ICRCC 2012) Vl.No. 0
2012
Dr.I.PRIYA STELLA MARY
SMART MONITORING SYSTEM FOR EARLY DETECTION OF URINE BLOCKAGE IN SUPRAPUBIC CATHETERS THROUGH IOT INTEGRATION
International Research Journal of Modernization in Engineering Technology and Science Vl.No. 05
2024
A COMPARATIVE ANALYSIS BETWEEN DATA VISUALIZATION TOOLS FOR EFFECTIVE COMMUNICATION: POWER BI AND QLIK SENSE
International Research Journal of Modernization in Engineering Technology and Science Vl.No. 05
2024
REAL TIME BIRD DETECTION ON SOLAR PANELS USING JETSON NANO
International Research Journal of Modernization in Engineering Technology and Science Vl.No. 6
2024
A COMPARISON OF VARIOUS IMAGE IN-PAINTING ALGORITHMS
International Research Journal of Modernization in Engineering Technology and Science Vl.No. 6
2024
SIGHT BEYOND VISION (SBV) WALKING STICK FOR BLIND PEOPLE: OBJECT DETECTION, CURRENCY RECOGNITION AND LOCATION SHARING
International Research Journal of Modernization in Engineering Technology and Science Vl.No. 6
2024
COMPARATIVE ANALYSIS OF QUANTUM AND TRADITIONAL APPROACHES IN TRANSFER LEARNING
International Research Journal of Modernization in Engineering Technology and Science Vl.No. 6
2024
ENHANCING HUMAN ROBOT INTERACTION: A HYBRIAD CNN RNN ARCHITECTURE FOR EMOTIONS RECOGNITION FROM FACIAL EXPRESSIONS?
International Research Journal of Modernization in Engineering Technology and Science Vl.No. 6
2024
Deploying a Data Science Model to build a TN_DS_TRANS app for translating all the TN Government files in English to Tamil
International Journal of Intelligent Systems and Applications in Engineering (IJISAE) (Scopus) Vl.No. 5
2024
SMARGAR ?An IoT based Smart Garbage Monitoring System for Preserving Historic College Campuses
International Journal of Engineering Research & Technology (IJERT) Vl.No. 10
2021
Dr.A.BEATRICE DOROTHY
Overview of Federated Learning
International Research Journal of Modernization in Engineering Technology and Science Vl.No. 6
2024
Real-Time Intelligent Information Protection Using AI and Machine Learning Model
IEEE Vl.No. 0
2023
6G Networks In Unmanned Ariel Vehicle Intelligent Internet of Things Secured Communication
IEEE Vl.No. 6
2023
Securing Voices, Personalizing Interactions: Exploring Speaker Identification in Voice Assistant Systems
International Research Journal Of Modernization in Engineering Technology and Science Vl.No. 6
2023
Advancement in Solar - Powered Electric Vehicles: An Integrated Approach
International Research Journal Of Modernization in Engineering Technology and Science Vl.No. 0
2023
SQL Injection Attack Detection Using Machine Learning
International Research Journal Of Modernization in Engineering Technology and Science Vl.No. 0
2023
Advancements in Sentiment Analysis: A Detailed Exploration of Supervised and Unsupervised Learning Approaches
International Research Journal Of Modernization in Engineering Technology and Science Vl.No. 6
2023
Maximizing Forensic Analysis Efficiency Through Integrated AI Models
International Research Journal Of Modernization in Engineering Technology and Science Vl.No. 6
2023
Enhancing Channel Security By Error Detection And Correction During Quantum Key Distribution Using Hamming Code With Modified Elgamal
International Journal of Scientific & Technology Research Vl.No. 8(12)
2019
An approach for IoT security using Quantum key distribution
International Journal of Scientific & Technology Research Vl.No. 8(8)
2019
DORBRI: An Architecture for the DoD Security Breaches Through Quantum IoT
Lecture Notes on Data Engineering and Communications Technologies ( Book Series) Vl.No. 15
2018
IoT based Home Security through Digital Image Processing Algorithms
IEEE Vl.No. 0
2017
Internet of Things: Data Management and Security
International Journal of Control Theory and Application Vl.No. 9(26)
2016