MCA,M.Tech.,MBA,M.Phil,CSM,BLIS,Ph.D.,
arockiam_cs1@mail.sjctni.edu (Institution)
larockiam@yahoo.co.in (Personal)
Book Pubilished: 155
Published: 264
National: 28
International: 236
Year | Name of the award |
---|---|
2012-12-30 | Best Academic Researcher, ASDF Global Awards |
No. 23, Subbiah Garden,, Pandamangalam,, Woraiyur,,
Trichy.-620003
SNo | Book Title | Publisher | Edition | ISBN | Year |
---|---|---|---|---|---|
1 | Success through Soft Skills | Bharathidasan University | 1 | 9788190949095 | 2010 |
2 | Object Oriented Programming with C#.NET | India | 1 | 978-81-8465-121 | 2013 |
3 | Research in a Nutshell | IFCOT | 1 | 0 | 2011 |
4 | Computer literacy (Chapter-3) | Dept of Computer Science | 1 | 0 | 2013 |
5 | Data Mining Tool- A Step by Step Guide to Beginners | ICT | 2 | 0 | 2015 |
6 | STATISTICAL APPROACHES ON MULTIDISCIPLINARY RESEARCH VOLUME I(Chapter 19) | surragh | 1 | 0 | 2017 |
7 | Research in a Nutshell | IFCOT | 2 | 0 | 2016 |
8 | Advanced Engineering Research and Applications (Chapter - 14) | Research India Publicatio | 1 | 9789386138651 | 2017 |
9 | Research Methodology in a Nutshell | ACCA Printing Press | 1 | 9788192288284 | 2017 |
10 | Advances in Computational Intelligence and Communication Technology, Chapter - AROSTEV: A Unified Framework to Enhance Secure Routing in IoT Environment | springer | 1 | 978-981-16-9755 | 2022 |
11 | FTM-A MIDDLE LAYER ARCHITECTURE FOR FAULT TOLERANCE IN CLOUD COMPUTING | Google Scholar | null | null | 2012-13 |
12 | VERTICAL SCALABILITY ISSUES AND CHALLENGES IN CLOUD COMPUTING AN OVERVIEW | Google Scholar | null | null | 2012-13 |
13 | USER INTERFACE DESIGN FOR EFFECTIVE E-LEARNING BASED ON PERSONALITY TRAITS | Google Scholar | null | null | 2012-13 |
14 | SIMULATED ANNEALING VERSUS GENETIC BASED SERVICE SELECTION ALGORITHMS | Google Scholar | null | null | 2012-13 |
15 | SECURITY ALGORITHMS TO PREVENT DENIAL OF SERVICE (DOS) ATTACKS IN WLAN | Google Scholar | null | null | 2012-13 |
16 | RESEARCH CHALLENGES AND SECURITY ISSUES IN CLOUD COMPUTING | Google Scholar | null | null | 2012-13 |
17 | MFSPFA AN ENHANCED FILTER BASED FEATURE SELECTION ALGORITHM | Google Scholar | null | null | 2012-13 |
18 | GENETIC APPRAOCH FOR SERVICE SELECTION PROBLEM IN COMPOSITE WEB SERVICE | Google Scholar | null | null | 2012-13 |
19 | FUZZY WEIGHTED GAUSSIAN MIXTURE MODEL FOR FEATURE REDUCTION | Google Scholar | null | null | 2012-13 |
20 | FEATURE SELECTION A NEW PERSPECTIVE | Google Scholar | null | null | 2012-13 |
21 | ESTIMATING THE RELIABILITY OF COMPOSITE WEB SERVICE SERVICE CONSUMER PERSPECTIVE | Google Scholar | null | null | 2012-13 |
22 | DERIVING ASSOCIATION BETWEEN INTELLIGENT QUOTIENT AND DEBUGGING SKILLS | Google Scholar | null | null | 2012-13 |
23 | A STUDY ON FEATURE SELECTION USING MACHINE LEARNING TECHNIQUES | Google Scholar | null | null | 2012-13 |
24 | SIMULATED ANNEALING BASED SERVICE SELECTION ALGORITHM FOR COMPOSITE WEB SERVICE | Google Scholar | null | null | 2012-13 |
25 | SECURITY ISSUES CHALLENGES AND SOLUTIONS IN NETWORK MOBILITY A REVIEW | Google Scholar | null | null | 2012-13 |
26 | MATHEMATICAL MODELING AND SIMULATION STUDY OF DELAY-SENSITIVE ALGORITHM TO ENHANCE QUALITY OF SERVICE IN MOBILE NETWORKS | Google Scholar | null | null | 2012-13 |
27 | IMPORTANCE OF ASSOCIATION IN DATA MINING A REVIEW | Google Scholar | null | null | 2012-13 |
28 | IMPACT OF DEPRESSION AND STRESS ON THE PROGRAMMING PERFORMANCE OF THE STUDENTS | Google Scholar | null | null | 2012-13 |
29 | ENHANCED FEATURE SELECTION ALGORITHM USING MODIFIED FISHER CRITERION AND PRINCIPAL FEATURE ANALYSIS | Google Scholar | null | null | 2012-13 |
30 | CLUSTERING METHODS AND ALGORITHMS IN DATA MINING REVIEW | Scopus | null | null | 2012-13 |
31 | AN IMPACT OF EMOTIONAL HAPPINESS ON STUDENTS PERSONALITY IN LEARNING ENVIRONMENT | Google Scholar | null | null | 2012-13 |
32 | AAA MECHANISM FOR VISITING MOBILE NODE IN NETWORK MOBILITY ENVIRONMENT | Google Scholar | null | null | 2012-13 |
33 | AAA MECHANISM FOR MOBILE ROUTER IN NETWORK MOBILITY ENVIRONMENT | Google Scholar | null | null | 2012-13 |
34 | AAA MECHANISM FOR LOCAL MOBILE NODE IN NETWORK MOBILITY ENVIRONMENT | Google Scholar | null | null | 2012-13 |
35 | A SURVEY ON HORIZONTAL SCALABILITY IN CLOUD COMPUTING AN OVERVIEW | Google Scholar | null | null | 2012-13 |
36 | A SURVEY ON FILTER APPROACH FOR FEATURE SELECTION IN DATA MINING. | Google Scholar | null | null | 2012-13 |
37 | A QUALITY OF SERVICE PERFORMANCE EVALUATION STRATEGY FOR DELAY CLASSES IN GENERAL PACKET RADIO SERVICE | Google Scholar | null | null | 2012-13 |
38 | APPLYING DATA MINING TECHNIQUES ON SOIL FERTILITY PREDICTION | Google Scholar | null | null | 2013-14 |
39 | A SYSTEMATIC APPROACH ON DATA PRE-PROCESSING IN DATA MINING | Google Scholar | null | null | 2013-14 |
40 | A NOVEL LAS-RELIEF FEATURE SELECTION ALGORITHM FOR ENHANCING CLASSIFICATION ACCURACY IN DATA MINING | Google Scholar | null | null | 2013-14 |
41 | ENHANCING THE INTERPRETABILITY OF SOIL CLASSIFICATION DATA FROM A NEURAL NETWORK SYSTEM BY USING FUZZY APPROACHES | Google Scholar | null | null | 2013-14 |
42 | MATCH MAKING SERVICE (MMS) A CENTRALIZED ARCHITECTURE TO ENHANCE SCALABILITY IN A HETEROGENEOUS CLOUD | Google Scholar | null | null | 2013-14 |
43 | FAILURE MANAGEMENT IN CLOUD AN OVERVIEW | Google Scholar | null | null | 2013-14 |
44 | AN IMPACT OF LEARNING BEHAVIOR AND CREATIVITY QUOTIENT IN LEARNING ENVIRONMENT | Google Scholar | null | null | 2013-14 |
45 | USER AUTHENTICATION MECHANISM FOR SHARING E-RESOURCE IN EDUCATIONAL CLOUDS | Google Scholar | null | null | 2013-14 |
46 | DATA SECURITY AND PRIVACY IN CLOUD STORAGE USING HYBRID SYMMETRIC ENCRYPTION ALGORITHM | Google Scholar | null | null | 2013-14 |
47 | ENHANCING DATA SECURITY DURING TRANSIT IN PUBLIC CLOUD | Google Scholar | null | null | 2013-14 |
48 | CLOUD SERVICE TOOLS STATE OF THE ART | Google Scholar | null | null | 2013-14 |
49 | AUTO SCALING IN CLOUD COMPUTING AN OVERVIEW | Google Scholar | null | null | 2013-14 |
50 | SOM-ANN A NOVEL APPROACH TO ANALYZING THE BROWN PLANT HOPPER | Google Scholar | null | null | 2013-14 |
51 | MEDIUM ACCESS CONTROL SPOOF DETECTION AND PREVENTION ALGORITHM (MAC SDP DOS) FOR SPOOFING ATTACKS IN WLAN | Google Scholar | null | null | 2013-14 |
52 | PAIRWISE- FUZZY ORDERED WEIGHTED AVERAGE ALGORITHM- GAUSSIAN MIXTURE MODEL FOR FEATURE REDUCTION | Google Scholar | null | null | 2013-14 |
53 | FRAMEWORK TO DETECT AND PREVENT MEDIUM ACCESS CONTROL LAYER DENIAL OF SERVICE ATTACKS IN WLAN | Google Scholar | null | null | 2013-14 |
54 | SECURE AND ROBUST CLOUD STORAGE WITH CRYPTOGRAPHY AND ACCESS CONTROL | Google Scholar | null | null | 2013-14 |
55 | FUZZY WEIGHTED ORDERED WEIGHTED AVERAGE-GAUSSIAN MIXTURE MODEL FOR FEATURE REDUCTION | Google Scholar | null | null | 2013-14 |
56 | POSITIONAL_NFCP POSITIONS BASED BIG DATA ALGORITHM TO IDENTIFY N_LENGTHFREQUENT CONTIGUOUS PATTERNS (FCP) IN A LARGE HUMAN GENOME SEQUENCE DATABASE | Google Scholar | null | null | 2014-15 |
57 | AROCRYPT A CONFIDENTIALITY TECHNIQUE FOR SECURING ENTERPRISES DATA IN CLOUD | Google Scholar | null | null | 2014-15 |
58 | A NOVEL ARCHITECTURAL FRAMEWORK TO ENHANCE SCALABILITY IN A FEDERATED HETEROGENEOUS CLOUD ENVIRONMENT | Google Scholar | null | null | 2015-16 |
59 | SBCOHC AN OPTIMIZED TASK SCHEDULING APPROACH FOR PUBLIC CLOUD ENVIRONMENT | Google Scholar | null | null | 2015-16 |
60 | AROMO SECURITY FRAMEWORK TO ENHANCE SECURITY OF DATA IN PUBLIC CLOUD | Google Scholar | null | null | 2015-16 |
61 | ANALYSIS OF PREDICTION TECHNIQUES IN TIME SERIES FOR BIG DATA USING R | Google Scholar | null | null | 2015-16 |
62 | SEQUENTIAL PR_FCP BIG DATA PATTERN DECOMPOSING ALGORITHM TO IDENTIFY FREQUENT CONTIGUOUS PATTERNS (FCP) FROM LARGE DNA SEQUENCE DATABASE USING PERMUTATIONS WITH REPETITION (PR) | Google Scholar | null | null | 2015-16 |
63 | DECODE_HMM_MLCS AN EFFICIENT ALGORITHM TO IDENTIFY MULTIPLE LONGEST COMMON SEQUENCE (MLCS) IN LARGE DNA SEQUENCES BY USING DECODING HMM | Google Scholar | null | null | 2016-17 |
64 | ACCENTUATING THE NECESSITY FOR NEW-FANGLED IOT MISSING DATA IMPUTATION TECHNIQUE | Google Scholar | null | null | 2016-17 |
65 | ROUTE DISCOVERY OVERHEAD AWARE ROUTING PROTOCOL FOR IOT TO ENHANCE QOS | Google Scholar | null | null | 2016-17 |
66 | EDSHA AN EFFICIENT DATA SKEW HANDLING APPROACH FOR MAPREDUCE MODEL USING TIME SERIES DATA | Google Scholar | null | null | 2016-17 |
67 | PAFHWKM AN ENHANCED PARALLEL APPROACH TO FORECAST TIME SERIES DATA USING HOLT-WINTERS AND K-MEANS ALGORITHM | Google Scholar | null | null | 2017-18 |
68 | INTRUSION DETECTION SYSTEM TO DETECT SINKHOLE ATTACK ON RPL PROTOCOL IN INTERNET OF THINGS | Google Scholar | null | null | 2017-18 |
69 | EPC BASED AUTHENTICATION OF DEVICES IN THE SMART HEALTHCARE SYSTEM | Google Scholar | null | null | 2017-18 |
70 | DETECTION OF OUTLIERS IN THE IOT DATA USING THE STCPOD MODEL | Google Scholar | null | null | 2017-18 |
71 | A SECURED PUBLIC KEY EXCHANGE TECHNIQUE FOR ELLIPTIC CURVE CRYPTOGRAPHY | Google Scholar | null | null | 2017-18 |
72 | ARCHITECTURAL FRAMEWORK FOR RESOURCE MANAGEMENT IN FOG COMPUTING | Google Scholar | null | null | 2017-18 |
73 | AN ENHANCED TECHNIQUE TO DETECT SINKHOLE ATTACK IN INTERNET OF THINGS | Google Scholar | null | null | 2017-18 |
74 | TOPQOS TENSOR BASED OPTIMUM PATH SELECTION IN INTERNET OF THINGS TO ENHANCE QUALITY OF SERVICE | Google Scholar | null | null | 2017-18 |
75 | IMPUTING THE MISSING VALUES IN IOT USING ESTCP MODEL | Google Scholar | null | null | 2017-18 |
76 | ENHANCING THE SECURITY OF IOT DATA USING MULTILEVEL ENCRYPTION | Google Scholar | null | null | 2017-18 |
77 | A UNIFIED MODEL FOR CLOUD DATA CONFIDENTIALITY | Google Scholar | null | null | 2017-18 |
78 | A TECHNIQUE TO ENHANCE QUALITY OF SERVICE USING WEIGHTED PATH MECHANISM | Google Scholar | null | null | 2017-18 |
79 | A ROBUST ARCHITECTURE FOR DETECTING OUTLIERS IN IOT DATA USING STCPOD MODEL | Google Scholar | null | null | 2017-18 |
80 | SECURE TWO-TIER USER AUTHENTICATION MECHANISM FOR IOT ENABLED SMART HEALTHCARE SYSTEM | Google Scholar | null | null | 2017-18 |
81 | E2TBR ENERGY EFFICIENT TRANSMISSION BASED ROUTING FOR IOT | Google Scholar | null | null | 2017-18 |
82 | FTM-A MIDDLE LAYER ARCHITECTURE FOR FAULT TOLERANCE IN CLOUD COMPUTING | Google Scholar | null | null | 2012-13 |
83 | DERIVING ASSOCIATION BETWEEN INTELLIGENT QUOTIENT AND DEBUGGING SKILLS | Google Scholar | null | null | 2012-13 |
84 | A STUDY ON FEATURE SELECTION USING MACHINE LEARNING TECHNIQUES | Google Scholar | null | null | 2012-13 |
85 | VERTICAL SCALABILITY ISSUES AND CHALLENGES IN CLOUD COMPUTING AN OVERVIEW | Google Scholar | null | null | 2012-13 |
86 | USER INTERFACE DESIGN FOR EFFECTIVE E-LEARNING BASED ON PERSONALITY TRAITS | Google Scholar | null | null | 2012-13 |
87 | SIMULATED ANNEALING VERSUS GENETIC BASED SERVICE SELECTION ALGORITHMS | Google Scholar | null | null | 2012-13 |
88 | SIMULATED ANNEALING BASED SERVICE SELECTION ALGORITHM FOR COMPOSITE WEB SERVICE | Google Scholar | null | null | 2012-13 |
89 | SECURITY ISSUES CHALLENGES AND SOLUTIONS IN NETWORK MOBILITY A REVIEW | Google Scholar | null | null | 2012-13 |
90 | SECURITY ALGORITHMS TO PREVENT DENIAL OF SERVICE (DOS) ATTACKS IN WLAN | Google Scholar | null | null | 2012-13 |
91 | RESEARCH CHALLENGES AND SECURITY ISSUES IN CLOUD COMPUTING | Google Scholar | null | null | 2012-13 |
92 | MFSPFA AN ENHANCED FILTER BASED FEATURE SELECTION ALGORITHM | Google Scholar | null | null | 2012-13 |
93 | MATHEMATICAL MODELING AND SIMULATION STUDY OF DELAY-SENSITIVE ALGORITHM TO ENHANCE QUALITY OF SERVICE IN MOBILE NETWORKS | Google Scholar | null | null | 2012-13 |
94 | IMPORTANCE OF ASSOCIATION IN DATA MINING A REVIEW | Google Scholar | null | null | 2012-13 |
95 | IMPACT OF DEPRESSION AND STRESS ON THE PROGRAMMING PERFORMANCE OF THE STUDENTS | Google Scholar | null | null | 2012-13 |
96 | GENETIC APPRAOCH FOR SERVICE SELECTION PROBLEM IN COMPOSITE WEB SERVICE | Google Scholar | null | null | 2012-13 |
97 | FUZZY WEIGHTED GAUSSIAN MIXTURE MODEL FOR FEATURE REDUCTION | Google Scholar | null | null | 2012-13 |
98 | FEATURE SELECTION A NEW PERSPECTIVE | Google Scholar | null | null | 2012-13 |
99 | ESTIMATING THE RELIABILITY OF COMPOSITE WEB SERVICE SERVICE CONSUMER PERSPECTIVE | Google Scholar | null | null | 2012-13 |
100 | ENHANCED FEATURE SELECTION ALGORITHM USING MODIFIED FISHER CRITERION AND PRINCIPAL FEATURE ANALYSIS | Google Scholar | null | null | 2012-13 |
101 | COGNITION BASED USER INTERFACE DESIGN FRAMEWORK FOR E-LEARNING | Google Scholar | null | null | 2012-13 |
102 | CLUSTERING METHODS AND ALGORITHMS IN DATA MINING REVIEW | Scopus | null | null | 2012-13 |
103 | AN IMPACT OF EMOTIONAL HAPPINESS ON STUDENTS PERSONALITY IN LEARNING ENVIRONMENT | Google Scholar | null | null | 2012-13 |
104 | AAA MECHANISM FOR VISITING MOBILE NODE IN NETWORK MOBILITY ENVIRONMENT | Google Scholar | null | null | 2012-13 |
105 | AAA MECHANISM FOR MOBILE ROUTER IN NETWORK MOBILITY ENVIRONMENT | Google Scholar | null | null | 2012-13 |
106 | AAA MECHANISM FOR LOCAL MOBILE NODE IN NETWORK MOBILITY ENVIRONMENT | Google Scholar | null | null | 2012-13 |
107 | A SURVEY ON HORIZONTAL SCALABILITY IN CLOUD COMPUTING AN OVERVIEW | Google Scholar | null | null | 2012-13 |
108 | A SURVEY ON FILTER APPROACH FOR FEATURE SELECTION IN DATA MINING. | Google Scholar | null | null | 2012-13 |
109 | A QUALITY OF SERVICE PERFORMANCE EVALUATION STRATEGY FOR DELAY CLASSES IN GENERAL PACKET RADIO SERVICE | Google Scholar | null | null | 2012-13 |
110 | APPLYING DATA MINING TECHNIQUES ON SOIL FERTILITY PREDICTION | Google Scholar | null | null | 2013-14 |
111 | A SYSTEMATIC APPROACH ON DATA PRE-PROCESSING IN DATA MINING | Google Scholar | null | null | 2013-14 |
112 | A NOVEL LAS-RELIEF FEATURE SELECTION ALGORITHM FOR ENHANCING CLASSIFICATION ACCURACY IN DATA MINING | Google Scholar | null | null | 2013-14 |
113 | ENHANCING THE INTERPRETABILITY OF SOIL CLASSIFICATION DATA FROM A NEURAL NETWORK SYSTEM BY USING FUZZY APPROACHES | Google Scholar | null | null | 2013-14 |
114 | MATCH MAKING SERVICE (MMS) A CENTRALIZED ARCHITECTURE TO ENHANCE SCALABILITY IN A HETEROGENEOUS CLOUD | Google Scholar | null | null | 2013-14 |
115 | FAILURE MANAGEMENT IN CLOUD AN OVERVIEW | Google Scholar | null | null | 2013-14 |
116 | AN IMPACT OF LEARNING BEHAVIOR AND CREATIVITY QUOTIENT IN LEARNING ENVIRONMENT | Google Scholar | null | null | 2013-14 |
117 | USER AUTHENTICATION MECHANISM FOR SHARING E-RESOURCE IN EDUCATIONAL CLOUDS | Google Scholar | null | null | 2013-14 |
118 | DATA SECURITY AND PRIVACY IN CLOUD STORAGE USING HYBRID SYMMETRIC ENCRYPTION ALGORITHM | Google Scholar | null | null | 2013-14 |
119 | ENHANCING DATA SECURITY DURING TRANSIT IN PUBLIC CLOUD | Google Scholar | null | null | 2013-14 |
120 | CLOUD SERVICE TOOLS STATE OF THE ART | Google Scholar | null | null | 2013-14 |
121 | MOBILE CLOUD SECURITY ISSUES AND CHALLENGES A PERSPECTIVE | Google Scholar | null | null | 2013-14 |
122 | AUTO SCALING IN CLOUD COMPUTING AN OVERVIEW | Google Scholar | null | null | 2013-14 |
123 | SOM-ANN A NOVEL APPROACH TO ANALYZING THE BROWN PLANT HOPPER | Google Scholar | null | null | 2013-14 |
124 | MEDIUM ACCESS CONTROL SPOOF DETECTION AND PREVENTION ALGORITHM (MAC SDP DOS) FOR SPOOFING ATTACKS IN WLAN | Google Scholar | null | null | 2013-14 |
125 | PAIRWISE- FUZZY ORDERED WEIGHTED AVERAGE ALGORITHM- GAUSSIAN MIXTURE MODEL FOR FEATURE REDUCTION | Google Scholar | null | null | 2013-14 |
126 | FRAMEWORK TO DETECT AND PREVENT MEDIUM ACCESS CONTROL LAYER DENIAL OF SERVICE ATTACKS IN WLAN | Google Scholar | null | null | 2013-14 |
127 | SECURE AND ROBUST CLOUD STORAGE WITH CRYPTOGRAPHY AND ACCESS CONTROL | Google Scholar | null | null | 2013-14 |
128 | FUZZY WEIGHTED ORDERED WEIGHTED AVERAGE-GAUSSIAN MIXTURE MODEL FOR FEATURE REDUCTION | Google Scholar | null | null | 2013-14 |
129 | POSITIONAL_NFCP POSITIONS BASED BIG DATA ALGORITHM TO IDENTIFY N_LENGTHFREQUENT CONTIGUOUS PATTERNS (FCP) IN A LARGE HUMAN GENOME SEQUENCE DATABASE | Google Scholar | null | null | 2014-15 |
130 | AROCRYPT A CONFIDENTIALITY TECHNIQUE FOR SECURING ENTERPRISES DATA IN CLOUD | Google Scholar | null | null | 2014-15 |
131 | A NOVEL ARCHITECTURAL FRAMEWORK TO ENHANCE SCALABILITY IN A FEDERATED HETEROGENEOUS CLOUD ENVIRONMENT | Google Scholar | null | null | 2015-16 |
132 | SBCOHC AN OPTIMIZED TASK SCHEDULING APPROACH FOR PUBLIC CLOUD ENVIRONMENT | Google Scholar | null | null | 2015-16 |
133 | AROMO SECURITY FRAMEWORK TO ENHANCE SECURITY OF DATA IN PUBLIC CLOUD | Google Scholar | null | null | 2015-16 |
134 | ANALYSIS OF PREDICTION TECHNIQUES IN TIME SERIES FOR BIG DATA USING R | Google Scholar | null | null | 2015-16 |
135 | SEQUENTIAL PR_FCP BIG DATA PATTERN DECOMPOSING ALGORITHM TO IDENTIFY FREQUENT CONTIGUOUS PATTERNS (FCP) FROM LARGE DNA SEQUENCE DATABASE USING PERMUTATIONS WITH REPETITION (PR) | Google Scholar | null | null | 2015-16 |
136 | DECODE_HMM_MLCS AN EFFICIENT ALGORITHM TO IDENTIFY MULTIPLE LONGEST COMMON SEQUENCE (MLCS) IN LARGE DNA SEQUENCES BY USING DECODING HMM | Google Scholar | null | null | 2016-17 |
137 | ACCENTUATING THE NECESSITY FOR NEW-FANGLED IOT MISSING DATA IMPUTATION TECHNIQUE | Google Scholar | null | null | 2016-17 |
138 | ROUTE DISCOVERY OVERHEAD AWARE ROUTING PROTOCOL FOR IOT TO ENHANCE QOS | Google Scholar | null | null | 2016-17 |
139 | EDSHA AN EFFICIENT DATA SKEW HANDLING APPROACH FOR MAPREDUCE MODEL USING TIME SERIES DATA | Google Scholar | null | null | 2016-17 |
140 | PAFHWKM AN ENHANCED PARALLEL APPROACH TO FORECAST TIME SERIES DATA USING HOLT-WINTERS AND K-MEANS ALGORITHM | Google Scholar | null | null | 2017-18 |
141 | INTRUSION DETECTION SYSTEM TO DETECT SINKHOLE ATTACK ON RPL PROTOCOL IN INTERNET OF THINGS | Google Scholar | null | null | 2017-18 |
142 | EPC BASED AUTHENTICATION OF DEVICES IN THE SMART HEALTHCARE SYSTEM | Google Scholar | null | null | 2017-18 |
143 | DETECTION OF OUTLIERS IN THE IOT DATA USING THE STCPOD MODEL | Google Scholar | null | null | 2017-18 |
144 | A SECURED PUBLIC KEY EXCHANGE TECHNIQUE FOR ELLIPTIC CURVE CRYPTOGRAPHY | Google Scholar | null | null | 2017-18 |
145 | ARCHITECTURAL FRAMEWORK FOR RESOURCE MANAGEMENT IN FOG COMPUTING | Google Scholar | null | null | 2017-18 |
146 | AN ENHANCED TECHNIQUE TO DETECT SINKHOLE ATTACK IN INTERNET OF THINGS | Google Scholar | null | null | 2017-18 |
147 | TOPQOS TENSOR BASED OPTIMUM PATH SELECTION IN INTERNET OF THINGS TO ENHANCE QUALITY OF SERVICE | Google Scholar | null | null | 2017-18 |
148 | IMPUTING THE MISSING VALUES IN IOT USING ESTCP MODEL | Google Scholar | null | null | 2017-18 |
149 | ENHANCING THE SECURITY OF IOT DATA USING MULTILEVEL ENCRYPTION | Google Scholar | null | null | 2017-18 |
150 | A UNIFIED MODEL FOR CLOUD DATA CONFIDENTIALITY | Google Scholar | null | null | 2017-18 |
151 | A TECHNIQUE TO ENHANCE QUALITY OF SERVICE USING WEIGHTED PATH MECHANISM | Google Scholar | null | null | 2017-18 |
152 | A ROBUST ARCHITECTURE FOR DETECTING OUTLIERS IN IOT DATA USING STCPOD MODEL | Google Scholar | null | null | 2017-18 |
153 | SECURE TWO-TIER USER AUTHENTICATION MECHANISM FOR IOT ENABLED SMART HEALTHCARE SYSTEM | Google Scholar | null | null | 2017-18 |
154 | E2TBR ENERGY EFFICIENT TRANSMISSION BASED ROUTING FOR IOT | Google Scholar | null | null | 2017-18 |
155 | E2TBR ENERGY EFFICIENT TRANSMISSION BASED ROUTING FOR IOT | Google Scholar | null | null | 2017-18 |
International |
||||||
SNo | Title | Name of Journal / Vol. No. / Page Nos/ISSNO. | Impact Factor | H Index No. | C Index No. | Year |
---|---|---|---|---|---|---|
1 | A Review on Intrusion Detection Systems to Secure IoT Networks | International Journal of Computer Networks and Applications (IJCNA) / 9 / 38-50 / 2395-0455 | 0.514 | 9 | 0 | 2022 |
2 | VeNADet: Version Number Attack Detection for RPL based Internet of Things | Solid State Technology / 64 / 2225-2237 / 0038-111X | 0 | 7 | 0 | 2021 |
3 | DAVmS: Distance Aware Virtual Machine Scheduling approach for reducing the response time in cloud computing | The Journal of Supercomputing / 0 / 1-12 / 0 | 0 | 0 | 0 | 2021 |
4 | ETLB: An Enhanced Throttled Load Balancing Approach for Reducing the Response Time in Cloud Computing | Solid State Technology / 64 / 706-715 / 0038-111X | 0 | 7 | 0 | 2021 |
5 | Location Based Rank Attack Detection Technique (LRADT) | Webology / 18 / 1305-1315 / 1735-188X | 1.57 | 9 | 0 | 2021 |
6 | The Security Challenges In The World Of Internet Of Things | Webology / 18 / 1574-1584 / 1735-188X | 1.57 | 9 | 0 | 2021 |
7 | IoT Data Preprocessing - A Survey | Webology / 18 / 2070-2080 / 1735-188X | 1.57 | 9 | 0 | 2021 |
8 | Blockchain Based Device Authentication For The Internet Of Things | Webology / 18 / 2199-2209 / 1735-188X | 1.57 | 9 | 0 | 2021 |
9 | Ada-IDS: AdaBoost Intrusion Detection System for ICMPv6 based Attacks in Internet of Things | IJACSA) International Journal of Advanced Computer Science and Applications / 12 / 499-506 / 2156-5570 | 1.09 | 9 | 0 | 2021 |
10 | CID: Central Tendency Based Noise Removal Technique for IoT Data | Webology / 18 / 2210-2217 / 1735-188X | 1.57 | 9 | 0 | 2021 |
11 | Promoting a Clean and Hygienic Environment using IoT | International Journal of Recent Technology and Engineering (IJRTE) / 8 / 4722-4726 / 2277-3878 | 5.92 | - | - | 2020 |
12 | Priority Intensed Meta Task Scheduling Algorithm for Multi Cloud Environment (PIMTSA) | Journal of Physics: Conference Series / 1427 / 1-8 / - | - | - | - | 2020 |
13 | MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage | International Journal of Information and Computer Security / 11,1 / 1-16 / 1744-1765 | 0.524 | 9 | 0 | 2019 |
14 | A survey on Nutrition Monitoring and Dietary Management System | International Journal of Research and Analytical Reviews (IJRAR) / 6 / 329-334 / 2348-1269 | 5.75 | 0 | 0 | 2019 |
15 | ANNIDS: Artificial Neural Network based Intrusion Detection System for Internet of Things | International Journal of Innovative Technology and Exploring Engineering (IJITEE) / 8 / 2583- 258 / 2348-1269 | 5.54 | - | - | 2019 |
16 | A Hybrid Method for Smart Irrigation System | International Journal of Recent Technology and Engineering (IJRTE) Scopus Indexed / 8 / 2277-3878 / 2278-3075 | 5.92 | - | - | 2019 |
17 | Prevalence of Diabetes Mellitus in Tiruchirappalli District using Machine Learning | International Journal of Recent Technology and Engineering (IJRTE) / 8 / 6400-03 / 2278-3075 | 5.92 | - | - | 2019 |
18 | Prevalence of Type-II Diabetics Association with PM 2.5 and PM 10 in Central Region of Tamil Nadu | International Journal of Recent Technology and Engineering (IJRTE) / 8 / 6440-6444 / 2277-3878 | 5.92 | 0 | 0 | 2019 |
19 | Nutrition Monitoring and Calorie Estimation using Internet of Things (IoT) | International Journal of Innovative Technology and Exploring Engineering (IJITEE) / 8 / 2669- 72 / 2278-3075 | 5.54 | 0 | 0 | 2019 |
20 | Entity Aware Association Rule Based Big Data Migration | International Journal of Emerging Technologies and Innovative Research (JETIR) / 6 / 373-383 / 2349-5162 | 5.87 | - | - | 2019 |
21 | A Novel Big Data Migration Framework with Reduced Database Downtime | International Journal of Engineering Research and Applications (IJERA) / 9 / 43-52 / 22489622 | 5.18 | - | - | 2019 |
22 | Intrusion Detection System for Detecting Rank Attacks in RPL based 6LoWPAN Networks | International Conference on Advances in Computer Science and Technology / 0 / 37-38 / 0 | 0 | 0 | 0 | 2018 |
23 | Non Adjacent Form based Scalar Multiplication Technique for Increasing Speed of ECC | International Conference on Advances in Computer Science and Technology / 0 / 38-39 / 0 | 0 | 0 | 0 | 2018 |
24 | A Model To Predict and Pre-Treat Diabetes Mellitus | International Conference on Advances in computer science and Technology / 0 / 25 / 0 | 0 | 0 | 0 | 2018 |
25 | Resource Based Load Balanced Min-Min Algorithm | International Conference on Advances in Computer Science and Technology / 0 / 30-31 / 0 | 0 | 0 | 0 | 2018 |
26 | ELT-EAPR: Expected Life Time of Energy Aware Parent Routing for IoT Networks | International Journal of Pure and Applied Mathematics (SCOPUS) / 118,8 / 243-249 / 1311-8080 | 7.19 | - | - | 2018 |
27 | ORBUA: An Effective Data Access Model for MobiCloud Environment | International Journal of Pure and Applied Mathematics (SCOPUS) / 118,8 / 79-86 / 1311-8080 | 7.19 | - | - | 2018 |
28 | Rate aware Meta task Scheduling Algorithm for multi cloud computing (RAMTSA) | Journal of Physics: Conference Series / 1142 / 1-9 / 1742-6596 | 1.963 | 59 | 0 | 2018 |
29 | Spell Aware Meta Task Scheduling Algorithm (SAMTSA) for Multicloud | International Journal of Scientific Research in Computer Science Applications and Management Studies / 7, 4 / 1-5 / 2319-1953 | 0.654 | 0 | 0 | 2018 |
30 | LAHUBMAX -Priority Based Meta Task Scheduling Algorithm in multicloud | International Journal of Computer Sciences and Engineering / 6, 10 / 650-655 / 2347-2693 | 3.022 | 009 | 0 | 2018 |
31 | Aro-Nims: A New-Fangled Framework for IoT Data Pre-processing | International Journal of Research in Advent Technology(IJRAT) / 6, 5 / 858-863 / 2321-9637 | 5.153 | 0 | 0 | 2018 |
32 | Aro-Pri: A New-Fangled Architecture for IoT Data Pre-Processing | International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) / 7, 3 / 1-5 / 2319-1953 | 0.654 | 0 | 0 | 2018 |
33 | A Novel Block Cipher for Enhancing Data Security in Healthcare Internet of Things | Journal of Physics: Conference Series / 1142, 1 / 1-12 / 1742-6596 | 1.963 | 59 | 0 | 2018 |
34 | Architecture for Secure Data Management in Healthcare Internet of Things | International Journal of Scientific Research in Computer Science Applications and Management Studies / 7, 3 / 1-5 / 2319-1953 | 1.654 | 0 | 0 | 2018 |
35 | ANNA: A Unified Framework for Data Security in Healthcare Internet of Things | ICTACT Journal on Communication Technology / 9, 2 / 1740-1748 / 2229-6948 | 0.788 | 0 | 0 | 2018 |
36 | An Algorithm to Detect Rank Attack in RPL based 6LoWPAN Networks | International Journal of Computer Sciences and Engineering (IJCSE) / 6, 2 / 460-463 / 2347-2693 | 3.022 | 009 | 0 | 2018 |
37 | RDAID: Rank Decreased Attack Identification Algorithm for Internet of Things | International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) / 7, 3 / 1-5 / 2319-1953 | 0.65 | 0 | 0 | 2018 |
38 | RIAIDRPL: Rank Increased Attack Identification Algorithm for Avoiding Loop in the RPL DODAG | International Journal of Pure and Applied Mathematics (IJPAM) / 119, 16 / 1203-1210 / 1311-8080 | 7.19 | 21 | 0 | 2018 |
39 | E2V: Techniques for Detecting and Mitigating Rank Inconsistency Attack (RInA) in RPL based Internet of Things | Journal of Physics: Conference Series (JPCS), IOP publishing / 1142 / 75-86 / 1742-6596 | 1.963 | 59 | 0 | 2018 |
40 | ARO_VID: A Unified Framework for Data Security in Internet of Things | Journal of Emerging Technologies and Innovative Research (JETIR) / 5, 7 / 685-690 / 2349-5162 | 5.87 | 0 | 0 | 2018 |
41 | ARO_EDGE: A Technique to Ensure Data Security in Internet of Things (IoT) | Asian Journal of Computer Science and Technology / 7, 2 / 52-56 / 2249-0701 | 0 | 0 | 0 | 2018 |
42 | Hybrid Security Techniques to Protect Sensitive Data in E-Healthcare Systems | IEEE Digital Explorer / 0 / 39-43 / 0 | 0 | 0 | 0 | 2018 |
43 | Key Generation Algorithm using Soft Set for data security in Internet of Things | Proceedings of International Conference on Internet of Things and Connected Technologies (ICIoTCT), ELSEVIER / 0 / 367-372 / 1556-5068 | 0 | 0 | 0 | 2018 |
44 | EALBA: Energy Aware Load Balancing Algorithm for IoT Networks | ACM Series , Scopus / 0 / 46-50 / 0 | 0 | 0 | 0 | 2018 |
45 | Energy Aware Routing Applications for Internet of Things | Proceeding of the International Conference on Computer Networks, Springer / 0 / 0 / 0 | 0 | 0 | 0 | 2018 |
46 | Performance Analysis of Classification Algorithms for Diabetic Prediction using Pima-Indian Dataset | Journal of Emerging Technologies and Innovative Research (JETIR) / 5,12 / 563-569 / 2349-5162 | 5.87 | 0 | 0 | 2018 |
47 | A Novel Technique to Enhance QoS using Location based Trust validation in 6LoWPAN for IoT Networks | International Journal of Computer Sciences and Engineering / 6,2 / 1-5 / 2347-2693 | 3.022 | 009 | 0 | 2018 |
48 | TNLIQ: Trust Validation in Ad-Hoc Networks using Dynamic Location Identification to ensure QoS | International Journal of Computer Sciences and Engineering / 6,2 / 21-24 / 2347-2693 | 3.022 | 009 | 0 | 2018 |
49 | Scheduling for Internet of Things Applications on Cloud: A Review. | Imperial Journal of Interdisciplinary Research / 3 (1 ) / 1649 -1653 / 2454-1362 | 3.75 | - | - | 2017 |
50 | EPCAMD: EPC Based Authentication for Secure Accessing of Medical Devices in the Smart Healthcare System | Lecture Series in Communications in Computer and Information Science (Springer - in Press) / - / 433-445 / 0 | 0 | - | - | 2017 |
51 | E2TR2: Energy efficient transmission range routing for IoT networks | Lecture Series in Communications in Computer and Information Science (Springer - in Press) / - / 0 / 0 | 0 | - | - | 2017 |
52 | An enhanced sinkhole attacker node identification technique using successful link ration in IoT | International Journal of Computer Science / 5(1) / 1439-1444 / 2348-6600 | 0.453 | 0 | 0 | 2017 |
53 | Role of Scheduling and Load Balancing Algorithms in cloud to improve the Quality of Services | International Journal of Computer Science / 5(1) / 1454-1462 / 2348-6600 | 0.453 | - | - | 2017 |
54 | A Novel Fuzzy based Energy Efficient Routing for Internet of Things | IEEE Explorer(in Press) / - / 0 / 0 | 0 | - | - | 2017 |
55 | Device Authentication Mechanism for IoT enabled Healthcare system | IEEE Explorer(in Press) / 0 / 0 / 0 | 0 | 0 | 0 | 2017 |
56 | Enhanced Encryption Algorithm(EEA) for protecting users credentials in Public Cloud | IEEE Explorer(in Press) / - / 0 / 0 | 0 | - | - | 2017 |
57 | USER AUTH Secure Two Tier User Authentication Mechanism for IoT Enabled Smart Healthcare System | International Conference on Newer engineering concepts and technology / - / 0 / 0 | 0 | - | - | 2017 |
58 | Hybrid One Time Password Mechanism for User Authentication in Internet of Things Environment | International Conference on Advanced Techniques in Engineering, Science Management / - / 96-104 / 0 | 0 | - | - | 2017 |
59 | Architectural Framework for Resource Management in Fog Computing | International Journal of Engineering Research & Technology (IJERT) / 5,13 / 151-154 / 2278-0181 | 0 | - | - | 2017 |
60 | An Enhanced Technique to Detect Sinkhole Attack in Internet of Things | International Journal of Engineering Research and Technology (IJERT) / 5,13 / 147-150 / 2278-0181 | 0 | - | - | 2017 |
61 | Secure Two-Tier User Authentication Mechanism For IoT Enabled Smart Healthcare System | International Journal of Recent Scientific Research / 8,7 / 59-63 / 0976-3031 | 6.86 | 0 | 0 | 2017 |
62 | Issues and Challenges in Minimizing the response time in cloud service | International Journal for Trends in Engineering and Technology / 25,01 / 13-17 / 2349-9303 | 0.765 | - | - | 2017 |
63 | E2TBR: Energy Efficient Transmission Based Routing for IoT | International Journal of Computer Science Engineering / 7,4 / 1-8 / 2249-6831 | 8.876 | - | - | 2017 |
64 | EPC Based Authentication of Devices in the Smart Healthcare System | International Journal of Electrical, Electronics & Computer Science Engineering / 8,7 / 6-11 / 2348-2273 | 4.255 | - | - | 2017 |
65 | Intrusion Detection System to detect sinkhole attack on RPL protocol in Internet of Things | International Journal of Electrical Electronics and Computer Science Engineering / 4,4 / 16-20 / 2454-1222 | 4.255 | - | - | 2017 |
66 | A Secured Public key Exchange Technique for Elliptic Curve Cryptography | International Journal of Engineering Research in Computer Science and Engineering / 4,9 / 72-77 / 2394-2320 | 4.890 | - | - | 2017 |
67 | ENNEGCC 3D Energy Efficient scheduling algorithm using 3-D Neural Network Predictor for Green Cloud Computing Environment | IEEE Digital Explorer / - / 0 / 0 | 0 | 0 | 0 | 2017 |
68 | Detection of outliers in the IoT data using the STCPOD model | International Journal of Engineering Research in Computer Science and Engineering / 4,10 / 1-6 / 2394-2320 | 4.890 | - | - | 2017 |
69 | A Pragmatic Study on Time Series Models for Big Data | International Journal of Emerging Research in Management &Technology / 6,8 / 67-78 / 2278-9359 | 3.962 | - | - | 2017 |
70 | PAFHWKM: An Enhanced Parallel Approach to Forecast Time Series Data Using Holt-Winters and K-Means Algorithm | International Journal on Future Revolution in Computer Science & Communication Engineering / 3,8 / 65-73 / 2454-4248 | 0 | - | - | 2017 |
71 | Device Authentication Mechanism For IoT Enabled Healthcare System | IEEE Digital Explorer / - / 1-6 / 0 | 0 | - | - | 2017 |
72 | Research Issues on Data Security in Cloud Computing: A Survey | International Journal of Scientific Research in Computer Science Applications and Management Studies / 6,5 / 1-6 / 2319-1953 | 0 | - | - | 2017 |
73 | A Unified Model for Cloud Data Confidentiality | International Journal of Scientific Research in Computer Science, Engineering and Information Technology / 2,6 / 256-261 / 2456-3307 | 4.032 | 0 | 0 | 2017 |
74 | Enhancing the Security of IoT Data using Multilevel Encryption | International Journal of Advanced Research in Computer Science / 8,9 / 841-845 / 0976-5697 | 0.765 | - | - | 2017 |
75 | A Technique to Enhance Quality of Service using weighted Path Mechanism | International Journal of Scientific Research in Computer Science, Engineering and Information Technology / 2,4 / 413-417 / 2456-3307 | 4.032 | - | - | 2017 |
76 | TOPQoS : TENSOR Based Optimum Path Selection in Internet of Things to Enhance Quality of Service | International Journal of Scientific Research in Computer Science, Engineering and Information Technology / 2,6 / 852-859 / 2456-3307 | 4.032 | - | - | 2017 |
77 | A Novel Fuzzy Based Energy Efficient Routing for Internet of Things | IEEE Digital Explorer / 0 / 1-4 / 0 | 0 | 0 | 0 | 2017 |
78 | Imputing the Missing Values in IoT Using ESTCP Model | International Journal of Advanced Research in Computer Science / 8,9 / 1-5 / 0976-5697 | 0.765 | - | - | 2017 |
79 | A Robust Architecture for Detecting Outliers in IoT Data using STCPOD Model | International Journal of Scientific Research in Computer Science, Engineering and Information Technology / 2,6 / 659 - 664 / 2456-3307 | 4.032 | - | - | 2017 |
80 | ARARO Framework for Confidentiality Techniques to Enhance Security of Numerical and Non-Numerical Data in Public Cloud Storage | IJIREEICE / 4(3) / 32-37 / 2321 - 2004 | 4.855 | - | - | 2016 |
81 | Key Based Mutual Authentication (KBMA) Mechanism for Secured Access in MobiCloud Environment | In Proceedings of International Conference on Mechanical Engineering and Electrical Systems (ICMES 2015) / 40 / 1-5 / 0 | 0 | 0 | 0 | 2016 |
82 | Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage | In Proceedings of International Conference on Mechanical Engineering and Electrical Systems (ICMES 2015) / 40 / 1-5 / 0 | 0 | - | - | 2016 |
83 | Confidentiality Technique using Data Obfuscation to Enhance Security of Stored Data in Public Cloud Storage | International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) / 5, No. 1 / 169-174 / 2278-909X | 4.295 | 0 | 0 | 2016 |
84 | A Novel Lexicon Based Approach to Enhance the Accuracy of Sentiment Analysis on Big Data | International Journal of Emerging Research in Management and Technology (IJERMT) / 5, No. 2 / 80-86 / 2278-9359 | 1.492 | - | - | 2016 |
85 | Combining Lexicon and Machine Learning Method to Enhance the Accuracy of Sentiment Analysis on Big Data | International Journal of Computer Science and Information Technologies (IJCSIT) / 7(1) / 306-311 / 0975-9646 | 3.32 | - | - | 2016 |
86 | Route Discovery Overhead Aware Routing Protocol for IoT to Enhance QoS | IJCTA (SCOPUS Indexed) / 9(27) / 249-254 / 0974-5572 | 2.804 | - | - | 2016 |
87 | Filling Fuel Quantity Measurement Systems Using Internet Of Things | International Journal of Innovative Research and Advanced Studies (IJIRAS) / 3(13) / 152-154 / 2394-4404 | 0 | - | - | 2016 |
88 | QRIC: QoS aware Routing for Internet of Things in College Management system | International Journal of Engineering Research & Technology (IJERT) / 4(29) / 37-39 / 2278-0181 | 1.76 | - | - | 2016 |
89 | Deist: Dynamic Detection of Sinkhole Attack for Internet of Things | International Journal of Engineering and Computer Science / 5(12) / 58-62 / 2319-7242 | 4.3098 | - | - | 2016 |
90 | A Neoteric Authentication Scheme for IoT Healthcare System | International Journal of Engineering Sciences & Research Technology (IJESRT) / 5(12) / 296-303 / 2277-9655 | 4.116 | - | - | 2016 |
91 | Authentication in IoT Environment: A Survey | International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE / 6(10) / 140-145 / 2277-128X | 2.5 | - | - | 2016 |
92 | A Novel Authentication Scheme for IoT enabled Smart Healthcare System | International Journal of Engineering Research & Technology(IJERT) / 4(29) / 174-179 / 2278-0181 | 1.76 | - | - | 2016 |
93 | Security in IoT Environment: A Survey | International Journal of Information Technology and Mechanical Engineering (IJITME) / 2(7) / 1-8 / 2349-2865 | 1.227 | - | - | 2016 |
94 | Applications of Big Data Analytics for Diagnosing Diabetic Mellitus: Issues and Challenges | International Journal of Resent Trends in Engineering and Research / 2(6) / 454 -461 / 2455-1457 | 3.344 | - | - | 2016 |
95 | A Study on Security Issues and Challenges in IoT | International Journal of Engineering Sciences and Management Research / 3(11) / 34-43 / 2349-6193 | 2.805 | - | - | 2016 |
96 | Accentuating the necessity for new-fangled IoT missing data imputation technique | International Journal of Computer Technology and Applications(I J C T A) (scopus indexed) / 9(27) / 1-4 / 0974-5572 | 2.804 | - | - | 2016 |
97 | Decode_HMM_MLCS: An efficient algorithm to identify Multiple Longest Common Subsequence (MLCS) in Large DNA Sequences by using Decoding HMM | Journal of Chemical and Pharmaceutical Sciences (JCHPS) / 9(1) / 59-64 / 0974-2115 | 0 | - | - | 2016 |
98 | A Survey on Noisy Data Elimination Using Clustering Techniques | International Journal of Information Technology and Mechanical Engineering (IJITME) / 2(8) / 11-17 / 2349-2865 | 1.227 | - | - | 2016 |
99 | Energy Efficiency in Internet of Things: An Overview | INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH / 2(6) / 475-482 / 2455-1457 | 3.344 | - | - | 2016 |
100 | EOCIPHER: A Hybrid Approach To Enhance Security Of Outsourced Data In Public Cloud Storage | Proceeding of the 4th International Conference on Artificial Intelligence and Computer Science (AICS2016),28 - 29 November 2016, Langkawi, MALAYSIA / 3 / 33-42 / 2289-5965 | 0 | - | - | 2016 |
101 | A framework for ensuring data confidentiality in smart home system | International conference on Emerging trends in Engineering & Technology / - / 0 / 0 | 0 | - | - | 2016 |
102 | Confidentiality technique to encrypt and Obfuscate non numerical and numerical data to enhance security in public cloud storage | IEEE Explorer / - / 0 / 0 | 0 | - | - | 2016 |
103 | Performance Improved Holt-Winter`s (PIHW) Prediction Algorithm for Big Data Environment | International Journal on Intelligent Electronic System / 10(2) / 23-31 / 0973-9238 | 0 | - | - | 2016 |
104 | EDSHA: An Efficient Data Skew Handling Approach For Mapreduce Model Using Time Series Data | I J C T A (SCOPUS Indexed) / 9(27) / 423-430 / 0974-5572 | 2.804 | - | - | 2016 |
105 | Lexicon Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets | International Journal of Computer Science and Information Technology & Security (IJCSITS) / 6 (3) / 33-38 / 2249-9555 | 3.765 | - | - | 2016 |
106 | Machine Learning Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets | International Journal of Advance Research in Computer Science and Management Studies / 4 (5) / 72-82 / 2321-7782 | 6.047 | - | - | 2016 |
107 | Hybrid Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets | IJCSET / 6 (6) / 185-190 / 2231-0711 | 0 | - | - | 2016 |
108 | Enhanced Authentication Mechanism for Securing the Cloud Services using AaaS | International Advanced Research Journal in Science, Engineering and Technology / 3 / null / null | null | - | - | 2016 |
109 | A Unified Cloud Authenticator for Mobile Cloud Computing Environment | IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) / 4 / 29-34 / 0975-8887 | 0.821 | 0 | 0 | 2015 |
110 | Cost Aware Dynamic Rule Based Auto-scaling of Infrastructure-as-a-Service in Cloud Environment | IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) / 4 / 35-40 / 0975-8887 | 0.821 | 0 | 0 | 2015 |
111 | A Novel Approach for Ensuring Data Confidentiality in Public Cloud Storage | IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) / 5 / 1-5 / 0975-8887 | 0.821 | 0 | 0 | 2015 |
112 | A Novel Edu-CloudSec Framework for E-Learning | IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) / 4 / 41-46 / 0975-8887 | 0.821 | 0 | 0 | 2015 |
113 | Big Data for Education in Students` Perspective | IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) / 4 / 11-17 / 0975-8887 | 0.821 | 0 | 0 | 2015 |
114 | A Secure Authentication Scheme for MobiCloud | International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore / 0 / 35-40 / 0 | 0 | 0 | 0 | 2015 |
115 | Load Balancer Behavior Identifier (LoBBI) for Dynamic Threshold Based Auto-scaling in Cloud | International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore / 0 / 162-166 / 0 | 0 | 0 | 0 | 2015 |
116 | A Framework for Key Management for Data Confidentiality in Cloud Environment | International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore / 0 / 167-170 / 0 | 0 | 0 | 0 | 2015 |
117 | AROMONcrypt: A Technique to Optimize the Security by Ensuring the Confidentiality of Outsourced Data in Cloud Storage | Elixir International Journal / 0 / 9535-2959 / 2229-712X | 5.09 | 0 | 0 | 2015 |
118 | Secure Sharing of E-Content in Cloud Environment for Educational Institutions | International Journal of Computer & Communication Engineering Research / 3 / 7-10 / 0 | 1.5024 | 0 | 0 | 2015 |
119 | Big Data Migration in the Cloud Environment - An Overview | IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications ICACCTHPA 2014 / 5 / 16-20 / 0975-8887 | 0.821 | 0 | 0 | 2015 |
120 | A Review on Big Data Integration | IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications ICACCTHPA 2014 / 5 / 21-26 / 0975-8887 | 0.821 | 0 | 0 | 2015 |
121 | Data Integration in Big Data Environment | Bonfring International Journal of Data Mining / 5 / 1-5 / 2277-5048 | 0 | 0 | 0 | 2015 |
122 | AROcrypt A Confidentiality Technique for Securing Enterprises Data in Cloud | International Journal of Engineering and Technology (IJET) (Scopus) / 7 / 245-253 / 0975-4024 | 0.31 | 0 | 0 | 2015 |
123 | SequentialPR_FCP: BigData Pattern decomposing algorithm to Identify Frequent Contiguous Patterns (FCP) from Large DNA Sequence Database using Permutations with Repetition (PR) | International Journal of Applied Engineering and Research (IJAER) / 10 / 9477-9488 / 0 | 0 | - | - | 2015 |
124 | Analysis of Prediction Techniques in Time Series for Big Data using R | International Journal of Applied Engineering Research / 10 / 6712-6715 / 0973-4562 | 0 | - | - | 2015 |
125 | AROMO Security Framework to Enhance Security of Data in Public Cloud | International Journal of Applied Engineering Research / 10 / 6740-6746 / 1087-1090 | 0 | - | - | 2015 |
126 | SBCOHC: An Optimized Task Scheduling Approach for Public Cloud Environment | International Journal of Applied Engineering Research / 10 / 6807-6810 / 1087-1090 | 0 | - | - | 2015 |
127 | A Novel Architectural Framework to Enhance Scalability in a Federated Heterogeneous Cloud Environment | International Journal of Applied Engineering Research / 10 / 6854-6861 / 1087-1090 | 0 | - | - | 2015 |
128 | Performance Evaluation of Task Scheduling in Cloud Environment Using Soft Computing Algorithms | International Journal of Computer Science and Network (IJCSN) / 4 / 387-391 / 2277-5420 | 0.417 | - | - | 2015 |
129 | AUTOPRED: An Architectural Framework to Predict the Service Requests to Enhance Scalability in Federated Clouds | International Journal of Electronics Communication and Computer Technology (IJECCT) / 5 / 15-20 / 2249-7838 | 1.24 | - | - | 2015 |
130 | Enhanced Framework for Authentication as a Service to Ensure Security in Public Cloud Environment | International Journal of Engineering Research and Technology (IJERT) / 4 / 442-445 / 2278-0181 | 1.76 | - | - | 2015 |
131 | PBCOPSO: A Parallel Optimization Algorithm for Task Scheduling in Cloud Environment | Indian Journal of Science Technology / 8 / 1-5 / 0974-5645 | 0 | - | - | 2015 |
132 | An Improved Particle Swarm Optimization Algorithm for Meta Task Scheduling In Cloud Environment | International Journal of Computer Science Trends and Technology (IJCST) / 3 / 108-112 / 2347-8578 | 1.91 | - | - | 2015 |
133 | A Study of User Authentication Techniques in Cloud Computing | International Journal of Emerging Technologies and Innovative Research (IJETIR) / 2 / 3309-3314 / 2349-5162 | 2.57 | - | - | 2015 |
134 | EnBloAES: A Unified Framework to Preserve Confidentiality of Data in Public Cloud Storage | Indian Journal of Science Technology / 8 / 1-8 / 0974-5645 | 0 | - | - | 2015 |
135 | A Survey on User Authentication Mechanism in Mobile Cloud Environment | International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT) / 1 / 114-118 / 2348 4454 | 0 | 0 | 0 | 2015 |
136 | A Study on Basic Concepts of Big Data | International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT) / 1 / 119-124 / 2348-4454 | 0 | - | - | 2015 |
137 | Align_MLCS: A Sequence Alignment based Efficient Algorithm to Identify Multiple Longest Common Subsequence (MLCS) for DNA Sequences | International Journal of Applied Engineering and Research (IJAER) / 10 / 4224-4227 / 0 | 0 | - | - | 2015 |
138 | Parallel Bottom-up Generalization Approach for Data Anonymization using Map Reduce for Security of Data in Public Cloud | Indian Journal of Science Technology / 8 / 1-9 / 0974-5645 | 0 | - | - | 2015 |
139 | Confidentiality Technique to Enhance Security of Data in Public Cloud Storage Using Data Obfuscation | Indian Journal of Science Technology / 8 / 1-10 / 0974-5645 | 0 | - | - | 2015 |
140 | Parallelized Contextual Valance Shifter Algorithm for Sentiment Analysis on Big Data | International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) / 5 / 590-595 / 2277 128X | 2.5 | - | - | 2015 |
141 | A Hybrid Approach for Aspect Based Sentiment Analysis on Big Data | International Research Journal of Engineering and Technology (IRJET) / 2 / 1-5 / 2395-0056 | 2.518 | - | - | 2015 |
142 | Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environment | International Journal of Computer and Communication System Engineering (IJCCSE) / - / 671-675 / 2312-7694 | 0.374 | - | - | 2015 |
143 | Virtual Machine Behavior Identifier (VMBI) for VM Level Auto-scaling in Cloud Environment | International Journal of Emerging Technology and Advanced Engineering (IJETAE) / 5 / 255-260 / 2250-2459 | 2.324 | - | - | 2015 |
144 | Improved Parallel Time Series Based Algorithm for Big Data using MapReduce Programming Model | International Journal of Applied Engineering Research (IJAER) / 10 / 791-796 / 0973-4562 | 0 | - | - | 2015 |
145 | Load Pattern Identifier (LoPI) for Threshold Based Auto-scaling in Cloud Environment | International Journal of Emerging Research and Technology (IJERT) / 10 / 460-466 / 2278-0181 | 1.76 | - | - | 2015 |
146 | HMM_MLCS: Hidden Markov Model (HMM) based algorithm to identify Multiple Longest Common Subsequence (MLCS) in DNA Sequences | Journal of Chemical and Pharmaceutical Sciences (JCHPS) / 8 / 881-886 / 0974-2115 | 0 | - | - | 2015 |
147 | A Predictive Model to Forecast and Pre-Treat Diabetes Mellitus using Clinical Big Data in Cloud | International Journal of Applied Engineering Research (IJAER) / 10 / 55-59 / 0973-4562 | 0 | - | - | 2015 |
148 | A Dynamic Two Stage Authentication Framework to Enhance Security in Public EduCloud | International Journal of Applied Engineering Research (IJAER) / 10 / 126-131 / 0973-4562 | 0 | - | - | 2015 |
149 | Issues and Challenges hampering the evolution of IoT big data analytics | International Journal of Applied Engineering Research (IJAER) / 10 / 247-251 / 0973-4562 | 0 | - | - | 2015 |
150 | Parallel Prediction Model for Big Data using MapReduce Programming Model | International Journal of Applied Engineering Research (IJAER) / 10 / 286-291 / 0973-4562 | 0 | - | - | 2015 |
151 | Confidentiality Framework to Enhance Data Security in Public Cloud Storage | International Journal of Applied Engineering Research (IJAER) / 10 / 484-488 / 0973-4562 | 0 | - | - | 2015 |
152 | AROMO Security Framework to Enhance Security of Data in Public Cloud | Proceedings of 2nd International Conference on Engineering, Technology and Science / 1 / 1054-1060 / 0 | 0 | - | - | 2015 |
153 | Confidentiality Technique to Enhance Security of Data in Public Cloud Storage Using Data Obfuscation | Proceedings of International Conference on Soft Computing in Applied Sciences & Engineering (ICSCASE-2015) / - / 46-53 / 0 | 0 | - | - | 2015 |
154 | DNA-DRUG_FCP: AN EFFICIENT COMPUTATIONAL METHOD FOR DNA-DRUG DESIGN USING FREQUENTLY REPEATED PATTERNS IN A LARGE HUMAN GENOME DATABASE | Journal of Chemical and Pharmaceutical Sciences / 8 / null / null | null | - | - | 2015 |
155 | FREQUENT CONTIGUOUS PATTERN (FCP) MINING IN GENOMIC SEQUENCE ANALYSIS AND PATTERN DISCOVERY | Journal of Chemical and Pharmaceutical Sciences / 8 / null / null | null | - | - | 2015 |
156 | Big Data Analytics and its Important Concepts: A Review | Proceedings of International Conference on Contemporary Trends in Computer Science (ICCTC 14) / 0 / 57-61 / 0 | 0 | 0 | 0 | 2014 |
157 | LASA HEU Heuristic Approach for Service Selection in Composite Web Services | Proceedings of World Congress on Computing and Communication Technologies (WCCCT 14), IEEE (CPS) / 0 / 256-259 / 978-1-4799-2876-7/14 | 0 | 0 | 0 | 2014 |
158 | Big Data Analytics and Cloud Based Solutions A Survey | International Conference on Research Trends in Computer Technologies (ICRTCT) / - / 0 / 0 | 0 | 0 | 0 | 2014 |
159 | Cognitive Complexity Metrics Analysis Tool(CCMAT) | International Journal of Emerging Trends in Computing and Communication Technology / 1 / 65-73 / 2348-4454 | 0 | 0 | 0 | 2014 |
160 | Enhanced User Access Control Architecture for Cloud Storage | International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) / 4 / 1111-1116 / 2277 128X | 2.080 | 0 | 0 | 2014 |
161 | An Innovative Solution for Cloud Security through Quantitative Analysis of Various Visual Cryptography Schemes | International Journal of Engineering and Innovative Technology (IJEIT) / 3 / 63-67 / 2277-3754 | 1.895 | 0 | 0 | 2014 |
162 | Securing Data with Authentication in Mobile Cloud Environment: Methods, Models and Issues | International Journal of Computer Application (IJCA) / 94 / 0 / 0975 - 8887 | 0.821 | 0 | 0 | 2014 |
163 | Security Framework to Ensure the Confidentiality of Outsourced Data in Public Cloud Storage | International Journal of Current Engineering and Technology (IJCET) / 4 / 1265-1270 / 2277 - 4106 | 2.552 | 0 | 0 | 2014 |
164 | Frequent Contiguous Pattern Mining Algorithms for biological Data Sequences | International Journal of Computer Application (IJCA) / 95 / 15-20 / 0975 - 8887 | 0.821 | 0 | 0 | 2014 |
165 | A Comparative Analysis of Encryption Techniques and Data Security Issues in Cloud Computing | International Journal of Computer Application (IJCA) / 96 / 1-6 / 0975 - 8887 | 0.821 | 0 | 0 | 2014 |
166 | A State-of-Art Load Balancing Algorithms in Cloud Computing | International Journal of Computer Application (IJCA) / 95 / 10-14 / 0975 - 8887 | 0.821 | 0 | 0 | 2014 |
167 | A Review on Dynamic Resource Allocation Strategies and Mechanisms in Cloud Computing | International Journal of Advanced Research in Computer Science & Technology (IJARCST) / 2 / 264-269 / 2347 - 8446 | 0.889 | 0 | 0 | 2014 |
168 | A Unified Architecture for Optimal Resource Utilization in a Heterogeneous Cloud Environment | International Journal of Machine Learning and Computing / 4 / 0 / 383-388 | 0 | 0 | 0 | 2014 |
169 | Performance Evaluation of Min-Min and Max-Min algorithms for job scheduling in federated cloud | International Journal of Computer Applications (IJCA) / 99 / 47-54 / 0975-8887 | 0.821 | 0 | 0 | 2014 |
170 | Authentication Mechanism to Enhance Security in the cloud environment | International Journal of Current Engineering and Technology (IJCET) / 4 / 3278-3281 / 2277-4106 | 1.274 | 0 | 0 | 2014 |
171 | A Framework to optimize task scheduling in cloud environment | International Journal of Computer Science and Information Technologies (IJCSIT) / 5 / 7060-7062 / 0975-7646 | 2.93 | 0 | 0 | 2014 |
172 | An extensive analysis on task scheduling Algorithms in cloud environment | International Journal of emerging technologies in computational and applied science(IJETCAS) / 10 / 310-313 / 0 | 0 | 0 | 0 | 2014 |
173 | General Aspect of (Big) Data Migration Methodologies | International Journal of Computer Science and Engineering (SSRG-IJCSE) / 1 / 37-40 / 2348 - 8387 | 0 | 0 | 0 | 2014 |
174 | Positional_nFCP Positions based Big Data algorithm to Identify n_length Frequent Contiguous Patterns FCP in a Large Human Genome Sequence Database | International Journal of Applied Engineering and Research (IJAER), (Scopus) / 9 / 771 - 780 / 0973-4562 | 0 | 0 | 0 | 2014 |
175 | Automated Data Validation Framework for Data Quality in Big Data Migration Projects | International Journal of Computer Science and Engineering (SSRG-IJCSE) / 1 / 24-27 / 2348 - 8387 | 0 | 0 | 0 | 2014 |
176 | IndexedFCP An Index based approach to identify Frequent Contiguous Patterns FCP in Big Data | IEEE International Conference on Intelligent Computing Applications (ICICA`14) / 0 / 27-31 / 0 | 0 | 0 | 0 | 2014 |
177 | An IoT Based Secured Smart Library System with NFC Based Book Tracking | International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) / 11 / 18-21 / 0976-1353 | 1.012 | 0 | 0 | 2014 |
178 | Enhanced Anonymization Algorithm to Preserve Confidentiality of Data in Public Cloud | International Conference on Information Society (i-Society 2014), IEEE / 0 / 86-91 / 978-1-908320-36-0 | 0 | 0 | 0 | 2014 |
179 | A Novel Framework for an Authentication as a Service in Public Cloud Environment | International Journal of Advanced Research in Computer and Communication Engineering / - / 61-66 / 9789351072942 | 0 | - | - | 2014 |
180 | Obfuscrypt: A Novel Confidentiality Technique for Cloud Storage | International Journal of Computer Applications / 88 / 17-21 / 0975 - 8887 | 0.821 | 0 | 0 | 2014 |
181 | A State of Art Scheduling Algorithms in Cloud | Advance Research in Computer Science & Technology (IJARSCT) / 2 / 476-481 / 2347 - 8446 | 0.889 | 0 | 0 | 2014 |
182 | A Security Service Algorithm to Ensure the Confidentiality of Data in Cloud Storage | International Journal of Engineering Research and Technology (IJERT) / 3 / 1053-1058 / 2278-0181 | 1.760 | 0 | 0 | 2014 |
183 | User Authentication Mechanism for Sharing E resource in Educational Clouds | International Journal of Networking and Communication Engineering / 0 / 0 / 0974-9713,0974-9616 | 0.569 | 0 | 0 | 2013 |
184 | Cognition Based user Interface Design Framework For E-Learning | International Journal of Advance Technology and Engineering Research (IJATER) / 3, Issue 1 / 135-140 / 2250-3536 | 0 | 0 | 0 | 2013 |
185 | User Interface Design for Effective E-Learning based on Personality Traits | International Journal of Computer Applications (IJCA) / 61, No. 14 / 28-32 / 0975-8887 | 0.814 | 0 | 0 | 2013 |
186 | Security Algorithms to Prevent Denial of Service (DoS) Attacks in WLAN | International Journal of Wireless Communications and Networking Technologies (IJWCNT) / 2 No. 1 / 1-7 / 2319-6629 | 0 | 0 | 0 | 2013 |
187 | A Quality of Service Performance Evaluation Strategy for Delay Classes in General Packet Radio Service | International Journal of Advanced Science and Technology / 50 / 91-98 / 0 | 0 | 0 | 0 | 2013 |
188 | Mathematical Modeling and Simulation Study of Delay-Sensitive Algorithm to Enhance Quality of Service in Mobile Networks | International Journal of Future Generation Communication and Networking / 5, No. 3 / 31-42 / 2233-7857 | 0 | 0 | 0 | 2013 |
189 | AAA Mechanism for Visiting Mobile Node in Network Mobility Environment | International Journal of Advanced Research in Computer Science and Software Engineering / 3, Issue 1 / 195-199 / 2277-128X | 0 | 0 | 0 | 2013 |
190 | Fuzzy Weighted Gaussian Mixture Model for Feature Reduction | International Journal of Computer Applications (IJCA) / 64, Issue 18 / 9-15 / 0975-8887 | 0.835 | 0 | 0 | 2013 |
191 | ArK Feature Selection Algorithm to resolve Small Sample Size Problem | International Journal of Artificial Intelligent Systems and Machine Learning / 0 / (Accepted) / 0974-9667,0974-9543 | 0.763 | 0 | 0 | 2013 |
192 | AAA Mechanism for Local Mobile Node in Network Mobility Environment | International Journal of Computer Networks and Wireless Communications (IJCNWC) / 3, No. 1 / 8-12 / 0 | 0 | 0 | 0 | 2013 |
193 | AROSA- Reliability Evaluation Framework | IET Software / 0 / (Accepted) / 1751-8806 | 0 | 0 | 0 | 2013 |
194 | An improved Feature Selection Algorithm using Modified Fisher Score and Principal Feature Analysis | Journal of Data Mining and Knowledge Discovery / 0 / Communi / 1384-5810 | 0 | 0 | 0 | 2013 |
195 | Modified Feature Selection algorithm to improve classification accuracy using MFS and PFA | International Journal of Data Mining and Bioinformatics / 0 / Communi / 1748-5673 | 0 | 0 | 0 | 2013 |
196 | Secure and Robust Cloud Storage with Cryptography and Access Control | International Journal of Computer Science and Engineering (Elixir) / 56 / 13481-134 / 229-712x | 0 | 0 | 0 | 2013 |
197 | Fuzzy Weighted Ordered Weighted Average Gaussian Mixture Model for Feature Reduction | International Journal of Computers & Technology / 4 / 694 - 712 / 2277-3061 | 0 | 0 | 0 | 2013 |
198 | Medium Access Control Spoof Detection and Prevention Algorithm (MAC SDP DoS) for Spoofing Attacks in WLAN | IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) / 3 / 165-171 / 2249-955 | 0 | 0 | 0 | 2013 |
199 | Framework to Detect and Prevent Medium Access Control Layer Denial of Service Attacks in WLAN | IRACST - International Journal of Computer Networks and Wireless Communications (IJCNWC) / 3 / 152-159 / 2250-3501 | 0 | 0 | 0 | 2013 |
200 | Pairwise Fuzzy Ordered Weighted Average Algorithm Gaussian Mixture Model for Feature Reduction | International Journal of Computers & Technology / 6 / 287-301 / 2277-3061 | 1.043 | 0 | 0 | 2013 |
201 | SOM ANN A novel approach to analyzing the Brown Plant Hopper | International Journal of Computer Science & Applications / 2 / 107-116 / 2278 - 1080 | 0 | 0 | 0 | 2013 |
202 | Auto Scaling in Cloud Computing An Overview | International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) / 2 / 2870-2875 / 2278- 1021 | 1.770 | 0 | 0 | 2013 |
203 | Mobile Cloud Security Issues and Challenges: A Perspective | International Journal of Electronics and Information Technology (IJEIT) / 3 / 401-406 / 2277- 3754 | 1.895 | 0 | 0 | 2013 |
204 | Cloud Service Tools State of the Art | International Journal of Electronics and Information Technology (IJEIT) / 3 / 102-108 / 2277- 3754 | 1.895 | 0 | 0 | 2013 |
205 | Enhancing Data Security During Transit in Public Cloud | International Journal of Electronics and Information Technology (IJEIT) / 3 / 486-491 / 2277- 3754 | 1.895 | 0 | 0 | 2013 |
206 | Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm | International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) / 2 / 3064-3070 / 2278- 1021 | 1.770 | 0 | 0 | 2013 |
207 | User Authentication Mechanism for Sharing E-resource in Educational Clouds | International Journal of Computer Science and Network Security (IJCSNS) / 13 / 58-62 / 0 | 0 | 0 | 0 | 2013 |
208 | An impact of learning behavior and creativity quotient in learning environment | International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) / 2 / 3807-3812 / 2278- 1021 | 1.770 | 0 | 0 | 2013 |
209 | Failure Management in Cloud An Overview | International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) / 2 / 4003-4008 / 2278-1021 | 1.770 | 0 | 0 | 2013 |
210 | Match Making Service MMS A Centralized Architecture to Enhance Scalability in a Heterogeneous Cloud | International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) / 3 / 1128-1135 / 2277 128X | 2.080 | 0 | 0 | 2013 |
211 | Enhancing the Interpretability of Soil Classification Data from a Neural Network System by Using Fuzzy Approaches | International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) / 3 / 459-465 / 2277 128X | 2.080 | 0 | 0 | 2013 |
212 | A Novel LAS Relief Feature Selection Algorithm for Enhancing Classification Accuracy in Data Mining | International Journal of Computers & Technology (IJCT) / 11 / 2921-2927 / 2277-3061 | 1.341 | 0 | 0 | 2013 |
213 | A Systematic Approach on Data Pre processing in Data Mining | International Journal of Advanced Computer Technology (IJACT) / 2 / 335-339 / 2320-0790 | 0 | 0 | 0 | 2013 |
214 | Maintenance Effort Prediction Model Using Cognitive Complexity Metrics | International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) / 3 / 1599-1608 / 2277 128X | 2.080 | 0 | 0 | 2013 |
215 | Applying Data Mining Techniques on Soil Fertility Prediction | International Journal of Computer Applications Technology and Research (IJCATR) / 2 / 660-664 / 2320-0790 | 0 | 0 | 0 | 2013 |
216 | MSDoT Memory Size and Depth of Tier Based Queuing Model for Scheduling a Multi-Tier Cloud | Proceedings of International Conference on Emerging Trends and Applications in Computer Science (ICETACS), IEEE Xplore / - / 119-124 / 978-1-4673-5249-9 | 0 | 0 | 0 | 2013 |
217 | Impact of Depression and Stress on the Programming Performance of the Students | International Journal of Data Mining Knowledge Engineering / 0 / 0 / 0974-9683,0974-9578 | 0.621 | 0 | 0 | 2012 |
218 | A Study on Feature Selection using Machine Learning Techniques | International Journal of Data Mining Knowledge Engineering / 0 / 0 / 0974-9683,0974-9578 | 0.621 | 0 | 0 | 2012 |
219 | MFSPFA: An Enhanced Filter based Feature Selection Algorithm | International Journal of Computer Applications / 51, No. 12 / 27-31 / 0975-8887 | 0.814 | 0 | 0 | 2012 |
220 | An Impact of Emotional Happiness in Students? Learning Environment | International Journal of Data Mining Knowledge Engineering / 0 / 0 / 0974-9683,0974-9578 | 0 | 0 | 0 | 2012 |
221 | Feature Selection: A New Perspective | International Journal of Data Mining Knowledge Engineering / 0 / 0 / 0974-9683,0974-9578 | 0.621 | 0 | 0 | 2012 |
222 | Vertical Scalability Issues and Challenges in Cloud Computing: An Overview | International Journal of Networking and Communication Engineering / 0 / 0 / 0974-9713,0974-9616 | 0.569 | 0 | 0 | 2012 |
223 | A Survey on Horizontal Scalability in Cloud Computing An Overview | International Journal of Networking and Communication Engineering / 0 / 0 / 0974-9713,0974-9616 | 0.569 | 0 | 0 | 2012 |
224 | Survey on User Authentication for Cloud Computing | International Journal of Networking and Communication Engineering / 0 / 0 / 0974-9713,0974-9616 | 0.569 | 0 | 0 | 2012 |
225 | SECURITY ISSUES CHALLENGES AND SOLUTIONS IN NETWORK MOBILITY A REVIEW | International Journal of Computer Networks and Wireless Communications (IJCNWC) / 2, No.2 / 0 / 2250-3501 | 0.274 | 0 | 0 | 2012 |
226 | FTM A Middle Layer Architecture for Fault Tolerance in Cloud Computing | IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies ICNICT / 0 / 12-16 / 0 | 0 | 0 | 0 | 2012 |
227 | AAA Mechanism for Mobile Router in Network Mobility Environment | International Journal of Advanced Research in Computer and Communication Engineering / 1, Issue 10 / 832-836 / 2278-1021 | 0 | 0 | 0 | 2012 |
228 | Enhanced Feature Selection Algorithm using Modified Fisher Criterion and Principal Feature Analysis | International Journal of Advanced Research in Computer Science / 3, No. 4 / 310-314 / 0976-5697 | 0 | 0 | 0 | 2012 |
229 | Outlook of ANN in Agriculture Data Mining | International journal of Soft Computing / 7, Issue 1 / 24-27 / 1816-9503 | 0 | 0 | 0 | 2012 |
230 | Clustering Methods and Algorithms in Data Mining :review | Asian Journal of information Technology / 11, Issue 1 / 40-44 / 1682-3915 | 0 | 0 | 0 | 2012 |
231 | Importance of Association Rules in Data Mining : A Review | International journal of Soft Computing / 7,Issue 3 / 135-140 / 1816-9503 | 0 | 0 | 0 | 2012 |
232 | A new methodology to overcome high dimensionality problem in data mining | International Journal of Data Warehousing and Mining / 0 / (Accepted) / 0 | 0 | 0 | 0 | 2012 |
233 | An Inverse Modified Fisher Criterion to solve under-sampled problem in Data Mining | IEEE Transactions on Knowledge and Data Engineering (TKDE) / 0 / Communi / 0 | 0 | 0 | 0 | 2012 |
234 | Privacy in Cloud Computing: A Survey | Proceedings of the International Conference of Advanced Computer Science & Information (ACSIT- 2012) / 0 / 231-330 / 0 | 0 | 0 | 0 | 2012 |
235 | Positional - LCS: A Position based algorithm to find Longest Common Subsequence (LCS) in Sequence Database (SDB) | IEEE International Conference on Computational Intelligence and Computing Research / 0 / 284-287 / 0 | 0 | 0 | 0 | 2012 |
236 | HeurisFCP-A Heuristic Approach to Identify Frequent Contiguous Patterns (FCP) in Sequence Database | Proceedings of the International Conference on Radar, Communication and Computing (ICRCC 2012) / 0 / 215?220 / 0 | 0 | 0 | 0 | 2012 |
National |
||||||
SNo | Title | Name of Journal / Vol. No. / Page Nos/ISSNO. | Impact Factor | H Index No. | C Index No. | Year |
---|---|---|---|---|---|---|
1 | Predictive Model for Diabetes Mellitus in Tamil Nadu Using IoT Data | National Conference on Transforming Technology / 0 / 0 / 0 | 0 | 0 | 0 | 2018 |
2 | A Survey of Algorithms for Scheduling in the cloud: In a metric basis | National Conference on Transforming Technology / 0 / 0 / 0 | 0 | 0 | 0 | 2018 |
3 | An Enhanced Architecture for Imputing Missing Data in IoT Data using FRBIS Model | Proceedings of the National Conference on Advanced Computing Technologies and Applications / 0 / 0 / 978-1-941505-83-0 | 0 | 0 | 0 | 2018 |
4 | FRND: False Rank Node Detection Algorithm in RPL Topology | Proceedings of National Conference on Advanced Computing Technologies and Applications / 0 / 0 / 978-1-941505-83-0 | 0 | 0 | 0 | 2018 |
5 | RESEARCH ISSUES ON WEB MINING | State-Of-The-Art and Research Issues In Cloud Computing / - / null / null | null | - | - | 2017 |
6 | A Unified Model for Cloud Data Confidentiality | Fifth National Conference on Intelligent computing(FNCIC) / - / 87-92 / 0 | 0 | - | - | 2016 |
7 | Parallel DBScan algorithm for removing noise in IoTBig data | Fifth National Conference on Intelligent computing(FNCIC) / - / 99-104 / 0 | 0 | - | - | 2016 |
8 | A Methodology for preprocessing and construction of Diabetic Mellitus Warehouse | Fifth National Conference on Intelligent computing(FNCIC) / - / 93-98 / 0 | 0 | - | - | 2016 |
9 | User Demand Forecasting UDF for Dynamic Schedule Based Auto-scaling in Cloud Environment | User Demand Forecasting (UDF) for Dynamic Schedule Based Auto-scaling in Cloud Environment / - / null / null | null | - | - | 2016 |
10 | A Framework for Cloud Confidentiality in Public Cloud Storage | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 8-14 / 0976-2523 | 0 | - | - | 2015 |
11 | A Study on Cloud Data Security Issues | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 15-25 / 00976-2523 | 0 | - | - | 2015 |
12 | An Enhanced Qualitative Framework for Data Integration with Multiple Data Sources using Parallel Processing | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 26-32 / 0976-2523 | 0 | - | - | 2015 |
13 | Enhanced Authentication Framework for Mobile Cloud Environment | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 41-46 / 0976-2523 | 0 | - | - | 2015 |
14 | Issues and Challenges in Sentiment Analysis: A Survey | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 55-62 / 0976-2523 | 0 | - | - | 2015 |
15 | EQOS-AODV: A Technique to Enhance Quality of Service using Half Transmission Area Towards Sender | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 47-54 / 0976-2523 | 0 | - | - | 2015 |
16 | Large Scale Sentiment Analysis on Cloud Environment | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 63-71 / 0976-2523 | 0 | - | - | 2015 |
17 | User Behavior Identifier (UBI) for Schedule Based Auto-scaling in Cloud Environment | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 105-114 / 0976-2523 | 0 | - | - | 2015 |
18 | A Survey on the Metamorphosis of IoT Big Data into Quality Data using Pre-processing Techniques | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 115-123 / 0976-2523 | 0 | - | - | 2015 |
19 | Enhanced Authentication Mechanism for Public Cloud | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 124-131 / 0976-2523 | 0 | - | - | 2015 |
20 | A Study on Aspect based Sentiment Analysis on Big Data | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 132-140 / 0976-2523 | 0 | - | - | 2015 |
21 | Enhanced Architecture for Data Confidentiality in Cloud Computing | National Conference on Data Science and Engineering (NCDS 2014) / 0 / 40-45 / 9789351072942 | 0 | 0 | 0 | 2014 |
22 | A Cluster Based Services for Load Balancing in Cloud Computing Environment | National Conference on Data Science and Engineering (NCDS 2014) / 0 / 46-52 / 9789351072942 | 0 | 0 | 0 | 2014 |
23 | A Cluster Based Task Scheduling in Cloud Computing | National Conference on Data Science and Engineering (NCDS 2014) / 0 / 53-60 / 9789351072942 | 0 | 0 | 0 | 2014 |
24 | A Framework to Ensure Data Security in Public Cloud Storage | National Conference on Data Science and Engineering (NCDS 2014) / 0 / 88-92 / 9789351072942 | 0 | 0 | 0 | 2014 |
25 | A Pioneering Approach on Cloud Data Security using Cryptography | National Conference on Data Science and Engineering (NCDS 2014) / 0 / 23-32 / 9789351072942 | 0 | 0 | 0 | 2014 |
26 | Combining Top-Down and Bottom-Up Scalable Multidimensional Anonymization over Big Data using Map reduce on Cloud | National Conference on Data Science and Engineering (NCDS 2014) / 0 / 75-87 / 9789351072942 | 0 | 0 | 0 | 2014 |
Regional |
||||||
SNo | Title | Name of Journal / Vol. No. / Page Nos/ISSNO. | Impact Factor | H Index No. | C Index No. | Year |
---|---|---|---|---|---|---|
1 | Cloud Computing : Opportunities and Challenges | Retell / 21 / 28-34 / ISSN 0973-404X | - | - | - | 2019 |
2 | Quality of Services in the Internet of Things (IOT) - A Survey | Retell / 21 / 35-43 / ISSN 0973-404X | - | - | - | 2019 |
Seminars(S) / Conferences(C) /Workshops(WS) attended and the source of funding (National (N) / International (IN)) with details of outstanding participants, if any
SNo | Title | Type | Organization Name | Place | Days | Date |
---|---|---|---|---|---|---|
1 | FDP on "Open Educational Resources" - Search, Identify, Repurpose and Create your OER | S | St. Joseph`s College(Autonomous) | Trichy | 1 | 2021-09-25 |
2 | International Conference on Research and Development in Science , Engineering and Technology | I | St. Anne`s College of Engineering and Technology | Panruti | 1 | 2021-03-05 |
3 | IoT and it`s Application | S | SLS. MAVMM. AYIRA VAISYAR COLLEGE | Madurai | 1 | 2020-05-27 |
4 | Data Science and Visualization using Python | W | CSI Gwalior Chapter & the Institution of Engineers | - | 1 | 2020-05-24 |
5 | Recent Trends in Information Technology | S | J. J. College of Arts and Science | PudukKottai | 1 | 2020-05-24 |
6 | Trends and Scope in Robotics | S | AALIM MUHAMMED SALEGH COLLEGE OF ENGINEERING | Chennai | 1 | 2020-05-16 |
7 | FDP on Machine Learning Algorithms | S | Dwaraka Doss Goverdhan Doss Vaishnav College | Chennai | 1 | 2020-05-13 |
8 | Machine Learning Algorithms | W | Shasun Jain College for Women | Chennai | 1 | 2020-05-10 |
9 | International Conference on Computer Networks, Big Data and IoT | I | Vaigai College of Engineering | Madurai | 2 | 2019-12-19 |
10 | International Conference on Smart systems and Innovative Technology | I | Francis Xavier Engineering college | Tirunelveli | 3 | 2019-11-27 |
11 | International Conference on Inventive Communication and Computational technologies | I | Gnanamani College of Technology | Namakkal | 2 | 2019-04-29 |
12 | International Conference on Computer Networks Big Data and IoT (ICCBI - 2018) | I | Springer, Vaigai College of Engineering | Madurai | 2 | 2018-12-20 |
13 | International Conference on Smart Systems and Inventive Technology (ICSSIT 2018) | I | IEEE, Francis Xavier Engineering College | Tirunelveli | 2 | 2018-12-14 |
14 | International Conference on Advances in Computer Science and Technology | I | St. Francis de Sales College | Bengaluru | 1 | 2018-01-24 |
15 | National conference on transforming technology | C | Srimad Andavan Arts and Science college | Trichy | 2 | 2018-01-24 |
16 | International Conference on Intelligent Computing, Instrumentation and Control Technologies | I | Vimal Jothi Engg. College | Kannur, Kerala | 2 | 2017-07-06 |
17 | International Conference on Trends in Technology and Engineering | I | Arjun College of Technology | Coimbatore | 2 | 2017-04-06 |
18 | International Conference on Newer engineering concepts and technology | I | International Conference on Newer engineering concepts and technology | Trichy | 2 | 2017-03-28 |
19 | IT Skill show & International conference on Advancements in Computing Resources | I | Alagappa Institute of Skill Development & Computer Science | Karaikudi | 2 | 2017-02-15 |
20 | 2nd World Congress Computing and Communication Technology | I | Department of Computer Science & IT, St.Joseph`s college | Tiruchirappalli | 3 | 2017-02-02 |
21 | International conference on Emerging trends in engineering & Technology | I | Arunachala College of Engineering for women | Kanyakumari | 2 | 2016-12-09 |
22 | 4th International Conference on Artificial Intelligence & Computer Science | I | World Conferences.net | Adya Hotel Langkawi, Malaysia | 2 | 2016-11-28 |
23 | 2nd World Congress Computing and Communication Technology | I | Department of Computer Science, St.Jospeh`s College | Tiruchirappalli | 3 | 2016-02-02 |
24 | Big Data Analytics and Business Intelligence | W | Department of Computer Science, St. Josephs College (Autonomous) | Tiruchirappalli | 2 | 2016-01-04 |
25 | 1st International Conference on Modeling, Simulation and Control (ICMSC 15) | I | Karpagam University | Coimbatore | 2 | 2015-10-15 |
26 | 2nd International Conference on Engineering Technology and Science (ICETS 15) | I | Muthayammal College of Engineering | Rasipuram, Namakkal | 2 | 2015-03-05 |
27 | National Seminar on Ethical Hacking - An Inevitable Tool for a Secured Organization | S | Kakaraparti Bhavanarayana College (Autonomous) | Vijayawada, Andhra Pradesh | 2 | 2014-12-12 |
28 | International Conference on Intelligent Network and Computing (ICINC 2014) | I | Curtin University, Sarawak | Malaysia | 2 | 2014-06-07 |
29 | National Workshop on Research Issues in big Data | W | Computer Society of India (CSI) | Bharathidasn University Technology Park, Tiruchirappalli | 1 | 2014-03-27 |
30 | International Conference on Challenges & Opportunities of Information Communication Technology- ICCOICT14 | I | Bon Secour`s College for Women | Thanjavur | 1 | 2014-02-05 |
31 | Second International Conference on Research Trends in Computer Technologies (ICRTCT) | I | Dr.N.G.P College | Coimbatore | 1 | 2014-01-31 |
32 | First International Conference on Emerging Trends and Applications in Computer Science (ICETACS) | I | IEEE | Shilong | 2 | 2013-09-13 |
33 | Conference | C | College | - | 1 | 2010-01-01 |
34 | Conference | I | College | - | 1 | 2010-01-01 |
(Special Lectures / Workshops / Seminars / Association Activities/ Alumni Meeting)
SNo | Type of Programme | Title | Beneficiaries | Days | Date |
---|---|---|---|---|---|
1 | Reviewer for the International Conference | Innovative Intelligence Computing and Applications | Dept. of CS, Idhaya College for Women | 1 | 2019-08-28 |
2 | Workshop | Intellectual Property Rights (IPR) & Research Proposal writing | PG & Research department of CS, Mass College | 1 | 2019-08-17 |
3 | National Level Seminar | IoT - The Next Technology | Adiyaman Arts & Science College for Women | 1 | 2019-08-14 |
4 | Orientation Programme | Life Coping Skills | St. Anne`s College of Engineering and Education | 1 | 2019-07-16 |
5 | Conference Chair | Recent Trends in Advanced Computing | PG and Research Scholars,SJC of arts and science | 1 | 2019-02-07 |
6 | Special Lecture | Internet of things basics, Applications: Issues and challenges | B.E. & MCA, Paavai Engineering College, Namakkal | 1 | 2019-01-24 |
7 | Special Lecture | External Funding for Major / Minor / Seminar / Conferences | Academicians and Researchers in CS, Sacred Heart | 1 | 2018-08-24 |
8 | Keynote Speaker | Internet of things(IoT) | UG & PG students, Syed Ammal Arts & science. | 1 | 2018-08-01 |
9 | Workshop | Cloud for Eductional Intitutions | UG & PG students, Mother Teresa, Kodaikanal. | 2 | 2018-06-23 |
10 | Special Lecture | Research Skill Develpment | Faculty, Shri Sakthikailassh Womens college, salem | 1 | 2018-05-15 |
11 | Keynote Speaker | Advanced Computing Technologies and Applications | UG & PG students, REVA university, Bangalore | 1 | 2018-04-06 |
12 | Training Programme | Proposal Writing | Staffs, Arul Anandar College, Madurai | 1 | 2018-02-08 |
13 | Workshop | Advanced Big Data Analytics using R | Staffs, Cauvery college for women, Trichy | 1 | 2018-01-25 |
14 | Moderator and Invited Speaker | International Conference on Advances in Computer science | Staffs & Students, St. Francis de Sales College | 1 | 2018-01-24 |
15 | Seminar | Internet of Things | MCA & PG, Ganesar college, Melasivapuri | 1 | 2017-12-29 |
16 | Special Lecture | Introduction to Internet of Things in the workshop on IoT and its applications | UG, PG & MCA Students, SJC, Trichy | 1 | 2017-12-15 |
17 | Seminar | The Internet of Things-The Next Technology | B.E. & MCA, Paavai Engineering College, Namakkal | 1 | 2017-10-11 |
18 | Workshop | Research Methodology and Project Writing | Staffs, K. Ramakrishnan col of tech, Trichy | 1 | 2017-10-07 |
19 | Session Chair | Viewpoints in Cloud Security | Staffs & Research, Christhu Raj Institute | 1 | 2017-09-28 |
20 | National Seminar | Emerging Trends in Information Technology | UG, PG, Idhaya college for women, Sarugani | 1 | 2017-09-20 |
21 | Seminar | Big Data Analytics | B.E., Adi Shankara Institute of Engineering Col | 1 | 2017-08-12 |
22 | Keynote Speaker | Efficient Research Proposal Writing | Staffs & Research, SJC, Trichy | 1 | 2017-08-01 |
23 | Seminar | Research Project Agencies and Project Proposal Writing | Staffs, Holy cross college, Trichy | 1 | 2017-07-17 |
24 | Seminar | Big Data Analytics | B.E. & MCA, Paavai Engineering College, Namakkal | 1 | 2017-07-07 |
25 | Workshop | IoT-The Next Technology Mega-Trend | MCA, St.Xavier`s college, Palayamkottai | 1 | 2017-03-06 |
26 | State Level Workshop | Wonders of IoT | PG Students, Jayaraj annapackiam col | 1 | 2017-03-04 |
27 | Conference Chair | International Conference on current trends in Advanced computing | Staffs&Students, Kristu Jayanti College, Bengaluru | 2 | 2017-03-02 |
28 | State Level Seminar | Innovative Researches in Computer Science | PG & Research students, Srimad Andavan College | 1 | 2017-01-30 |
29 | Special Lecture on Preparing Research Article | Srimad andavan arts & Science College, Tiruchirappalli | PG and Research Dept. of CS | 1 | 2017-01-30 |
30 | National Workshop | Data science research-Biological data management | Staffs & Research, Jamal Mohamed College, Trichy | 3 | 2017-01-23 |
31 | Resource Person on National level workshop on Data science Research | Jamal Mohamed College, Tiruchirappalli | PG and Research students | 3 | 2017-01-23 |
32 | Guest Lecture on ICT in Education and Research | St.Anne`s B.Ed College for Women, Periyakulam | B.Ed Students | 1 | 2016-09-22 |
33 | Lecture on Data Analytics using R | Jayaraj annapackiam college for women | M.Sc Maths and CS students | 2 | 2016-09-20 |
34 | Resource Person on National level workshop on Research Methodology and MATLAB | St.Joseph`s college of arts and science, Cuddalore. | PG and Research Dept. of CS | 2 | 2016-09-16 |
35 | Short Course on Relational Database Management System | St.Joseph`s Institute of Management, Tiruchirappllai | MBA Students | 2 | 2016-08-11 |
36 | Short Course on Software Engineering | St.Joseph`s Institute of Management, Tiruchirappllai | MBA students | 2 | 2016-08-06 |
37 | Lecture on Cloud Computing and IT Security | Mother Tersea Womens Univeristy, Kodaikanal | MCA and MPhil students | 1 | 2016-07-14 |
38 | Ph.D External Examinar (Viva-Voce) | Erode Arts and Science College | Bharathiyar University | 1 | 2016-07-04 |
39 | UGC Sponsored National Seminar on Emerging Trends in ICT-Enabled Teaching Learning Process | Pavanatma College, Murockassery, Iduki, Kerala | Students | 2 | 2016-02-11 |
40 | UGC Sponsored Three Days National Seminar | Cloud Computing | Students & Staffs, MES College, Kerala | 3 | 2015-09-15 |
41 | Special lecture | Successful Project Writing | Faculties,St. Mary`s College,Tuticorin | 1 | 2015-07-08 |
42 | Special lecture | Information Security and Be a Winner | Students, Vasavi Vidya Trust Group of Institutions | 1 | 2015-03-04 |
43 | UGC Sponsored Two Days Workshop | Data Mining and Research Methodology & Article Writing | M.phil. and Research Scholars | 2 | 2015-02-07 |
44 | Seminar | Recent Trends in IoT | Students | 1 | 2015-01-31 |
45 | Special Lecture | Big Data and Green Computing | Students | 1 | 2015-01-21 |
46 | Special Lecture | Ethical Hacking - An Inevitable Tool for a Secured Organization | Students | 2 | 2014-12-12 |
47 | Seminar | Cloud Computing and Big Data | Students and Teachers | 1 | 2014-12-09 |
48 | Special Lecture | Cloud and Big Data | Students | 1 | 2014-10-31 |
49 | Special Lecture | Big Data Analysis | Students | 1 | 2014-10-13 |
50 | National Level Workshop | Internet Security, Changes and Challenges | Students | 1 | 2014-09-26 |
51 | Keynote Speaker | Cloud Computing: Opportunities and Challenges | Students | 1 | 2014-09-17 |
52 | Special Lecture | Research methodology | Students | 1 | 2014-09-04 |
53 | Special Lecture | Cloud Computing & Big Data | Students | 1 | 2014-09-02 |
54 | workshop | Cloud Computing and Big Data | Students | 1 | 2014-08-21 |
55 | Seminar | Cloud Computing | Students | 1 | 2014-08-16 |
56 | Technical Chair | Drafting funded project proposal | Students | 1 | 2014-08-11 |
57 | Keynote Speaker and Session Chair | National Conference on Data Science NCDS-2014 | Students | 2 | 2014-08-07 |
58 | Workshop | WEKA | Students | 1 | 2014-04-12 |
59 | Technical Chair | National Conference on Mining, Internetworking and Data Security- MINDS 2014 | Students | 1 | 2014-03-28 |
60 | UGC Funded Workshop | Research in Data Mining using WEKA | Students | 1 | 2014-03-05 |
61 | UGC Funded Workshop | Big Data | Students | 1 | 2014-03-05 |
62 | Organizing Committee Member-Conference | World Congress on Computing and Communication Tech | Institution | 3 | 2014-02-27 |
63 | Ph.D. External Examiner (Viva-Voce) | Karpagam university, Coimbatore | University | 1 | 2014-02-24 |
64 | Two-Days National Level Workshop | WEKA | Students | 2 | 2014-02-14 |
65 | Special Lecture | Research Methodology and Scientific Writing | Ph.D Scholars and P.G. students | 1 | 2014-02-13 |
66 | National Level Seminar | Recent Trends in IT Field | Students | 1 | 2014-02-01 |
67 | Board of Studies | St.Xavier`s College (Autonomous) | Institution | 1 | 2014-01-11 |
68 | National Workshop | WEKA | Students | 1 | 2014-01-10 |
69 | Special Lecture | Interview and Soft Skills | Students | 1 | 2013-12-16 |
70 | National Level Faculty Development Programme | Research and Research Funding | Faculties | 1 | 2013-12-16 |
71 | Special Lecture | Project Proposal Writing and Funding | Faculties | 1 | 2013-12-12 |
72 | Board of Studies | Sri Sarada College for Women | Institution | 1 | 2013-11-30 |
73 | Special Lecture | Big Data in Business | Students | 1 | 2013-11-23 |
74 | Workshop | Modern Research Methodology | Students | 1 | 2013-10-28 |
75 | Member- Advisory Committee to the Editorial Board | Nehru Memorial College | Institution | 1 | 2013-10-01 |
76 | Academic Auditor | PSGR Krishnammal College for Women | Institution | 1 | 2013-09-30 |
77 | State Level Seminar | Cloud Computing | Students | 1 | 2013-09-28 |
78 | Subject Expert | Faculty Enhancement Programme | Faculties and Students | 1 | 2013-09-03 |
79 | Guest Lecture | Special interaction on Research | M. Tech. students and Faculty Members | 1 | 2013-07-19 |
80 | Special Lecture | To succeed in as Interview | Dept of Tamil, St. Joseph`s College | 1 | 2013-02-26 |
81 | National Seminar on Construction Project Management | Project Management | Civil Engineers, Oxford Engineering College | 1 | 2013-02-23 |
82 | Special Lecture | Cloud Computing Issues and Challenges | M.Phil and Final Year PG students, Nehru Memorial | 1 | 2013-02-13 |
83 | Special Lecture | Cloud Computing | MCA Students, SJC | 1 | 2013-02-13 |
84 | Seminar | Cloud Computing Issues and Challenges | M.Phil. & Ph.D. Research Scholars, St. Xaviers. | 1 | 2013-02-12 |
85 | Seminar | Cloud Computing Issues and Challenges | MCA students, Jayaram College of Engineering Tech | 1 | 2013-02-07 |
86 | Seminar | Research Opportunities and Challenges in Mobile Networks and Cloud Computing | M.Phil. & Ph.D. Research Scholars, Jain College. | 1 | 2013-02-02 |
87 | Workshop | Cloud Computing Issues and Challenges | M.Phil. & Ph.D. Research Scholars, Jamal Mohmad. | 1 | 2013-01-23 |
88 | Conference Chair | International Conference on Engineering Trends in Science and Engineering Technology | J. J College of Engineering and Technology | 1 | 2012-12-14 |
89 | Special Lecture | Research Methodology | M.Phil. & Ph.D. Research Scholars, BUTP. | 1 | 2012-11-06 |
90 | Chair Person for the Paper Presentation | WebFest 12 | Holy Cross College | 1 | 2012-10-19 |
91 | Special lecture | Cloud Computing Issues and Challenges | M.Phil. & Ph.D. Research Scholars, Sacred Heart. | 1 | 2012-08-31 |
92 | Special Lecture | Be a Winner | Students, Oxford Engineering College, Trichy. | 1 | 2012-08-03 |
93 | Workshop | Cloud Computing | M.Phil. & Ph.D. Research Scholars, KONGU, Erode. | 1 | 2012-08-01 |
(From National(N) / International(IN), funding agencies and Total grants received.)
SNo | Title of the Project | Type | Status | Finding Agency | Duration | Amount(in Rupees) | Year |
---|---|---|---|---|---|---|---|
1 | Developing predictive models to forecast and pre-treat Diabetes mellitus in Tamil Nadu using clinical | MI | C | UGC - SERO | 2 years | 1,90,000 | 2017 |
2 | A Framework to Enhance Security using Authentication, Authorization and Accounting (AAA) Mechanisms in NEtwork MObility (NEMO) Environment | MI | C | UGC | 2 | 1,80,000 | 2012 |
3 | Enhancing the Functional and Non-Functional Metrics of Reliability in a Dynamic Web Service Environment | MA | C | DST | 3 | 10,32,000 | 2011 |
4 | An investigation into the Cognitive Complexity of Component based System | MI | C | UGC | 2 | 1,35,000 | 2009 |
5 | A study on the impact of Emotional Competence on the Comprehension of Object Oriented Systems for Competitive Advantage | MI | C | UGC | 2 | 70,000 | 2007 |
6 | An investigation into the Cognitive Complexity of Object-oriented Systems | MI | C | UGC | 2 | 35,000 | 2007 |
Ph.D Awarded to |
||||
SNo | Scholar Code | Scholar Name | Date of ViVa | Title |
---|---|---|---|---|
1 | BDU. Ref. No. 1663 | P. Calduwel Newton | 2012 | Routing Algorithms to Enhance the Quality of Service in Mobile Networks |
2 | BDU. Ref. No. 2329 | N. Sasikaladevi | 2013 | Reliability Enforced Service Selection Approaches for Composite Web Services |
3 | BDU. Ref. No. 4840 | A. Aloysius | 2013 | A Cognitive Complexity Metrics Suite for Object Oriented Design |
4 | BDU. Ref. No. 11161 | J. Isac Gnanaraj | 2014 | Authentication, Authorization and Accounting Mechanisms to Enhance Security in Network Mobility |
5 | BDU. Ref. No. 36852 | V. Arul Kumar | 2013 | Feature Selection Approaches to Enhance the Classification Accuracy |
6 | BDU. Ref. No. 5326 | J. Charles Selvaraj | 2014 | User Interface Design Framework based on Cognition for Effective E-learning |
7 | BDU. Ref. No. 22920 | S. Charles | 2014 | Feature Reduction Techniques to Enhance the Clustering Accuracy |
8 | BDU Ref. No. 34005 | S.S.Baskar | 2014 | Feature Selection Techniques to Enhance Classification Accuracy in Data Mining |
9 | MSU/RES/R1/REG NO.7809 | S. S. Manikandasaran | 2015 | Security Framework to Ensure the Confidentiality of Outsourced Data in Public Cloud Storage |
10 | BDU Ref. No. 7918 | R. Jemina Priyadarsini | 2016 | Optimized Meta Task Scheduling Algorithms for Cloud Environment |
11 | BDU Ref. No. 33312 | A. Stanislas | 2016 | Optimization of Virtual Machine Generation in a Scalable Heterogeneous Federated Cloud Environment |
12 | COSDEC11042 | S. Raja Sekaran | 2017 | Enhanced Algorithms for mining the complete-set of Frequent Contiguous Pattern(FCPS) in DNASequences |
13 | BDU Ref. No. 47564 | S. Arul Oli | 2017 | Confidentiality Techniques to Enhance Data Security in Public Cloud Storage |
14 | 12PHP1163 | I. Amalraj | 2017 | Enhanced Mechanisms for Privacy Preservation in Public Cloud using Data Anonymization |
15 | Ph.D.-CB-July2012-0228 | B. Devika Rubi | 2017 | Enhanced Longest Common Pattern Mining Algorithms for DNA Sequences |
16 | BDU Ref. No. 17949 | A. Cecil Donald | 2018 | An Identity Management Framework for Secured Data Access in Mobicloud Environment |
17 | BDU. Ref. No. 17948 | N.Veeraragavan | 2018 | A Novel Framework for Authentication as a Service (AaaS) to Enhance Security in Public Cloud Environ |
18 | BDU Ref. No. 45111 | G. Vaitheeswaran | 2018 | Approaches to Enhance the Accuracy of Sentiment Analysis on Big Data |
19 | BDU Ref. No. 34500 | M. Kriushanth | 2018 | Dynamic Rules for Effective Auto-Scaling in Cloud Environment |
20 | BDU Ref. No. 06755 | A. Jenifer Jothi Mary | 2019 | Techniques to Enhance the Accuracy of Aspect Level Sentiment Analysis in Big Data |
21 | BDU Ref. No .015873 | I.Priya Stella Mary | 2019 | Enhanced Data Pre-Processing Models for Internet of Things |
22 | BDU Ref. No. 26925 | R. Stephen | 2019 | Techniques for Secured Routing in Internet of Things |
23 | BDU Ref. No. 52138 | A. Dalvin Vinoth Kumar | 2019 | Quality of Service Enhanced Routing Algorithms for Internet of Things |
24 | BDU Ref. No. 16847 | A.Vithya Vijayalakshmi | 2019 | Framework for Data Security in Internet of Things |
25 | BDU Ref. No. 038782 | Sr. R.Shantha Mary Joshitta | 2019 | Lightweight Algorithms for Data Security in Healthcare Internet of Things |
26 | BDU. Ref. No. 32637 | S. Santiago | 2019 | Energy Aware Routing Algorithms for Internet of Things |
27 | BDU Ref. No. 39078 | B. J. Hubert Shanthan | 2020 | Meta Task Scheduling Algorithms for Multi Cloud Computing |
M.Phil Awarded to |
||||
SNo | Scholar Code | Scholar Name | Date of ViVa | Title |
---|---|---|---|---|
1 | R. Indra | null | 1999 | Network conferencing |
2 | R. John Xavier | null | 1999 | Distributed Environment on LAN |
3 | D. Chitra | null | 1999 | Building a Portal with lotus domino |
4 | S. Sagayaraj | null | 2003 | Distributed processing A comparative Analysis against sequential processing |
5 | J. Josephine Hillary | null | 2003 | Object Oriented Software Measurement Tools. |
6 | A. Aloyius | null | 0 | A Study of Cognitive complexity and Debugging in Object oriented system. |
7 | S. Lawrence | null | 0 | Code Quality analysis of Artificial Neural Network System. |
8 | J. Sasikumar | null | 0 | A study on Metric changes in Versioning |
9 | A. Ayubkhan | null | 0 | Comprehension in Object Oriented Systems |
10 | M. Badri Prasad | null | 0 | Halstead Metrics tool for object oriented systemHalstead Metrics tool for object oriented system |
11 | 11MCS | D. A. E. Rosaline | 2012 | Horizontally Scalable Architecture for Cloud Computing |
12 | 11MCS | M. Bala Vaishnavi | 2012 | Vertically Scalable Architecture for Cloud Computing |
13 | 11MCS117 | I. Arulmani | 2012 | User Authentication Mechanisms for Educational Clouds |
14 | 11MCS130 | P. Lakshmi | 2012 | Machine Level Authentication Mechanisms for Accessing E-Materials in Educational Clouds |
15 | 12MCS107 | S. Edel Josephine Rajakumari | 2013 | Secure Session Control in EDU-Cloud using OTP |
16 | 12MCS121 | A. Nallathambi | 2013 | Secure Financial Institution Data Transactions using RSA Encryption Algorithm in Mobile Cloud Comput |
17 | 12MCS128 | V. Rajeswari | 2013 | Secure Data Transfer in Medical Cloud using DES Algorithm |
18 | 09MCS114 | S.Manimozhi | 2010 | An Investigation into the Impact of Cognitive Factors in E-Learning Environment |
19 | 13MCS117 | A. Jenis | 2014 | An Authentication Mechanism to Enhance Security in Edu-Cloud |
20 | 13MCS113 | R. Ramya | 2014 | An Architecture for Clustered Services for Load Balancing in Cloud Environment |
21 | 13MCS119 | N. Hemalatha | 2014 | An Architecture for Data Confidentiality in MediCloud |
22 | 13MCS101 | V. R. Bithiah Blessie | 2014 | An Architecture for Cluster based Task Scheduling in Public Cloud |
23 | 13MCS114 | B. J. Hubert Shanthan | 2014 | A Novel Framework for Dynamic Resource Allocation in Cloud Based E-Learning |
24 | 14MCS136 | S. Maheswari | 2015 | Reversible N-Grams Stemmer Algorithm for Effective Classification of Text Data |
25 | 14MCS103 | A. Vithya Vijayalakshmi | 2015 | A Unified Model for Cloud Data Confidentiality |
26 | 14MCS114 | G. Kumaresan | 2015 | Authentication Architecture to Enhance Security in Public Edu-cloud |
27 | 14MCS154 | A. Nandhini | 2015 | A Hybrid Approach for Aspect Based Sentiment Analysis on Big Data |
28 | 14MCS135 | X. Jenie Arock | 2015 | Parallelized Contextual Valence Shifters Algorithm for Sentiment Analysis on Bigdata |
29 | 14MCS112 | M. A. Mary Priyanka | 2015 | Enhanced Authentication Mechanism for Public Cloud |
30 | 15MCS142 | S.Ayesha | 2016 | A new concept on sentiment analysis based on flattery sentiment |
31 | 15MCS107 | S.Shyni | 2016 | A framework for pre-processing and construction of diabetic mellitus warehouse |
32 | 15MCS123 | K.Rajarajeshwari | 2016 | A comparative study of ID3 and native bayes algorithm to extract opinion target and opinion word fro |
33 | 15MCS106 | A. Sagaya Priya | 2016 | Parallel DBSCAN Algorithm for removing noise in IoT Big Data |
34 | 16MCS111 | L. Benedict Carvin | 2017 | Energy Efficient Computing in Cloud Environment |
35 | 16MCS112 | W. Catherine Crasy | 2017 | A Framework for Data Security in Cloud Computing |
36 | 17MCS103 | V.A.Jane | 2018 | A Novel IoT Based Architecture for Banana Leaf Disease Prediction using Data Mining Technique |
37 | 18MCS108 | P. Kamakshi Priyaa | 2019 | An Internet of Things Based Calorie Estimation and Obesity Prediction System |