Sorry, you need to enable JavaScript to visit this website.

School of Computer Science and Engineering (SCOPE)

Publications

2018

  • Pengfei Hu, Huansheng Ning, Tie Qiu, Yue Xu, Arun Kumar S, A unified face identification and resolution scheme using cloud computing in Internet of Things, Future Generation Computer Systems, Vol. 81, pp. 582-592, 2018
  • Arvind Pillai, Rajkumar S, Swapnil Satapathy, Suresh Chandra Satapathy, Ki-Hyun Jung Rajakumar K, Local diagonal extrema number pattern: A new feature descriptor for face recognition, Future Generation Computer Systems, Vol.81, pp. 297-306, 2018
  • Shiwen Zhang, Xiong Lia, Haowen Liu, Yaping Lin, Arun Kumar S, A privacy-preserving friend recommendation scheme in online social networks, Sustainable Cities and Society, Vol.38, pp. 275-285, 2018
  • Khalid Mahmood Shehzad Ashraf Chaudhry, Husnain Naqvi, Saru Kumari, Xiong Li Arun Kumar S, An elliptic curve cryptography based lightweight authentication scheme for smart grid communication, Future Generation Computer Systems, Vol.81, pp. 557-565, 2018
  • Srinivasa Perumal R, Chandra Mouli PVSSR, Dimensionality reduced local directional number pattern for face recognition, Journal of Ambient Intelligence and Humanized Computing, Vol. 9(1), pp. 95-103, 2018
  • Annapurna J, Lakshmanan K, A cooperative game framework for detecting overlapping communities in social networks, Physica A: Statistical Mechanics and its Applications, Vol.491, pp. 498-515, 2018
  • Sanjiban Sekhar Roy, Reetika Roy, Valentina Emilia Balas, Estimating heating load in buildings using multivariate adaptive regression splines, extreme learning machine, a hybrid model of MARS and ELM, Renewable and Sustainable Energy Reviews, Vol.82, pp. 4256-4268, 2018
  • Jagadeesh Gopal, Arun Kumar S, Anirban Basu, Xiao Zhi Gao, Integration of fuzzy DEMATEL and FMCDM approach for evaluating knowledge transfer effectiveness with reference to GSD project outcome, International Journal of Machine Learning and Cybernetics, Vol. 9(2), pp. 225-241, 2018
  • Raheleh Khanduzi, M Reza Peyghami, Arun Kumar S, Data envelopment analysis and interdiction median problem with fortification for enabling IoT technologies to relieve potential attacks, Future Generation Computer Systems, Vol. 79 (3), pp. 928-940 2018
  • Xiong Li, Jianwei Niu, Saru Kumari, Fan Wu, Arun Kumar S Kim-Kwang Raymond Choo, A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments, Journal of Network and Computer Applications, Vol. 103, pp. 194-204, 2018
  • Mohamed Abdel-Basset, Laila Abdle-Fatah, Arun Kumar S, An improved Lévy based whale optimization algorithm for bandwidth-efficient virtual machine placement in cloud computing environment, Cluster Computing, Article in press, 2018
  • Mohamed Abdel-Basset, Doaa El-Shahat, Ibrahim El-henawy, Arun Kumar S, Syed Hassan Ahmed, A Novel Whale Optimization Algorithm for Cryptanalysis in Merkle-Hellman Cryptosystem, Mobile Networks and Applications, Article in press, 2018
  • Arjit Karati, SK Hafizul Islam, Marimuthu K, Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments, IEEE Transactions on Industrial Informatics, Article in press, 2018
  • Ananda Kumar S, Ilango P, The Impact of Wireless Sensor Network in the Field of Precision Agriculture: A Review, Wireless Personal Communications, Vol. 98(1), pp. 685-698, 2018
  • Saira Banu J, Rajasekhara Babu M, Sriram S, GPU implementation of image convolution using sparse model with efficient storage format, International Journal of Grid and High Performance Computing, Vol. 10(1), pp. 54-70, 2018
  • Beeren Sahu, Pankaj Kumar Sa, Sambit Bakshi, Arun Kumar S, Reducing dense local feature key-points for faster iris recognition, Computers and Electrical Engineering, Article in press, 2018
  • Liwei Huang, Yutao Ma, Yanbo Liu, Arun Kumar S, Multi-modal Bayesian embedding for point-of-interest recommendation on location-based cyber-physical-social networks, Future Generation Computer Systems, Article in press, 2018
  • Ali Shokouhi Rostami, Marzieh Badkoobe, Farahnaz Mohanna, Hengameh keshavarz, Ali Asghar Rahmani Hosseinabadi Arun Kumar S, Survey on clustering in heterogeneous and homogeneous wireless sensor networks, Journal of Supercomputing, Vol.74(1), pp. 277-323, 2018
  • Wei Liu, Jing Wang, Arun Kumar S, Jian Yin, Dynamic metric embedding model for point-of-interest prediction, Future Generation Computer Systems, Article in press, 2018
  • Zhigao Zheng, Arun Kumar S, Tao Wang, Adaptive Communication Protocols in Flying Ad Hoc Network, IEEE Communications Magazine, Vol.56(1), pp. 136-142, 2018
  • Fabio Martinelli, Francesco Mercaldo, Albina Orlando, Vittoria Nardone, Antonella Santone Arun Kumar S, Human behavior characterization for driving style recognition in vehicle system, Computers and Electrical Engineering, Article in press, 2018
  • Asha Jerlin M, Marimuthu K, A New Malware Detection System Using Machine Learning Techniques for API Call Sequences, Journal of Applied Security Research, Vol.13(1), pp. 45-62, 2018
  • Fan Wu, Xiong Li, Arun Kumar S, Lili Xu, Saru Kumari Liuxi Wu Jiang Shen, A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks, Future Generation Computer Systems, Vol.82, pp. 727-737, 2018
  • Jiachen Yang, Jiabao Wen, Bin Jiang, Zhihan Lu, Arun Kumar S, Marine depth mapping algorithm based on the edge computing in Internet of things, Journal of Parallel and Distributed Computing, Vol.114, pp. 95-103, 2018
  • Ching-Hsue Cheng, You-Shyang Chen, Arun Kumar S, Jieh Ren Chang, Ting Yu Wang, Lessoning travelers’ motivating behavior for a growing phenomenon in Taiwan by an advanced hybrid object-oriented hierarchical model, Journal of Computational Science, Vol.25, pp. 58-75, 2018
  • Satish C J, Anand M, Automated bug assignment in software maintenance using graph databases, International Journal of Intelligent Systems and Applications, Vol.10(2), pp. 27-36, 2018
  • Meghna Choudhary, Harish Kumar, Sakshi Kaushal, Arun Kumar S, The case analysis on sentiment based ranking of nodes in social media space, Multimedia Tools and Applications, Vol.74(4), pp. 4217-4236, 2018
  • Xiaomin Yang Wei Wu, Kai Liu, Pyoung Won Kim, Arun Kumar S Gwanggil Jeon, Multi-semi-couple super-resolution method for edge computing, IEEE Access, Vol.6, pp. 5511-5520, 2018
  • Shashank Kumar Mishra, Manjula R, Japmrmt: Java application performance monitoring and resource MGMT toolkit, International Journal of Mechanical Engineering and Technology, Vol. 9(1), pp. 572-586, 2018
  • Govinda K, Srikanth Deelip M, Big data analytics using hadoop over cloud, International Journal of Pure and Applied Mathematics, Vol.118(Spl. Issue 9), pp. 555-569, 2018
  • Gayathri Devi N, Manikandan K, A review on privacy measures and techniques in big data, International Journal of Pure and Applied Mathematics, Vol.118(Spl. Issue 9), pp. 195-202, 2018
  • Sai Jayesh B, Jayasurya B, Govinda K, Remote telemetry system using IOT, International Journal of Pure and Applied Mathematics, Vol. 118(Spl Issue 5), pp. 545-553, 2018
  • Balaji K, Lavanya K, Pattern-based conceptual clustering algorithms for knowledge acquisition: An overview, International Journal of Pure and Applied Mathematics, Vol. 118(Spl Issue 9), pp. 879-884, 2018
  • Govinda K, Narendra B, Opinion mining using classification techniques, International Journal of Pure and Applied Mathematics, Vol. 118(Spl Issue 9), pp. 535-544, 2018
  • Balaji K, Lavanya K, Clustering Algorithms for Mixed Datasets: A Review, International Journal of Pure and Applied Mathematics, Vol. 118(Spl Issue 7), pp. 547-555, 2018
  • PradeepKumar TS, Venkata Krishna P, Power modelling of sensors for IoT using reinforcement learning, International Journal of Advanced Intelligence Paradigms, Vol. 10(1-2), pp. 3-22, 2018
  • Petra Vrablecová, Anna Bou Ezzedine, Viera Rozinajova, Slavomir Sarik, Arun Kumar S, Smart grid load forecasting using online support vector regression, Computers and Electrical Engineering, Vol.65, pp. 102-117, 2018
  • Yinbin Miao, Jianfeng Ma, Qi Jiang, Xiong Li, Arun Kumar S, Verifiable keyword search over encrypted cloud data in smart city, Computers and Electrical Engineering, Vol.65, pp. 90-101, 2018
  • Liang Wei, Tang Mingdong, Long Jing, Arun Kumar S, Huang Yin, SIRSE: A secure identity recognition scheme based on electroencephalogram data with multi-factor feature, Computers and Electrical Engineering, Vol.65, pp. 310-321, 2018
  • Abdulaziz Shehab, Mohamed Elhoseny, Khan Muhammad, Haojun Huang, Arun Kumar S Po Yang, Secure and Robust Fragile Watermarking Scheme for Medical Images, IEEE Access, Article in press, 2018
  • Ali Hassan Sodhro, Arun Kumar S, Sandeep Pirphulal, Aicha Sekhari, Yacine Ouzrout, Green media-aware medical IoT system, Multimedia Tools and Applications, Article in press, 2018
  • Annapurna J, Lakshmanan K, Overlapping community detection in social networks using coalitional games, Knowledge and Information Systems, Article in press, 2018
  • Praveen Kumar Reddy, Rajasekhara Babu M, Implementing self adaptiveness in whale optimization for cluster head section in Internet of Things, Cluster Computing, Article in press, 2018
  • Sun Jian, Sun Siyu, Li Ke, Liao Dan, Arun Kumar S Victor Chang, Efficient algorithm for traffic engineering in Cloud-of-Things and edge computing, Computers and Electrical Engineering, Article in press, 2018
  • Zhiyong Zhang, Kim Kwang Raymond Choo, Arun Kumar S, Liang Chen, Crowd computing for social media ecosystems, Applied Soft Computing Journal, Article in press, 2018
  • Hai-Tao-Zheng, Zhe Wang, Wei Wang, Arun Kumar S, Xi Xiao Congzhi Zhao, Learning-based topic detection using multiple features, Concurrency Computation, Article in press, 2018
  • Marimuthu K, Xiong Li, Ashok Kumar Das, Saru Kumari, Qin Liu, Introduction to the special section on Big data and IoT in e-healthcare, Computers and Electrical Engineering, Vol.65, pp. 261-264, 2018
  • Vimala D, Manikandan K, A review on maximum coverage and network connectivity problems in wireless sensor network, International Journal of Pure and Applied Mathematics, Vol. 118(Spl Issue 9), pp. 231-238, 2018
  • Meenatchi S, Prabu S, Investigation on different clustering techniques in wireless sensor networks, International Journal of Advanced Intelligence Paradigms, Vol.10(1-2), pp. 194-207, 2018
  • Vipul Jain, Arun Kumar S, Sumit Sakhuja, Nittin Toduka, Rahul Aggarwal, Supplier selection using fuzzy AHP and TOPSIS: a case study in the Indian automotive industry, Neural Computing and Applications, Vol. 29 (7), pp. 555-564, 2018
  • San-Mey Zhang, Arun Kumar S, Reliable design for virtual network requests with location constraints in edge-of-things computing, Eurasip Journal on Wireless Communications and Networking, Vol.2018 (1), pp. 65, 2018
  • Zheng Ziao, Xiong Li, Le Wang, Qiuwei Yang, Jiayi Du Arun Kumar S, Using convolution control block for Chinese sentiment analysis, Journal of Parallel and Distributed Computing, Vol.116, pp. 18-26, 2018
  • Jerline Sheeba Anni, Arun Kumar S, Wireless Integrated Sensor Network: Boundary Intellect system for elephant detection via cognitive theory and Fuzzy Cognitive Maps, Future Generation Computer Systems, Vol. 83, pp. 522-534, 2018
  • Tingting Yang, Xiang Long, Arun Kumar S, Zhigao Zheng, Chao Tong, Deep detection network for real-life traffic sign in vehicular networks, Computer Networks, Vol.136, pp. 95-104, 2018
  • Shailendra Rathore, Arun Kumar S, Jong Hyuk Park, A novel framework for internet of knowledge protection in social networking services, Journal of Computational Science, Vol.26, pp. 55-65, 2018
  • Mauro A.A.da Cruz, Rodrigues, Joel José P.C., Arun Kumar S, Jalal Al-Muhtadi, Valery V. Korotaev, Performance evaluation of IoT middleware, Journal of Network and Computer Applications, Vol.109, pp. 53-65, 2018
  • Sooraj T R, B K Tripathy, An Interval valued fuzzy soft set based optimization algorithm for high yielding seed selection, International Journal of Fuzzy System Applications, Vol.7(2), pp. 44-61, 2018
  • Sodhro A H, Arun Kumar S, Sodhro G H, Lohano S, Pirbhulal S, An energy-efficient algorithm for wearable electrocardiogram signal processing in ubiquitous healthcare applications, Sensors (Switzerland), Vol.18(3), pp. 923, 2018
  • Niknil Mukund, Saurabh S Thakur, Sheelu Abraham, Kaustubh Vaghmare, D P Acharjya, An Information Retrieval and Recommendation System for Astronomical Observatories, Astrophysical Journal, Supplement Series, Vol.235(1), pp. 22, 2018
  • Prasanth Vaidya S, Chandra Mouli PVSSR, Adaptive, robust and blind digital watermarking using Bhattacharyya distance and bit manipulation, Multimedia Tools and Applications, Vol.77(5), pp. 5609-5635, 2018
  • Abin Oomen Philip, Saravanaguru RaK, A vision of connected and intelligent transportation systems, International Journal of Civil Engineering and Technology, Vol.9(2), pp. 873-882, 2018
  • Sangeethapriya N, Sasikala R, Srinivasan A, Burst communication by using self-adaptive buffer allocation with energy-efficient in-body sensor networks, International Journal of Biomedical Engineering and Technology, Vol.26(3-4), pp. 325-340, 2018
  • Suresh Kumar N, Arun M, Mukesh Kumar Dangi, Remote sensing image retrieval using object-based, semantic classifier techniques, International Journal of Information and Communication Technology, Vol.13(1), pp. 68-82, 2018
  • Syed Muzamil Basha, Dharmendra Singh Rajputh, Iyengar NCSN, Ronnie D Caytiles, A novel approach to perform analysis and prediction on breast cancer dataset using R, International Journal of Grid and Distributed Computing, Vol.11(2), pp. 41-54, 2018
  • Somula Ramasubba Reddy, Sasikala R, Round robin with load degree: An algorithm for optimal cloudlet discovery in mobile cloud computing, Scalable Computing, Vol.19(1), pp. 39-51, 2018
  • Divisha Khaturia, Aditi Saxena, Syed Muzamil Basha, Iyengar NCSN, Ronnie D Caytiles, A comparative study on airline recommendation system using sentimental analysis on customer tweets, International Journal of Advanced Science and Technology, Vol.111, pp. 107-114, 2018
  • Murillo B. Rodrigues  Raul Victor M. Da Nóbrega Shara Shami A. Alves Pedro Pedrosa Rebouças Filho, João Batista F, Duarte ;  Arun Kumar S,  Victor Hugo C. De Albuquerque Health of Things Algorithms for Malignancy Level Classification of Lung Nodules, IEEE Access, Vol.6, pp. 18592-18601, 2018
  • Pankaj Kumar, Saru Kumari, Vishnu Sharma, Xiong Li, Arun Kumar S SK Hafizul Islam, Secure CLS and CL-AS schemes designed for VANETs, Journal of Supercomputing, Article in press, 2018
  • Arun Kumar S, Ahmed E. Fakhry, Mohamed Abdel-Basset, Ibrahim El-henawy, Arabic text clustering using improved clustering algorithms with dimensionality reduction, Cluster Computing, Article in press, 2018
  • Mahmuda Akter, Md. Obaidur Rahman, Md. Nazrul Islam, Mohammad Mehedi Hassan, Ahmed Alsanad Arun Kumar S, Energy-Efficient Tracking and Localization of Objects in Wireless Sensor Networks, IEEE Access, Vol.6, pp. 17165-17177, 2018
  • Shifeng Chen, Rong Chen, Gai-Ge Wang, Jian Gao, Arun Kumar S, An adaptive large neighborhood search heuristic for dynamic vehicle routing problems, Computers and Electrical Engineering, Article in press, 2018
  • Jiachen Yang Chang Wang Qiming Zhao, Bin Jiang, Zhihan Lv Arun Kumar S\, Marine surveying and mapping system based on Cloud Computing and Internet of Things, Future Generation Computer Systems, Vol.85, pp. 39-50, 2018
  • Soubhagya Sankar Barpanda Banshidhar Majhi, Panjak Kumar Sa, Arun Kumar S, Sambit Bakshia, Iris feature extraction through wavelet mel-frequency cepstrum coefficients, Optics and Laser Technology, Article in press, 2018
  • Muhammad Sajjad, Salman Khan, Tanveer Hussain, Khan Muhammad, Arun Kumar S, CNN-based anti-spoofing two-tier multi-factor authentication system, Pattern Recognition Letters, Article in press, 2018
  • Mohamed Elhoseny, Ahmed Abdelaziz, Ahmed S. Salama, A.M. Riad, Khan Muhammad Arun Kumar S, A hybrid model of Internet of Things and cloud computing to manage big data in health services applications, Future Generation Computer Systems, Article in press, 2018
  • Zulfiqar Ali, M. Shamim Hossain, Ghulam Muhammad, Arun Kumar S, An intelligent healthcare system for detection and classification to discriminate vocal fold disorders, Future Generation Computer Systems, Vol.85, pp. 19-28, 2018
  • Vanmathi C, Prabu S, Image Steganography Using Fuzzy Logic and Chaotic for Large Payload and High Imperceptibility, International Journal of Fuzzy Systems, Vol.20(2), pp. 460-473, 2018
  • Aarthi S L, Prabu S, Tri-texture feature extraction and region growing-level set segmentation in breast cancer diagnosis, International Journal of Biomedical Engineering and Technology, Vol.26(3-4), pp. 279-303, 2018
     

2017

  • Santhi V, Adaptive color image watermarking scheme using Weibull distribution, Studies in Computational Intelligence, Vol.660, pp. 453-468, 2017
  • Ananda Kumar S, Ilango P, PRIN: A Priority-Based Energy Efficient MAC Protocol for Wireless Sensor Networks Varying the Sample Inter-Arrival Time, Wireless Personal Communications, Vol.92, No.3, pp. 863-881, 2017
  • Samuel OW, Asogbon GM, Arun Kumar S, Fang P, An integrated decision support system based on ANN and Fuzzy_AHP for heart failure risk prediction, Expert System with Applications, Vol. 68, pp. 163-172, 2017
  • BK Tripathy, Sooraj TR, Radhakrishna Mohanty, A new approach to interval-valued fuzzy soft sets and its application in decision-making, Advances in Intelligent Systems and Computing, Vol.509, pp. 3-10, 2017
  • Savithri G, Vinupriya Mane S, Saira Banu J, Parallel implementation of RSA 2D-DCT steganography and chaotic 2D-DCT steganography, Advances in Intelligent Systems and Computing, Vol.419 AISC, pp. 593-605, 2017
  • Umadevi KS, Arun Kumar T, Survey on Research Advancements in WiMedia MAC protocol, International Journal of Engineering and Technology Innovation, Vol.7, No.1, pp. 61-68, 2017
  • Sharmila Banu K, BK Tripathy, Exploring incidence-prevalence patterns in spatial epidemiology via neighborhood rough sets, International Journal of Healthcare Information Systems and Informatics, Vol.12, No.1, pp. 30-43, 2017
  • Arun Kumar S, Gopal J, Basu A, Subramaniam PR, An integrated fuzzy DEMATEL, TOPSIS, and ELECTRE approach for evaluating knowledge transfer effectiveness with reference to GSD project outcome, Neural Computing and Applications, Vol.28, No.1, pp. 111-123, 2017
  • Ramesh Ashwin Kumar, Talikdar FA, Ashour AS, Santhi V, Histogram thresholding in image segmentation: A joint level set method and Lattice Boltzmann method based approach, Advances in Intelligent Systems and Computing, Vol. 455, pp. 529-539, 2017
  • Hore S, Chatterjee S, Santhi V, Dey N, Indian sign language recognition using optimized neural networks, Advances in Intelligent Systems and Computing, Vol. 455, pp. 553-563, 2017
  • Medhane Dharshan Vishwasrao, Arun Kumar S, Search space-based multi-objective optimization evolutionary algorithm, Computers and Electrical Engineering, Vol.58, pp. 126-143, 2017
  • Bhagyavathi M, Saritha V, Venkata Krishna P, A novel method for multipath routing using cross layer approach in vehicular adhoc networks, International Journal of Communication Systems, Article in press, 2017
  • Nitesh Kumar, Md Azaruddin, Prasantha Kumar Jana, Minimum spanning tree-based delay-aware mobile sink traversal in wireless sensor networks, International Journal of Communication Systems, Article in press, 2017
  • Satish Kumar N, Rajakumar K, A study on security for adaptive periodic threshold sensitive energy efficient protocol based on elliptic curve cryptology in wireless sensor network, International Journal of Control Theory and Applications, Vol.10, No.1, pp. 1-11, 2017
  • Umadevi KS, Arun Kumar T, Providing an optimal QoS using demand-based distributed reservation protocol allocation algorithm for WiMedia medium access control, International Journal of Information and Communication Technology, Vol.10, No.2, pp. 218-227, 2017
  • Ramani S, Jaisankar N, Cyclic repeated patterns in sequential pattern mining based on the fuzzy cmeans clustering and association rule mining technique, International Journal of Intelligent Engineering and Systems, Vol.10, No.1, pp. 176-185, 2017
  • Dasari Nagaraju Saritha V, An evolutionary multi-objective approach for resource scheduling in mobile cloud computing, International Journal of Intelligent Engineering and Systems, Vol.10, No.1, pp. 12-21, 2017
  • Ramanathan L, Angelina Geetha, Khalid M, Swarnalatha P, Student performance prediction model based on lion-wolf neural network, International Journal of Intelligent Engineering and Systems, Vol.10, No.1, pp. 114-123, 2017
  • Anisha M Lal, Margret Anouncia S, Adapted sparse fusion with constrained clustering for semisupervised change detection in remotely sensed images, Journal of Applied Remote Sensing, Vol.11, No.1, pp. 016013, 2017
  • Chiranji Lal Chowdhari, DP Acharjya, Clustering algorithm in possibilistic exponential fuzzy c-mean segmenting medical images, Journal of Biomimetics, Biomaterials and Biomedical Engineering, Vol.30, pp. 12-23, 2017
  • Srinivas Koppu, Madhu Viswanatham V, A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform, Modelling and Simulation in Engineering, 7470204, 2017
  • Prashant Vaidhya S, Chandra Mouli PVSSR, A robust semi-blind watermarking for color images based on multiple decompositions, Multimedia Tools and Applications, Article in press, 2017
  • Prabu Mohandas, Arun Kumar S, Ajith Abraham, Jerline Sheebha Anni, An automated irrigation system based on a low-cost microcontroller for tomato production in South India, Studies in Computational Intelligence, Vol.676, pp. 49-71, 2017
  • Srninvas Koppu, Madhu Viswanatham V, 2D chaotic map based on 2D adaptive grey wolf algorithm for ultra sound medical image security, International Journal of Intelligent Engineering and Systems, Vol.10, No.1, pp. 104-113, 2017
  • Darshan Mehta, BK Tripathy, Clustering of categorical data using intuitionistic fuzzy k-modes, Advances in Intelligent Systems and Computing, Vol.546, pp. 254-263, 2017
  • Ryan Serrao, BK Tripathy, Jayaram Reddy, An analysis of decision theoretic kernalized rough intuitionistic fuzzy C-means, Advances in Intelligent Systems and Computing, Vol.546, pp. 296-306, 2017
  • BK Tripathy, Suvendu Kumar Parida, Some properties of rough sets on fuzzy approximation spaces and applications, Advances in Intelligent Systems and Computing, Vol.516, pp. 179-188, 2017
  • Jayant G Rohra, Boominathan P, Swathi JN, Priya Thakur, Rajen P Bhatt, User localization in an indoor environment using fuzzy hybrid of particle swarm optimization & Gravitational search algorithm with neural networks, Advances in Intelligent Systems and Computing, Vol.546, pp. 286-295, 2017
  • BK Tripathy, Radhakrishna Mohanty, Some properties of rough sets on intuitionistic fuzzy approximation spaces and their application in computer vision, Advances in Intelligent Systems and Computing, Vol.546, pp. 264-275, 2017
  • Geetha Mary A, Iyengar NChSN, DP Acharjya, Privacy preservation in fuzzy association rules using rough set on intuitionistic fuzzy approximation spaces and DSR, International Journal of Autonomous and Adaptive Communications Systems, Vol.10, No.1, pp. 67-87, 2017
  • Kuhilee Roy, Subramanya VRK Rao G, Savarimuthu, Margret Anouncia S, Exploiting visual cues for learning gait patterns associated with neurological disorders, Jurnal Teknologi, Vol.79, No.3, pp. 31-38, 2017
  • Prabakaran N, Jagadeesh Kannan R, Sustainable life-span of WSN nodes using participatory devices in pervasive environment, Microsystem Technologies, Vol. 23, No.3, pp. 651-657, 2017
  • Amandeep Verma, Sakshi Kaushal, Arun Kumar S, Computational intelligence based heuristic approach for maximizing energy efficiency in Internet of Things, Studies in Computational Intelligence, Vol.705, pp. 53-76, 2017
  • Arun Kumar S, Ajith Abraham, Patrick Siarry, Quan Z Sheng, Intelligent decision support systems for sustainable computing, Studies in Computational Intelligence, Vol.705, pp. 1-6, 2017
  • Parveen Sultana H, Nalini N, Medium access control methods in sensor and actuator based wireless networks - A review, Walailak Journal of Science and Technology, Vol.14, No.4, pp. 267-274, 2017
  • Alekha Kumar Mishra, Asis Kumar Tripathy, Arun Rakesh Kumar, Ashok Kumar T, A replica detection scheme based on the deviation in distance traveled sliding window for wireless sensor networks, Wireless Communications and Mobile Computing, Vol.2017, Article ID: 8457616, 8 pages, 2017
  • Marimuthu K, Saru Kumari, Saravanan R, Sayantani Basu, A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks, Wireless Personal Communications, Volo.93, No.2, pp. 383-407, 2017
  • Chen Chen, Arun Kumar S, A congestion avoidance game for information exchange on intersections in heterogeneous vehicular networks, Journal of Network and Computer Applications, Vol.85, pp. 116-126, 2017
  • Saru Kumari, Marimuthu K, Ashok Kumar Umar Das, Neeraj Kumar, A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers, Journal of Supercomputing, pp. 1-26, 2017
  • Puneet Jai Kaur, Sakshi Kaushal, Arun Kumar S, Francesco P, A Framework for Assessing Reusability Using Package Cohesion Measure in Aspect Oriented Systems, International Journal of Parallel Programming, pp. 1-22, 2017
  • Ramani S, Jaisankar N, Performance evaluation of association rule mining with enhanced Apriori algorithm incorporated with artificial bee colony optimization algorithm, International Journal of Intelligent Engineering and Systems, Vol.10, No.2, pp. 58-67, 2017
  • DP Acharjya, Anitha A, A comparative study of statistical and rough computing models in predictive data analysis, International Journal of Ambient Computing and Intelligence, Vol.8, No.2, pp. 32-51, 2017
  • Achyut Shankar, Jaisankar N, Base station positioning in wireless sensor network to aid cluster head selection process, International Journal of Intelligent Engineering and Systems, Vol.10, No.2, pp. 173-182, 2017
  • Vijayakumar K, Ilango P, Grey fuzzy neural network-based hybrid model for missing data imputation in mixed database, International Journal of Intelligent Engineering and Systems, Vol.10, No.2, pp. 146-155, 2017
  • Anitha A, DP Acharjya, Crop suitability prediction in Vellore District using rough set on fuzzy approximation space and neural network, Neural Computing and Applications, pp. 1-18, 2017
  • Ahmed S Firdaus, Nor Badrul Anuar, Razak MFA, Arun Kumar S, Bio-inspired computational paradigm for feature investigation and malware detection: interactive analytics, Multimedia Tools and Applications, pp. 1-37, 2017
  • Samuel OW, Zhou H, Li X, Arun Kumar S, Pattern recognition of electromyography signals based on novel time domain features for amputees' limb motion classification, Computers and Electrical Engineering, 2017
  • Hu P, Ning H, Qiu T, Arun Kumar S, A unified face identification and resolution scheme using cloud computing in Internet of Things, Future Generation Computer Systems, 2017
  • Santhi H, Jaisankar N, Fuzzy cost probability-based suppressed flooding multi-constrained QoS multicast routing for MANETs, International Journal of High Performance Computing and Networking, Vol.10, No.1-2, pp. 100-108, 2017
  • Umadevi KS, Arun Kumar T, DCRMRP: Distributed cooperative relay-based multihop routing protocol for WiMedia networks, International Journal of High Performance Computing and Networking, Vol.10, No.1-2, pp. 127-133, 2017
  • Syed Siraj Ahmed, DP Acharjya, Sugata Sanyal, A framework for phishing attack identification using rough set and formal concept analysis, International Journal of Communication Networks and Distributed Systems, Vol.18, No.2, pp. 186-212, 2017
  • Satheesh A, Dhananjay Kumar, Dharmalingam P, Lakshmipriya TKS, Krishnaveni S, Dynamically reconfgurable queue for intel IXP2400 network processor, Journal of Internet Technology, Vol.18, No.1, pp. 95-101, 2017
  • Rajkumar S, Chandra Mouli PVSSR, Adaptive pedestrian detection in infrared images using fuzzy enhancement and top-hat transform, International Journal of Computational Vision and Robotics, Vol.7, No.1-2, pp. 49-67, 2017
  • Satish C J, Anand M, The impact of visualizing traceability links for evolving requirements in software maintenance- A controlled experiment, International Journal of Intelligent Engineering and Systems, Vol.10, No.3, pp. 235-244, 2017
  • Babulal G R, Gayathri P, Proficient Algorithms for Mining HUI in One Phase using Direct Discovery of High Utility Patterns (D2HUP), International Journal of Intelligent Engineering and Systems, Vol.10, No.3, pp. 192-199, 2017
  • Pooja Rajendra Choudhary, Jaisankar N, Secure access control with dynamic policy updating for the data in cloud system, International Journal of Intelligent Engineering and Systems, Vol.10, No. 3, pp. 136-145, 2017
  • Agarwal Ruchi Sanjay, Rajkumar S, Marimuthu K, Ganapathy Rajasekharan CT and MRI image fusion based on discrete wavelet transform and Type-2 fuzzy logic, International Journal of Intelligent Engineering and Systems, Vol.10, No.3, pp. 355-362, 2017
  • Thendral P, Madhu Viswanatham V, Performance analysis of classification algorithms on a novel unified clinical decision support model for predicting coronary heart disease risks, International Journal of Intelligent Engineering and Systems, Vol.10, No.3, pp. 210-217, 2017
  • Nikethan Jevane, Rajkumar S, Enhancement of an algorithm for oil tank detection in satellite images, International Journal of Intelligent Engineering and Systems, Vol.10, No.3, pp. 218-225, 2017
  • Akila Victor, Muhammad Rukunuddin Ghalib, Automatic detection and classification of skin cancer, International Journal of Intelligent Engineering and Systems, Vol.10, No.3, pp. 444-451, 2017
  • Vijay Sekar E, Anuradha J, Anshita Arya, Balamurugan B, Victor Chang, A framework for smart traffic management using hybrid clustering techniques, Cluster Computing, pp. 1-16, 2017
  • Nishant Doshi, Saru Kumari, Dheerendra Mishra, Choo K K R, Arun Kumar S, A password based authentication scheme for wireless multimedia systems, Multimedia Tools and Applications, pp. 1-26, 2017
  • Hashem I A T, Mohsen Marjeni, Arun Kumar S, Sakariah A K, Multi-objective scheduling of MapReduce jobs in big data processing, Multimedia Tools and Applications, pp. 1-16, 2017
  • Santhi K, Chellatamilan T, Zayaraz G, Enhancing the concert of live migration of virtual machine's with lazy counting-based splay tree algorithm, ARPN Journal of Engineering and Applied Sciences, Vol.12, No. 9. pp. 2923-2930, 2017
  • Meghna Choudhary, Harish Kumar, Sakshi Kaushal, Arun Kumar S, The case analysis on sentiment based ranking of nodes in social media space, Multimedia Tools and Applications, pp. 1-20, 2017
  • Mahmood K, Chaudhry SA Naqvi H, Arun Kumar S, An elliptic curve cryptography based lightweight authentication scheme for smart grid communication, Future Generation Computer Systems, 2017
  • Naresh K, Krishnamoorthy A, Jagadeesh Kannan R, Ganesan R, An efficient system model for multicasting measured noise value of polluting industries, Advances in Intelligent Systems and Computing, Vol.508, pp. 377-383, 2017
  • Sanjiban Sekhar Roy, Ahinav Mallik, Rishab Gulati, Mohammad S Obaidat, Venkata Krishna P, A deep learning based artificial neural network approach for intrusion detection, Communications in Computer and Information Science, Vol.655, pp. 44-53, 2017
  • Vijayakumar S, Santhi V, Neuro-fuzzy approach for speckle noise reduction in SAR images, Communications in Computer and Information Science, Vol.709, pp. 251-260, 2017
  • Vijayakumar S, Santhi V, Speckle noise reduction in SAR images using neuro-fuzzy approach, International Journal of Imaging and Robotics, Vol.17, No.2, pp. 106-120, 2017
  • Prabakaran N, Jagadeesh Kannan R, Cooperative sensors for identifying an impulsive events of asynchronous environment, Advances in Intelligent Systems and Computing, Vol.508, pp. 215-222, 2017
  • Marimuthu K, Akshat Pradhan, Saru Kumari, Rajkumar S, Rahul Ashok Kumar, Security on ―secure remote login scheme with password and smart card update facilities‖, Communications in Computer and Information Science, Vol.655, pp. 26-33, 2017
  • Henning Fernau, Lakshmanan K, Parikh images of matrix ins-del systems, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10185-LNCS, pp. 201-215, 2017
  • Praveen Kumar Reddy, Rajasekhara Babu M, An energy aware end-to-end trust mechanism for iot healthcare applications, Biomedical Research (India), Vol.28, No. 8, pp. 3456-3464, 2017
  • Rajkumar S, Marimuthu K, Saru Kumari, Wu F, Kihyun Jung, An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion, International Journal of Imaging Systems and Technology, Vol.27, No.2, pp. 118-132, 2017
  • Henning Fernau, Lakshmanan K, Indumathi R, On the computational completeness of graph-controlled insertion–deletion systems with binary sizes, Theoretical Computer Science, Vol.682, pp. 100-121, 2017
  • Selvakumar K, Sairamesh L, Kannan A, An Intelligent Energy Aware Secured Algorithm for Routing in Wireless Sensor Networks, Wireless Personal Communications, Vol.96, No.3, pp. 4781-4798, 2017
  • Miao Y, Ma J, Jiang Q, Li X, Arun Kumar S, Verifiable keyword search over encrypted cloud data in smart city, Computers and Electrical Engineering, 2017
  • Abdel-Basset M, Wang G-G, Arun Kumar S, Rushdy E, Krill herd algorithm based on cuckoo search for solving engineering optimization problems, Multimedia Tools and Applications, pp. 1-24, 2017
  • Liao X, Guo S, Yin J, Li X, Arun Kumar S, New cubic reference table based image steganography, Multimedia Tools and Applications, pp. 1-18, 2017
  • Senthil Murugan B, Arun Kumar S, MIFIM—Middleware solution for service centric anomaly in future internet models, Future Generation Computer Systems, Vol.74, pp. 349-365, 2017
  • Sanjiban Sekhar Roy, Reetika Roy, Valentina Emilia Balas, Estimating heating load in buildings using multivariate adaptive regression splines, extreme learning machine, a hybrid model of MARS and ELM, Renewable and Sustainable Energy Reviews, 2017
  • Henning Fernau, Lakshmanan K, Sergey Verlan, Universal matrix insertion grammars with small size, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10240 LNCS, pp. 182-193, 2017
  • Priya G, Jaisankar N, A review on various trust models in cloud environment, Journal of Engineering Science and Technology Review, Vol.10, No.2, pp. 213-219, 2017
  • Shashank Mouli Satapathy, Shantanu Kumar Rath, Empirical assessment of machine learning models for agile software development effort estimation using story points, Innovations in Systems and Software Engineering, Vol.13, No.2-3, pp. 191-200, 2017
  • BK Tripathy, Saurabh S Thakur, Rahul Chowdhury, A classification model to analyze the spread and emerging trends of the Zika virus in twitter, Advances in Intelligent Systems and Computing, Vol.556, pp. 643-650, 2017
  • Rizwan Patan, Rajasekhara Babu M, Suresh K, Design and development of low investment smart hospital using internet of things through innovative approaches, Biomedical Research (India), Vol.28, No.11, pp. 4979-4985, 2017
  • Nitesh Kumar, Md Azaruddin, Prasantha Kumar Jana, Minimum spanning tree–based delay-aware mobile sink traversal in wireless sensor networks, International Journal of Communication Systems, Vol. 30, No.13, pp. 2017
  • Kayode Sakariyah Adewole, Nor Badrul Anuar, Amirrudin Kamsin, Arun Kumar S, SMSAD: a framework for spam message and spam account detection, Multimedia Tools and Applications, pp. 1-36, 2017
  • Petra Vrablecova, Bou Ezzeddine A, Rozinajová V, Arun Kumar S, Smart grid load forecasting using online support vector regression, Computers and Electrical Engineering, 2017
  • Li X, Arun Kumar S, Saru Kumari, Shen J, M K Khan, An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city, Personal and Ubiquitous Computing, Vol.21, No. 5, pp. 791-805, 2017
  • Rizwan Patan, Rajasekhara Babu M, Suresh K, Design and development of low investment smart hospital using internet of things through innovative approaches, Biomedical Research (India), Vol.28, No.11, pp. 4979-4985, 2017
  • Nitesh Kumar, Md Azaruddin, Prasantha Kumar Jana, Minimum spanning tree–based delay-aware mobile sink traversal in wireless sensor networks, International Journal of Communication Systems, Vol. 30, No.13, pp. 2017
  • Kayode Sakariyah Adewole, Nor Badrul Anuar, Amirrudin Kamsin, Arun Kumar S, SMSAD: a framework for spam message and spam account detection, Multimedia Tools and Applications, pp. 1-36, 2017
  • Petra Vrablecova, Bou Ezzeddine A, Rozinajová V, Arun Kumar S, Smart grid load forecasting using online support vector regression, Computers and Electrical Engineering, 2017
  • Li X, Arun Kumar S, Saru Kumari, Shen J, M K Khan, An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city, Personal and Ubiquitous Computing, Vol.21, No. 5, pp. 791-805, 2017
  • Shukla A, Bhattacharyya A, Lakshmanan K, Srivas M, Thattai M, Discovering vesicle traffic network constraints by model checking, PLoS ONE,  Vol 12,,No.7e0180692, 2017
  • Ma J,  Qiao Y Hu G,  Huang Y, Wang M Arun Kumar S Zhang C Wang Y, Balancing User Profile and Social Network Structure for Anchor Link Inferring across Multiple Online Social Networks,  IEEE Access, 5,7954610,       pp. 12031-12040, 2017
  • Li X Niu J, Kumari S Wu F  Sangaiah  AK Choo  KKR, A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments, Journal of Network and Computer Applications, 2017
  • Cheelu D,  Madda RB Chen C-Y Venkata Krishna P Yenduri S, Intelligent vertical handoff decision strategy based on network performance prediction and consumer surplus value for next generation wireless networks, IET Networks, Vol.6, No. 4,  pp. 69-74, 2017
  • Umadevi KS Arun Kumar T, C-DAM: Contention based distributed reservation protocol allocation algorithm for wimedia medium access control, Journal of Engineering Science and Technology, Vol.28 No.11, pp. 4979-4985, 2017
  • DP Acharjya,  Das TK, A framework for attribute selection in marketing using rough computing and formal concept analysis, IIMB Management Review, Vol.29 No.2     pp. 122-135, 2017
  • Lavanya K, Saleem Durai MA Iyengar NCSN, A hybrid model for rice disease diagnosis using entropy based neuro genetic algorithm, Fuzzy Systems: Concepts, Methodologies, Tools, and Applications, 1-3, pp. 273-292, 2017
  • Boominathan P,  Aramudhan M, A multi-objective fuzzy ant colony optimization algorithm for virtual machine placement, Fuzzy Systems: Concepts, Methodologies, Tools, and Applications, 1-3, pp. 459-487, 2017
  • Subramaniam PR Venugopal C Arun Kumar S, A fuzzy-based calorie burn calculator for a gamified walking activity using treadmill, Fuzzy Systems: Concepts, Methodologies, Tools, and Applications, 2-3, pp. 763-781, 2017
  • Mishra V,  Manjula R, A survey on service-oriented network virtualization software defined networking for cloud computing, International Journal of Applied Engineering Research, Vol.12 No.12    pp. 3063-3069, 2017
  • Chen C Liu X Qiu T Arun Kumar S, A short-term traffic prediction model in the vehicular cyber-physical systems, Future Generation Computer Systems , 2017
  • Fernau H, Lakshmanan K, Raman I, Graph-controlled insertion-deletion systems generating language classes beyond linearity, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10316 LNCS,    pp. 128-139, 2017
  • Basu S,  Kumar K, Automated detection of focal cortical dysplasia lesions from MRI scans of epilepsy patients, International Journal of  Tomography and Simulation, Vol .30 No.3  pp. 59-68, 2017
  • Somasekhar G,  Karthikeyan K, Fast matrix multiplication with big sparse data, Cybernetics and Information Technologies, Vol.17  No.1     pp. 16-30, 2017
  • Patil A, Marimuthu K Nagaraja Rao A Niranchana R, Comparative study of cloud platforms to develop a chatbot, International Journal of Engineering and Technology(UAE), Vol .6 No.3      pp. 57-61, 2017
  • Gao X-Z Arun Kumar S, Sugumaran V, Cloud based cyber-physical systems in the design of next-generation digital systems, Intelligent Automation and  Soft Computing, Vol.23 No.3     pp. 475-476, 2017
  • Li X Peng J Kumari S Wu F Marimuthu K Raymond Choo K-K, An enhanced 1-round authentication protocol for wireless body area networks with user anonymity, Computers and Electrical Engineering, Vol61, pp. 238-249, 2017
  • Arun Kumar S,  Nedjah N Zhang Z, Introduction to the special section on Recent Trends in Embedded Technologies and Wearable Systems: Computational Intelligence Solutions, Computers and Electrical Engineering, Vol.61, pp. 235-237, 2017
  • Arun Kumar S, Samuel OW Li X Abdel-Basset M,   Wang H, Towards an efficient risk assessment in software projects-Fuzzy reinforcement paradigm, Computers and Electrical Engineering, 2017
  • Srikanth K,  Panwar LK Panigrahi BK Herrera-Viedma E Arun Kumar S Wang G-G, Meta-heuristic framework: Quantum inspired binary grey wolf optimizer for unit commitment problem, Computers and Electrical Engineering, 2017
  • Chahal M Harit S Mishra KK, Arun Kumar S, Zheng Z, A Survey on software-defined networking in vehicular ad hoc networks: Challenges, applications and use cases, Sustainable Cities and Society, Vol 35, 
  • Cuomo S De Michele P Piccialli F Arun Kumar S, Reproducing dynamics related to an Internet of Things framework: A numerical and statistical approach, Journal of Parallel and Distributed Computing, 2017 pp. 830-840, 2017
  • Abdel-Basset M Mohamed M Hussien A-N Arun Kumar S, A novel group decision-making model based on triangular neutrosophic numbers, Soft Computing, 2017
  • El-Shahat D,  Abdel-Basset M El-Henawy I Arun Kumar S, A modified flower pollination algorithm for the multidimensional knapsack problem: human-centric decision making, Soft Computing, 2017
  • Wang L,  Wang Y Arun Kumar S, Liao B, Intuitionistic linguistic group decision-making methods based on generalized compensative weighted averaging aggregation operators, Soft Computing , 2017
  • Radha Krishna Mohanty, BK Tripathy, Intuitionistic hesitant fuzzy soft set and its application in decision making, Advances in Intelligent Systems  and Computing, Vol.517,  pp. 221-233, 2017
  • Sooraj TR BK Tripathy, Interval valued hesitant fuzzy  soft sets and its application in  stock market analysis, Advances in Intelligent Systems  and Computing, Vol 517,  pp. 755-764, 2017
  • BK Tripathy,  Goyal A Chowdhury R Sourav PA, MMeMeR: An algorithm for clustering heterogeneous data using rough set theory, International Journal of Intelligent Systems and Applications, Vol .9,  No 8  pp. 25-33, 2017
  • Thiyagarajan D Ganesan R, User verifiable multiple keyword search scheme using the Merkle tree for outsourced data in the cloud, International Journal of Technology, Vol 8, No 4  pp. 591-600, 2017
  • Pavan Kumar C, Selvakumar R, Efficient data reconstruction in sensor networks using optimal locally recoverable codes, International Conference on Ubiquitous and Future Networks, ICUFN , ICUFN 7993779,  pp. 217-221, 2017
  • Valada A,  Vertens J Dhall A Burgard W, AdapNet: Adaptive semantic segmentation in adverse environmental conditions, Proceedings - IEEE International Conference on Robotics and Automation, 7989540,  pp. 4644-4651, 2017
  • Sanjiban Sekhar Roy, Biba M Kumar R Kumar R Samui P, A new SVM method for recognizing polarity of sentiments in twitter, Handbook of Research on Soft  Computing and Nature-Inspired Algorithms, pp. 281-291, 2017
  • Jambulingam VK, Santhi V, Knowledge discovery and big data analytics: Issues, challenges, and opportunities, Web Semantics for Textual and Visual Information Retrieval, pp. 144-165, 2017
  • Singh A Dey N Ashour AS, Santhi V, Web semantics for textual and visual information retrieval, Web Semantics for Textual and Visual Information Retrieval, 2017
  • Vijayakumar S, Amudha J, Thakare VR Bharath  Bhushan S Santhi V, Role of social networking sites in enhancing teaching environment, Web Semantics for Textual and  Visual Information Retrieval, pp. 227-243, 2017
  • Vijayakumar S Bhushan B Dasari N Reddy R, Semantic web-based framework for scientific workflows in e-science, Web Semantics for Textual and  Visual Information Retrieval, pp. 187-202, 2017
  • Chaudhari N, Data analysis for potential reach using elasticsearch, Exploring Enterprise Service Bus in the Service-Oriented Architecture Paradigm , pp. 178-186, 2017
  • Ali R,  Pal AK Kumari S Marimuthu K,  Conti M, A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring, Future Generation Computer Systems , 2017
  • Asesh A BK Tripathy, Hybrid paradigm to establish accurate results for null value problem using rough—neural network model, Advances in Intelligent Systems and Computing, 2017
  • Srimathi C,  Natarajan R Mohan S, Analysis of sensor middleware using big data as a cloud computing utility, International Journal of  Information and Communication Technology, Vol 11, No 1,  pp. 62-80, 2017
  • Sooraj TR, Radhakrishna Mohanty, BK Tripathy, Hesitant fuzzy soft set theory  and its application in decision making, Advances in Intelligent Systems and Computing, Vol 517 , pp. 315-322, 2017
  • Srinivasan S, Rajakumar K, A review on multiple-feature-based adaptive sparse representation (MFASR) and other classification types , International Journal on  Smart Sensing and Intelligent Systems, 2017
  • Thendral P, Madhu Viswanatham V, Prediction of transition sequence of diseases’ severity levels using clinical datasets with data mining approaches, Biomedical Research (India), Vol 28, No 15 pp. 6900-6906, 2017
  • Akila Victor, Muhammad Rukunuddin Ghalib, A hybrid segmentation approach for detection and classification of skin cancer, Biomedical Research (India), Vol 28, No 16 , pp. 6947-6954, 2017
  • Ananda Kumar S, Ilango P, The Impact of Wireless  Sensor Network in the Field of Precision  Agriculture: A Review, Wireless Personal Communications, pp. 1-14, 2017
  • Rostami AS,  Badkoobe M Mohanna F K, eshavarz H Hosseinabadi  AAR Arun Kumar S, Survey on clustering in heterogeneous  and homogeneous wireless sensor networks, Journal of Supercomputing, pp. 1-47 , 2017
  • Zheng H-T Wang Z Ma N Chen J Xiao X  Arun Kumar S, Weakly-supervised image captioning based on rich contextual information, Multimedia Tools and Applications, pp. 1-17, 2017
  • Irshad A Sher M Chaudhry SA Kumari S Arun Kumar S  Li X Wu F, A secure mutual auth enticated key agreement of user with  multiple servers for critical systems, Multimedia Tools and Applications, 2017
  • Xiao X,  Zhang S Mercaldo F Hu G Arun Kumar S, Android malware detection based on system call sequences and LSTM, Multimedia Tools and Applications,   , 2017
  • Liao X Yin J Guo S Li X Arun Kumar S, Medical JPEG image steganography based on preserving inter-block dependencies, Computers and Electrical Engineering, 2017
  • Nan X,  Bao L,  Zhao X Zhao X Arun Kumar S Wang G-G  Ma Z, EPuL: An enhanced positive-unlabeled learning algorithm for the prediction of pupylation sites, Molecules, Vol 22, No 9, 1463, 2017
  • Chen J Zheng H,  Xiao X, Arun Kumar S, Jiang Y  Zhao C, Tianji: Implementation of an Efficient Tracking Engine in Mobile Internet Era, IEEE Access, 5,8002558,  pp. 16592-16600, 2017 Rong H Wang Z,  Zheng H Hu C Peng L Ai Z Arun Kumar S, Mining efficient taxi operation strategies from large scale geo-location data , IEEE Access , 2017
  • Xiao X, Fu P Hu G Arun Kumar S,  Zheng H  Jiang Y, SAIDR: A New Dynamic Model for SMS-Based Worm Propagation in Mobile Networks, IEEE Access, 5,7953749,  pp. 9935-9943, 2017
  • Chen C,  Liu X Qiu T Liu L, Arun Kumar S, Latency estimation based on traffic density for video streaming in the internet of vehicles, Computer Communications, Vol 111 pp. 176-186 , 2017
  • Qiu T,  Zhang Y,  Qiao D Zhang X Wymore ML  Arun Kumar s, A Robust Time Synchronization  Scheme for Industrial Internet of Things, IEEE Transactions on Industrial  Informatics, 2017
  • Karati A,  Islam SH,  Biswas GP Bhuiyan MZA, Vijayakumar P Marimuthu K, Provably Secure Identity-based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments, IEEE Internet of Things Journal, 2017
  • Jain H Eshwa SC Suresh Kumar N, Leprosy detection using image processing and deep learning, Journal of Global Pharma Technology, Vol 9, No 9  pp. 8-14, 2017
  • Singh A Rath D Bansal K VidhyapathiCM, Home automation using IoT linked with facebook facial recognition, ARPN Journal of Engineering and Applied Sciences, Vol 12, No 17  pp. 5154-5159, 2017
  • Parmar R Lakshmanan R, Detecting diabetic retinopathy from retinal images using CUDA deep neural network , International Journal of Intelligent Engineering and Systems, Vol 10, No 4  pp. 284-292, 2017
  • Venkata Krishna P,  Misra S Saritha V, Raju DN Obaidat MS, An efficient learning automata based task offloading in mobile cloud computing environments, IEEE International Conference on Communications, 7997139, 2017
  • Saritha V, Venkata Krishna P,  Misra S Obaidat MS, Learning automata based optimized multipath routingusing leapfrog algorithm for VANETs, IEEE International Conference on Communications, 7997401, 2017
  • Sanjiban Sekhar Roy,  Kulshrestha P,  Samui P, Classifying images of drought-affected area using deep belief network, kNN, and random forest learning techniques, Deep Learning Innovations and Their Convergence With Big Data, pp. 102-119, 2017
  • BK Tripathy, Seetha H Murty MN, Uncertainty-based clustering algorithms for large data sets, Modern Technologies for Big Data Classification and Clustering, pp. 1-33, 2017
  • Jagan J,  Samui P Sanjiban Sekhar Roy, Kurup P, Intelligent models applied to elastic modulus of jointed rock mass, Handbook of Research on Trends and Digital Advances in Engineering Geology, 2017
  • Hemalatha S, Margret Anouncia S, Unsupervised segmentation of remote sensing images using fd based texture analysis model and ISODATA, International Journal of Ambient  Computing and Intelligence, Vol 8, No 3   pp. 58-75, 2017
  • Sarkar M Banerjee S Badr Y Arun Kumar S, Configuring a trusted cloud service model for smart city exploration using hybrid intelligence, International Journal of Ambient Computing and Intelligence, Vol 8, No 3  pp. 1-21, 2017
  • DP Acharjya, Mitra A, Bio-inspired computing for information retrieval applications , Bio-Inspired Computing for  Information Retrieval Applications, pp. 1-388, 2017
  • Vasumathy M Mythili T, Shape determination of aspired foreign body on pediatric radiography images using rule-based approach, Advanced Image Processing Techniques and Applications, pp. 170-181, 2017
  • Suresh Kumar N, Arun Kumar S, Arun M Anand S, Advanced image processing techniques and applications , Advanced Image Processing Techniques and Applications, 2017
  • Nagarajan SK, Arun Kumar S, Vegetation index: Ideas, methods, influences, and trends , Advanced Image Processing  Techniques and Applications, pp. 347-386, 2017
  • Prabu S, Swarnalatha P,  Chandran A, Expert system through GIS-based cloud, Advanced Image Processing Techniques and Applications, pp. 387-398, 2017
  • Wu F,  Li X Arun Kumar S, Xu L Kumari S  Wu L  Shen J, A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks, Future Generation Computer Systems, 2017
  • Rajkumar S, Chandra Mouli  PVSSR,  Robust pedestrian detection in infrared images using rotation and scale invariant-based structure element descriptor, International Journal of Signal and Imaging Systems Engineering, Vol 10, No 3  pp. 157-167, 2017
  • Ranjith KS,  Zhenning Y,  Caytiles RD Iyengar NCSN, Comparative analysis of association rule mining algorithms for the distributed data , International Journal of Advanced Science and Technology, Vol 102  pp. 49-60, 2017
  • Cheelu D,  Babu MR Venkatakrishna P Gao XZ, User preferences and expert opinions based vertical handoff decision strategy with the inclusion of cost parameter for 4G networks, International Journal of Autonomous and Adaptive Communications Systems, Vol 10, No 3  pp. 261-278, 2017
  • Sanjiban Sekhar Roy, Viswanatham VM, Krishna PV , An ensemble design approach based on bagging technique for  filtering e-mail spam, International Journal of Autonomous and Adaptive Communications Systems, Vol 10, No 3, pp. 247-260, 2017
  • Sankar S, Srinivasan P, Composite metric based energy efficient routing protocol for internet of things, International Journal of Intelligent Engineering and Systems, Vol 10 No 5, pp. 278-286, 2017
  • Gaonkar AP,  Kulkarni R Caytiles RD Iyengar NCSN, Classification of lower back pain disorder using multiple machine learning techniques and identifying degree of importance of each parameter, International Journal of Advanced Science and Technology, Vol 105  pp. 11-24, 2017
  • Anthoniraj A, Margret Anouncia S, Influence of human emotion expressed through social networks in viral marketing, International Journal of Business Information Systems, Vol 26, No 1  pp. 15-32, 2017
  • Supriya S,  Subaji M, Intelligent based image enhancement using direct and in-direct contrast enhancement techniques – A comparative survey, International Journal of Signal Processing, Image Processing and Pattern Recognition, 2017
  • Mendiratta A,  Scibelli F Esposito AM Capuano V,  Likforman-Sulem L  Maldonato MN  Vinciarelli A  Esposito A, Automatic detection of depressive states from speech, Smart Innovation, Systems and Technologies, 69, pp. 301-314, 2017
  • Anand M, Lakshmanan K, Formal language representation and modelling structures underlying RNA folding process, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10398 LNCS, pp. 20-29, 2017
  • Boominathan P, Aramudhan M, Virtual machine placement using hypercube ant colony optimization framework, International Journal of Intelligent Engineering and Systems, Vol 10, No 5  pp. 77-86, 2017
  • Velmurugan J, Venkatesan M, Soft computation model for  identification landslide factor, Journal of Advanced Research in Dynamical and Control Systems, 9(Special Issue 6), pp. 665-679, 2017
  • Khanduzi R Peyghami MR, Arun Kumar S, Data envelopment analysis and interdiction median problem with fortification for enabling IoT technologies to relieve potential attacks, Future Generation Computer Systems, 79, pp. 928-940, 2017
  • PradeepKumar TS, Venkata Krishna P, Obaidat MS Saritha V,  Hsiao KF, Energy optimisation using distance and hop-based transmission (DHBT) in wireless sensor networks scheme and simulation analysis, SIMULTECH 2017 - Proceedings of the 7th International Conference on Simulation and Modeling Methodologies, Technologies and Applications, 2017
  • Rajesh Kannan R, Aramudhan M, Mobile cloud governance service classification based on QoS performance evaluation, Electronic Government, Vol 13 No 2 , pp. 148-167 , 2017
  • Midya A, Lakshmanan K, Sumitha VS Pani AK, 1-Normal DRA for insertion languages, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10398 LNCS, pp. 10-19, 2017
  • Basha SM,  Zhenning Y, RajputDS, Caytiles RD,  Iyengar NCSN, Comparative study on performance analysis of time series predictive models, International Journal of Grid and Distributed Computing, Vol 10 No 8   pp. 37-48 , 2017
  • Basha SM, Zhenning Y Rajput DS, Iyengar NCSN, Caytiles RD,   Weighted fuzzy rule based sentiment prediction analysis on tweets , International Journal of Grid and Distributed Computing, Vol 10 No 6  pp. 41-54, 2017
  • Kumar P, Saru Kumari,  Sharma V Arun Kumar S, Wei J  Li X, A certificateless aggregate signature scheme for healthcare wireless sensor network, Sustainable Computing: Informatics and Systems, 2017
  • Samui P Sanjiban Sekhar Roy, Kurup P,  Dalkiliç Y, Modeling of seismic liquefaction data using extreme learning machine, Earthquakes: Monitoring Technology, Disaster Management and Impact Assessment, pp. 61-70, 2017
  • Sawa S Balaji H, Iyengar NCSN, Caytiles RD, Predicting diabetics accuracy using rough set clusters, International Journal of Grid and Distributed Computing, Vol 10 No 9 , pp. 47-56, 2017
  • Basha SM,  Balaji H Iyengar NCSN, Caytiles RD, A soft computing approach to provide recommendation on PIMA diabetes, International Journal of Advanced Science and Technology, 106, pp. 19-32, 2017
  • Samui P,  Roy SS Balas VE, Handbook of Neural Computation, Handbook of Neural Computation, pp. 1-630, 2017
  • Muthumeenakshi M Archana T,  Muralikrishna P, Fuzzy application in secured  data transmission, International Journal of Pure and Applied Mathematics, Vol 116 No 3 , pp. 711-715, 2017
  • Singh N, Kalpesh A Swathi JN, Fault prone analysis of software systems using Rough Fuzzy C- means clustering, International Journal of Intelligent Engineering and Systems, Vol 10 No 6 , pp. 1-8, 2017
  • Meganathan NT , Trust centric stable routing for Wireless Mesh Networks, International Journal of Intelligent  Engineering and Systems, Vol 10 No (6), pp. 145-155, 2017
  • Sendhil Kumar KS, Jaisankar N, Towards data centre resource scheduling via hybrid cuckoo search algorithm in multi-cloud environment, International Journal of Intelligent Enterprise, 4(1-2), pp. 21-35, 2017
  • Suresh Kumar N,  Arun M, Genetic algorithm-based feature selection for classification of land cover changes using combined LANDSAT and ENVISAT images, International Journal of Bio-Inspired Computation, Vol 10, No 3,  pp. 172-187, 2017
  • Vijayakumar K, Ilango P, Integrating WLI fuzzy clustering with grey neural network for missing data imputation, International Journal of Intelligent Enterprise, 4(1-2), pp. 103-127, 2017
  • Singh S Kedia P Suresh Kumar N, Android controlled autonomous robot car, International Journal of Enterprise Network Management, Vol 8No 3  pp. 235-246, 2017
  • Satish CJ Anand M, VTrace-a tool for visualizing traceability links among software artefacts for an evolving system, Bulletin of Electrical Engineering and Informatics, Vol 6 No 2 , pp. 201-218, 2017
  • Chen J-Y, Zheng H-T,  Xiao X, Arun Kumar S,  Jiang Y  Zhao C-Z, Tianji: Implementation of an Efficient Tracking Engine in the Mobile Internet Era, IEEE Access, 5,8002558, pp. 16592-16600, 2017
  • Chen W,  Zhang M Hu G Tang X Arun Kumar S, Constrained Random Routing Mechanism for Source Privacy Protection in WSNs, IEEE Access, 2017
  • Ma J,  Qiao Y Hu G,  Huang Y Arun Kumar S  Zhang CWang YZhang R, De-anonymizing Social Networks with Random Forest Classifier, IEEE Access, 2017
  • Kaur G Kaur J Aggarwal S Singla C Mahajan N Kaushal S  Sangaiah AK, An optimized hardware calibration technique for transmission of real-time applications in VoIP network, Multimedia Tools and Applications, pp. 1-34, 2017
  • Lin C Prasad M,  Chung C,  Puthal D El-Sayed H  Sankar S  Wang Y SinghJ Arun Kumar S, IoT-based Wireless Polysomnography Intelligent System for Sleep Monitoring, IEEE Access, 2017
  • Zheng H Zhou Y Liang N,  Xiao X Arun Kumar S, Exploiting User Mobility for Time-aware POI Recommendation in Social Networks, IEEE Access, 2017
  • Vivekanandan T, Iyengar NChSN, Optimal feature selection using a modified differential evolution algorithm and its effectiveness for prediction of heart disease, Computers in Biology and Medicine, 90, pp. 125-136 , 2017
  • Balakrishnan SM Arun Kumar S, Integrated QoUE and QoS approach for optimal service composition selection in internet of services (IoS), Multimedia Tools and Applications, 2017
  • Kumar R,  Rajan A,  Talukdar FA,  Dey N Santhi V Balas VE, Optimization of 5.5-GHz CMOS LNA parameters using firefly algorithm , Neural Computing and Applications , Vol 28, No 12  pp. 3765-3779, 2017
  • Abdel-Basset M, Fakhry AE, El-henawy I, Qiu T, Arun Kumar S, Feature and Intensity Based Medical Image Registration Using Particle Swarm Optimization, Journal of Medical Systems, Vol.41, No.12, pp. 197, 2017
  • Meenakshi S P, Raman M, Kamakoti V, Country-wide long-term event detection and classification mechanisms using spatiotemporal BGP prefix data, IAENG International Journal of Computer Science, Vol.44, No.4, pp. 537-554, 2017
  • Zhang R, Shen J, Wei F, Li X, Arun Kumar S, Medical image classification based on multi-scale non-negative sparse coding, Artificial Intelligence in Medicine, Vol.83, pp.44-51, 2017
  • Kauser Ahmed P, Analysis of data mining tools for disease prediction, Journal of Pharmaceutical Sciences and Research, Vol.9(10), pp. 1886-1888, 2017
  • Pandi Vijayakumar, Pandiaraja P, Marimuthu K, Jegadha Deborah L, An efficient secure communication for healthcare system using wearable devices, Computers and Electrical Engineering, Vol.63, pp. 232-245, 2017
  • Wu F, Li X, Xu L, Marimuthu K, Shen J, A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server, Computers and Electrical Engineering, Vol.63, pp. 168-181, 2017
  • Pramod Reddy A, Vijayarajan V, Extraction of emotions from speech-A survey, International Journal of Applied Engineering Research, Vol.12(16), pp. 5760-5767, 2017
  • Elizabeth Isaac, Rajasekhara Babu M, John Jose, Impact of deflection history based priority on adaptive deflection router for mesh NoCs, Electronic Government, Vol.13(4), pp. 391-407, 2017
  • Akarsh Goyal, Anupam Sourav, Kayanaraman P, Application of genetic algorithm based intuitionistic fuzzy k-mode for clustering categorical data, Cybernetics and Information Technologies, Vol.17(4), pp. 99-113, 2017
  • Ravi Kumar Poluru, Shaik Naseera, A literature review on routing strategy in the internet of things, Journal of Engineering Science and Technology Review, Vol.10(5), pp. 50-60, 2017
  • Senthilnathan P, Sirajudeen Ameer John, Venkatachalam I, Face recognition using scale invariant feature transform, Journal of Advanced Research in Dynamical and Control Systems, Volo.9(Special Issue 6), pp. 1 -32, 2017
  • Boominathan P, Aramudhan M, Saravanaguru RaK, Fuzzy bio-inspired hybrid techniques for server consolidation and virtual machine placement in cloud environment, Cybernetics and Information Technologies, Vol. 17(4), pp. 52-68, 2017
  • Deepasikha Mishra, Banshidhar Majhi, Bakshi S, Arun Kumar S, Pankaj Sa K, Single image super resolution for texture images through neighbor embedding, Multimedia Tools and Applications, pp. 1-30, 2017
  • Sumathi A C, Vidhyapriya R, Vivekanandan C, Arun Kumar S, Enhancing 4G Co-existence with Wi-Fi/IoT using cognitive radio, Cluster Computing, pp. 1-11, 2017
  • Li X, Niu J, Bhuiyan M Z A, Marimuthu K, Saru Kumari, A Robust ECC based Provable Secure Authentication Protocol with Privacy Protection for Industrial Internet of Things, IEEE Transactions on Industrial Informatics, 2017
  • Praveen Kumar Reddy, Rajasekhara Babu M, A hybrid cluster head selection model for Internet of Things, Cluster Computing, pp. 1-13, 2017
  • Qiu T, Chen B Arun Kumar S, Ma J, Huang R, A Survey of Mobile Social Networks: Applications, Social Characteristics, and Challenges, IEEE Systems Journal, 2017
  • Alotaibi F, Abdullah MT, Abdullah RBH, Hashem IAT, Arun Kumar S, Optical Character Recognition for Quranic Image Similarity Matching, IEEE Access, 2017
  • Yao S, Arun Kumar S, Zheng Z, Wang T, Sparsity estimation matching pursuit algorithm based on restricted isometry property for signal reconstruction, Future Generation Computer Systems, 2017
  • Tian Y, Li X, Arun Kumar S, Zhang L, Wang W, Privacy-preserving scheme in social participatory sensing based on Secure Multi-party Cooperation, Computer Communications, 2017
  • Jaisakthi S M, Mirunalini P, Jadhav R, Vatsala, Automatic whale matching system using feature descriptor, CEUR Workshop Proceedings, 1866, 2017
  • Arvind Pillai, Rajkumar S, Swapnil Satapathy, Jung K, Rajakumar K, Local diagonal extrema number pattern: A new feature descriptor for face recognition, Future Generation Computer Systems, 2017
  • Vandana Jha, Deepa P Shenoy, Venugopal K R, Arun Kumar S, A novel sentiment aware dictionary for multi-domain sentiment classification, Computers and Electrical Engineering, 2017
  • Chen Chen, Zhao H, Qiu T, Hou R, Arun Kumar S, A multi-station block acknowledgment scheme in dense IoT networks, Computer Communications, 2017
  • Magesh G, Swarnalatha P, Analyzing customer sentiments using machine learning techniques, International Journal of Civil Engineering and Technology, Vol.8(10), pp. 1829-1842, 2017
  • Jerline Sheeba Anni, Arun Kumar S, A wireless sensor network based on unmanned boundary sensing technique for minimizing human elephant conflicts, Studies in Informatics and Control, Vol.26(4), pp. 459-468, 2017
  • Arun Kumar G, Madhu Viswanatham V, Autonomic performance enhancement environment for websphere application server, International Journal of Pure and Applied Mathematics, Vol.116(23 Spl Issue), pp. 719-730, 2017
  • Balakrishnan SM Arun Kumar S, Integrated quality of user experience and quality of service approach to service selection in internet of services, Multimedia Tools and Applications, Vol.76(21), pp. 22889-22916, 2017
  • Lijo V P, Hari Seetha, Text-based sentiment analysis: Review, International Journal of Knowledge and Learning, Vol.12(1), pp. 1-26, 2017
  • Farook Sunar Mahammad, Madhu Viswanatham V, A study on H.26x family of video streaming compression techniques, International Journal of Pure and Applied Mathematics, Vol.117(10 Spl Issue), pp. 63-66, 2017
  • Parveen Sultana H, Senthil J, Mudit Saraf, Saket Maskara, Smart vehicle collision detection and sos service, International Journal of Pure and Applied Mathematics, Vol.116(12 Spl Issue), pp. 137-145, 2017
  • Parveen Sultana H, Sreecharan Challa, Senthil J, IOT based garbage monitoring system, International Journal of Pure and Applied Mathematics, Vol.116(12), pp. 127-135, 2017
  • Geraldine Bessie Amali D, Siddhartha Bhuyan, Aju D, Design of image enhancement filters using a novel parallel particle swarm optimisation algorithm, International Journal of Advanced Intelligence Paradigms, Vol.9(5-6), pp. 576-588, 2017
  • Jagadeesan K, Anand B, Samantha S, Dey N, Santhi V, Application of flower pollination algorithm in load frequency control of multi-area interconnected power system with nonlinearity, Neural Computing and Applications, Vol.28(1), pp. 475-488, 2017
  • Li X, Ibrahim MH, Saru Kumari, Arun Kumar S, Gupta V, Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks, Computer Networks, Vol.129(2), pp. 429-443, 2017
  • Ruixin Ma, Kai Wang, Tie Qiu, Arun Kumar S, Dan Lin, Feature-based Compositing Memory Networks for Aspect-based Sentiment Classification in Social Internet of Things, Future Generation Computer Systems, Article in press, 2017
  • Haleema P K, Iyengar NChSN, JADETraderPal - JADE mobile agent embedded with flexible negotiation strategies for dynamic e-commerce environments, Journal of King Saud University - Computer and Information Sciences, Article in press, 2017
  • Ashok Kumar PM, Don S, High dimensional data visualization: A survey, Journal of Advanced Research in Dynamical and Control Systems, Vol.12(Spl Issue), pp. 851-866, 2017
  • Zheng Xiao, Xiong Li, Le Wang, Qiuwei Yang, Arun Kumar S Jiayi Du, Using convolution control block for Chinese sentiment analysis, Journal of Parallel and Distributed Computing, Article in press, 2017
  • Xiong Li, Fan Wu, Saru Kumari, Lili Xu, Arun Kumar S, A provably secure and anonymous message authentication scheme for smart grids, Journal of Parallel and Distributed Computing, Article in press, 2017
  • Surya Kant, Tripti Mahara, Vijay Kumar Jain, Deepak Kumar Jain, Arun Kumar S, LeaderRank based k-means clustering initialization method for collaborative filtering, Computers and Electrical Engineering, Article in press, 2017
  • Hai-Tao-Zheng, Wei Wang, Wang Chen, Arun Kumar S, Automatic Generation of News Comments Based on Gated Attention Neural Networks, IEEE Access, Article in press, 2017
  • Shailendra Rathore, Pradip Kumar Sharma, Arun Kumar S, A Hesitant Fuzzy based Security Approach for Fog and Mobile-Edge Computing, IEEE Access, Article in press, 2017
  • Amrut Ranjan Jena, Raja Das, A comparison of neural network architectures for the prediction of MRR in EDM, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-7 doi:10.1088/1757-899X/263/4/042151, 2017
  • Tendai Nyamugudza, Venkatesh Rajasekar, Prasad Sen, M Nirmala, V Madhu Viswanatham, Network traffic intelligence using a low interaction honeypot, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-10 doi:10.1088/1757-899X/263/4/042096, 2017
  • Mohan Kamal Hassan, Sana Prasanth Shakthi, Sasikala R, Sentimental analysis of Amazon reviews using naïve bayes on laptop products with MongoDB and R, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-10 doi:10.1088/1757-899X/263/4/042090, 2017
  • Kalyani Sukhadan, Vijjayarajan V, Krishnamoorthy A, Geraldine Bessie Amali, Image based book cover recognition and retrieval, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-10 doi:10.1088/1757-899X/263/4/042088, 2017
  • S M Susheel Kumar, Deepak Laxkar, Sourav Adhikari, Vijjayarajan V, Assessment of various supervised learning algorithms using different performance metrics, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-10 doi:10.1088/1757-899X/263/4/042087, 2017
  • Mudita Verma, Vijjayarajan V, Siva Shanmugam G, Geraldine Bessie Amali, Effective implementation of hierarchical clustering, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-6 doi:10.1088/1757-899X/263/4/042094, 2017
  • Divyesh Bhatnagar, Amit Kumar Tiwari, Vijjayarajan V, Krishnamoorthy A, Classification of normal and abnormal images of lung cancer, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-11 doi:10.1088/1757-899X/263/4/042100, 2017
  • K Ritwik Kulkarni, Abhijitsingh Gaonkar, Vijjayarajan V, Manikandan K, Analysis of lower back pain disorder using deep learning, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-8, doi:10.1088/1757-899X/263/4/042086, 2017
  • Tushar Vyavahare, Darshana Tekade, Saurabh Nayak, Suresh Kumar N, Blessy Trencia Lincy S S, Enhanced rearrangement technique for secure data transmission: Case study credit card process, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-7, doi:10.1088/1757-899X/263/4/042102, 2017
  • H R Swathi, Shah Sohini, Surbhi, Gopichand G, Image compression using singular value decomposition, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-8, doi:10.1088/1757-899X/263/4/042082, 2017
  • Manik Sharma, Anuradha J, H K Manne, G S C Kashyap, Facial detection using deep learning, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-9, doi:10.1088/1757-899X/263/4/042092, 2017
  • Gaurav P Dave, Suresh Kumar N, Blessy Trencia Lincy S S, Performance evaluation of throughput computing workloads using multi-core processors and graphics processors, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-13, doi:10.1088/1757-899X/263/4/042101, 2017
  • Shinde Yugandhara Prabhakar, Pratishtha Parganiha, Madhu Viswanatham V, Nirmala M, Comparison between genetic algorithm and self organizing map to detect botnet network traffic, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-6, doi:10.1088/1757-899X/263/4/042103, 2017
  • R Niranchana, N Gayathri Devi, Santhi H, Gayathri P, Securing internet by eliminating DDOS attacks, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-11, doi:10.1088/1757-899X/263/4/042099, 2017
  • Ria Elin Thomas, Chandhiny G, Katyayani Sharma, Santhi H, Gayathri P, Enhancement of A5/1 encryption algorithm, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-9, doi:10.1088/1757-899X/263/4/042084, 2017
  • B Prabhavathi, V Tanuja, Madhu Viswanatham V, Rajasekhara Babu M, A smart technique for attendance system to recognize faces through parallelism, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-14 doi:10.1088/1757-899X/263/4/042095, 2017
  • Manjula R, Shubham Jain, Sharad Srivastava, Pranav Rajiv Kher, Real estate value prediction using multivariate regression models, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-7, doi:10.1088/1757-899X/263/4/042098, 2017
  • Nilay Nigam, Geraldine Bessie Amali, Pollution level predictor using artificial neural networks trained with galactic swarm optimization algorithms, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-9, doi:10.1088/1757-899X/263/4/042093, 2017
  • Advait Trivedi, Geraldine Bessie Amali, A comparative study of machine learning models for ethnicity classification, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-8, doi:10.1088/1757-899X/263/4/042091, 2017
  • A Raahul, R Sapthagiri, K Pankaj, Vijayarajan V, Voice based gender classification using machine learning, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-9, doi:10.1088/1757-899X/263/4/042083, 2017
  • Vivek P Khadse, P Akhil, Christopher Anto, Lydia Jane G, Analysis of crimes committed against scheduled tribes, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-6, doi:10.1088/1757-899X/263/4/042089, 2017 
  • Suvajit Dutta, Bonthala CS Manideep, Shalva Rai Vijayarajan V, A comparative study of deep learning models for medical image classification, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-9, doi:10.1088/1757-899X/263/4/042097, 2017
  • Belal Ahmed, Shivank Singh Chouhan, Subham Biswas, Santhi H, Gayathri P, Analysis of travelling salesman problem, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-9, doi:10.1088/1757-899X/263/4/042085, 2017
  • Garima Yadav, Mansi Joshi, Sasikala R, Twitter data analysis: Temporal and term frequency analysis with real-time event, IOP Conference Series: Materials Science and Engineering, Vol.263, pp. 1-7, doi:10.1088/1757-899X/263/4/042081, 2017
  • Henning Fernau, Lakshmanan K, Indumathi R, Investigations on the power of matrix insertion-deletion systems with small sizes, Natural Computing, Article in press, 2017
  • Mirunalini P, Aravindan C, Jaisakthi S M, Automatic stenosis detection using SVM from CTA projection images, Multimedia Systems, Article in press, 2017
  • Lu M, Liu S, Arun Kumar S, Pan Z, Zuo Y, Nucleosome Positioning with Fractal Entropy Increment of Diversity in Telemedicine, IEEE Access, Article in press, 2017
  • Zhang C, Hu G, Chen G, Arun Kumar S, Jiang W, Towards a SDN-based Integrated Architecture for Mitigating IP Spoofing Attack, IEEE Access, Article in press, 2017
  • Ramalingam SP, Chandra Mouli PVSSR, Robustness of DR-LDP over PCANet for face analysis, International Journal of Multimedia Information Retrieval, pp. 1-9, 2017
  • NB Kar, Babu K S, Arun Kumar S, Bakshi S, Face expression recognition system based on ripplet transform type II and least square SVM, Multimedia Tools and Applications, pp.1-24, 2017
  • Kumar S, Singh S K, Abidi A I, Datta D, Arun Kumar S, Group Sparse Representation Approach for Recognition of Cattle on Muzzle Point Images, International Journal of Parallel Programming, pp. 1-26, 2017
  • Muhammad Sajjad, Mansoon Nasir, Khan Muhammad, Siraj Khan, Arun Kumar S + 3 more, Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities, Future Generation Computer Systems, Article in press, 2017
     

2016

  • Magesh Vasudevan BK Tripathy, A Constraint Based Question Answering Over Semantic Knowledge Base, Advances in Intelligent Systems and Computing, Vol.411, pp. 121-131, 2016
  • BK Tripathy, Sooraj TR, Radhakrishna Mohanty, A New Approach To Fuzzy Soft Set Theory And Its Application In Decision Making, Advances in Intelligent Systems and Computing, Vol.411, pp. 305-313, 2016
  • Marimuthu K, Saravanan R, A secure remote user mutual authentication scheme using smart cards, Journal of Information Security and Applications, Vol.19, No.4-5, pp. 282-294, 2016
  • Jyoti Shinde, Privi Dubey, Omkar Vaidhya, Venkatesan M, An improvised clustering approach for climate change analysis, Research Journal of Pharmaceutical, Biological and Chemical Sciences, Vol.7, No.1, pp. 1310, 2016
  • Pradeep Kumar G, Ezhilarasan C, Sandhiya R, Analysis of twitter data for understanding tweeting activity of public, Research Journal of Pharmaceutical, Biological and Chemical Sciences, Vol.7, No.1, pp. 2032-2042, 2016
  • Kushagra Sharma, Aditi J, Sharmila Banu K, BK Tripathy, Data anonymization through slicing based on graph-based vertical partitioning, Smart Innovation, Systems and Technologies, Vol.44, pp. 569-576, 2016
  • Rushikesh Shingade, Amit Patel, Shivam Suryawanshi, Venkatesan M, Efficient Resource Management in Cloud Computing, International Journal of Engineering and Technology, Vol.7, No.6, pp. 2045-2053, 2016
  • Arun Kumar S, Xiaozhi Gao, Ajith Abraham, Exploring the antecedents of social network usage on academic performance-A combined GP-TOPSIS approach, Jurnal Teknologi, Vol.78, No.1, pp. 55-67, 2016
  • Suresh K, Rajasekhara Babu M, Towards effective communication technique for energy efficient internet of things, International Journal of Engineering Research in Africa, Vol.21, pp. 184-190, 2016
  • Akshay Amolik, Jivane Niketan, Mahavir Bhandari, Venkatesan M, Twitter sentiment analysis of movie reviews using machine learning technique, International Journal of Engineering and Technology, Vol.7, No.6, pp. 2038-2044, 2016
  • Nishil Shah, Srishti Tiwari, Vidushi V, Water quality analysis using multiple linear regression, Research Journal of Pharmaceutical, Biological and Chemical Sciences, Vol7, No.1, pp. 915-921, 2016
  • Ankita Bihani, Shruthi Reddy M, Aswin C, A new approach to re-fragment in a distributed database environment, Indian Journal of Science and Technology, Vol.9, No.3, pp. 1-8, 2016
  • Anthoniraj A, Margret Anouncia S, A review on user influence ranking factors in social networks, International Journal of Web Based Communities, Vol.12, No.1, pp. 74-83, 2016
  • Senthil Kumar R, Arun Kumar T, A software framework for code security using M-COTMETRICS based code obfuscation technique, Jurnal Teknologi, Vol.78, No.2, pp. 73-81, 2016
  • Kumar K, Saravanaguru RaK, CBPR: Case based pattern retrieval - a framework for pattern retrieval, ARPN Journal of Engineering and Applied Sciences, Vol.11, No.2, pp. 1321-1325, 2016
  • Kumar K, Saravanaguru RaK, Context aware requirement patterns (CaRePa) methodology and its evaluation, Far East Journal of Electronics and Communications, Vol.16, No.1, pp. 101-117, 2016
  • Subarnarekha Ghosal, Karishma, Aju D, Detection and visualization of brain tumour using DICOM images, International Journal of Tomography and Simulation, Vol.29, No.1, pp. 29-42, 2016
  • Aju D, Rajkumar R, A multi-stage hybrid cad approach for MRI brain tumor recognition and classification, The Official Journal of  Institute of Integrative Omics and Applied Biotechnology (IIOAB), Vol.7, No.1, pp. 7-20, 2016
  • Ajay Nadargi, Mythili T, Addressing identity and location privacy of things for Indoor—case study on internet of everything’s (IoE), Smart Innovation, Systems and Technologies, Vol.49, pp. 377-386, 2016
  • Aastha Yadav, Chandini Bhambani, Pronay Peddiraju, Ronnie DC Iyengar NChSN, Agent based performance analysis of strategic algorithms in prisoner’s dilemma, International Journal of Multimedia and Ubiquitous Engineering, Vol.11, No.2, pp. 309-322, 2016
  • Sarthak Nandi, Santhi V, DWT–SVD-based watermarking scheme using optimization technique, Advances in Intelligent Systems and Computing, Vol.394, pp. 69-77, 2016
  • Varun Manchikalapudi, Khadar Babu SK, Improving efficiency and fairness in mobile Ad HOC networks, Advacnes in Intelligent Systems and Computing, Vol.394, pp. 1001-1008, 2016
  • Umadevi KS, Arunkumar T, Link Quality-based multi hop relay protocol for WiMedia medium access control, Advances in Intelligent Systems and Computing, Vol.413, pp. 145-152, 2016
  • Anbarasi M, Saleem Durai MA, Prediction of protein folding kinetic states using fuzzy back propagation method, Smart Innovation, Systems and Technologies, Vol.49, pp. 419-443, 2016
  • Amol Bandal, Mythili T, Quality measurements of fruits and vegetables using sensor network, Smart Innovation, Systems and Technologies, Vol. 49. pp. 121-130, 2016
  • Sharvil Shah, Kumar K, Saravanaguru RaK, Sentimental analysis of twitter data using classifier algorithms, International Journal of Electrical and Computer Engineering, Vol.6, No.1, pp. 357-366, 2016
  • Xiaozhi Gao, Arun Kumar S, Muthu Ramachandiran, Soft Computational Approaches for Prediction and Estimation of Software Development, Scientific World Journal, 3905931, 2016
  • Panda M, Ajith Abraham, BK Tripathy, Soft granular computing based classification using hybrid fuzzy-KNN-SVM, Intelligent Decision Technologies, Vol.10, No.2, pp. 115-128, 2016
  • Sharma T, Rahul C, Shahul S, Venkatesan M, Video retrieval system-an approach based on image comparison, International Journal of Engineering and Technology, Vol.8, No.1, pp. 357-363, 2016
  • Puyalnithi T, Madhu Viswanatham V, Visualization and statistical analysis of multi dimensional data of wireless sensor networks using self organising maps, International Journal of Engineering and Technology, Vol.8, No.1, pp. 391-395, 2016
  • Praveen Kumar Reddy, Rajasekhara Babu M, A scalable approach for improving dynamic multithreaded applications on NUMA based architectures, ARPN Journal of Engineering and Applied Sciences, Vol.11, No.3, pp. 1494-1503, 2016
  • Venkatesan R, Prabu S, A comparative study of various approaches used for the classification of hyperspectral satellite imagery, International Journal of Applied Engineering Research, Vol.11, No.4, pp. 2829-2832, 2016
  • Anuradha D, A literature review of transportation problems, International Journal of Pharmacy and Technology, Vol.8, No.1, pp. 3554-3570, 2016
  • Rajkumar S, Rishin Haldar, Arvind Pillai, Praneet Dutta, A sugeno fuzzy logic based CT and MRI image fusion technique with quantitative analysis, International Journal of Pharmacy and Technology, Vol.8, No.1, pp. 11286-11296, 2016
  • Raghuveer VR, BK Tripathy, Affinity-based learning object retrieval in an elearning environment using evolutionary learner profile, Knowledge Management and E-Learning, Vol.8, No.1, pp. 182-199, 2016
  • Sarthak Nandi, Santhi V, Arulmozhivarman P, DWT- SVD combined adaptive watermarking for digital images, International Journal of Tomography and Simulation, Vol.29, No.2, pp. 69-79, 2016
  • Siva Shanmugam G, Iyengar NChSN, Effort of load balancer to achieve green cloud computing: A review, International Journal of Multimedia and Ubiquitous Engineering, Vol.11, No.3, pp. 317-332, 2016
  • BK Tripathy, Deboleena Dutta, Chido Tazivazvino, On the research and development of social internet of things, Modeling and Optimization in Science and Technologies, Vol.8, pp. 153-173, 2016
  • Kumar R, Rajan A, Talukdar FA, Santhi V Balas VE, Optimization of 5.5-GHz CMOS LNA parameters using firefly algorithm, Neural Computing and Applications, pp. 1-15, 2016
  • Govinda K, Saravanaguru RaK, Review on IOT technologies, International Journal of Applid Engineering Research, Vol.11, No.4, pp. 2848-2853, 2016
  • Prabhavathy P, BK Tripathy, Sequential clustering: A Study on Covering Based Rough Set Theory, Research Journal of Pharmaceutical, Biological and Chemical Sciences, Vol.7, No.2, pp. 1799-1807, 2016
  • Venkatesan M, Ashvin DA, Bhambure S, Thomas R, A centroid-based clustering approach to analyze examinations for diabetic patients, International Journal of Pharmaceutical and Clinical Research, Vol.8, No.1, pp. 75-79, 2016
  • Kamal S, Ripon SH, Day N Ashour AS, Santhi V, A MapReduce approach to diminish imbalance parameters for big deoxyribonucleic acid dataset, Computer Methods and Programs in Biomedicine, Elsavier, Vol.131, pp. 191-206, 2016
  • Karthikeyan T, Arun Kumar T, An integrated defense approach for distributed denial of service attacks in mobile ad-hoc networks, International Journal of Applied Engineering Research, Vol.11, No.7, pp. 4898-4910, 2016
  • Ramanathan L, Geetha A, Khalid M, Swarnalatha P, Apply of sum of difference method to predict placement of students’ using educational data mining, Advances in Intelligent Systems and Computing, pp. 433, pp. 367-377, 2016
  • Kaushik S, Venkata Krishna P, Big Cloud: A hybrid cloud model for secure data storage through cloud space, International Journal of advanced intelligence Paradigms, Vol.8, No.2, pp. 229-241, 2016
  • Shanmugasundaram P, Ilango P, Big data analytics bring new insights and higher business value - An experiment carried out to divulge sales forecasting solutions, International Journal of advanced intelligence Paradigms, Vol.8, No.2, pp. 207-218, 2016
  • Hari Seetha, Narayanamoorthy M, Classification by majority voting in feature partitions, International Journal of Information and Decision Sciences, Vol.8, No.2, pp. 109-124, 2016
  • Sanjiban Sekhar Roy, Madhu Viswanatham V, Classifying spam emails using artificial intelligent techniques, International Journal of Engineering Research in Africa, Vol. 22, pp. 152-161, 2016
  • Naaz E, Sharma D, Sirisha D, Venkatesan M, Enhanced K-means clustering approach for health care analysis using clinical documents, International Journal of Pharmaceutical and Clinical Research, Vol.8, No.1, pp. 60-64, 2016
  • Santhi H, Jaisankar N, Handa A, Kaul A, Improved associativity based routing for multi hop networks using TABU initialized genetic algorithm, International Journal of Applied Engineerng Research, Vol.11, No.7, pp. 4830-4837, 2016
  • Lakshmanan K, Anand M, Modelling DNA and RNA secondary structures using matrix insertion-deletion systems, International Journal of Applied Mathematics and Computer Science, Vol.26, No.1, pp. 245-258, 2016
  • Rizwan Patan, Rajasekhara Babu M, Performance improvement of Data analysis of IoT applications using restorm in big data stream computing platform, International Journal of Engineering Research in Africa, Vol.22, pp. 141-151, 2016
  • Parveen Sultana H, Venkata Krishna P, Priority focused medium access control in wireless sensor actuator networks for CPS, International Journal of Communication Networks and Distributed Systems Vol.16, No.2, pp. 99-113, 2016
  • Saptarshi Chakraborty, BK Tripathy, Privacy preserving anonymization of social networks using eigenvector centrality approach, Intelligent Data Analysis, Vol.20, No.3, pp. 543-560, 2016
  • Kumar K, Saravanaguru RaK, Requirement pattern extraction using cluster based framework - RAPID, Indian Journal of Science and Technology, Vol.9, No.4, pp. 87179, 2016
  • Yadav A, Bose G, Bhange R, Iyengar NChSN, Security, vulnerability and protection of vehicular on-board diagnostics, International Journal of Security and its Applications, Vol.10, No.4, pp. 405-422, 2016
  • Lavanya K, Study and application of dynamic incremental regression in seasonal crop marketing supported by SONN, IIOAB Journal, Vol.7, No.4, pp. 22-29, 2016
  • Venkata Vara Prasad D, Jaganathan S, Padma Priya R, An Innovative Cloud Framework for Tracking and Monitoring Tangible Assets in Smarter Campus Using RFID, Asian Journal of Information technology, Vol.15, No.11, pp. 1713-1722, 2016
  • Boominathan P, Aramudhan M, A Firefly Colony and Its Fuzzy Approach for Server Consolidation and Virtual Machine Placement in Cloud Datacenters, Advances in Fuzzy Systems, 6734161, 2016
  • Vairamuthu S, Margret Anouncia S, Analyzing the scope of integrating electronic medical records (EMR) and electronic health records (EHR) with multimodal human computer interaction (MMHCI), Jurnal Teknologi, Vol.78, No.6, pp. 35-43, 2016
  • Jagatheesan K, Anand B, Samanta S, Dey N Santhi V, Application of flower pollination algorithm in load frequency control of multi-area interconnected power system with nonlinearity, Neural Computing and Applications, pp. 1-14, 2016
  • Rajesh Kannan R, Aramudhan M, Comparative study of load balancing algorithms in cloud computing environment, Indian Journal of Science and Technology, Vol.9, No.20, 85866, 2016
  • Suresh K, Rajasekhara Babu M, Emerging biomedical health care system by using Internet of Things, Journal of Biomimetics, Biomaterials and Biomedical Engineering, Vol.27, pp. 103-112, 2016
  • Kumar K, Saravanaguru RaK, Formalizing context aware requirement patterns using ontology, Jurnal Teknologi, Vol.76, No.6, pp. 13-19, 2016
  • BK Tripathy, Dishant Mittal, Deepthi P Huddedagaddi, Hadoop with intuitionistic fuzzy C-means for clustering in big data, Advances in Intelligent Systems and Computing, Vol. 438, pp. 599-610, 2016
  • Sendhil Kumar KS, Jaisankar N, Optimized balanced scheduling of two phase top down specialization for diabetes patients using map reduce, Research Journal of Pharmaceutical, Biological and Chemical Sciences, Vol.7, No.3, pp. 205-214, 2016
  • Raghuveer VR, Murali S, Recent trends in eLearning environment for effective content dissemination to online, International Journal of Engineering and Technology, Vol.8, No.2, pp. 536-546, 2016
  • Satish CJ, Anand M, Software documentation management issues and practices: A survey, Indian Journal of Science and Technology, Vol.9, No.20, pp. 86869, 2016
  • Ricky Parmer, Mahek Merchant, Nishil Shah, Testing and challenges in modern Cyber Physical Systems, Research Journal of Pharmaceutical, Biological and Chemical Sciences, Vol.7, No.3, pp. 1275-1283, 2016
  • Farhana Ferdousi, Amir Ahmed, Arun Kumar S, The implementation of innovative manufacturing practices: Is it a choice or pressure?: A relative case study, International Journal of Intelligent Enterprise, Vol.3, No.2, pp. 170-183, 2016
  • Abhinav Rastogi, Tanya Chanana, Yamuna M, A brief review on application of graph theory in data mining, International Journal of Pharmacy and Technology, Vol.8, No.2, pp. 13604-13613, 2016
  • Murali S, Jaisankar N, A clustered wireless sensor network based air pollution monitoring system with swarm intelligence based data aggregation, Jurnal Teknologi, Vol.78, No.7, pp. 23-33, 2016
  • Lavanya K, Saleem Durai MA, Iyengar NChSN, A hybrid model for rice disease diagnosis using entropy based neuro genetic algorithm, International Journal of Agriculture and Environmental Information System, Vol.7, No.2, pp. 52-69, 2016
  • BK Tripathy, Radhakrishna Mohanty, Sooraj TR, Anurag Tripathy, A modified representation of IFSS and its usage in GDM, Smart Innovation Systems and Technologies, Vol.50, pp. 365-375, 2016
  • BK Tripathy, Radhakrishna Mohanty, Sooraj TR, Arun KR, A new approach to intuitionistic fuzzy soft sets and its application in decision-making, Advacnes in Intelligent Systems and Computing, Vol.439, pp. 93-100, 2016
  • Rajkumar S, Chandra Mouli PVSSR, A novel and robust rotation and scale invariant structuring elements based descriptor for pedestrian classification in infrared images, Infrared Physics and Technology, Vol.78, pp. 13-23, 2016
  • Rizwan Patan, Rajasekhara Babu M, A novel biomedical data solutions by using big data platforms for better health care service, International Journal of Pharmacy and Technology, Vol.8, No.2, pp. 13008-13021, 2016
  • Karthikeyan T, Arun Kumar T, A study and an analysis to mitigate distributed denial of service attacks in mobile ad-hoc network, International Journal of Pharmacy and Technology, Vol.8, No.2, pp. 12476-12513, 2016
  • Deepa M, Anand M, A study on morphological analysis using adaptor grammar, International Journal of Pharmacy and Technology, Vol.8, No.2, pp. 12563-12577, 2016
  • Anbarasi M, Saleem Durai MA, A survey on swarm optimization techniques for heart disease prediction, International Journal of Pharmacy and Technology, Vol.8, No.2, pp. 4130-4141, 2016
  • Suresh Kumar N, Arun M, Accuracy analysis of various classification algorithms for used land, International Journal of Enterprise Network Management, Vol.7, No.2, pp. 113-132, 2016
  • Abhishek Mathur, Siva Shanmugam G, Iyengar NChSN, Agent based yoga recommendation system for better health, International Journal of Bio-Science and Bio- Technology, Vol.8, No.3, pp. 239-248, 2016
  • Saptarshi Chakraborty, BK Tripathy, Alpha-anonymization techniques for privacy preservation in social networks, Social Network Analysis and Mining, Vol.6, No.1, pp. 29, 2016
  • Swathi JN, Priya V, Boominathan P, Ramani S, An empirical study of fuzzy decision trees for predicting the patients medical behaviour, International Journal of Pharmacy and Technology, Vol.8, No.2, pp. 12984-12993, 2016
  • Boominathan P, Rishin Haldar, Rajkumar S, Bin packing problems: Comparative analysis of heuristic techniques for different dimensions, International Journal of Pharmacy and Technology, Vol.8, No.2, pp. 13305-13319, 2016
  • Sresht Agarwal, BK Tripathy, Decision theoretic rough intuitionistic fuzzy Cmeans algorithm, Smart Innovation, System and Technologies, Vol.50, pp. 71-82, 2016
  • Henning Fernau, Lakshmanan K, Indumathi R, Descriptional complexity of graph-controlled insertion-deletion systems, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 9777, pp. 111-125, 2016
  • Chanderkanta, Neha Singh, Santhosh Kumar, Design of programmable logic device based on electro-optic effect of lithium-niobate-based Mach-Zehnder interferometers, Photonic Network Communications, pp. 1-15, 2016
  • Sreenivasa Perumal, Chandra Mouli PVSSR, Dimensionality reduced local directional pattern (DR-LDP) for face recognition, Expert System with Applications, Vol.63, pp. 66-73, 2016
  • Perla Ravi Teja, Khadar Babu SK, Evolutionary computing based on QoS oriented energy efficient VM consolidation scheme for large scale cloud data centers, Cybernetics and Information Technologies, Vol.16, No.2, pp. 97-112, 2016
  • Sooraj T R, Radhakrishna Mohanty, BK Tripathy, Fuzzy soft set theory and its application in group decision making, Advances in Intelligent System and Computing, Vol.452, pp. 171-178, 2016
  • Fernau Henning, Lakshmanan K, Indumathi R, Generative power of matrix insertion-deletion systems with context-fr ee insertion or deletion, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol.9726, pp. 95-48, 2016
  • Ramani S, Boominathan P, Swathi JN, Rajkumar S, Improving optimization sequence of compilers by using sequence selection approach, International Journal of Pharmacy and Technology, Vol.8, No.2, pp. 13471-13480, 2016
  • Rajkumar S, Ramani S, Boominathan P, Medical image fusion using contourlet transform and fusion tool techniques, International Journal of Pharmacy and Technology, Vol.8, No.2, pp. 13553-13563, 2016
  • Srilatha P, Manjula R, Similarity index based link prediction algorithms in social networks: A survey, Journal of Telecommunications and Information Technology, Vol.2016, No.2, pp. 87-94, 2016
  • Suresh Kumar N, Survey of workflow management tools for grid computing environment, International Journal of Pharmacy and Technology, Vol.8, No.2, pp. 3991-3999, 2016
  • Ramalingam SP, Chandra Mouli PVSSR, Two-level dimensionality reduced local directional pattern for face recognition, International Journal of Biometrics, Vol.8, No.1, pp. 52-64, 2016
  • Yokesh Babu S, Ashish Kumar Jaiswal, Kumaresan P, A low cost prototype for multiple access security system, International Journal of Applied Engineering Research, Vol.11, No.13, pp. 7907-7913, 2016
  • Ananda Kumar S, Ilango P, Dinesh GH, A modified LEACH protocol for increasing lifetime of the wireless sensor network, Cybernetics and Information Technologies, Vol.16, No.3, pp. 154-164, 2016
  • Marimuthu K, Saru Kumari, Ashok Kumar Umar Das, Fan Wu Sayantani Basu, A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks, Security and Communication Networks, Article in press, 2016
  • Gayathri P, Jaisankar N, A study on some tasks, corpus and resources of medical information retrieval, Indian Journal of Science and Technology, Vol.9, No.25, pp. 96611, 2016
  • Bharathi L, Sasikala R, Srinivasan A, Adaptive burst assembly algorithm for reducing burst loss and delay in OBS networks, Asian Journal of Information technology, Vol.15, No.13, pp. 2123-2132, 2016
  • Saru Kumari, Marimuthu K, Ashok Kumar Umar Das, Fan Wu, An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks, Security and Communication Networks, Article in press, 2016
  • Yokesh Babu S, Kumaresan Prabu AS, Anamolized based security for private information attacks on social network, International Journal of Applid Engineering Research, Vol.11, No.13, pp. 7914-7919, 2016
  • Anisha M Lal, Margret Anouncia S, Enhanced dictionary based sparse representation fusion for multi-temporal remote sensing images, European Journal of Remote Sensing, Vol.49, pp. 317-336, 2016
  • Swarnapriya RM, Prabu S, Dharun VS, F-SIFT and FUZZY-RVM based efficient multitemporal image segmentation approach for remote sensing applications, Automatic Control and Compter Sciences, Vol.50, No.3, pp. 151-164, 2016
  • Nagarathna P, Manjula R, Maximization of WSN Life Using Hybrid Evolutionary Programming, International Journal of Wireless Information Networks, Vol.23, No.3, pp. 246-256, 2016
  • Anitha P, Periasamy PS, Mohanasundaram R, Optimization methods for data storage position in wireless sensor networks: A survey, Asian Journal of Information technology, Vol.15, No.13, pp. 2238-2243, 2016
  • Ananda Kumar S, Ilango P, PRIN: A Priority-Based Energy Efficient MAC Protocol for Wireless Sensor Networks Varying the Sample Inter-Arrival Time, Wireless Personal Communications, pp. 1-19, 2016
  • Vipul K Jain, Arun Kumar S, Sakhuja Sumit, Nittin Thoduka Rahul Aggarwal, Supplier selection using fuzzy AHP and TOPSIS: a case study in the Indian automotive industry, Neural Computing and Applications, pp. 1-10, 2016
  • Marimuthu K, Saru Kumari, Xiong Li, Saravanan R Sayantani Basu, A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks, Wireless Personal Communications, pp. 1-25, 2016
  • Radha Krishna Mohanty, Sooraj TR, BK Tripathy, IVIFS and decision-making, Advances in Intelligent Systems and Computing, Vol.468, pp. 319-330, 2016
  • Parveen Sultana H, Venkata Krishna P, Two-level medium access control in cyber physical system-based smart wireless networks, International Journal of Critical Computer-Based Systems, Vol.6, No.3, pp. 191-203, 2016
  • Vijayashree J, Iyengar NChSN, Heart disease prediction system using data mining and hybrid intelligent techniques: A review, International Journal of Bio-Science and Bio- Technology, Vol.8, No.4, pp. 139-148, 2016
  • Prabakaran N, Jagadeesh Kannan R, Sustainable life-span of WSN nodes using participatory devices in pervasive environment, Microsystem Technologies, pp. 1-7, 2016
  • Prashant Lahane, Mythili T, Literature review of human stress analysis using EEG signal, Research Journal of Pharmaceutical, Biological and Chemical Sciences, Vol.7, No.5, pp. 2328-2338, 2016
  • BK Tripathy, Akarsh Goyal, Patra Anupam Sourav, A comparative analysis of rough intuitionistic fuzzy k-mode algorithm for clustering categorical data, Research Journal of Pharmaceutical, Biological and Chemical Sciences, Vol.7, No.5, pp. 2787-2802, 2016
  • Kauser Ahmed P, Meraj Alam MD, Brain tumor detection in medical imaging using soft computing techniques, Research Journal of Pharmaceutical, Biological and Chemical Sciences, Vol.7, No.5, pp. 1170-1174, 2016
  • Megana Santhoshi P, Mythili T, A novel framework for fall detection by using ambient sensors and voice recording, Research Journal of Pharmaceutical, Biological and Chemical Sciences, Vol.7, No.5, pp. 2097-2104, 2016
  • Prabu M, Margret Anouncia S, NDVI generation of chlorophyll from OCM data for the Indian ocean region using multispectral images, Research Journal of Pharmaceutical, Biologicaland Chemical Sciences, Vol.7, No.5, pp. 2855-2866, 2016
  • BK Tripathy, Viraj Sahai, Neha Kaushik, Methods for individual and group decision making using interval-valued fuzzy preference relations, Advances in Intelligent Systems and Computing, Vol.469, pp. 197-206, 2016
  • Medhane Dharshan Vishwasrao, Arun Kumar S, Source node position confidentiality aspects in wireless networks: An extended review, International Journal of High Performance Systems Architecture, Vol.6, No.2, pp. 61-81, 2016
  • Puyalnithi T, Madhu Viswanatham V, Preliminary cardiac disease risk prediction based on medical and behavioural data set using Supervised Machine Learning Techniques, Indian Journal of Science and Technology, Vol.9, no.31, pp. 96740, 2016
  • Shankar A, Jaisankar N, A Novel Energy Efficient Clustering Mechanism in Wireless Sensor Network, Procedia Computer Science Vol.89, pp. 134-141, 2016
  • Don S, Dugki Min, Breast skin line segmentation on digital mammogram using fractal approach, Indian Journal of Science and Technology, Vol.9, No.31, pp. 85420, 2016
  • Swathi JN, Rajen B Bhatt, Boominathan P, Improving the Accuracy of Fuzzy Decision Tree by Direct Back Propagation with Adaptive Learning Rate and Momentum Factor for User Localization, Procedia Computer Science Vol.89, pp. 506-513, 2016
  • BK Tripathy, Dishant Mittal, Hadoop based uncertain possibilistic kernelized c-means algorithms for image segmentation and a comparative analysis, Applied Soft Computing Journal, Vol.46, pp. 886-923, 2016
  • Lohit Mittal, Tarang Gupta, Arun Kumar S, Prediction of credit risk evaluation using naive Bayes, artificial neural network and support vector machine, IIOAB Journal, Vol.7, No.7, pp. 33-42, 2016
  • Deepthi P Hudedagaddi, BK Tripathy, Application of spatial IFCM in Leukaemia cells, IIOAB Journal, Vol.7, No.5, pp. 33-40, 2016
  • Ramanathan L, Geetha A, Khalid M, Swarnalatha P, A novel genetic nand PAFT model for enhancing the student grade performance system in higher educational institutions, IIOAB Journal, Vol.7, No.5, pp. 1-11, 2016
  • Bhulakshmi Bonthu, Arunava Kar, Jabanjalin Hilda J, Optimized warning and protection system for vehicle using RFID-based networks, Indian Journal of Science and Technology, Vol.9, No. 28, pp. 91211, 2016
  • P R Choudhary, Aachal Murade, Venkatesan M, Climate change prediction using artificial neural network, International Journal of Applied Engineering Research, Vol.11, No.3, pp. 1954-1959, 2016
  • Baskaran A, Chaudhary N, Caytiles R D, Iyengar NChSN, Fuzzy optimized and bee inspired routing protocol for improved QoS in mobile Ad Hoc networks, International Journal of Control and Automation, Vol.9, No.8, pp. 391-402, 2016
  • Gopichand G, Saravanaguru RaK, A generic review on effective intrusion detection in ad hoc networks, International Journal of Electrical and Computer Engineering, Vol.6, No.4, pp. 1779-1784, 2016
  • Marimuthu K, Remote user authentication scheme using smart card: A review, International Journal of Internet Protocol Technology, Vol.9, No.2-3, pp. 107-120, 2016
  • Abdul Gaffar H, Venkata Krishna P, A virtual backoff algorithm-based MAC protocol for underwater acoustic sensor networks, International Journal of Internet Protocol Technology, Vol.9, No.2-3, pp. 129-137, 2016
  • Swathi J N, Rajen B Bhatt, Ilango P, User localisation using wireless signal strength - An application for pattern classification using fuzzy decision tree, International Journal of Internet Protocol Technology, Vol.9, No.2-3, pp. 138-150, 2016
  • Kuppusamy S P, Sasikala R, Thangamuthu G S, A survey on end-to-end performance metrics of QoS-aware multicast routing protocols for mobile ad hoc networks, International Journal of Networking and Virtual Organizations, Vol.16, No.3, pp. 283-297, 2016
  • Xiong Li, Jianwei Niu, Marimuthu K, Saru Kumari, Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications, Journal of Medical Systems, Vol.40, No.12, pp. 268, 2016
  • Rizwan Patan, Rajasekhara Babu M, Re-storm: Real-time energy efficient data analysis adapting storm platform, Jurnal Teknologi, Vol.78, No.10, pp. 139-146, 2016
  • Sharmila Banu K, BK Tripathy, Data analytics in spatial epidemiology: A survey, Jurnal Teknologi, Vol.78, No.10, pp. 159-165, 2016
  • Aju D, Rajkumar R, T1-T2 weighted MR image composition and cataloguing of brain tumor using regularized logistic regression, Jurnal Teknologi, Vol.78, No.9, pp. 149-159, 2016
  • Senthil Murugan B, Arun Kumar S, Integrated QoUE and QoS approach for optimal service composition selection in internet of services (IoS), Multimedia Tools and Applications, Vol.75, pp. 1-28, 2016
  • Annapurna J, Lakshmanan K, A survey on game theoretic models for community detection in social networks, Social Network Analysis and Mining, Vol.6, No.1, pp. 83, 2016
  • Ramu S P, Prabu S, An approach for efficient pre-processing of multi-temporal hyperspectral satellite imagery, Institute of Integrative Omics and Applied Biotechnology (IIOAB Journal), Vol.7, No.5, pp. 12-20, 2016
  • Senthil Murugan B, Arun Kumar S, Aspect-oriented middleware framework for resolving service discovery issues in internet of things, International Journal of Internet Protocol Technology, Vol. 9, No.2-3, pp. 62-78, 2016
  • Boominathan P, Aramudhan M, A multi-objective fuzzy ant colony optimization algorithm for virtual machine placement, International Journal of Fuzzy Systems Applications, Vol.5, No.4, pp. 165-191, 2016
  • Swathi J N, Rajen B Bhatt, Ilango P, An improved second order training algorithm for improving the accuracy of fuzzy decision trees, International Journal of Fuzzy Systems Applications, Vol.5, No.4, pp. 96-120, 2016
  • Thendral P, Madhu Viswanatham V, Analysis of impact of fuzification of range attributes in performance of various classification algorithms in detecting primary tumor, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 16515-16520, 2016
  • Archana T, Usha Devi G, Prediction of student performance in educational data mining - A survey, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 17757-17763, 2016
  • Senthilnathan P, B B Ghosh, Fault tolerance in cloud environment based on high-level computation management, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 17801-17817, 2016
  • Blessy Trencia Lincy, Swarnalatha P, Prabu S, A novel user-based recommendation system using mahout framework, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 16222-16229, 2016
  • BK Tripathy, Akarsh Goyal, Anupam Sourav, Clustering categorical data using intuitionistic fuzzy K-mode algorithm, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 16688-16701, 2016
  • Arun Kumar G, Madhu Viswanatham V, Autonomic computing integration in server management,cloud computing and big-data, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 17681-17693, 2016
  • Priya G, Jaisankar N, A reputation based trustworthy system for cloud environment, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 16702-16708, 2016
  • Sourabh Thakur, Rahul Chowdhury, Identification of chief characteristics of alcohol consumption traits in schools using rough set and formal concept analysis, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 18446-18470, 2016
  • Yokesh Babu S, Saleem Durai MA, An arduino based smart real time web application for server room monitoring and appliances control, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 18471-18481, 2016
  • Vishruth C S, Thendral P, Madhu Viswanatham V, Performance analysis of various classification techniques over diabetes dataset, International Journal of Pharmacy and Technology, Vol.8, No.3, 18136-18140, 2016
  • Arun Kumar G, Madhu Viswanatham V, Autonomic clever search, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 16611-16617, 2016
  • Ramanathan L, Delay and disruption tolerant network: The technology and it’s scope, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 15723-15735, 2016
  • Govinda K, Viraat Salin, Monalika, Audit trail’s approach for telemedicine dataover cloud environment, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 15523-15532, 2016
  • Gayathri P, Santhi H, Nagra A, Gaba, Study and analysis of privacy and securitychallenges in Internet of Things (IOT), International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 2016
  • Ashmeet Singh, Ananda Kumar S, Application of bagging and boosting for all the classification Algorithms, International Journal of Pharmacy and Technology, Vol.8, No.3, 17669-17680, 2016
  • BK Tripathy, Sooraj TR, Radhakrishna Mohanty, Advances decision making usisng hybrid soft set models, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 17694-17721, 2016
  • Vijayakumar S, Santhi V, Airborne remote sensing of oil slicks using recent radar satellite trends: Application of oil slick mapping on ocean surface monitoring using quad-polarization SAR images, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 15869-15883, 2016
  • Anbarasi M, Saleem Durai MA, Social networksbased disease analysis using Hadoop, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 15828-15837, 2016
  • Nadeem M, Priya G, Data access control and privacy preservation using attribute based encryption in cloud computing, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 15438-15446, 2016
  • Swathi JN, A survey on nature inspired metaheuristic techniques for training feedforwad neural networks, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 4567-4590, 2016
  • Geraldine Bessie Amali D, Vijayarajan V, Jaisakthi S M, Dedania P P, Developing a semantic web based search using ontology classification, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 18978-18988, 2016
  • Jayashree J, Vijayashree J, Technical aids for outdoor assistive navigation for visually impaired people, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 16344-16351, 2016
  • Sandeep T, Priya G, Reputation based trust management for cloud services, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 15541-15551, 2016
  • Santhi H, Jaisankar N, A study on congestion imperatives and challenges in mobile Ad hoc networks, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 4801-4814, 2016
  • Utkarsha Tiwari, Anbarasi M, Saleem Durai MA, A rough set based kernel possibilistic c-means algorithm for medical data, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 16596-16604, 2016
  • Prabakaran N, Jagadeesh Kannan R, Context centered response for enabling pervasive environment using data centric WSNs, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 15485-15496, 2016
  • Shanmugasundaram P, Subaji M, Big data analytics in healthcare system for diverse perspectives, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 18430-18445, 2016
  • Vijayarajan V, Rajesh Kannan R, Rajkumar R, Dhinakaran N, Automatic detection of moving objects using Kalman algorithm, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 18963-18970, 2016
  • Bhatia R, Boominathan P, Ramani S, Development of genetic algorithms to improve test case generation in software engineering, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 15533-15541, 2016
  • Rajkumar S, Prakash J, Automated attendance using raspberry Pi, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 16214-16221, 2016
  • Natarajan P, Sushmitha G, Brain tumor detection in MRI brain imagesusing threshold operation, International Journal of Pharmacy and Technology, Vol.8, No.3, pp. 16181-16190, 2016
  • Sasikala R, Research based literature survey and analysis on various sharding techniques, IIOAB Journal, Vol. 7, (9 Special Issue) pp. 479-494, 2016
  • Sathya S, Rajkumar R, Unique barcode identifier for patient record using geographical, calendar, time barcodes with error detection, Indian Journal of Science and Technology, Vol.9, No.38, pp. 97189, 2016
  • Ganesh Gopal D, Saravanan R, Selfish node detection based on evidence by trust authority and selfish replica allocation in DANET, International Journal of Information and Communication Technology, Vol.9, No.4, pp. 473-491, 2016
  • Akarsh Goyal, Ishan Khandelwal, Aditya Kumar Mathur, Iyengar NChSN, PDConnect: Low cost wearable device connecting patient-doctor via cloud for good health, International Journal of Smart Home, Vol.10, No.9, pp. 329-338, 2016
  • Anil Satyan, Mythili T, Sumit Hazra, A novel RGB based steganography using prime component alteration technique, IIOAB Journal, Vol.7, No.5, pp. 58-73, 2016
  • Sai Sree K, Murali Manohar B, Swarnalatha P, Analysis of the application of data mining techniques in the field of education, IIOAB Journal, Vol.7, No.5, pp. 203-215, 2016
  • Tamilarasi R, Prabu S, Swarnalatha P, An investigation on the techniques used for encryption and authentication for data security in cloud computing, IIOAB Journal, Vol. 7, No.5, pp. 126-138, 2016
  • Jenisha T, Swarnalatha P, A survey of neural network algorithms used for image annotation, IIOAB Journal, Vol.7, No.5, pp. 236-252, 2016
  • Gopinath MP, Prabu S, Classification of thyroid AbnorMalities on thermal image: A study and approach, IIOAB Journal, Vol.7, No.5, pp. 41-57, 2016
  • Karthi S, Prabu S, An investigation on hybrid computing for competent data storage and secure access for geo-spatial applications, IIOAB Journal, Vol.7, No.5, pp. 139-149, 2016
  • Deepthi P Hudedagaddi, BK Tripathy, Kernel based spatial fuzzy c-means for image segmentation, IIOAB Journal, Vol.7, No.5, pp. 150-156, 2016
  • Swarnalatha P, BK Tripathy, Analysis of depth using clustering techniques with bit plane filter for satellite imagery, IIOAB Journal, Vol.7, No.5, pp. 108-125, 2016
  • Rajkumar S, Rishin Haldar, Swarnalatha P, Arvind P, Multimodality medical image fusion using block based intuitionistic fuzzy sets, IIOAB Journal, Vol.7, No.5, pp. 85-94, 2016
  • Pragya Agrawal, Swarnalatha P, Combining semantic data store and big data for pharma use case, IIOAB Journal, Vol.7, No.5, pp. 253-264, 2016
  • Utkarsh Gupta, Swarnalatha P, Prateek C, Speech guided feature extraction and brain storm optimization to cluster objects using fuzzy logic, IIOAB Journal, Vol.7, No.5, pp. 193-202, 2016
  • Mythili T, Tamizharasi T, Sumathy S, Swarnalatha P, Hybrid tool for diagnosis of diabetes, IIOAB Journal, Vol.7, No.5, pp. 74-84, 2016
  • Mohan K, Aramudhan M, Sasikala R, Swarnalatha P, F-TEM: A fuzzy based trust evaluation model for healthcare applications in cloud, IIOAB Journal, Vol.7, No.5, pp. 180-192, 2016
  • Prabu S, BK Tripathy, Swarnalatha P, Ramakrishnan R Manthiramoorthi S, An anaglyph approach of geometric correction for depth reconstruction of satellite imagery, IIOAB Journal, Vol.7, No.5, pp. 95-107, 2016
  • Vijayakumar S, Swarnalatha P, Rukmini S, A neural network classification approach for oil spill detection on sar images, IIOAB Journal, Vol.7, No.5, pp. 225-235, 2016
  • Mythili T, Smit U Patel, Prakhar Vyas, Tamizharasi T, Analyzing company’s stock price movement using public sentiment in twitter data, IIOAB Journal, Vol.7, No.5, pp. 127-136, 2016
  • Vasumathy M, Mythili T, A hybird mik segmentation technique for diagnosing aspired foreign body on pediatric radiography images, IIOAB Journal, Vol.7, No.5, pp. 210-217, 2016
  • Jabanjalin Hilda J, Srimathi C, Bhulakshmi Bonthu, A review on the development of big data analytics and effective data visualization techniques in the context of massive and multidimensional data, Indian Journal of Science and Technology, Vol.9, No.27, pp. 1-13, 2016
  • Senthil Kumar R, Arun Kumar T, A survey on prioritization of software quality attributes, Indian Journal of Science and Technology, Vol.9, No.44, pp. 86988, 2016
  • Charanya R, Aramudhan M, Saravanaguru RaK, A review on access control issues in ehealth application in cloud computing, Indian Journal of Science and Technology, Vol.9, No.42, pp. 90536, 2016
  • Shaik Naseera Rajini GK, Sunil Kumar Reddy P, Host CPU load prediction using statistical algorithms: A comparative study, International Journal of Control Theory and Applications, Vol.9, No.12, pp. 5577-5582, 2016
  • Vijayakumar K, Ilango P, An analysis and comparison of various missing data imputation tools and techniques, International Journal of Engineering and Technology, Vol.8, No.5, pp. 1910-1915, 2016
  • BK Tripathy, Parida SC, Covering based optimistic multigranular approximate rough equalities and their properties, International Journal of Intelligent Systems and Applications, Vol.8, No.6, pp. 70-79, 2016
  • Kamalakannan J, Rajasekhara Babu M, Early detection of breast cancer using GLCM feature extraction in mammograms, IIOAB Journal, Vol.7, No.5, pp. 170-179, 2016
  • Aarthy SL, Prabu S, A computerized approach on breast cancer detection and classification, IIOAB Journal, Vol.7, No.5, pp. 157-169, 2016
     

2015

  • Sunil Kumar Reddy T, Venkata Krishna P, Chenna Reddy P, Power aware framework for scheduling tasks in grid-based workflows, International Journal of Communication Network and Distributed Systems, Vol.14, No.1, pp. 74-88, 2015
  • Sanjiban Sekhar Roy, Dishant Mittal, Avik Basu, Ajith Abraham, Stock market forecasting using LASSO linear regression model, Advances in Intelligent Systems and Computing, Vol.334, pp. 371-381, 2015
  • Chandrasekharan VM, Manimaran A, Akhil Ranjan, Cryptography using a pair of dice, International Journal of Pharm Tech Research, Vol.7, No.1, pp. 85-89, 2015
  • BK Tripathy, Prateek Saraf, Parida SCh, On multigranular approximate rough equivalence of sets and approximate reasoning, Smart Innovation, Systems and Technologies, Vol.32, pp. 605-616, 2015
  • Rajasekaran P, Prabakaran N, Magudeeswaran V, Context-Aware Computing Using Rich Contexts for Pervasive Environment, Advances in Intelligent Systems and Computing, 308 AISC, Vol.1, pp. 425-431, 2015
  • Maheswari A, Arun Kumar S, System for the detection and reporting of cardiac event using embedded systems, Advances in Intelligent Systems and Computing, Vol.337, pp. 587-594, 2015
  • Kartik Shah, Praveen Kumar Reddy M, Vairamuthu S, Improvement in hungarian algorithm for assignment problem, Advances in Intelligent Systems and Computing, Vol.326, pp. 1-8, 2015
  • Sheeba Anni DJ, Arun Kumar S, An early warning system to prevent human elephant conflict and tracking of elephant using seismic sensors, Advances in Intelligent Systems and Computing, Vol.337, pp. 595-602, 2015
  • Dharshan V Medhane, Arun Kumar S, Source Node Position Confidentiality (SNPC) Conserving Position Monitoring System for wireless networks, Advances in Intelligent Systems and Computing, Vol.338, pp. 347-355, 2015
  • Kartik Shah, Shantanu Santoki, Himanshu Ghetia, Aju D, Classification of remote sensing image based on different similarity measures, Advances in Intelligent Systems and Computing, Vol. 324, pp. 609-619, 2015
  • Balamurugan B, Venkata Krishna P, An enhanced security framework for a cloud application, Advances in Intelligent Systems and Computing, Vol.324, pp. 825-836, 2015
  • Jagadeesh G, Arun Kumar S, Anirban Basu, Pradeep Reddy Ch, Towards identifying the knowledge codification effects on the factors affecting knowledge transfer effectiveness in the context of GSD project outcome, Advances in Intelligent Systems and Computing, Vol.337, pp. 611-620, 2015
  • Balamurugan B, Venkata Krishna P, Enhanced role-based access control for cloud security, Advances in Intelligent Systems and Computing, Vol.324, pp. 837-852, 2015
  • Balamurugan B, Venkata Krishna P, Abinaya V, Meenakshi R Nirmala Devi M, Enhanced security framework for data integrity using third-party auditing in the cloud system, Advances in Intelligent Systems and Computing, Vol.325, pp. 25-31, 2015
  • Balamurugan B, Venkata Krishna P, Saravana Kumar N, Rajyalakshmi GV, An efficient framework for health system based on hybrid cloud with ABE-outsourced decryption, Advances in Intelligent Systems and Computing, Vol.325, pp. 41-49, 2015
  • Balamurugan B, Venkata Krishna P, Gomathi P, Umamageshwari R, An intelligent cloud security system for critical applications, Advances in Intelligent Systems and Computing, Vol.325, pp. 33-40, 2015
  • Raghuveer VR, BK Tripathy, On demand analysis of learning experiences for adaptive content retrieval in an e-learning environment, Journal of e-Learning and Knowledge Society, Vol.11, No.1, pp. 139-156, 2015
  • BK Tripathy, Govindarajulu K, Some more properties of covering based pessimistic multigranular rough sets, Advances in Intelligent Systems and Computing, Vol.339, pp. 555-564, 2015
  • Anuradha J, BK Tripathy, Uncertainty based Hybrid Particle Swarm Optimization Techniques and their Application, Multi-Objective Swarm Intelligence Studies in Computational Intelligence, Vol. 592, pp. 143-169, 2015
  • Arun Kumar S, Arun Kumar T, Xiao Zhi Gao, Anbazhagan N Saleem Durai M A, An ANFIS approach for evaluation of team-level service climate in GSD projects using Taguchi-genetic learning algorithm, Applied Soft Computing, Elsevier Publications, Vol.30, pp. 628-635, 2015
  • Ramesh Babu K Arun Kumar T, A Context aware Pre-Handsoff support approach to provide optimal QoS for streaming Applications over Vehicular Ad hoc networks - HOSA, Journal of Engineering Science and Technology, Vol.10, No.6, pp. 743-764, 2015
  • Abishek Varma GNS, Aswani Kumar Reddy G, Ravi Theja, Arun Kumar T, Cluster based Multipath Dynamic Routing (CBDR) Protocol for wireless Sensor Networks, Indian Journal of Science and Technology, Vol.8, Supp. 2, pp. 17-22, 2015
  • Mohanasundaram R, Periasamy PS, Hybrid Swarm Intelligence optimization approach for Optimal data storage position identification in wireless sensor network, The Scientific World Journal, Vol.2015, Article ID: 597486, pp. 1-12, 2015
  • Deepa Lakshmi S, Arun Kumar G, Madhu Viswanatham V, Network security enhancement through honeypot based systems, International Journal of Engineering and Technology, Vol.7, No.1, pp. 290-293, 2015
  • Geraldine Bessie Amali D, Vijayarajan V, Accurate solution of benchmark linear programming problems using hybrid particle swarm optimization (PSO) algorithms, International Journal of Applied Engineering Research, Vol. 10, NO.4, pp. 9101-9110, 2015
  • Elizabeth Isac, Rajasekhara Babu M, Wormhole routing in network on chip, International Journal of Applied Engineering Research, Vol.10, NO.4, pp. 9043-9050, 2015
  • Suresh K, Elizabeth Isac, Rajasekhara Babu M, High performance computing on heterogeneous/ multiprocessors system energy-aware design, International Journal of Applied Engineering Research, Vol.10, NO.4, pp. 8941-8953, 2015
  • Senthil Kumar R, Arun Kumar T, An approach for software security using digital rights management, ARPN Journal of Engineering and Applied Sciences, Vol.10, No.6, pp. 2531-2535, 2015
  • Ramanathan L, Angelina Geetha, Khalid M, Mining students’ record to predict their performance in undergraduate degree, International Journal of Applied Engineering Research, Vol.10, No.1, pp. 1113-1142, 2015
  • Senthil Kumar R, Arun Kumar T, Code security using control flow obfuscation with opaque predicate, International Journal of Applied Engineering Research, Vol.10, No.2, pp. 3239-3250, 2015
  • Sravani M, Manjula R, A software engineering approach for realizing smart grids, International Journal of Applied Engineering Research, Vol.10, No.4, pp. 11337-11351, 2015
  • Mohanasundaram R, Periasamy PS, Swarm based optimal data storage position using enhanced bat algorithm in wireless sensor networks, International Journal of Applied Engineering Research, Vol.10, No.2, pp. 4311-4328, 2015
  • Ajay Nadargi, Mythili T, A review of protecting location privacy in location based service, International Journal of Applied Engineering Research, Vol.10, No.4, pp. 11237-11249, 2015
  • Meenakshi Sundaram V, Arun Kumar T, A Delaunay diagram-based Min-Max CP-Tree algorithm for Spatial Data Analysis, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, Vol.5, No.3, pp. 142-154, 2015
  • Dishant Mittal, Dev Gaurav, A decision tree classification model for determining the location for solar power plant, Frontiers in Artificial Intelligence and Applications, Ebook: Advances in Digital Technologies, Vol.275, pp. 285-295, 2015
  • Ananda Kumar S, Ilango P, A mathematical model for assigning the priority for incoming packets in event driven applications for wireless sensor network, International Journal of Applied Engineering Research, Vol.10, No.9, pp. 19911-19920, 2015
  • Ananda Kumar S, Ilango P, Data funnelling in wireless sensor networks: A comparative study, Indian Journal of Science and Technology, Vol.8, No.5, pp. 472-480, 2015
  • Abhinevesh M, Manikandan K, Design and Qos Analysis of Novel Collaborative Layered Approach for Cloud Resource Management, International Journal of Applied Engineering Research, Vol.10, No.8, pp. 20999-21013, 2015
  • Jerline Sheeba Anni, Arun Kumar S, Elephant tracking with seismic sensors: A technical perceptive review, Jurnal Teknologi, Vol. 74, No.1, pp. 199-209, 2015
  • Rajkumar S, Chandra Mouli PVSSR, Perceptual visualization enhancement of infrared images using fuzzy sets, Leture Notes in Computer Sciecne (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol.9030, pp. 3-19, 2015
  • Swarnalatha P, Anbarasi M, Aman Sharma, Ganesh M, Prediction of leukaemia cancer images using parallel saliency algorithm, International Journal of Pharma and Biosciences, Vol.6, No.2, 226-232, 2015
  • Chandra Mouli PVSSR, Two phase adaptive visible and invisible watermarking of digital images in hadamard domain, International Journal of Imaging and Robotics, Vol.15, No.12, pp. 104-118 2015
  • Sanjeevi P, Viswanathan P, Rajasekhara Babu M, Venkata Krishna P, Study and analysis of energy issues in cloud computing, International Journal of Applied Engineering Research, Vol.10, No.7, pp. 16961-16969, 2015
  • Swathi Suresh, Mary Varghese, Aju D, An efficient and optimized RC5 image encryption algorithm for secured image transmission, International Journal of Imaging and Robotics, Vol.15, No.3, pp. 116-125, 2015
  • Elizabeth Isaac, Rajasekhara Babu M, Distance routing on mesh network on chip, ARPN Journal of  Engineering and Applied Sciences, Vol.10, No.10, pp. 4419-4423, 2015
  • Murali S, Jaisankar N, A comparative study of air pollution monitoring system in wireless sensor network, International Journal of Applied Engineering Research, Vol.10, No.9, pp. 22545-22562, 2015
  • Pranav Patel, Chirag Patel, Rutul N Shah, Vijayarajan V, A parallel disk scheduling algorithm for multicore architectures, International Journal of Applied Engineering Research, Vol.10, No.10, pp. 25175-25188, 2015
  • Swathi JN, Ilango P, Rajen B Bhatt, Khalid M A study on the approximation of clustered data to parameterized family of fuzzy membership functions for the induction of fuzzy decision trees, Cybernetics and Information Technologies, Vol.15, No.2, pp. 75-96, 2015
  • Senthilnathan P, Kalaiarasan C, Cross-layer based delay latency reduction technique for multipath routing in MANET, International Journal of Applied Engineering Research (IJAER), Vol.10. No.9, pp. 23021-23042, 2015
  • Manikandan K, Kruthika S, Nanduri P, Sai Surya K, Design and development of automatic irrigation system with smart water pumpcontrol, International Journal of Applied Engineering Research (IJAER), Vol.10, No.9, pp. 23103-23108, 2015
  • Lavanya K, Saleem Durai MA, Iyengar NChSN, Site specific soil fertility ranking and seasonal paddy variety selection: An intuitionistic fuzzy rough set and fuzzy bayesian based decision model, International Journal of Multimedia and Ubiquitous Engineering, Vol.10, No.6, pp. 311-328, 2015
  • Iyengar NChSN, Gopinath Ganapathy, Trilateral trust based defense mechanism against DDoS attacks in cloud computing environment, Cybernetics and Information Technologies, Vol.15, No.2, pp. 119-140, 2015
  • Shahid Khan, Muhammad Rukunuddin Ghalib, A naive-bayes approach for disease diagnosis with analysis of disease type and symptoms, International Journal of Applied Engineering Research, Vol.10, No.11, pp. 29005-29014, 2015
  • Narayanamoorthy M, Manjula R, A new integrated computer architecture simulation framework towards next generation approach, International Journal of Applied Engineering Research, Vol.10, No.12, pp. 32415-32422, 2015
  • Sasikala S, Balamurugan SA, Geetha S, A novel feature selection technique for improved survivability diagnosis of breast cancer, Procedia Computer Science Vol.50, pp. 16-23, 2015
  • Anbarasi M, Saleem Durai MA, A study on predicting protein secondary structure using various data mining approaches, International Journal of Pharma and Biosciences, Vol.6, No.3, pp. B549-B561, 2015
  • Shanmugasundaram P, Ilango P, AN enterprise oriented view on the cloud integration approaches - hybrid cloud and big data, Procedia Computer Science Vol.50, pp. 163-168, 2015
  • Anbarasi M, Neha Vadnere, Tapasvi Soni, Saleem Durai MA Swarnalatha P, Assessment of transition and emission probabilities of HMM for protein secondary structure prediction, International Journal of Pharma and Biosciences, Vol.6, No.3, pp. B1043-B1049, 2015
  • Suresh Kumar N, Senthil Murugan B, Benthic classification of coralreefs using SVM classfier, International Journal of Pharma and Biosciences, Vol.6, No.3, pp. B700-B710, 2015
  • Muhammad Rukunuddin Ghalib, Mottal Ahmed, Hicast-K: A novel Hybridized gene clustering algorithm with inbuilt validation, International Journal of Applied Engineering Research, Vol.10, No.11, pp. 29025-29040, 2015
  • Naman Jain, Priya G, Ramya G, Low cost heart rate monitoring using fingertips, International Journal of Applied Engineering Research (IJAER), Vol.10, No.11, pp. 29641-29649, 2015
  • Santhi H, Jaisankar N, Multipath on-demand routing for large scale multi-hop networks, International Journal of Applied Engineering Research (IJAER), Vol.10, No.12, pp. 30801-30818, 2015
  • Ananda Kumar S, Ilango P, Dinesh Kumar, Silla Shameer Gupta Dinesh GH, Survey Study on Leach Protocols for Wireless Sensor Networks, International Journal of Applied Engineering Research (IJAER), Vol.10, No.11, pp. 29015-29024, 2015
  • Subashini N, Ilango P, An intelligent framework for cardio vascular disease diagnosis, International Journal of Applied Engineering Research (IJAER), Vol.10, NO.9, pp. 24271-24286, 2015
  • Apoorva Bansal, Srinivas Koppu, Madhu Viswanatham V, Sujatha R, Flame detection in videos using binarization, ARPN Journal of Engineering and Applied Sciences, Vol.10, No.12, pp.5368-5377, 2015
  • Brijendra Singh, Senthil J, Use of information technology by nurses in private hospitals in the state of Tamil Nadu in India, Mediterranean Journal of Social Sciences, Vol.6, No.4S2, pp. 658-666, 2015
  • Sivarama Krishnan S, Arun Kumar T, Analysis of routing mechanisms using QoS metrics in data aggregation for wireless sensor network–A survey, International Journal of Applied Engineering Research, Vol.10, No.14, 34323-34327, 2015
  • Suresh Kumar N, Manoharan A, Deforestation identification model using satellite images by color based segmentation, International Journal of PharmTech Research, Vol.8, No.4, pp. 776-781, 2015
  • Suresh Kumar N, Arun M, Enhanced classification algorithms for the satellite image processing, Indian Journal of Science and Technology, Vol.8, No.15, pp. 56390, 2015
  • Prabu S, Ramakrishnan R, Manthira Moorthi S, Swarnalatha P, Application of average brightness threshold algorithm for the analysis of relative radiometric correction for Ahmedabad region, International Journal of Earch Sciences and Engineering, Vol.8, No.1, pp. 341-348, 2015
  • Prashant Lahane, Arun Kumar S, An approach to eeg based emotion recognition and classification using kernel density estimation, Procedia Computer Science Vol.48 ©, pp. 574-581, 2015
  • Varun Mittal, Shivam Adithya, Recent developments in the field of bug fixing, Procedia Computer Science Vol.48©, pp. 288-297, 2015
  • Senthil Kumar R, Arun Kumar T, Dhavachelvan P, Gunasekaran G, Query based k-DRM for software security, Indian Journal of Science and Technology, Vol.8, No.17, pp. 67408, 2015
  • Ishwarappa Anuradha J, A brief introduction on big data 5Vs characteristics and hadoop technology, Procedia Computer Science Vol.48©, pp. 319-324, 2015
  • Grace Padma C, Arun Kumar T, Enhanced data mining techniques for improving the women entrepreneurs quality of service, International Journal of Applied Engineering Research, Vol.10, No.14, pp. 34029-34034, 2015
  • Saira Banu J, Rajasekhara Babu M, Reeta Pandey, Parallel implementation of Singular Value Decomposition (SVD) in image compression using OpenMp and sparse matrix representation, Indian Journal of Science and Technology, Vol.8, No.13, pp. 59410, 2015
  • Mohan V Pawar, Anuradha J, Network security and types of attacks in network, Procedia Computer Science Vol.48, pp. 503-506, 2015
  • Anthoniraj A, Margret Anouncia S, Vairamuthu S, Vasudeven M, A framework for E-Governance system using linked data and beliefdesire- intention agent, Indian Journal of Science and Technology, Vol.8, No.15, pp. 54038, 2015
  • Marimuthu K, Saravanan R, A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks, Wireless Personal Networks, Vol.84, No.3, pp. 2055-2078, 2015
  • Anupriya E, Iyengar NChSN, Adaptive semantic indexing of documents for locating relevant information in P2P networks, International Arab Journal of Information Technology, Vol.12, No.5, pp. 473-480, 2015
  • Shubham Agarwal, Shivam Srivatsava, Augmentation in dynamic sharing of bandwidth in campus area network (CAN) using Xen, International Journal of Applied Engineering Research, Vol.10, No.15, pp. 35451-35455, 2015
  • Marimuthu K, Saravanan R, Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme using Smart Cards, Journal of Discrete Mathematical Sciences and Cryptography, Vol.18, No.5, pp. 623-649, 2015
  • Anisha M Lal, Margret Anouncia S, Detection of boundaries by fusing the topographic sheets and multispectral images for geographic landscapes, International Journal of Ecology and Development, Vol.30, No.3, pp. 11-25, 2015
  • Mythili T, Margret Anouncia S, Anthony Xavior M, Adalarasu S Vasumathy M, Performance evaluation of artificial intelligence based methods for defect classification – A case study on weld radiographic images, International Journal of Applied Engineering Research, Vol.10, No.55, pp. 3751-3756, 2015
  • Varun Manchikalapudi, Khadar Babu SK, Simulation of efficiency in mobile Ad hoc networks using OMNeT++, Research Journal of Applied Sciences, Engineering and Technology, Vol.10, No.10, pp. 1192-1196, 2015
  • Dinakaran M, Siva Shanmugam G, Vijayarajan V, Kannadasan R, A new combinational approach of android and brackets to manage employeesvia GPS, International Journal of Applied Engineering Research, Vol.10, No.55, pp. 3009-3013, 2015
  • Dinakaran M, Siva Shanmugam G, Vijayarajan V, Kannadasan R, A triangular system for denial of service attack detection based on
  • multivariate correlation analysis, International Journal of Applied Engineering Research, Vol.10, No.55, pp. 3014-3019, 2015
  • Srimathi C, Subaji M, Rajesh N, Survey on health cloud characteristics, Health and Technology, Vol.5, No.2, A003, pp. 135-146, 2015
  • Somasekhar G, Karthikeyan K, Efficient techniques to deal with big data classification problems, International Journal of Pharmacy and Technology, Vol.7, No.2, pp. 8942-8950, 2015
  • Somasekhar G, Karthikeyan K, The mapreduce based MRMPCME algorithm for big stream data, International Journal of Applied Engineering Research, Vol.10, No.17, pp. 38589-38597, 2015
  • Venkatesan M, Arun Kumar T, Prabhavathy P, A novel Cp-Tree-based co-located classifier for big data analysis, International Journal of Communication Network and Distributed Systems, Vol.15, No.2-3, pp. 191-211, 2015
  • Balasubramanian V, Margret Anouncia S, Supporting adaptive learning environment through cognitive skill based learner classification, Indian Journal of Science and Technology, Vol.8, No.23, pp. 73148, 2015
  • Akila Victor, Gurleen Kaur Brar, An algorithm for deskewing a document image, International Journal of Applied Engineering Research, Vol.10, No.18, pp. 39071-39073, 2015
  • Shruti Hiremath, Pallavi Chandra, Anne Mary Joy, BK Tripathy, Neighbourhood rough set model for knowledge acquisition using MapReduce, International Journal of Communication Networks and Distributed Systems, Vol.15, No.2-3, pp. 212-234, 2015
  • Saira Banu J, Rajasekhara Babu M, Exploring vectorization and prefetching techniques on scientific kernels and inferring the cache performance metrics, International Journal of Grid and High Performance Computing, Vol.7, No.2, pp. 18-36, 2015
  • Anuradha J, Anvesha Sinha, BK Tripathy, Hybrid Clustering Algorithm Using Possibilistic Rough C-Means, International Journal of Pharma and Biosciences, Vol.6, No.4, pp. B799-B810, 2015
  • Sharmila Banu K, BK Tripathy, Soft computing techniques for categorical data analysis in bio-informatics, International Journal of Pharma and Biosciences, Vol.6, No.4, pp. B642-B646, 2015
  • Achyut Shankar, Jaisankar N, Energy efficient clustering mechanism for virtual MIMO communication in wireless sensor networks, International Journal of Applied Engineering Research, Vol.10, No.18, pp. 39562-39569, 2015
  • Manjunath KG, Jaisankar N, Optimization of Honda algorithm for rear end collision avoidance system with particle swarm optimization, International Journal of Applied Engineering Research, Vol.10, No.18, pp. 39048-39052, 2015
  • Anthoniraj A, Margret Anouncia S, Social network user's content personalization based on emoticons, Indian Journal of Science and Technology, Vol.8, No.23, pp. 72773, 2015
  • Saira Banu J, Rajasekhara Babu M, SIMD acceleration of SpMV Kernel on multi-core CPU architecture, Advances in Systems Science and Applications, Vol.15, No.3, pp. 273-293, 2015
  • Selvakumar K, Sai Ramesh L, Arputharaj Kannan, Enhanced K-means clustering algorithm for evolving user groups, Indian Journal of Science and Technology, Vol.8, No.24, IPL0371, 2015
  • Aju D, Rajkumar R, Locale detection, identification and significant feature extraction of brain tumor by manipulating mr images, International Journal of Pharma and Biosciences, Vol.6, No.4, pp. B291-B304, 2015
  • Thanapal P, Saleem Durai MA, Software based methodologies to extend energy level of android mobile devices, International Journal of Applied Engineering Research, Vol.10, No.17, pp. 37481-37487, 2015
  • Ravi Theja P, Sumathy S, Mythili T, Recognizing polarity of articles using sentiment analysis through machine learning techniques, International Journal of Applied Engineering Research, Vol.10, No.55, pp. 1806-1811, 2015
  • Anisha M Lal, Margret Anouncia S, Omar Haji Kombo, A hybrid approach for fusion combining SWT and sparse representation in multispectral images, Indian Journal of Science and Technology, Vol.8, No.16, pp. 66346, 2015
  • Anisha M Lal, Margret Anouncia S, Semi-supervised change detection approach combining sparse fusion and constrained k means for multi-temporal remote sensing images, Egyptian Journal of Remote Sensing and Space Science, Vol.18, No.2, pp. 279-288, 2015
  • Selvarani B, Vairamuthu S, An intelligent packet filtering based on bi-layer particle swarm optimization with reduced search space, Advances in Intelligent Systems and Computing, Vol.380, pp. 639-647, 2015
  • Arun Kumar S, Subramaniam PR, Zheng X, A combined fuzzy DEMATEL and fuzzy TOPSIS approach for evaluating GSD project outcome factors, Neural Computing and Applications, Vol.26, No.5, pp. 1025-1040, 2015
  • Swarnalatha P, BK Tripathy, A comparative analysis of depth computation of leukaemia images using a refined bit plane and uncertainty based clustering techniques, Cybernetyics and Information Technologies, Vol.15, No.1, pp. 126-146, 2015
  • Marimuthu K, Saravanan R, A secure remote user mutual authentication scheme using smart cards, Journal of Information Security and Applications, Vol.19, No. 4-5, pp. 282-294, 2015
  • Rizwan Patan, Rajasekhara Babu M, A Study Analysis of Energy Issues In Big Data, International Journal of Applied Engineering Research, Vol.10, No.6, pp. 15593-15609, 2015
  • Prabhadevi S, Senthil J, Kapoor R, Algorithm of Sentiment Analysis For Computing Machines, Journal of Scientific and Industrial Research, Vol.74, No.12, pp. 670-674, 2015
  • Perla Ravi Teja, Khadar Babu SK, An adaptive genetic algorithm based robust QoS oriented green computing scheme for VM consolidation in large scale cloud infrastructures, Indian Journal of Science and Technology, Vol.8, No.27, pp. 79175, 2015
  • Iyengar NChSN, Gopinath Ganapathy, An Effective Layered Load Balance Defensive Mechanism Against DDOS Attacks In Cloud Computing Environment, International Journal of Security and its Applications, Vol.9, No.7, pp. 17-36, 2015
  • Perla Ravi Teja, Khadar Babu SK, An Evolutionary Computing Based Energy Efficient Vm Consolidation Scheme For Optimal Resource Utilization And Qos Assurance, Indian Journal of Science and Technology, Vol.8, No.26, pp. 77179, 2015
  • Iyengar NChSN, Gopinath Ganapathy, Chaotic Theory Based Defensive Mechanism Against Distributed Denial Of Service Attack In Cloud Computing Environment, International Journal of Security and its Applications, Vol.9, No.9, pp. 197-212, 2015
  • Abhishek Varma, Aswani Kumar Reddy G, Ravi Theja Y, Arun Kumar T, Cluster Based Multipath Dynamic Routing (CBDR) Protocol For Wireless Sensor Networks, Indian Journal of Science and Technology, Vol.8, No.S2, pp. 17-22, 2015
  • Monu Pandey, Rajasekhara Babu M, Manasa J, Avinash K, Mobile Based Home Automation And Security System, Indian Journal of Science and Technology, Vol.8, pp. 12-16, 2015
  • Anitha A, DP Acharjya, Neural Network And Rough Set Hybrid Scheme For Prediction Of Missing Associations, International Journal of Bioinformatics Research and Applications, Vol.11, No.6, pp. 503-524, 2015
  • Govinda K, Sathiyamoorthy E, Privacy Preservation Of A Group And Secure Data Storage In Cloud Environment, Cybernetics and Information Technologies, Vol.15, No.1, pp. 46-54, 2015
  • Sarasvathi V, Iyengar NChSN, Qos Guaranteed Intelligent Routing Using Hybrid PSO-GA In Wireless Mesh Networks, Cybernetics and Information Technologies, Vol.15, No.1, pp. 69-83, 2015
  • Balusamy B, Murali T, Arun Kumar T, Venkata Krishna P, A Multi-Level Text Classifier For Feedback Analysis Using Tweets To Enhance Product Performance, International Journal of Electronic Marketing and Retailing, Vol.6, No.4, pp. 315-338, 2015
  • Aarthy SL, Prabu S, An Approach For Detecting Breast Cancer Using Wavelet Transforms, Indian Journal of Science and Technology, Vol.8, No.26, pp. IPL0502, 2015
     

2014

  • Natarajan P, Soniya N, Krishnan N, Enhancement of MRI Brain and CT Brain Image Fusion by Adaptive filter, International Journal of Tomography and Simulation, Vol.25, No.1, pp. 130-137, 2014
  • Amit Kumar Ahuja, Ram Chakka, Venkata Krishna P, BER reduction in signal receivers towards greening of digital communications, International Journal of Communication Networks and Distributed Systems, Inderscience Vol.12, No.1, pp. 82-94, 2014
  • Ilango P, Vijayakumar K, Rajasekhara Babu M, Instance driven clustering for the imputation of missing data in KDD, International Journal of Communication Networks and Distributed Systems, Inderscience Vol.12, No.1, pp. 69-81, 2014
  • Swarnalatha P, BK Tripathy, A comparative study of RIFCM with other related algorithms from their suitability in analysis of satellite images using other supporting techniques, Kybernets, Emarald Group Publishing Ltd., Vol.43, No.1, pp. 53-81, 2014
  • Saravanan Palani, Arun Kumar T, Impact of greedy and traffic information in geographical routing protocols for vehicular Ad-hoc networks, International Journal of Applied Engineering Research, Vol.9, No.10, pp. 1461-1446, 2014
  • Mythili T, Margret Anouncia S, Evaluating the performance of various segmentation techniques in industrial radiographs, Cybernetics and Information Technologies, Bulgarian Academy of Sciences, Vol.14, No.1, pp. 161-171, 2014
  • Sarasvathi V, Iyengar NChSN, Saha S, An efficient interference aware partially overlapping channel assignment and routing in wireless mesh networks, International Journal of Communication Networks and Information Security (IJCNIS), Vol.6, No.1, pp. 52-61, 2014
  • Geetha Mary A, DP Acharjya, Iyengar NChSN, Privacy preservation in fuzzy association rules using rough computing and DSR, Cybernetics and Information Technologies, Bulgarian Academy of Sciences, Vol.14, No.1, pp. 52-71, 2014
  • Viswanathan P, Venkata Krishna P, A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology, IEEE Journal of Biomedical and Health informatics, Vol.18, No.3, pp. 753-764, 2014
  • Muhammad Rukunuddin Ghalib, Surbhi Bhatnagar, Jayapoorani S, Udisha Pande, Artificial neural network based detection of renal tumors using CT scan image processing, International Journal of Engineering and Technology, Vol.6, No.1, pp. 28-38, 2014
  • Saravanaguru RaK, Arun Kumar T, CoMiTe: Context Aware Middleware Architecture for Time-Dependent Systems: A Case Study on Vehicular Safety, Arabian Journal fro Science and Engineering (AJSE), Vol.39, No.4, pp. 2895-2908, 2014
  • Muhammad Rukunuddin Ghalib, Ghosh DK, Microarray gene expression data mining using high end clustering algorithm based on attraction-repulsion technique, International Journal of Engineering and Technology, Vol.6, No.2, pp. 1139-1146, 2014 Sudip Misra, Venkata Krishna P, Kalaiselvan K, Saritha V
  • Mohammed S Obaidat, Learning automata-based QoS framework for cloud IaaS, IEEE Transaction on Network and Service management, Vol.11, No.1, pp. 15-24, 2014
  • Srimathi C, Eunmi Choi, Jemal H Abawajy, Rajesh N, Sensor grid middleware metamodeling and analysis, International Journal of Distributed Sensor Networks, Volume 2014 (2014), Article ID 805708, 12 pages, 2014
  • Suresh Kumar N, Margret Anouncia S, Prabu M, Fuzzy-based satellite image classification to find greenery and used land, International Journal of Tomography and Simulation, Vol.25, No.1, pp. 75-85, 2014
  • Natarajan P, Soniya N, Krishnan N, Enhancement of MRI brain and CT brain image fusion by adaptive filter, International Journal of Tomography and Simulation, Vol.25, No.1, pp. 130-137, 2014
  • Sanju V, Chiplunkar N, Khalid M, Venkata Krishna P, Design & simulation of SMITHA: A structured and scalable architecture for 3D network on chip systems, Advances in Systems Science and Applications, Vol.14, No.2, pp. 190-198, 2014
  • Gyanadeep N, Dinesh Kumar PVS, Girish Kumar K, Madhu Viswanatham V, Secure speech transformation using enhanced DNA cryptography, International Journal of Applied Engineering Research, Vol.9, No.18, pp. 5171-5180, 2014
  • Sudip Misra, Venkata Krishna P, Saritha V, Harshit Agarwal Aditya Ahuja, Learning automata-based multi-constrained faulttolerance approach for effective energy management in smart grid communication network, Journal of Network and Computer Application, Elsevier Publications, Vol.44, pp. 212-219, 2014
  • CH Pradeep Reddy, Venkata Krishna P, Cross layer based congestion control in wireless mesh networks, Cybernetics and Information Technologies, Bulgarian Academy of Sciences, Vol.14, No.2, pp. 65-80, 2014
  • Arun Kumar S, Arun Kumar T, Ashok Kumar PM, Partnership quality and service climate aspects in the context of GSD project outcome - A case study, International Journal of Applied Engineering Research, Vol.9, No.16, pp. 3203-3223, 2014 Saravanan Palani, Subramaniyaswami V, Sivaramakrishnan N, Arun Prakash M
  • Arun Kumar T, Data mining approach for subscription-fraud detection in telecommunication sector, Contemperory Engineering Sciences, Vol.7, No.11, pp. 515-522, 2014
  • Yokesh Babu S, Kumaresan P, Sourabh Gupta, Waseem Ali Sabel, Smart wearable prototype for visually impaired, ARPN Journal of Engineering and Applied Sciences, Vol.9, No.6, pp. 929-934, 2014
  • Manikandan K, Saleem Durai MA, Active queue management based congestion control protocol for wireless networks, International Journal of Enterrpise Network Management, INDERSCIENCE PUBLICATION, Vol.6, No.1, pp. 30-41, 2014
  • Kedhar M, Rajasekhara Babu M, Mayank G, Abhinivesh M, Parallelized hierarchical expected matching probability for multiple sequence alignment, Journal of Theoretical and Applied Information Technology, Vol.64, No.2, pp. 378-385, 2014
  • Sunil Kumar Reddy T, Venkata Krishna P, Chenna Reddy P, Power aware based workflow model optimization using fuzzy bee colony method, ARPN Journal of Engineering and Applied Sciences, Vol.9,  No.4, 2014
  • Senthil Kumar S, A study on third order runge-kutta techniques for solving practical problems, Walailak Journal of Science and Technology, Vo.11, No.8, pp. 679-686, 2014
  • Kumar PJ, Suganya P, Ilango P, Replication in a simply distributed, mobile Ad-hoc, cloud, internet and peer to peer environment: A multi dimensional analysis and the scope for extension, International Journal of Applied Engineering Research, Vol.9, No.18, pp. 4273-4282, 2014
  • Alagiri I, Madhu Viswanatham V, Venkata Krishna P, Efficient data transfer by mobility adjustment algorithm for clustered mobile Ad-hoc networks, Cybernetics and Information Technologies, Bulgarian Academy of Sciences, Vol.14, No.2, pp. 50-64, 2014
  • Thanapal P, Saleem Durai MA, A survey of mobile cloud computing for extending energy of mobile devices, Applied Mechanics and Materials, Vol.573, pp. 549-555, 2014
  • Vijayan E, Arun Kumar T, Anand M, Automatic cricket highlights generation baesd on key frame and image subtraction, International Journal of Applied Engineering Research, Vol.9, No.18, pp. 4359-4367, 2014
  • Jeyanthi N, Shabeeb H, Saleem Durai MA, Thandeeswaran R, RESCUE: Reputation based service for cloud user environment, International Journal of Engineering, Transactions B: Applications, Vol.27, No.8, pp. 1179-1184, 2014
  • Mythili T, Margret Anouncia S, A novel approach for automatic region of interest extraction in industrial radiographic images, International Journal of Computational Vision and Robotics, Vol.4, No.3, pp. 235-246, 2014
  • Senthil Kumar S, A study on third order runge-kutta techniques for solving practical problems, Walailak Journal of Science and Technology, Vol.11, No.8, pp. 679-686, 2014
  • Mythili T, Margret Anouncia S, An integrated approach for feature extraction and defect detection in industrial radiographic images - case study on welding defects, International Journal of Industrial and Systems Engineering, Vol.7, No.4, pp. 424-448, 2014
  • Aruna E, Abhirami Shri A, Ajanthaa L, Building a Robust Software Based Router, Smart Innovation, Systems and Technologies, Vol. 2, No.28, pp. 181-188, 2014
  • Senthil Kumar S, Editorial: Special issue on analytical and approximate solutions for numerical problems, Walailak Journal of Science and Technology, Vol.11, No.8, pp. 679-686 (i-ii), 2014
  • Saravanan Palani, Arun Kumar T, Fuzzy enabled geographic routing protocol for vehicular Ad hoc networks, International Review on Computers and Software, Vol.9, No.6, pp. 1101-1107, 2014
  • BK Tripathy, Anurag Tripathy, Govindarajulu K, Rohan Bharghav, On kernel based rough intuitionistic fuzzy C-means algorithm and a comparative analysis, Smart Innovation, Systems and Technologies, Vol.1, No.27, pp. 349-359, 2014
  • Vijayarajan V, Dinakaran M, Mayank Lohani, Ontology based object-attribute-value information extraction from web pages in search engine result retrieval, Smart Innovation, Systems and Technologies, Vol.1, No.27, pp. 611-620, 2014
  • Dhinesh Babu LD, Gunasekaran A, Venkata Krishna P, A decision-based pre-emptive fair scheduling strategy to process cloud computing work-flows for sustainable enterprise management, International Journal of Business Information Systems, Vol.16, No.4, pp. 409-430, 2014
  • Deepak Naidu C, Srinivas Koppu, Madhu Viswanatham V, Aarthy SL, Crystography based medical image security with LSB blowfish algorithms, ARPN Journal of Engineering and Applied Sciences, Vol.9, No.8, pp. 1225-1233, 2014
  • Senthil Kumaran U, Ilango P, Secure authentication and integrity techniques for randomized secured routing in WSN, Wireless Networks, Vol.21, No.2, pp. 443-451, 2014
  • Yokesh Babu S, Kumaresan P, Arjun Rajshekhar, Swayamdeepa Sanyal Rohan Puri, Cloud integrated low cost customizable smart medical chair for diagnosis and doctor assistance, International Journal of Intelligent Engineering and Systems, Vol.7, No.3, pp. 10-17, 2014
  • Iyengar NChSN, Gopinath Ganapathy, PC Mogan Kumar, Ajith Abraham, A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment, International Journal of Grid and Utility Computing, Vol.5, No.4, pp. 236-248, 2014
  • Srimathi C, Vaideeswaran J, Meta-scheduler using agents for fault tolerance in computational grid, International Journal of Computational Vision and Robotics (IJCVR) Inderscience publisher, Vol.4, No.4, pp. 294-329, 2014
  • Venkata Krishna P, Sudip Misra, Dheeraj Joshi, Anant Gupta Mohammad S Obaidat, Secure socket layer certificate verification: A learning automata approach, Security and Communication Networks, Vol.7, No.11, pp. 1712-1718, 2014
  • Ashok Kumar PM, Arun Kumar S, A petri net-based approach for event detection in pedestrian crossing sequence, Indian Journal of Science and Technology, Vol.7, No.4, pp. 439-446, 2014
  • Muhammad Rukunuddin Ghalib, Babyna Nandeibam, DK Ghosh, Microarray gene expression data analysis through a hybrid clustering algorithm incorporated with validation techniques, International Journal of Engineering and Technology, Vol.6, No.4, pp. 1636-1644, 2014
  • Indhumathi R, Lakshmanan K, Edge-disjoint fibonacci trees in Hypercube, Journal of Computer Networks and Communications, Vo. 2014, Article ID. 498349, 4 pages, 2014
  • Arun Kumar S, Prabakar Rontala S, Xinliang Zeng, A combined fuzzy DEMATEL and fuzzy TOPSIS approach for evaluating GSD project outcome factors, Neural Computing and Applications, 2014
  • Muhammad Rukunuddin Ghalib, Ankita Bihani, Ghosh DK, A novel method for analysis of microarray cancer data using genetic algorithms and constructive neural networks, International Journal of Applied Engineering Research, Vol.9, No.21, pp. 9465-9478, 2014
  • Muhammad Rukunuddin Ghalib, Ghosh DK, A novel Rough-Fuzzy based clustering algorithm integrating reformulated fuzziness parameter for microarray gene expression analysis, International Journal of Applied Engineering Research, Vol.9, No.21, pp. 10821-10839, 2014
  • Yokesh Babu S, Ashish Kumar Jaiswal, Kumaresan P, A Smart Multi-purpose Remote Controlled Digital Clock, International Journal of Applied Engineering Research, Vol.9, No., pp. 3163-3172, 2014
  • Srimathi C, Subaji M, Anu Soosan Baby, Deepu Raveendran, A study on Distributed Data Mining frameworks, ARPN Journal of Engineering and Applied Sciences Vol.9, No.12, pp. 2513-2520, 2014
  • Ramesh T, Santhi V, A survey of influence propagation of websites for modeling and simulation, International Journal of Applied Engineering Research, Vol.9, No.23, pp. 20891-20898, 2014
  • Manjunatha HC, Venkatesan M, A survey on community detection techniques & software toolkits for social network analysis, International Journal of Applied Engineering Research, Vol.9, No.23, pp. 19429-19437, 2014
  • Saritha V, Madhu Viswanatham V, An efficient cross layer based channel reservation method for vehicular networks, International Journal of Communication systems, Vol.27, No.12, pp. 4249-4264, 2014
  • Rohan Kulkarni, Sahil Karkhanis, Abhishek Tripathy, Yokesh Babu S, Automated anti-theft and accident detection system for the elderly, International Journal of Applied Engineering Research, Vol.9, No.20, pp. 7653-7666, 2014
  • Ananda Kumar S, Ilango P, Deep Dwivedi, Low-power and cost effective sensor network for efficient water Resrouce management practices - A case study, International Journal of Applied Engineering Research, Vol.9, No.23, pp. 22887-22897, 2014
  • Govinda K, Shruthi Hiremath, Rainfall prediction using artificial neural network, International Journal of Applied Engineering Research, Vol.9, No.23, pp. 21243-21254, 2014
  • Ramanathan L, Swarnalatha P, Vijayakumar K, Kaushik S Prabu S, Students performance prediction based on multiple classifiers, International Journal of Applied Engineering Research, Vol.9, No.21, pp. 10717-10725, 2014
  • Swarnapriya RM, Prabu S, Dharun VS, Techniques for detecting the cloud cover in high resolution Multi-Temporal satellite Imagery: A comparison, International Journal of Applied Engineering Research, Vol.9, No.21, pp. 10889-10897, 2014
  • Govinda K, Dev Gaurav, User identity management protocol in cloud computing paradigm, International Journal of Applied Engineering Research, Vol.9, No.23, pp. 21231-21242, 2014
  • Aarthy SL, Prabu S, A comparative study of image segmentation and classification in digital mammograms, International Journal of Applied Engineering Research, Vol.9, No.23, pp. 22977-22996, 2014
  • Hemalatha S, Margret Anouncia S, A review of texture based segmentation approaches for remotely sensed images, International Journal of Applied Engineering Research, Vol.9, No.21, pp. 10329-10336, 2014
  • Rajeswari C, Sathiyabhama B, Geetha Mary A, Prashant P Data perturbation using confidence interval for variance, International Journal of Applied Engineering Research, Vol.9, No.23, pp. 20757-20771, 2014
  • Senthil Kumaran U, Ilango P, Evolution of key management and variations of random pre key distribution in wireless sensor network: Survey, International Journal of Applied Engineering Research, Vol.9, No.21, pp. 11681-11688, 2014 Swathi JN, Rajen B Bhatt, Ilango P, Khalid M
  • Tripathy BK, Induction of fuzzy decision trees and its refinement using gradient projected neuro fuzzy decision tree, International Journal of advanced intelligence Paradigms, Vol.6, No.4, pp. 346-369, 2014
  • Sasikumar Gurumurthy, Senthilkumar NC, muhammad Rukunuddin Ghalib, A Study of Digital Signal processing application for Remote Patient Monitoring System using live EEG Data transmission, International Journal of Applied Engineering Research, Vol.9, No.18, pp. 4683-4692, 2014
  • Senthilkumar NC, muhammad Rukunuddin Ghalib, Sasikumar Gurumurthy, Dynamic and Effective stock analyzer using Data Mining Technique, International Journal of Applied Engineering Research, Vol.9, NO.20, pp. 6799-6812, 2014
  • Ilango P, Vijayakumar K, Rajasekhara Babu M, Instance Based Clustering for Imputation of Missing Data in KDD, International Journal of Communication Networks and Distributed Systems, Inderscience Publishers, Geneva, Vol.2, No.1, pp. 69-81, 2014
  • Iyengar NChSN, Arindam Banerjee Gopinath Ganapathy, A Fuzzy logic based Defending Mechanism against DDoS Attacks in Cloud Computing Environment, International Journal of Communication Networks and Information Security (IJCNIS), Vol.6, No.3, pp. 233-245, 2014
  • Prabakaran N, Naresh K, Jagadeesh Kannan R, Fusion Centric Decision Making for Node Level congestion in wirelless sensor networks, Advances in Intelligent systems and Computing, Springer International Publishing/Switzerland, 248 Vol.1, 321-329, 2014
  • Pradeep Reddy CH, Jagadeesh Gopal, Arun Kumar S, Efficient Bandwidth Utilization with Congestion Control for Wireless Mesh Networks, Indian Journal of Science and Technology, Vol.7, No.11, pp. 1780-1787, 2014
  • Senthil J, Arumugam S, Brijendra Singh, Sanklan Saxena, Optimization of Software production using Generative Programming, Australian Journal of Basic and Applied Sciences, Vol.2, No.1, pp. 126-131, 2014
  • Senthil J, Brijendra Singh, Gaurav Doshi, Ishan Gupta Mohit Kumar, Automatic Form Generation from Database based on Generative Programming, Australian Journal of Basic and Applied Sciences, Vol.8, No.1, pp. 132-136, 2014
  • Senthil J, Swathi JN, Brijendra Singh, Rajul B Krishna S, Supervised Machine Learning Tech. for Risk Identification, Australian Journal of Basic and Applied Sciences, pp. 68-71, 2014
  • Ashok Arora, Sahil Karkhanis, Geetha Mary A, An Extended Framework for Enhanced Hybrid System using Database as a Service, International Journal of Applied Engineering Research, Vol. 9, No.21, pp. 9057-9068, 2014
  • Rajeswari C, Sathiyabhama B, Geetha Mary A, Putta Prashanth, Data perturbation using Confidence interval for Variance, International Journal of Applied Engineering Research, Vol. 9, No.23, pp. 20757-20771, 2014
  • Muhammad Rukunuddin Ghalib, Aadhya Saravgi, Cosmica Mahapatra, Analysis of Microarray Gene Expression Data Clustering algorithms with different standard cluster validity techniques, International Journal of Applied Engineering Research, Vol.9, No.20, pp. 7001-7016, 2014
  • TK Das, DP Acharjya, A Decision Making Model using Soft Set and Rough Set on Fuzzy Approximation Spaces, International Journal of Intelligent Systems Technologies and Applications, Vol.13, No.3, pp. 170-186, 2014
  • Harsh Arora, Arindam Banarjee, Rahul Jidge, A heuristic approach to variable ordering for logic synthesis engine design: algorithmic insight, International Journal of Circuits and Architecture Design, Vol.2, No.1, pp. 141-155, 2014
  • Akansha Srivastave, Sumithra Sriram, Santhi V, Analysis of Signal in Discrete Walsh and Hadamard Transform Domain for Visible Watermarking of Digital Images, International Journal of Applied Engineering Research, Vol.9, No.22, pp. 14179-14191, 2014
  • Ramesh T, Santhi V, Influence of Web Videos on Websites - A Survey, International Journal of Applied Engineering Research, Vol.9, No.23, pp. 20891-20897, 2014
  • Jayanth Kumar K, Vinvith Kumar M, Vairamuthu S, Selvarani B, A Framework for Talk Value Transfer among Diverse Mobile Service Providers, International Journal of Applied Engineering Research (IJAER), Vol.9, No.19, pp. 6401-6411, 2014
  • Sudha S, Madhu Viswanatham V, ACAFD: Secure and Scalable Access Control with Assured File Deletion for Outsourced Data in Cloud, Journal of ICT Research and Applications, Vol.8, No.1, pp. 18-30, 2014
  • Hari Priya Y, Bindu Pavani KV, Lavanya S, Madhu Viswanatham V, Feature Based Image Stitching on Aerial Images, International Journal of Applied Engineering Research, Vol.8, No.19, pp. 2237-2240, 2014
  • Prabu S, Selvakumar K, Integration of Artificial Neural Networks and Biometric Techniques for Individual Authentication, International Journal of Applied Engineering Research, Vol.9, No.22, pp. 13511-13537, 2014
  • Gopinath MP, Prabu S, A Comparative Study of Techniques involved in Thermal Image Diagnostic System, International Journal of Applied Engineering Research, Vol.9, No.24, pp. 26393-26416, 2014
  • Misra S, Venkata Krishna P, Saritha V, Agarwal H Shu L Obaidat MS, Efficient Medium Access control for Cyber-Physical systems with Heterogeneous Networks, IEEE Systems Journal, Vol.  No.9, No.1, pp. 22-30, 2015
     

2013

  • Ramakrishnan R, Manthira Moorthi S, Prabu S, Swarnalatha P, Comparative Analysis of Various Methods for Preprocessing of Satellite Imagery, International Journal of Engineering and Technology,(0975-4024), Volume 5,No 1,.pp.431-437, 2013
  • Yuvarani M, Iyengar NChSN, Interactive query expansion using concept-based directions finder based on Wikipedia, International Arab Journal of Information Technology, Vol.10, No.6, pp. 4551-4558, 2013
  • Misra S, Venkata Krishna P, Saritha V, Obaidat M, Learning automata as a utility for power management in smart grids, IEEE Communications Magazine, Vol. 51, No. 1, pp. 98-104; 2013
  • BK Tripathy, Jayaram Reddy A, Manusha GV, Mohisin GS, Improved algorithms for anonymization of set-valued data, Advances in Intelligent Systems and Computing, Vol. 177, pp. 581-594, 2013
  • Neha Tekriwal, Madhumitha, Venkata Krishna P, Integration of safety and smartness using cloud services: An insight to future, Innovations and Advances in Computer, Information, Systems sciences and Engineering, Lecture Notes in Electrical Engineering, Vol. 152, pp. 293-303, 2013
  • BK Tripathy, SS Gnatayat, Conceptual application of list theory to data structures, Advances in Intelligent Systems and Computing, Vol. 177, pp. 551-560, 2013
  • Shrey Gupta, Rajkumar S, Vijayarajan V, Marimuthu K, Quantitative analysis of various image fusion techniques based on various metrics using different multimodality medical images, International Journal of Engineering and Technology, Vol. 5, No. 1; ISSN. 0975-4024; pp. 133-141, 2013
  • Santhi V, Arul Mozhivarman P, Hadamard transform based adaptive visible/invisible watermarking scheme for digital images, Information Security Technical Report, pp. 1-13, 2013
  • Srimathi C, Veeranjaneyulu Gangineni,  Performance analysis of replication mechanism using mobile agent in computational grid using WADE, International Journal of Information and Communication Technology, Vol. 5, No.2, pp. 205-215; Inderscience Publishers, 2013
  • Govinda K, Sathiamoorthy E, Secure key sharing for group communication under community cloud, Journal of Theoretical and Applied Information Technology, Vol. 48, No.2, pp. 674-679; ISSN: 1817-3195, 2013
  • Lakshmanan K, Anand M, Kamala Krithivasan, On the trade-off between ambiguity and complexity in contextual languages, Fundamenta Informaticae, Vol.122, No.4, pp. 315-326; ISSN: 0169-2968 (Print), 1875-8681 (Online), 2013
  • Rajkumar R, Iyengar NChSN, Peer-to-Peer JXTA Architecture for Continuing Mobile Medical Education Incorporated in Rural Public Health Centers, Osong Public Health and Research Perspectives, Vol. 4, No.2, pp. 99-106, 2013 Venkata Krishna P, Sudip Misra, Saritha V, Harshit Agarwal
  • Naveen Chilamkurti, Learning automata-based virtual backoff algorithm for efficient medium access in vehicular ad hoc networks, Journal of Systems Architecture, Vol.59, No.10, pp. 1-8, 2013
  • Suresh Kumar N, Margret Anouncia S, Prabu M, Application of satellite remote sensing to find soil fertilization by using soil colour, International Journal of Online Engineering Vol. 9, No.2, pp. 2013
  • Krishnakumar V, Rajasekhara Babu M, A methodology to extract information from the brain waves in a multi-core environment, International Journal of Engineering and Technology, Vol.5, No.2, pp. 986-991; ISSN: 0975-4024, 2013
  • Manjunath KG, Jaisankar N, A survey on rear end collision avoidance system for automobiles, International Journal of Engineering and Technology, Vol. 5, No.2, pp. 1368-1372; ISSN: 0975-4024, 2013
  • Mayank Singh Rana, Sendhil Kumar KS, Jaisankar N, Comparison of probabilistic optimization algorithms for resource scheduling in cloud computing environment, International Journal of Engineering and Technology, Vol. 5, No.2, pp. 1419-1427; ISSN: 0975-4024, 2013
  • Govinda K, Sathiamoorthy E, Surbhit Agarwal, Secure key exchange for cloud environment using cellular automata with triple-des and error-detection, International Journal of Engineering and Technology, Vol. 5, No.2, pp. 1004-1009; ISSN: 0975-4024, 2013
  • Manjunath KG, Jaisankar N, Shreedevi KG, An intelligent intrusion detection for detecting unauthorized malware over the network, International Journal of Engineering and Technology, Vol. 5, No.2, pp. 1373-1380; ISSN: 0975-4024, 2013
  • Balasubramanian V, Margret Anouncia S, George Abraham, SaGe framework - Mapping of SARSA to adaptive e-learning using learning styles, International Journal of Engineering and Technology, Vol. 5, No.2, pp. 1272-1280; ISSN: 0975-4024, 2013
  • Pratik Nelge, Govinda K, Mahesh M, Database audit over cloud environment using forensic analysis algorithm, International Journal of Engineering and Technology, Vol. 5, No.2, pp. 696-699; ISSN: 0975-4024, 2013 Parul Upadhyaya, Vimal Anjana, Vivek Jain, Marimuthu K
  • Ganesh Gopal D, Practical system for querying encrypted data on the cloud, International Journal of Engineering and Technology, Vol. 5, No.2, pp. 1878-1881; ISSN: 0975-4024, 2013
  • Khushboo C, Rajasekhara Babu M, Energy and run time evaluation for compiler methods using dynamic voltage-frequency scaling on Xscale architecture, International Journal of Engineering and Technology, Vol. 5, No.2, pp. 1870-1877; ISSN: 0975-4024, 2013
  • Deep Dwivedi, Yokesh Babu S, Kumaresan P, Low-cost multiterrainrescuing 4-legged bot prototype, International Journal of Engineering and Technology, Vol. 5, No.2, pp. 888-899: ISSSN: 0975-4024, 2013
  • Charanya R, Aramudhan M, Mohan K, Nithya S, Levels of security issues in cloud computing, International Journal of Engineering and Technology, Vol. 5, No.2, pp. 1912-1920; ISSSN: 0975-4024, 2013
  • Murali S, Jaisankar N, Integrated development environment for rover, International Journal of Engineering and Technology, Vol. 5, No.2, pp. 1207-1213; ISSSN: 0975-4024, 2013
  • Prabu S, Swarnalatha P, Ranjith D, An efficient method for identification of faces for 2D images, International Journal of Engineering and Technology, Vol. 5, No.2, pp. 1010-1015; ISSSN: 0975-4024, 2013
  • Rajasekhara Babu M, Venkata Krishna P, Khalid M, A framework for power estimation and reduction in multi-core architectures using basic block approach, International Journal of Communication Networks and Distributed Systems, Vol.10, No.1, pp.40-51; DOI : 10.1504 / IJCNDS.2013.050506, 2013
  • Aditya Ahuja, Venkata Krishna P, Saritha V, Analysis of a refined model for the IEEE 802.11 distributed coordination function, International Journal of Communication Networks and Distributed Systems, Vol.10, No.1, pp.66-82; DOI:10.1504/IJCNDS.2013.050508, 2013
  • Balasubramanian V, Margret Anouncia S, A narrative review of research on learning styles and cognitive strategies, Journal of Theoretical and Applied Information Technology, Vol.52, No.1, pp. 23-29; ISSN: 1992-8645, 2013
  • Yuvarani M, Iyengar NChSN, Kannan A, Improved concept-based query expansion using Wikipedia, International Journal of Communication Networks and Distributed Systems, Vol.11, No.1, pp. 26-41; Inderscience Publishers, 2013
  • Santhi V, Arun Kumar T, Arulmozhivarman P, Adaptive visible watermarking in Hadamard domain for digital images, International Journal of Information and Computer Security, Vol.5, No.3, pp. 202-223, Inderscience Publishers, 2013
  • Balasubramanian V, Margret Anouncia S, George Abraham, Reinforcement learning approach for adaptive e-learning systems using learning styles, Information Technology Journal , Vol. 12, No.12, pp. 2306-2314, Science alert, 2013
  • Aju D, Bimal Kumar Ray, Quantification and analysis of 3D magnetic resonance image brain tumor, International Journal of Tomography & Statistics, Vol.24, No.3, 2013
  • Santhi V, Arulmozhivarman P, Adaptive visible watermarking for digital images using SURF technique in wavelet domain, International Journal of Tomography & Statistics, Vol.24, No.3, 2013
  • Saritha V, Madhu Viswanatham V, An efficient cross layer based channel reservation method for vehicular networks, International Journal of Communication Systems, Wiley Inter Science, 2013
  • Deepanshi Garg, Prithvi Rajan M, Jaisankar N, Krishi-services-web services based solution for agricultural issues, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2362-2365, ISSN: 0975-4024 (Jun-July), 2013
  • Arindam Banarjee, Naveen Bommu, Prateek Agarwal, Jaisankar N, Design of manufacturing execution system for FMCG industries, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2366-2374, ISSN: 0975-4024 (Jun-July), 2013
  • Ramanathan L, Dhanda S, Suresh Kumar D, Predicting students' performance using modified ID3 algorithm, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2491-2497, ISSN: 0975-4024 (Jun-July), 2013
  • Sathyaraj R, Prabu S, A survey-quality based object oriented software fault prediction, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2349-2351, ISSN: 0975-4024 (Jun-July), 2013
  • Aishwarya R, Gayathri P, Jaisankar N, A method for classification using machine learning technique for diabetes, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2903-2908, ISSN: 0975-4024 (Jun-July), 2013
  • Ramkinkar Singh, Vipra Gupa, Mohan K, Dynamic federation in identity management for securing and sharing personal health records in a patientcentric model in cloud, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2201-2209, ISSN: 0975-4024 (Jun-July), 2013
  • Dhanaraj Cheelu, Rajasekhara Babu M, Venkata Krishna P, A study of vertical handoff decision strategies in heterogeneous wireless networks, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2541-2554, ISSN: 0975-4024 (Jun-July), 2013
  • Govinda K, Pavan Kumar A, Gangi Pratap Reddy, On-demand secure streaming of multimedia data over cloud, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2101-2107, ISSN: 0975-4024 (Jun-July), 2013
  • Persi Pameela I, Gayathri P, Jaisankar N, A fuzzy optimization technique for the prediction of coronary heart disease using decision tree, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2506-2514, ISSN: 0975-4024 (Jun-July), 2013
  • BK Tripathy, Satapathy MK, Chowdhuri PK, Intuitionistic fuzzy lattices and intuitionistic fuzzy boolean algebras, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2352-2361, ISSN: 0975-4024 (Jun-July), 2013
  • Chaitanya Kumar Singh, Srinivas Koppu, Madhu Viswanatham V, E-RIHT: Enhanced Hybrid IP Traceback Scheme with 16-bit marking field, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2594-2600, ISSN: 0975-4024 (Jun-July), 2013
  • Muhammad Rukunuddin Ghalib, Shivam Vohra, Sunish Vohra, Akash Juneja, Mining on car database employing learning and clustering algorithms, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2628-2635, ISSN: 0975-4024 (Jun-July), 2013
  • Arshad Mohammed, Sarath Mohan, Sasank Ungarala, Abdul Gaffar H, Hybrid binary exponential back-off mechanism for wireless sensor networks, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2391-2397, ISSN: 0975-4024 (Jun-July), 2013
  • Muhammad Rukunuddin Ghalib, Swarnalatha P, Karan Thakkar, Virtual machine migration with an open source hypervisor, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2671-2677, ISSN: 0975-4024 (Jun-July), 2013
  • Mohammed Masoom Rabbani, Ilango P, Enhancing accountability for distributed data sharing in the cloud, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2529-2533, ISSN: 0975-4024 (Jun-July), 2013
  • Sasikumar Gurumurthy, Vudi Sai Mahit, Rittwika Ghosh, Analysis and simulation of brain signal data by EEG signal processing technique using MATLAB, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2771-2776, ISSN: 0975-4024 (Jun-July), 2013
  • Natarajan P, Debsmita Ghosh, Kenkre Natasha Sandeep, Sabiha Jilani, Detection of tumor in mammogram images using extended local minima threshold, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2310-2315, ISSN: 0975-4024 (Jun-July), 2013
  • Gayathri P, Jaisankar N, Comprehensive study of heart disease diagnosis using data mining and soft computing techniques, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2947-2958, ISSN: 0975-4024 (Jun-July), 2013
  • Monica Shekar, Saravanaguru RaK, A case study on semantic web search using ontology modeling, International Journal of Engineering and Technology, Vol. 5, No.3, pp. 2342-2348, ISSN: 0975-4024 (Jun-July), 2013
  • DP Acharjya, Debarati Bhattacharjee, A rough computing based performance evaluation approach for educational institutions, International Journal of Software Engineering and its Applications, Vol.7, No.4, pp. 331-348; 2013
  • Senthilnathan P, Kalaiarasan C, A joint design of routing and resource allocation using QoS monitoring agent in mobile ad-hoc networks, Journal of Theoretical and Applied Information Technology, Vol. 55, No.2, pp. 224-231; ISSN. 1992-8645, 2013
  • Maiti A, BK Tripathy, Remote laboratories: Design of experiments and their web implementation, Educational Technology and Society, Vol. 13, No.3, pp. 220-233; ISSN. 1436-4522, 2013
  • Dhanaraj Cheelu, Rajasekhara Babu M, Venkata Krishna P, User preferences and expert opinions based vertical handoff decision strategy, Journal of Theoretical and Applied Information Technology, Vol. 55, No.1, pp. 53-59; ISSN. 1992-8645, 2013
  • Venkatesan M, Arun Kumar T, A multiple window-based co-location pattern mining approach for various types of spatial data, International Journal of Computer Applications in Technology, Vol. 48, No.2, pp. 144-154., 2013
  • Srimathi C, Vaideeswaran J, Implementation of the fault tolerance in computational grid using agents by meta-modelling approach, International Journal of Communication Networks and Distributed Systems, Vol.10, No.4, pp. 335-350, 2013 Aman Sharma, Natarajan P, Swarnalatha P, BK Tripathy 
  • Krishnan N, Image transformation using modified K-means clustering algorithm for parallel saliency map, International Journal of Engineering and Technology, Vol. 5, No.4, pp. 3328-3333, ISSN. 0975-4024, 2013
  • Rajkumar R, Iyengar NChSN, Dynamic Integration of Mobile JXTA with Cloud Computing for Emergency Rural Public Health Care, Osong Public Health and Research Perspectives, Vo.4, No.5, pp. 255-264, Elsevier Publications, 2013
  • Bhatt Alok Nileshchandra, Rajasekhara Babu M, J Bhatt Anuja, Automation testing software that aid in efficiency increase of regression process, Recent Patents on Computer Science, Vol. 6, No. 2, pp. 107-114(8), 2013
  • Jaya Subalakshmi R, Haleema PK, Iyengar NChSN, Enhancing a traditional health care system of an organization for better service with agent technology by ensuring confidentiality of patients' medical information, Cybernetics and Information Technologies, Vol. 13, No.3, pp. 140-156, ISSN: 1314-4081, 2013
  • Margret Anouncia S, Clara Madonna LJ, Jeevitha P, Nandhini R, Design of a diabetic diagnosis system using rough sets, Cybernetics and Information Technologies, Vol. 13, No.3, pp. 124-139, ISSN: 1314-4081, 2013
  • Senthil J, Arumugam S, Shah P, Rahul DE, A search algorithm on a relational dataset containing algorithms to facilitate real time code generation, Journal of Theoretical and Applied Information Technology, Vol. 56, No.2, pp. 244-251, ISSN: 1992-8645, 2013
  • Ankita Bihani, Pooja Kabra, Supriya Moond, Optimized e-Transportation system customized to user need, International Journal of Engineering and Technology, Vol.5, No.3, pp. 2328-2333, 2013
  • Anand M, Ramya G, A study on various bio-inspired computing models, Jounal of Theoretical and Applied Information Technology, Vol. 57, No.3, pp. 418-423; ISSN: 1992-8645, 2013
  • Annapurna J, Aswarni Kumar Cherukuri, Exploring attributes with domain knowledge in formal concept analysis, Journal of Computing and Information Technology', Vol.21, No.2, pp. 109-123, 2013
  • Prabu S, Ramakrishnan R, Manthira Moorthi S, Swarnalatha P, Non parametric model re-sampling techniques for geometric correction of remote sensing satellite images, International Journal of Applied Engineering Research, Vol. 8, No. 14, pp. 1611-1621, 2013 Senthil J, Arumugam S, Brijendra Singh, Prashant Pandey  Akash Giri
  • Akshay Sharma, Use of Artificial Intelligence in automation of sequential steps of software development / production, Journal of Theoretical and Applied Information Technology, Vol. 57, No.3, pp. 380-387, ISSN: 1992-8645, 2013
  • Yokesh Babu S, Saleem Durai MA, A Novel Adatable framework to handle hetrogenity issues in WSN Hardware and system software-A Comparative analysis and proposal, International Journal of Applied Engineering Research, Vol. 8, No. 15, pp. 1749-1765;, 2013
  • Dhanaraj Cheelu, Rajasekhara Babu M, Venkata Krishna P, A fuzzy-based intelligent vertical handoff decision strategy with maximised user satisfaction for next generation communication networks, International Journal of Process Management and Benchmarking, Vol.3, No.4, pp. 420-440; DOI: 10.1504/IJPMB.2013.058268, 2013
  • Ezhilmaran D, Sudhanshi Upadhyay, Social computing: An intelligent and responsive system, International Journal of Applied Engineering Research, Vol. 8, No. 16, pp. 1945-1952;, 2013
  • Vijayarajan V, Dinakaran M, Feature based image retrieval using fused sift and surf features, International Review of Computers and spftwares, Vol. 8, No.10, pp. 2013 Bijlu S Thomas, Srinivas Koppu, Madhu Viswanatham V, Suzanna Manoj Williums 
  • Deepak C, Optical Character and Object Recognition using Artificial Neural Network, International Journal of Applied Engineering Research, Vol.8, No.9, pp. 1021-1033, 2013
  • Sudha S, Madhu Viswanatham V, Addressing Security and Privacy Issues in Cloud Computing, Journal of Theoretical and Applied Information Technology, Vol. 48, No.2, pp. 708-719, 2013 Sanjiban Sekhar Roy, Omsai Jadhav, Saptarshi Chakraborthy, Swapnil Saurav
  • Madhu Viswanatham V, Multicriteria decision analysis for intrusion detection data, Advances in Intelligent Systems and Computing, Vol.174, pp. 667-672, 2013
  • Arun Kumar S, Arun Kumar T, An Adaptive neuro fuzzy approach for evaluation of team-level service climate in GSD projects, Neural Computing and Applications, Vol.23, No.8 pp. 2013
  • Arun Kumar S, Arun Kumar T, Measuring IT service quality in the context of team level service climate and GSD project outcome relationship, Australian Journal of Basic and Applied Sciences, Vol.7, No.8, pp. 374-385, 2013
  • Venkatesan M, Arun Kumar T, An Improved Bayesian Classification Data Mining Method for Early Warning Landslide Susceptibility Model Using GIS, Advanced in Intelligent Systems and computing, Vol.202, No.2, pp. 277-288, 2013
  • Saravanaguru RaK, Arun Kumar T, VCR: Vehicular Cloud for Road side scenarios, Advances in Computing and Information Technology, Vol.178, pp. 541-552, 2013
  • Senthil Kumar K, DP Acharjya, Arun Kumar T, Trust Evaluation using Fuzzy proximity relation with ordering for MANET, International Journal of Trust Management in Computing and Communications, Inderscience, Vol.1, No.2, pp. 105-120, 2013
  • Krithika LB, Anand M, Opinion mining and summarization of company reviews, Journal of Theoretical and Applied Information Technology, Vol.57, No.2, pp.184-190, 2013
  • Gaurav Kumar Nayak, Swathi JN, Ilango P, Development and Comparative Analysis of Fuzzy Inference Systems for Predicting Customer Buying Behavior, International Journal of Engineering and Technology, Vol.5, No.5, pp. 4093-4108, 2013
  • Chiranjilal Chowdhary, Chandra Mouli PVSSR, Image Registration with New System for Ensemble of Images of Multi-Sensor Registration, World Applied Sciences Journal, Vol. 26, No.1, pp. 45-50, 2013
  • Santhi V, Arun Kumar T, Arulmozhivarman P, Adaptive Invisible Watermarking Model for Securing Ownership Rights of Digital Images using SIFT features in Bi-orthogonal Wavelet domain, International Journal of Tomography and Simulation, Vol. 23, No.2, pp. 42-62, 2013
  • Swarnalatha P, BK Tripathy, Depth Computatuion using bit plane with clustering techniques for satellite images, International journal of earth sciences and engineering, Vol.6, No.1, pp.13-21, 2013
  • Prabu S, Swarnalatha P, Ranjith D, Efficient Method for Identification of Faces for 2D Images, International Journal of Engineering and Technology, Vol.5, No.2, pp. 1010-1015, 2013
  • Gaganjit Singh, Swarnalatha P, BK Tripathy, Swetha Kakani, Convex Hull Based WBC Computation for Leukaemia Detection, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol.2, No.5, pp. 1843-, 2013
  • Mythili T, Margret Anouncia S, An Integrated Aproach for Feature Extraction and Defect Detection in Industrial Radiographic Images-Case study on Welding Defects, International Journal of Industrial and Systems Engineering, 2013
  • Mythili T, Margret Anouncia S, A Novel Approach for Automatic Region of Interest Extraction (AROIE)in Industrial Radiographic Images, International Journal of Computational Vision and Robotics (IJCVR) Inderscience publisher, 2013
  • Yokesh Babu S, Saleem Durai MA, A Novel adaptable framework to handle heterogeneity issues in WSN hardware and system software: A comparative analysis and proposal, International Journal of Applied Engineering Research, Vol.8, No.15, pp. 1749-1765, 2013
  • Anupriya E, Iyengar NChSN, Peer-to-Peer coordinated virtual clustering of documents for information retrieval, International Journal of Information Processing: Management, Vol.4, No.6, pp. 86-98, 2013 Jeyanthi N, Uttara B, Sravani M, Venu Tiwari
  • Iyengar NChSN, Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP, International Journal of Communiucation, Networks and Distributed Systems(IJCDNS), Inderscience, Vol. 11, No.3, pp. 262-279, 2013
  • Jaya Subalakshmi R, Haleema PK, Iyengar NChSN, Enhancing Traditional Health Care system of an organization for better service with agent technology by ensuring Confidentiality of patient medical information, Cybernetics & Information Technologies, Bulgaria, Vol.13, No.3, pp. 140-156, 2013
  • Jeyanthi N, Iyengar NChSN, Mohan Kumar PC, Kannammal A, An Enhanced entropy approach to detect and prevent DDOS attacks in cloud computing, International Journal of Communication Networks and Information Security (IJCNIS), Vol.5, No.2, pp.110-119, 2013
  • Jeyanthi N, Iyengar NChSN, EOS: An efficient and scalable mechanism for escaping DDOS attacks in cloud computing, Cybernetics & Information Technologies, Bulgaria, Vol.13, No.1, pp. 46-60, 2013 Syed Perwez, Hamza Mohd Zubair, Muhammad Rukunuddin Ghalib, Kauser Ahmed P
  • Mohammed Iftekar, Association rule mining technique for psychometric personality testing and behaviour prediction, International Journal of Engineering and Technology, Vol. 5, No.5, pp. 4349-4361, 2013
  • Ashita Paliwal, Shivika Bisen, Muhammad Rukunuddin Ghalib, Sharmila N, An improved segmentation technique based on Declaunay triangulations for breast infiltration/tumor detection from mammograms, International Journal of Engineering and Technology, Vol.5, No.3, pp. 2565-2574, 2013
  • Murali S, Jaisankar N, Integrated Development Environment for Rover, International Journal of Engineering and Technology (IJET), Vol.5, No.2, pp. 1207-1213, 2013
  • Santhi H, Jaisankar N, Multipath on-demand routing for large scale multi hop networks, Cubernetics and Information Technologies, Vol.12, 2013
  • Dhinesh Babu LD, Venkata Krishna P, Versatile Time-Cost Algorithm (VTCA) for Scheduling Non-Preemptive Tasks of Time critical workflows in cloud computing  systems, International Journal of communication networks and distributed systems, Inderscience Publishers, Vol.11, No.4, pp. 390-411, 2013
  • Viswanathan P, Venkata Krishna P, Medical Image spatial fusion watermarking system, Volume 222 LNEE, Inderscience Publishers, Vol.2, pp. 453-464, 2013
  • Sakthi Ganesh M, Venkata Krishna P, Improving Frequent Link Failure Detection in VANET, International Journal of Engineering and Technology, Vol.5, No.2, pp. 1882-1886, 2013
  • Dhinesh Babu LD, Venkata Krishna P, Honey Bee Behaviour inspired load balancing of Task in cloud Computing Environments, Applied soft computing Elsevier, Vol. 13, No.5, pp. 2292-2303, 2013
  • Dhinesh Babu LD, Venkata Krishna P, Applying Operations Management models for facility location problem in cloud computing, International Journal of Services and operations management, Inderscience publishers, Vol15, No.1, pp. 1-27, 2013
  • Nanda R, Venkata Krishna P, DOM-WLAN: a traffic analysis based approach for detecting malicious activities on wireless networks, Security of information and networks, ACM, pp. 421-424, 2013
  • Vanmathi C, Prabu S, A Survey of State of the Art techniques of Stenography, International Journal of Engineering and Technology, Vol.5, No.1, pp. 376-379, 2013
  • Sanjiban Sekhar Roy, Network analysis of transcription factors for nuclear reporgramming into induced pluripotent stem cell using bio informatics, Cell Journal, 2013
  • Rohan Bhargava, BK Tripathy, Kernel based rough-fuzzy C-Means, Pattern Recognition and Machine Intelligence, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol.8251, pp. 148-155, 2013
     

2012

  • Rajkumar R, Iyengar NChSN,  JXTA: A Technology Facilitating Mobile P2P Health Management System, Osong Public Health and Research Perspectives, Vol. 3, No. 3, pp. 165 - 169, 2012
  • Arun Kumar T, Saravanaguru RaK,   Context aware middleware model for handling vehicular safety issues, Journal of Computer Science, Vol. 8; No. 8, pp. 1244 - 1252, 2012
  • BK Tripathy, GK Panda, Arnab Mitra,  Some concepts of incomplete multigranulation based on rough intuitionistic fuzzy sets, Advances in Intelligent and Soft Computing, Vol. 166, pp. 683 - 693, 2012
  • Jayanthi N, Iyengar NChSN,  An entropy based approach to detect and distinguish DDoS attacks from flash Crowds in VoIP Networks, International Journal of Network Security, Vol. 14, No. 5, pp. 257-269, 2012
  • Sudip Misra, Venkata Krishna P, Akhil Bhiwal, Amardeep Singh Chawla, A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks, The Journal of Super Computing, Vol. 32, No.1, pp. 4-23, 2012
  • Sudip Misra, Venkata Krishna P, Saritha V,  An efficient approach for distributed channel allocation with learning automata-based reservation in cellular networks, Simulation, Vol. 88, No.10, pp. 1166-1179 2012
  • Saleem Durai MA, DP Acharjya, Kannan A, Iyengar NChSN, An intelligent knowledge mining model for kidney cancer using rough set theory, International Journal of Bioinformatics Research and Applications, Vo. 8, No.5, pp. 417-435, 2012
  • Bhuvaneshwari S, Vaideki KJ, Kumar K, Margret Anouncia S, Problem frames analysis over sysML model for critical goods transportation monitoring system, Journal of Theoretical and Applied Information Technology, Vol. 2, No. 4, pp. 1798-1801, 2012
  • Sudip Misra, Venkata Krishna P, Saritha V, LACAV: An energy-efficient channel assignment mechanism for vehicular adhoc networks, The Journal of Super Computing, Vol. 62, No.3, pp. 1241-1262, 2012
  • Kamala Krithivasan, Lakshmanan K, Anand M, Khalid M, On the ambiguity and complexity measures of insertion-deletion systems, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Vol. 87, pp. 425-439, 2012
  • Thandeeswaran R, Subhashini S, Jeyanthi N, Saleem Durai MA, Secured multi-cloud virtual infrastructure with improved performance, Cybernetics and Information Technologies, Bulgarian Academy of Sciences, Vol. 12, No. 2, pp. 11-22, 2012
  • Reddy BSK, Ganesh MS, Venkata Krishna P, Temporary parallel route recovery for frequent link failure in VANET, Advances in Intelligent Systems and Computing, Vol. 176, pp. 369-374, 2012
  • Arun Kumar S, Arun Kumar T, Ontology rule based retrieval of knowledge sharing and trust behavior: An global software development perspective, International Journal of Engineering and Technology, ISSN: 09754024; Vol. 4, No. 5, pp. 364-371, 2012
  • Ch Aswani Kumar, Radvansky M, Annapurna J, Analysis of Vector space Model, Latent semantic Indexing and Formal concept analysis for information retrieval, Cybernetics and Information Technologies, Bulgarian Academy of Sciences, Vol. 12, No. 1; pp. 34-48; ISSN (Print) 1314-4081, DOI: 10.2478/cait-2012-0003, 2012
  • Ravi Nirlakalla, Bhaskara Rao Boothuru Subbarao Thhotta, Rajasekhara Babu M, Venkata Krishna P, Designing of power optimized bypassing array multiplier in nanometer technology, Computer Communication and Information Science (CCIS) Springer-Verlag Berlin Heidelberg, Vol. 270 Issue pp. 277-284 (ISSN: 978-3-642-29218-7  ), 2012
  • Sasirekha M, Sumaiya Thaseen I, Saira Banu J, A Defense Mechanism For Credit Card Fraud Detection, International Journal on Cryptography and Information Security, Vol. 2, No.3; pp. 89-100, 2012
  • Venkata Krishna P, Saritha V, Vedha G, Bhiwal A Chawla AS, Quality-of-service-enabled ant colony-based multipathrouting for mobile ad hoc network, IET Communications, Vol. 6, Iss. 1, pp. 76– 83; ISSN 1751-8628, 2012
  • Alagiri I, Madhu Viswanatham V, Venkata Krishna P, Band-width Efficient Multipoint Relays Selection in Optimized Link State Routing Protocol for Mobile Ad-hoc Networks, Information Technology Journal , Vol. 11, No.8 : 1097-1102., 2012
  • Manaswi Saha, Venkata Krishna P, Bandwidth Management Framework for Multicasting in Wireless Mesh Networks, International Journal of Information and Electronics Engineering, Vol. 2, No. 3, pp. 421-425, 2012
  • Manikandan K, Saleem Durai MA, A novel framework for efficient congestion control protocol and QoS enhancement in Adhoc wireless Networks, Journal of Theoretical and Applied Information Technology, Vol. 45 No.2, pp. 387-396, 2012
  • Anthony Xavior, Margret Anouncia S, Case-based reasoning (CBR) model for hard machining process,  International Journal of Advanced Manufacturing Technology, 61:1269–1275, Springer-Verlag London Limited 2012., 2012
  • Senthil J, Arumugam S, Margret Anouncia S, Abhinav Kapoor, Automatic Code Generation for Recurring Codepatterns in Web based Applications and Increasing Efficiency of Data Access Code, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1; pp. 473-476, 2012
  • Senthil J, Arumugam S, Margret Anouncia S, Abhinav Kapoor, Cracking the Encryption Key from Auto Generated Cipher, IJCSI International Journal of Computer Science Issues, 2012
  • Rajkumar S, Vijayarajan V, Shrey Gupta, Anil Kumar, Analysis of Non-Linear Filtering Techniques based on Quantitative Metrics using Different Images, International Journal of Computer Applications Volume 52 – No. 6, pp.13-20, 2012
  • Raghuveer VR, BK Tripathy, An Object Oriented Approach to Improve the Precision of Learning object Retrieval in a Self Learning Environment, Int. Jour. of e-learning and Learning Objects, vol.8, 2012, pp. 193-214., 2012
  • Vasanthi S, Jayanthi MK, Learning objects- an object oriented analysis, design model and research review, International Journal of Computer Science and Information Technologies (IJCSIT), 2012
  • Jayanthi MK, Survey on High Performance MultiProcessor System on Chips, International Journal of Computer Applications 2012
  • Jayanthi MK, Domain-Driven Action Able Knowledge Discovery, International Journal of Data Mining and Knowledge Engineering,, 2012
  • Hari Seetha, Saravanan R, Narasimha Murty M, Pattern Synthesis using Multiple Kernel learning for Efficient SVM classification, Cybernetics and Information Technologies,, 12(4),77-94, 2012
  • Hari Seetha, Sri Vidhya VVR, Classification of Categorical Data Using Hybrid Similarity Measures. Wireless Networks and Computational Intelligence (2012):, CCIS-292, 371-377., 2012
  • Sudhar Kumar Singh, Hariom Kumar, Praveen Kumar K, Rajkumar R, Secure Auction Bidding Mobile Environment through Randomized Alphanumeric Cipher Algorithm, International Journal of Scientific and Research Publications, 2012
  • Thendeeswaran R, Subashini S, Jeyanthi N, Saleem Durai MA, Secured Multi-Cloud Virtual Infrastructure with Improved Performance Cybernetics and Information Technologies- Bulgarian Academy of Sciences Vol 12, No 2, pp 11-22., 2012
  • Saleem Durai MA, Danapal, A Survey on Cloud Computing for Mobile Users: Making Smartphones Last Longer with Computation Offload,  International Journal of Computer Applications, Volume 56– No.18, 2012
  • DP Acharjya, DP Acharjya, Kannan A, Iyengar NChSN, An Intelligent Knowledge Mining Model forKidney Cancer using Rough Set Theory Int. Journal of Bioinformatics Research  and al Applications-, Vol. 8, Nos 5/6, PP. 417-435 2012
  • Sangeetha TA, Saradha A, Ilango P, JPEG Compression and Decompression for Color Images using Latice Based Structures, Global Trends in Information Systems and Software Applications Communications in Computer and Information Science , 2012
  • Ilango P, Swathi JN, An Empirical Study of hard and Fuzzy Clustering Algorithm on IRIS Dataset, International Journal of Advances in Science and Technology, Vol 4,No:4,2012, 2012
  • Ilango P, Swathi JN, Study of Improvements in Fuzzy C Means Clustering Algorithm, International Journal of Computer Science and Knowledge Engineering., ISSN:0973-6735Volume 6 Number 2, 2012
  • Ilango P, Ontology Based Web Service Discovery using Semantic Techniques, International Journal of Computer Information Systems, 2012
  • Ilango P, Region Based Image Segmentation Methods using Medical Images, International Journal of Image Processing and Applications, 2012
  • Prabu S, Swarnalatha P, Cloud Gaming with P2P Network using XAML and Windows Azure, Global Trends in Information Systems and Software Applications, Communications in Computer and Information Science, Vol. 270; pp. 165-172; 2012, 2012
  • BK Tripathy, Nagaraju M, Topological Properties of Incomplete Multigranulation Based Rough Fuzzy  Sets, Obcom 2011, Part II, CCIS 270, PP 92 - 102, 2012, 2012
  • Nisha TM, Lijo VP, Improving the Efficiency of Data Retrieval in Secure Cloud, CNC 2012, LNICST pp. 238-241, 2012, 2012
  • Jeyanthi N, Iyengar NChSN, MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks, Cybernetics and Information Technology, Vol.11,No.4, pp.41-52, 2012
  • Jeyanthi N, Iyengar NChSN, Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment, International Journal of Communication Networks and Information Security (IJCNIS), Vol. 4, No. 3, pp.163-173, 2012
  • Lakshmi Prasad W, Sarath Chandra G, Vijayakumar Varma S, Iyengar NChSN, Different Variants of MR-RSA Cryptosystems and Digital Signature Schemes, International Journal of Advances in Science and Technology (Special Isuue),, Vol.4,No.5,pp49-54, 2012
  • Senthil J, Raghavendra Singh, Anupam Gupta, Pranov Kumar, Application of Sentiment Analysis in Reviewing Public Opinion using Naïve Bayes Technique with Laplace Smoothing European Journal of Scientific Research, Volume 78 Issue 4, 597-601, 2012
  • Senthil J, Arumugam S, Prathik Shah, Real Time Automatic Code Generation using Generative Programming Paradigm European Journal of Scientific Research, Volume 78 Issue 4, 581-587, 2012
  • Senthil J, Shoib Merchant, Akshey Maniyar, Cloud based Voice Mail Service for Mobile Computing European Journal of Scientific Research, Volume 78 Issue 4, pp. 602-607, 2012
  • Jayakumar S, Senthil J, Nithya S, Automatic Campus Network Management using GPS, International Journal of Computer Science and Issue, Vol 9, Issue 3, 468-472, 2012
  • Senthil J, Snehil Modani, Ishan Gupta, Apoorv K Agrawal, Improvement of Error Correction in the Networks using Generative Programming, International Journal of Computer Applications, x, Vol 9, Issue 3, 468-472, 2012
  • Arun Kumar S, Arun Kumar T, Ontology Rule based retrieval of Knowledge sharing and Trust behavior: An Global Software Development Perspective., International Journal of Engineering and Technology, Vol.4, Issue 5, pages: 364-371, 2012
  • Arun Kumar S, Arun Kumar T, Exploring the influence of parternership quality factors towards the outcome of global software development projects, Internation review on computer and software, Vol.7, Issue 5.pp. 2159-2172, 2012
  • Venkatesan M, Arun Kumar T, Prabhavathy P, An Improved Bayesian Classification Data Mining Method for Early Warning Landslide Susceptibility Model Using GIS, Advances in Intelligent System and Computing, Vol.202, pages:277-288, 2012
  • Govinda K, Sathiamoorthy E, Multilevel Security in Cloud Computing Environment using Graceful Codes, Global Trends in Information Systems and Software Applications Communications in Computer and Informaion Science, Vol270,pp613-618, 2012
     

2011

  • Parveen Sultana H, MPounambal, Venkata Krishna P, A Fast Handover Scheme for Multicasting  in IPv6 based Mobile Ad hoc Networks, Journal of Computer Science, Science Publications, USA, Vol 7, No. 1, ISSN 1549-3636, pp. 90-94, 2011
  • Swarnalatha P, Rajasekhara Babu M, Surendhar Thallapelly, Building Management System Using Windows Communication Foundation and  XAML, International Journal of Engineering and Technology, Vol. 3, No. 2, pp. 95-99, 2011
  • Arun Kumar S, Arun Kumar T, State of software metrics to forecast variety of elements in the software development process Advances in Parallel Distributed Computing, CCIS, Vol. 203; pp. 561-569, 2011
  • Misra S, Venkata Krishna P, Abraham KL, A stochastic learning automata-based solution for intrusion detection in vehicular ad hoc networks Security and Communication Networks, Vol. 4, No. 6, pp. 666-677, 2011
  • Maiti A, BK Tripathy, Applications of short message service and WAP in operating remotely triggered laboratories International Journal of Online Engineering Vol 7, No. 4, pp. 20-25, 2011
  • Nanda R, Venkata Krishna P, Mitigating denial of service attacks in hierarchical wireless sensor networks Network Security, Vol. 2011, No. 10; 2011
  • Lakshmanan K, Anand M, Krithivasan K, On the ambiguity of insertion systems International Journal of Foundations of Computer Science Vol. 22, No. 7; pp. 1747-1758, 2011
  • BK Tripathy, K Kumaran, Panda GK, An improved l-diversity anonymisation algorithm Communications in Computer and Information Science 157 CCIS, pp. 81-86, 2011
  • Lakshmanan K, Anand M, De La Clergerie EV, Modelling intermolecular structures and defining ambiguity in gene sequences using matrix insertion-deletion systems Frontiers in Artificial Intelligence and Applications, Vol. 228, pp. 71-82, 2011
  • Lakshmanan K, Anand M, Kamala Krithivasan, Khalid Mohammed, On the study of ambiguity and the trade-off between measures and ambiguity in insertion-deletion languages Nano Communication Networks, Biological Information and Communication Technology, Vol. 2, No. 2-3, pp. 106-118, 2011
  • Lakshmanan K, Anand M, Shankara Narayanan Krishna, Matrix insertion-deletion systems for bio-molecular structures Distributed Computing and Internet Technology, Lecture Notes in Computer Science, Vol. 6536, pp. 301-312, 2011
  • Sivarajesh Reddy, Rajasekhara Babu M, Swarnalatha P, Hand Gesture Recognition Using Skeleton of Hand and Distance Based Metric, Advances in Computing and Information Technology, Communication in Computer and Information science, Vol. 198, pp. 346-354, 2011
  • Surendhar Thallapelly, Rajasekhara Babu M, Swarnalatha P, An XAML approach for building management system using WCF Advances in Computing and Information Technology, Communication in Computer and Information science, Vol. 198, pp. 339-345, 2011
     

2010

  • Kauser Ahmed P, Muhammad Rukunuddin Ghalib Jaigam Dilshad,  Creation of Gene Database and Implementation of Transactrion processing, International Journal of Advanced Research in Computer Science, ISSN No. 0976-5697, Sep. - Oct. 2010 Vol. 1, No. 3, pp. 433-439,, 2010
  • Saravanaguru RaK, Arun Kumar T, Ramesh babu K,  An Efficient Routing Protocol Design for Distributed Wireless Sensor Networks,,  International Journal Of UbiComp (IJU), July, 2010,  Vol.1, No.3,pp. 15-29, 2010
  • Ramesh Babu K Arun Kumar T   An Imperceptible and Variable Block Based Blind Watermarking Scheme for Content & Copyright Protection, International Journal of Research and Reviews in Computer Science, Science Academy Publisher, United Kingdom, Vol. 1 No. 4, 2010, December 2010
  • Kauser Ahmed P, Muhammad Rukunuddin Ghalib,     The realization of automated testing tool for OOC, International Journal of Advanced Research in Computer Science, Vol. 1(3), pp. 433-439, (ISSN. NO.0976-5697) October, 2010, 2010
  • Arun Kumar S, Arun Kumar T, Swarnalatha P,  Significance of Software Metrica to Quantify Design and code quality design and code quality, International Journal of Computer Applications (0975 – 8887) Vo. 9, No.7, pp. 36-42; doi>10.5120/1608-2160, 2010
  • Mythili T, Swathi JN,   Quality Metrics Tool for Object Oriented Programming, International Journal of Computer Theory and Engineering, Vol.2, No.5, pp. 712-717; 1793-8201, 2010
  • Arun Kumar S, Swarnalatha P, Senthil Kumaran U,  The Realization of Automated GH Testing Tool for OOC, International Journal of Engineering Science and Technology, Vol. 2, No. 12, pp. 6987-6998, 2010
  • Akila Victor,    Comparitive Analysis of FLLT and JSEG, International Journal on Computer Science and Engineering (IJCSE), Vol. 2, No. 8, pp. 2641-2647, 2010
  • Chiranjib Chakraborty, Sanjiban Sekhar Roy,   Network building of Proteins in a Biochemical Pathway: A computational biology Related Model for Target Discovery and Drug Design, Current Bio-Informatics, Pub. Bentham Science Publishers, Vol. 5, No. 4, pp. 290-295, 2010
  • Sanjiban Sekhar Roy, C Chakraborthy, (+3 authors),  A hypothetical relationship between the nuclear reprogramming factors for induced pluripotent stem (iPS) cells generation - bioinformatics and algorithmic approach, Medical Hypotheses, Publisher: Elsevier Ltd Vol.76, No. 4, pp. 507-511, 2010
  • Swarnalatha P, Prabu S,   Agent Based fault Tolerance in Computational Grid-A Survey, International Journal of Engineering Science and Technology, Vol.2, No. 11, pp. 6771-6778, 2010
  • Annapurna J, Aswani Kumar Ch,   Interactive Image Retrieval Using text and image content, Cybernetics and Information Technologies, Bulgarian Academy of Sciences, Vol. 10, No.3, pp. 20-30, 2010
  • Swarnalatha P, BK Tripathy,   A Study on Edge Detection Techniques in Retinex Based Adaptive Filter, IACSIT International Journal of Engineering and Technology, Vol. 2, No. 6ISSN: 1793-8236, pp. 603-607, 2010
  • Madhu Viswanatham V, AA Chari PVenkatakrishna, Geethanjali, A survey on key management techniques in Mobile adhoc NET works, Int.Journal on Advanced Computing and Communications, Vol.2, Issue. I, pp.1-5, 2010
  • Vijayasherly V, Iyengar NChSN, H Mohamed Ameer Irshad, R Padma Priya, Remote desktop Access using Mobile phones and an Enhancement for Intra-Mobile search, International Journal of Advanced Research in Computer Science, Vol.1, No.4, pp. 229-232, 2010
  • Geetha Mary A, Iyengar NChSN, Anupriya E,  A Model To Measure The Effectiveness Of Filtering Malicious Traffic Under Dos Attack In Peer To Peer Network, International Journal of Computer and Mathematical Sciences, An International Research Journal, Vol. 1, No.4, pp. 411-417, 2010
  • Geetha Mary A, Iyengar NChSN,   A Frame Work for Ontological Privacy Preserved Mining, International Journal of Computer and Mathematical Sciences, An International Research Journal, Vol. 1, No.4, pp. 425-436, 2010
  • Madhu Viswanatham V, AA Chari,   An approach for detecting Attacks in mobile Adhoc Networks, Journal of Computer Science, Vol.4(3), pp.245-251, 2010
  • Janakiraman TN, Chandra Mouli PVSSR,   Image Segmentation using Euler Graphs, International Journal of Computers, Communications & Control, Vol.5, No.3, pp. 314-324, 2010
  • Venkata Krishna P, Sudip Misra, Kiran Isaac Abraham,  S-LAID: A Simple Learning Automata-Based Solution for Intrusion Detection in Wireless Sensor Networks, Wireless Communications and Mobile Computin, Vol.11, No.3, pp.426-441, 2010
  • Venkata Krishna P, S Misra, KL Abraham,  Adaptive Link-State Routing and Intrusion Detection in Wireless Mesh Networks, IET Information Security, Special Issue on Multi-Agent & Distributed Information Security, Vol.4, No.4, pp. 374-389, 2010
  • E Sathyamoorthy, Iyengar NChSN, V Ramachandran, Agent Based Trust Management in Distributed e-business environment, International Journal of Computer Science & Information Technology (IJCSIT), Vol.2, No.1, pp. 14-28, 2010
  • Sreenivasalu Reddy L, Ramakrishna Prasad, Iyengar NChSN, Ramachandran V, Solovay-Strassen test in a RSA Public key Cryptosystem, International Journal of computer Theory and Engineering, Vol2, No.1, 52-56, 2010
  • Saravanaguru RaK, Kripeshwari S, Arun Kumar T,  Efficient Querying of Web Services Using Ontologies, International Journal of Algorithms and Computational Mathematics and Numerical Analysis,  Multi Science Publishing, Vol.4, No.4, pp. 575-586, 2010
  • Margret Anouncia S, Cherian M, Parija A, Sylvia R, A Framework For Software Architecture Visualization And Evaluation, International Journal of Computer Applications, Vol.1, No.8, pp. 60-65, 2010
  • Swarnalatha P, Parveen Sultana H, Pounambal,  TCP-LP: Low-Priority Service via End-point Congestion, International Journal of Advanced Research in Computer Science, Vol 1, No. 4, ISSN  0976 - 5697, pp .47-52, 2010
  • Suresh Kumar N, Margret Anouncia S,   Identifying grades of Glioma using support vector machine recursive feature elimination, International Journal of Advanced Research in Computer Science, ISSN No: 0976-5697, Vol.1, No.4, pp. 53-55, 2010
  • Abhinay Sukreet Kumar Mandala, Pallapottu Raghuram, Iyengar NChSN, Implementation Of Cryptographic Algorithm for Intranet Based Emails,  International Journal of Information Science and Computer Mathematics, Pushpa Publishing House,  Vol.1, No.1, pp. 81-87, 2010
  • Margret Anouncia S, Saravanan R,   A knowledge model for gray scale image interpretation with emphasis on welding defect classification–An ontology based approach, Elsevier Publication, International Journal of Computers in Industry, Vol.61, No.8, pp. 742 - 749. (Impact Factor: 1.524), 2010
  • Jaisankar N, Saravanan R, Iyengar NChSN, Sreenivasalu & Madhusoodhana Reddy, An Efficient layered security framework for protecting Network Layer operations in Mobile Adhoc Networks, International Journal of Communication Networks and Distributed Systems (IJCNDS), Vol.5, No.3, pp. 295-307, 2010
  • S Gouse Mohiddin, S Vijaya Kumar Varma, Iyengar NChSN,  Unsteady Laminar Mhd Free Convective Heat And Mass Transfer In A Visco-elastic Flow Past A Vertical Cone, The International e-Journal of numerical analysis and related topics (IeJNART), Vol.4, pp 41-54, 2010
  • S Gouse Mohiddin S Vijaya Kumar Varma Iyengar NChSN, Radiation And Mass Transfer Effects On Transient Laminar Mhd Free Convective Flow Past A Vertical Cone With Variable Surface Conditions In The Presence Of Viscous Dissipation, The International e-Journal of Engineering Mathematics:Theory and Application (IeJEMTA), Vol.8, pp 22-37, 2010
  • Geetha Mary A, E Anupriya, Iyengar NChSN,  Secure and Auditable Agent-based Communication Protocol for E-health System Framework, International Journal of Computer and Mathematical Sciences, Vol.1(4), issue.3, pp.411-417, 2010
  • Geetha Mary A, Iyengar NChSN,   Dominant Pixel Identification from Gray-level Image using Various Matrix Translation operations - A novel approach for edge detection, International Journal of Computer and Mathematical Sciences, Vol.1(4), issue.3, pp. 425-436, 2010
  • Geetha Mary A, Iyengar NChSN,   Image Segmentation based on Euler Graphs, International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, pp.9-20, 2010
  • Suresh ThangakrishnanM, PrabukumarM,   A Novel and efficient mobile device authentication architecture, CIIT international journal of biometrics and bio-informatics, Vol 2, No 2, DOI: BB022010002, 2010
  • Muhammad Rukunuddin Ghalib, D K Ghosh,  CSTuEPM: An Efficient Clustering Algorithm for Microarray Gene Expression Data, International Journal of  Advanced Research in Computer Science, Vol I, Issue IV, Pages 370-377, 2010
  • Shanthi V, Arun Kumar T,  A  robust digital image watermarking algorithm using DNA sequences, International Journal on Image and Video processing (ICTACT), Vol.1 No.2.page(s):116 – 123, 2010
  • Dhawal Seth, LRamanathan, Abhishek Pandey, Security Enhancement: Combining Cryptography and Steganography, International Journal of Computer Applications, Vol. 9, No. 11, Article-2, pp. 3-6, ISSN 0975-8887, 2010
  • BK Tripathy, DP Acharjya,  Knowledge Mining using Ordering Rules and Rough Sets on Fuzzy Approximation Spaces, International Journal of Advances in Science and Technology, Vol. 1. No. 3, pp. 41-50, 2010
  • MSudha, MMonica,  Investigation on Efficient Management of Workflows in Cloud Computing Environment, IJCSE- International Journal of Computer Science and Engineering, Vol. 02, No. 05, pp. 1841-1845, 2010
  • Msudha, DrBandaru Rama Krishna Rao, MMonica, A Comprehensive Approach to Ensure secure Data Communication in Cloud Environment, IJCA – International Journal of Computer Application (0975-8887), Vol. 12 No. 8, pp. 19-23, USA, 2010
  • Mohan K, MAramudhan,   New Secure Communication Protocols for Mobile E-health System, International Journal of Computer Applications (0975-8887), Vol. 8. No. 4, pp. 10-15, 2010
  • Rishin Haldar, Debajyoti Mukhopadhyay,  An attempt to Verify Claims of University Departments by Text Mining its Web Pages, International Journal of Convergence Information Technology, Korea, Vol 5,No. 5, pp 192-202, 2010
  • Mythili T, Margret Anouncia S,  Automatic Defect Detection and Counting In Radiographic Weldment Images, International Journal of Computer Applications (0975 – 8887) Vol. 10,  No. 2, 2010
  • Mythili T, Sumathy S,  Diagnosis of Diabetes Mellitus based on Risk Factors, International Journal of Computer Applications (0975 – 8887), Vol. 10,  No.2, 2010
  • Manikandan K,   An Efficient Routing Protocol Design for Distributed Wireless Sensor Networks, International Journal of Computer Applications (0975 – 8887), Vol. 10– No. 4, pp. 5-10, 2010
  • Jaisankar N, Saravanan R,  Enhanced Two-Way Directional Routing for MANETs, International Journal of Advanced Research in Computer Science, Vol. 1, No.4, pp.14-19, 2010
  • Jaisankar N, Saravanan R,   An efficient layered security framework for protecting network layer operations in mobile ad hoc networks, International Journal of Communication Networks and Distributed Systems, (Inderscience publishers Ltd), Vol. 5, No. 3, pp. 295- 307, 2010
  • Jaisankar N, Saravanan R,  A review on security issues in mobile ad-hoc networks, International Journal of Computational Intelligence and Information Security, (IJCIIS), Vol. 1, No. 3, pp. 101-109, 2010
  • Jaisankar N, Saravanan R,  A mechanism for detection of denial of service attacks in mobile adhoc networks, International Journal of Research and Reviews in Computer Science (IJRRCS), Vol. 1, No.3 pp. 14-19, 2010
  • Jaisankar N, Saravanan R,  An extended AODV protocol for multipath routing in MANETs, International Journal of Engineering and Technology (IJET), Vol. 2, No. 4, pp. 394-400, 2010
  • Muhammad Rukunuddin Ghalib, P Kauser Ahmed, Jaigam Dilshad,  Qualitative and Quantitative metrics based analysis of Gene Expression Data Clustering Algorithms, International Journal of Advanced Research in Computer Science, Vol. 1, No. 3, pp. 433-439, 2010
  • Sasikumar Gurumurthy,   Effective Cache Placement in Multi-Hop Wireless Networks,  International Journal of Network and communication Engineering” [CIITIJ], Vol.  DOI: NCE102010007, ISSN: 0974-9713, ONLINE: ISSN 0974-9616, 2010
  • MSudha, MMonica,  A Simplified Network manager for Grid and Presenting the Grid as a Computation Providing Cloud, IJARCS-International Journal of Advanced Research in Computer Science, Vol. 01, No. 03, Pages 173-176, 2010
     

2009

  • Iyengar NChSN, Vijayasherly V, Parallel Query Processing in a Cluster using MPI and File System Caching, International Journal of Computer Science and Network Security, Vol.9, No.5, pp. 249-365, 2009
  • Sanjiban Sekhar Roy, Santanu Mukerji MA,   e-Learning of Japanese Pictography –It’s Perspective, Language in India, Vol.10, No.7, pp.91-102, 2009
  • Venkata Krishna P, Sudip Misra, Mohhamed S Obaidat, Saritha V, An efficient approach for distributed dynamic channel allocation with queues for real time and non-real time traffic in cellular networks, Journal of Systems and Software, (Elsevier), Vol. 82, No.7, pp 1112-1124, 2009
  • Iyengar NChSN, JaghadeeshR, Karthik TU, Prakash NM  Vijayasherly V, Distributed and Learner Adaptive Learning System Using Service Oriented Architecture, International Journal of Computer Science and Network Security, Vol.9 No.6, pp 187-190, 2009
  • Prabu S, Nandakumar S,   Real Time Speech Compression by Using Code Excited Linear Prediction Algorithm, International Journal on Intelligent Electronics Systems, ISSN 0973-9238,Vol. 3, No.1, pp.62-64; ISSN: 0973-9238, 2009
  •  ESathiyamoorthy, Iyengar NChSN, VRamachandran,  Agent Based Trust Management Model Based on Weight Value Model for Online Auctions, International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3,pp 15-31, 2009
  • Radheshyam Nanduri, Sai KrishnaG, Sandeep Kumar D, Iyengar NChSN, A Framework for Secure and Scalable Agent Based E-Auctions, Special Issue of the International Journal of the Computer, the Internet and Management, Vol.17 No. SP1, pp 42.1-42.5, 2009
  • Joseph Sukanth Y, Nishanth D, SathyamoorthyE, Iyengar NChSN, Trust Management Model In Online Auctions Using Multi Agents, Special Issue of the International Journal of the Computer, the Internet and Management, Vol.17 No. SP1, pp 44.1-44.4, 2009
  • Ilango P, Hemalatha Thiagarajan, Nickolas Savarimuthu,  Genetic Chromo Dynamic Framework for Imputation of Missing Data in Type II Diabetes Databases, Special Issue of the International Journal of the Computer, the Internet and Management, Vol. 17, No. SP1, ISSN 0858-7027, pp. 51.1-51.11, 2009
  • Margret Anouncia S, Godwin Joseph J,   A Study of Automatic Recognition and Extraction of Object of Interest from Images, International Journal of Computing and Information Technology, Vol. 17, Issue 4, pp 1-12, 2009
  • DP Acharjya,    Comparative Study of Rough Sets on Fuzzy Approximation Spaces and Intuitionistic Fuzzy Approximation Spaces, International Journal of Computational and Applied Mathematics, Vol. 4, No.1, pp. 91-102, 2009
  • DP Acharjya, B K Tripathy,   Rough Sets on Intuitionistic Fuzzy Approximation Spaces and Knowledge Representation, International Journal of Artificial Intelligence and Computational Research, Vol. 1, No. 1, pp. 29-36, 2009
  • Shanthi V, Arun Kumar T,   DWT – SVD Combined Full Band Watermarking Technique for Color Images in YUV color Space, International Journal of Computer Theory and Engineering, Vol.1.No.4.( 1793 – 8201) pp. 424-429, 2009
  • Jaisankar N, Saravanan R, Intelligent intrusion detection framework using mobile agents, International Journal of Network Security & its Applications, Vol 1, No2, pp. 72-88, 2009
  • Selvakumar K, Prabu S, RamanathanL,  Application of Centroid Neural Network Based Clustering Technique Using Competitive   Learning, International Research Publication- International Journal of Information Sciences and Technology, ISSN 0974-2255   in 2009. 2009
     

2008

  • DP Acharjya, B K Tripathy,   Rough Sets on Fuzzy Approximation Spaces and Applications to Distributed Knowledge Systems, International Journal of Artificial Intelligence and Soft Computing, Vol. 1, No. 1, pp. 1-14, 2008
  • BK Tripathy, PKChoudhury,   Fuzzy Lattices and Fuzzy Boolean Algebra, International Journal of Fuzzy Mathematics (USA), Published by International Fuzzy Mathematics Institute, Vol.16, no.1,  pp. 185-198, 2008
  • BK Tripathy, HKTripathy, PKDas,  A Prospective Fuzzy Logic approach to Knowledge-based Navigation of Mobile LEGO-Robot, Journal of Convergence Information Technology (U.K.), Vol.3, no.1, ISSN: 1975-9320, pp.64-70, 2008
  • BK Tripathy, HKTripathy, PKDas,  An Intelligent approach of Rough set in Knowledge Discovery Databases, International Journal of Computer Science and Engineering, Vol.2, no.1, pp.45-48, 2008
  • BK Tripathy, HKTripathy, PKDas,  An Intelligent Based Approach Using Fuzzy Inference Rules for Vowel Recognition, Journal of Convergence Information Technology (U.K.), Vol.3, No.1, ISSN:1975-9320, pp.51-56, 2008
  • Kannammal, Iyengar NChSN,   A Frame Work for Mobile Agent security in Distributed Agent based e-business Systems, International Journal of Business and Information, Vol.3 No.1 pp 129-143, 2008
  • Venkata Krishna P, Iyengar NChSN,   Design of Sequencing  Medium Access Control to Improve the Performance of Wireless Networks, Journal of Computing and Information Technology, CIT 16, Vol.  2, pp. 81–89, 2008
  • Venkata Krishna P, Iyengar NChSN,   An Efficient Hash Table Node Identification Method For Bandwidth Reservation In Hybrid Cellular And Ad Hoc Networks, International Journal of Computer Communications, Published by Elsevier Publications, Vol. 31, No. 4,  pp. 722-733, 2008
  • Venkata Krishna P, Iyengar NChSN,   Optimal channel allocation algorithm with efficient channel reservation for cellular networks, International Journal of Communication Networks and Distributed Systems, Vol.1,No.1, pp 33-51, 2008
  • Venkata Krishna P, Iyengar NChSN,   Sequencing Technique – An Enhancement to 802.11 Medium Access Control to improve the performance of Wireless Networks, International Journal of Communication Networks and Distributed Systems, Published by Inderscience Publishers, Vol.1,No.1, pp 52-70, 2008
  • Sudip Misra, Kiran Issac Abraham, Mohhamed S Obaidat, Venkata Krishna P, LAID: A Learning Automata-Based Scheme for Intrusion Detection in Wireless Sensor Networks, Trans. of wiley InterScience journal on Security and Communication Networks, Vol. 2, Issue. 2, pp. 105-115, [DOI: 10.1002/sec.74]. [SCI level], 2008
     

2007

  • Margret Anouncia S, Saravanan R,   Ontology Based process plan generation for radiographic image processing, Int. Journal of Metadata, Semantics and Ontologies, Vol. 2, No. 3, pp. 211-222, 2007
  • Sreekumar, DP Acharjya,   Emergence and Convergence of Information and Communication Technology in Higher Education, GYAN Management (International Journal of Management and Technology; Gian Jyoti Institute of Management and Technology, Chandigarh), Vol. I, Issue 2, pp. 176–182, 2007
  • Lakshmanan K, SN Krishna, R Rama, C Martin-vide, Internal Contextual Grammars for Mildly Context-Sensitive Languages, Research on Languages and Computation, Springer, Vol. 5 No.2, pp. 181–197, 2007
  • Hari Seetha, Saravanan R,   Short-term electric load prediction using   Fuzzy BP, Journal of   Computing and Information Technology, Vol 15, no: 3, 267–282, doi:10.2498, cit.1000987, 2007
  • Sulaiman Buhari, Akbar,   Impact of Redhat IPv6 Router on Heterogeneous Host Connections, International Journal of Communication Systems, Wiley Inter Science, Vol. 20, Issue 4, pp.411-426, 2007
  • GitanajaliJ, Shaik Nusrath Banu, Geetha Mary A, IndumathiJ, An Agent Based Burgeoning Framework for Privacy Preserving Information Harvesting Systems, International Journal of Computer Science and Network Security, VOL.7 No.11, pp. 268-276, 2007
  • Venkata Krishna P, Iyengar NChSN, A Cross Layer Based Qos Model For Wireless And Mobile Networks, Journal of Mobile Communication, Vol. 1, No. 4 pp. 114-120, 2007
  • A Kannammal, Iyengar NChSN,   A   Model for Mobile agent Security in e-business applications, International Journal of Business and Information, Vol.2 No.2, PP 185-198, 2007
  • Venkata Krishna P, Iyengar NChSN,   Optimal Routing with QOS guarantees in the wireless networks, A Chapter in Springer Link Book on “ Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications,  DOI: 10.1007, 978-1-4020-6266-7_8, 5 pp 469-473, Publisher: Springer Netherlands, 2007
  • JV Ramana Murthy, Iyengar NChSN, PAparna,  Slow Steady Rotation of a permeable sphere  in an incompressible Micropolar Fluid, International eJournal of Engineering Mathematics: Theory and Application, Egypt for publication, Vol.2, pp 44-60, 2007
  • Kannammal, VRamachandran, Iyengar NChSN,  Design and Performance Analysis of Agent Based Architecture for Session Management, Int. Journal of Electronic Business (IJEB), Vol.5, No.3, pp 263-275, 2007
  • Deena Yunam, Iyengar NChSN, AKannammal,  WebATU: Web Service Automated Testing Utility, Academic Open Internet Journal (AOIJ), Internet Computing, Vol 21, part6, p2  ( ISSN 1311-4360), 2007
  • Margret Anouncia S, Saravanan R,   Ontology Based Process Plan Generation for Image Processing, International Journal of Metadata, Semantics and Ontologies,   - Vol. 2, No.3, pp. 211 – 22, 2007
  • Margret Anouncia S, Saravanan R, Hari Seetha,  Short term electric load prediction using Fuzzy BP, Journal of Computing and Information Technology – CIT, Vol 15 No.3, pp. 267-282 2007
     

2006

  • Margret Anouncia S, Saravanan R,   Non-destructive testing using radiographic images – a survey, Published in the journal of Insight – British Journal of NDT, Vol  48, No.10, pp- 592 -597, 2006
  • Lakshmanan K, Iyengar NChSN,   A Note on Ambiguity of Internal Contextual Grammars, Theoretical Computer Science, Vol. 369, Issue: (1-3), pp. 436–441, 2006
  • Kannammal, VRamachandran, Iyengar NChSN,  An Enhanced Secure and Scalable Model for Enterprise Applications using Automated Monitoring, Journal of Computer Science (JCS), Science Publications, and New York,  USA, Vol. 2 No.7, pp. 589-594, 2006
  • Kannammal, VRamachandran, Iyengar NChSN,  Reliable Multi Agent System for E-Business Applications, Academic Open Internet Journal(AOIJ)Internet Computing, Vol-18, ISSN 1311-4360, 2006
  • Gayatri Mohankrishna, Iyengar NChSN, A Kannammal,  Secure Service Management using mobile Devices, Academic Open Internet Journal(AOIJ)Internet Computing, Vol-18, 2006
  • Lakshmanan K,    End-marked Maximal Depth-first Contextual Grammars, Proceedings of Developments in Language Theory 2006, Lecture Notes in Computer Science (DLT’06), LNCS-4036, pp. 339–350, California,USA, 2006
     

2005

  • R R William, Iyengar NChSN,   Compression of wave file by linear scaling, AMSE Periodicals France, Vol. 48 no. 4, pp 19-36, 2005
  • AKannamal, Iyengar NChSN,   Automated Response by Mobile Agents to Intrusion, The Pacific and Asian Journal of Mathematiccal Science, Vol.1,No.1, pp 1-14, 2005
  • Rajasekhara Babu M, Iyengar NChSN,   Automated response by mobile agents to intrusion detection, The Pacific and Asian Journal of Mathematical Science,  2005