Publications

School of Computer Science Engineering and Information Systems (SCORE)

The school has active research group involving in addressing and solving real world problems. The school has good numbers of journal publications and conference papers with high impact factor and H-Index. Our research scholars working on the emerging areas such as: Quantum Computing, Robotics, IOT, Cloud Computing, Big Data, Computer Graphics, Intelligent Systems and Network Architecture.

VIT-Virtusa Centre of Excellence & Data Science

Publications

2024
SL. NO. TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL
1 Experimental investigation and gray relational optimization of engine parameters to improve the output characteristics of an ammonia biodiesel powered dual fuel combustion engine Elumalai R., Sumathy S., K R., Akhtar M.N., P V E., Khan S.A., Gupta M.S., Asif M. Case Studies in Thermal Engineering
2 Meta heuristic approaches for sentiment analysis Rani M.S., Subramanian S. Expert Systems
3 Industry 5.0 in Smart Education: Concepts, Applications, Challenges, Opportunities, and Future Directions Supriya Y., Bhulakshmi D., Bhattacharya S., Gadekallu T.R., Vyas P., Kaluri R., Sumathy S., Koppu S., Brown D.J., Mahmud M. IEEE Access
4 A Review on State-of-Art Blockchain Schemes for Electronic Health Records Management Jayabalan J., Jeyanthi N. Cybernetics and Information Technologies
5 SECURE SUPERVISED LEARNING-BASED SMART HOME AUTHENTICATION FRAMEWORK Sudha K.S., Jeyanthi N., Iwendi C. International Journal of Computer Networks and Communications
6 MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment Jagadeesh G., Gitanjali J., Vellingiri J., Pounambal M., Sathiyamoorthy E., Iwendi C. Journal of Supercomputing
7 Locality-constraint Representation with Minkowski distance metric for an effective Face Hallucination Savitha S., Pounambal M. Journal of Visual Communication and Image Representation
8 Federated recurrent-based adaptive battle royale algorithm for privacy-preserving data aggregation in industrial IoT: a signal, image, and video processing perspective Jagadeesh G., Pounambal M., ArivuSelvan K., Sathiyamoorthy E., Vellingiri J., Madhu Viswanatham V., Iwendi C. Signal, Image and Video Processing
9 Adapting video-based programming instruction: An empirical study using a decision tree learning model Kumar S.T.S., Thandeeswaran R. Education and Information Technologies
10 An improved adaptive personalization model for instructional video-based e-learning environments Sanal Kumar T.S., Thandeeswaran R. Journal of Computers in Education
11 Threat Detection and Mitigation for Tactile Internet Driven Consumer IoT-Healthcare System R R., S H., Nagarajan S.M., Devarajan G.G., Omar M., Bashir A.K. IEEE Transactions on Consumer Electronics
12 Streamlining Micro-Credentials Implementation in Higher Education Institutions: Considerations for Effective Implementation and Policy Development Keoy K.H.; Koh Y.J.; Iqbal J.; Anjum S.S.; Yeo S.F.; Cherukuri A.K.; Teoh W.Y.; Piut D.A.A. Journal of Information and Knowledge Management
13 Antecedents of Intention to Use Social Media for Virtual Events Kwek C.L.; Lee M.S.C.; Lee S.P.; Siek H.L.; Keoy K.H.; Cherukuri A.K. Journal of Information and Knowledge Management
14 Preventing Illegal Deforestation using Acoustic Surveillance Rajesh M.; Wadhwa T.; Cherukuri A.K.; Kamalov F.; Jonnalagadda A.; Ray S. International Journal of Computer Information Systems and Industrial Management Applications
15 Conceptual design and implementation of FIDO2 compatible smart medical card for healthcare information system Sethuraman S.C.; Mitra A.; Ghosh A.; Shaw R.; Cherukuri A.K.; Kamalov F. International Journal of Critical Computer-Based Systems
16 Forward feature selection: empirical analysis Kamalov F., Elnaffarr S., Cherukuri A., Jonnalagadda A. Journal of Intelligent Systems and Internet of Things
17 OntoDSO: an ontological-based dolphin swarm optimization (DSO) approach to perform energy efficient routing in Wireless Sensor Networks (WSNs) Boopathi M., Parikh S., Awasthi A., Malviya A., Nachappa M.N., Mishra A., Shyam G.K., Narula G.S. International Journal of Information Technology (Singapore)
18 MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment Jagadeesh G., Gitanjali J., Vellingiri J., Pounambal M., Sathiyamoorthy E., Iwendi C. Journal of Supercomputing
19 Federated recurrent-based adaptive battle royale algorithm for privacy-preserving data aggregation in industrial IoT: a signal, image, and video processing perspective Jagadeesh G., Pounambal M., ArivuSelvan K., Sathiyamoorthy E., Vellingiri J., Madhu Viswanatham V., Iwendi C. Signal, Image and Video Processing
20 Experience Replay Optimization via ESMM for Stable Deep Reinforcement Learning Osei R.S., Lopez D. International Journal of Advanced Computer Science and Applications
21 Machine Learning-Based Security Enhancement in Heterogeneous Networks Using an Effective Pattern Mining Framework Srinivasan M.; Senthilkumar N.C. International Journal of Intelligent Systems and Applications in Engineering
22 Class imbalance data handling with optimal deep learning-based intrusion detection in IoT environment Srinivasan M., Senthilkumar N.C. Soft Computing
23 An Emoticon-Based Novel Sarcasm Pattern Detection Strategy to Identify Sarcasm in Microblogging Social Networks Nirmala M.; Gandomi A.H.; Babu M.R.; Babu L.D.D.; Patan R. IEEE Transactions on Computational Social Systems
24 Critical Factor Analysis for prediction of Diabetes Mellitus using an Inclusive Feature Selection Strategy Sreehari E., Babu L.D.D. Applied Artificial Intelligence
25 A Bio-Inspired Method for Breast Histopathology Image Classification Using Transfer Learning Chandana Mani R.K., Kamalakannan J., Rangaiah Y.P., Anand S. Journal of Artificial Intelligence and Technology
26 Modeling of Aquila Optimizer with Hybrid ResNet-DenseNet enabled Breast Cancer Classification on Histopathological Images Mani R.K.C., Kamalakannan J. Journal of Intelligent and Fuzzy Systems
27 A Review on Applications of Electroencephalogram: Includes Imagined Speech Santhakumari S., Kamalakannan J. International Journal of Advanced Computer Science and Applications
28 Extreme Rate Optimal Index Code Neelakandan R., Kaliyaperumal G. IEEE Access
29 Medical Image Fusion for Brain Tumor Diagnosis Using Effective Discrete Wavelet Transform Methods Ramaraj V., Swamy M.V.A., Sankar M.K. Journal of Information Systems Engineering and Business Intelligence
30 Improving the BERT model for long text sequences in question answering domain Ramaraj V., Swamy M.V.A., Prince E.E., Kumar C. International Journal of Advances in Applied Sciences
31 Prediction of particulate matter PM2.5 using bidirectional gated recurrent unit with feature selection Subbiah S.S., Paramasivan S.K., Thangavel M. Global Nest Journal
32 An Explainable AI framework for credit evaluation and analysis Nallakaruppan M.K., Balusamy B., Shri M.L., Malathi V., Bhattacharyya S. Applied Soft Computing
33 Evaluation of performance enhancement in Ethereum fraud detection using oversampling techniques Ravindranath V., Nallakaruppan M.K., Shri M.L., Balusamy B., Bhattacharyya S. Applied Soft Computing
34 Reliable water quality prediction and parametric analysis using explainable AI models Nallakaruppan M.K., Gangadevi E., Shri M.L., Balusamy B., Bhattacharya S., Selvarajan S. Scientific Reports
35 Gradient scaling and segmented SoftMax Regression Federated Learning (GDS-SRFFL): a novel methodology for attack detection in industrial internet of things (IIoT) networks Rajasekaran V.A., Indirajithu A., Jayalakshmi P., Nayyar A., Balusamy B. Journal of Supercomputing
36 Quantum Channel Optimization: Integrating Quantum-Inspired Machine Learning with Genetic Adaptive Strategies Vijay Anand R.; Magesh G.; Alagiri I.; Brahmam M.G.; Balusamy B.; Benedetto F. IEEE Access
37 Prediction of particulate matter PM2.5 using bidirectional gated recurrent unit with feature selection Subbiah S.S., Paramasivan S.K., Thangavel M. Global Nest Journal
38 Exploring Mental Fatigue and Burnout in the Workplace: A Survival Analysis Approach Eswar Reddy R., Santhi K. EAI Endorsed Transactions on Pervasive Health and Technology
39 Privacy Preserved Reinforcement Learning Model Using Generative AI for Personalized E-Learning Muniyandi A.P., Balusamy B., Dhanaraj R.K., Ellappan V., Murali S., Sathyamoorthy M., Nkenyereye L. IEEE Transactions on Consumer Electronics
40 Extended water wave optimization (EWWO) technique: a proposed approach for task scheduling in IoMT and healthcare applications Bapuram B.; Subramanian M.; Mahendran A.; Ghafir I.; Ellappan V.; Hamada M. Evolutionary Intelligence
41 DAIDNet: A Lightweight Domain Aware Architecture for Automated Detection of Network Penetrations Gupta P., Jain A., Ikram S.T., Gadekallu T.R., Srivastava G. IEEE Transactions on Network and Service Management
42 An Emoticon-Based Novel Sarcasm Pattern Detection Strategy to Identify Sarcasm in Microblogging Social Networks Nirmala M.; Gandomi A.H.; Babu M.R.; Babu L.D.D.; Patan R. IEEE Transactions on Computational Social Systems
43 Multimodal Biomedical Image Segmentation using Multi-Dimensional U-Convolutional Neural Network Srinivasan S., Durairaju K., Deeba K., Mathivanan S.K., Karthikeyan P., Shah M.A. BMC Medical Imaging
44 Leveraging ANFIS with Adam and PSO optimizers for Parkinson’s disease Pasha A., Ahmed S.T., Painam R.K., Mathivanan S.K., P K., Mallik S., Qin H. Heliyon
45 Enhancing cervical cancer detection and robust classification through a fusion of deep learning models Mathivanan S.K., Francis D., Srinivasan S., Khatavkar V., P K., Shah M.A. Scientific Reports
46 Detection of Parkinson disease using multiclass machine learning approach Srinivasan S.; Ramadass P.; Mathivanan S.K.; Panneer Selvam K.; Shivahare B.D.; Shah M.A. Scientific Reports
47 Blockchain Based an Efficient and Secure Privacy Preserved Framework for Smart Cities Padma A., Ramaiah M. IEEE Access
48 GLSBIoT: GWO-based enhancement for lightweight scalable blockchain for IoT with trust based consensus Padma A., Ramaiah M. Future Generation Computer Systems
49 Efficient improvement of energy detection technique in cognitive radio networks using K-nearest neighbour (KNN) algorithm Musuvathi A.S.S., Archbald J.F., Velmurugan T., Sumathi D., Renuga Devi S., Preetha K.S. Eurasip Journal on Wireless Communications and Networking
50 SURVEY ON TECHNICAL ADVANCEMENTS AND RENOVATIONS IN FEDERATED LEARNING Balaji S., Tulshain S., Modi M., Dalei A., Sumathi D. Malaysian Journal of Computer Science
51 ERAM-EE: Efficient resource allocation and management strategies with energy efficiency under fog?internet of things environments Periasamy P., Ujwala R., Srikar K., Durga Sai Y.V., Preetha K.S., Sumathi D., Sayeed M.S. Connection Science
52 Intelligent Security System for Preventing DDoS Attacks for 6G Enabled WBSN using Improve Grey Wolf Optimization Muniyandi A.P.; Balusamy B.; Dhanaraj R.K.; D S.; S N.; S P.K.; Alroobaea R.; Paramasivam A. IEEE Transactions on Consumer Electronics
53 A modified generative adversarial networks with Yolov5 for automated forest health diagnosis from aerial imagery and Tabu search algorithm Jayagopal P., Purushothaman Janaki K., Mohan P., Kondapaneni U.B., Periyasamy J., Mathivanan S.K., Dalu G.T. Scientific Reports
54 Gradient scaling and segmented SoftMax Regression Federated Learning (GDS-SRFFL): a novel methodology for attack detection in industrial internet of things (IIoT) networks Rajasekaran V.A., Indirajithu A., Jayalakshmi P., Nayyar A., Balusamy B. Journal of Supercomputing
55 Leveraging ensemble learning for stealth assessment model with game-based learning environment Rajendran D., Santhanam P. Soft Computing
56 Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things Nallakaruppan M.K., Somayaji S.R.K., Fuladi S., Benedetto F., Ulaganathan S.K., Yenduri G. IEEE Access
57 MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment Jagadeesh G., Gitanjali J., Vellingiri J., Pounambal M., Sathiyamoorthy E., Iwendi C. Journal of Supercomputing
58 Federated recurrent-based adaptive battle royale algorithm for privacy-preserving data aggregation in industrial IoT: a signal, image, and video processing perspective Jagadeesh G., Pounambal M., ArivuSelvan K., Sathiyamoorthy E., Vellingiri J., Madhu Viswanatham V., Iwendi C. Signal, Image and Video Processing
59 Federated recurrent-based adaptive battle royale algorithm for privacy-preserving data aggregation in industrial IoT: a signal, image, and video processing perspective Jagadeesh G., Pounambal M., ArivuSelvan K., Sathiyamoorthy E., Vellingiri J., Madhu Viswanatham V., Iwendi C. Signal, Image and Video Processing
60 An enhanced framework for smart automated evaluations of answer scripts using NLP and deep learning methods G M., R.K N., M M., V S. Multimedia Tools and Applications
61 Archimedes Fire Hawk Optimization enabled feature selection with deep maxout for network intrusion detection Rani B.S., Vairamuthu S., Subramanian S. Computers and Security
62 Fuzzy Swin transformer for Land Use/ Land Cover change detection using LISS-III Satellite data MohanRajan S.N., Loganathan A., Manoharan P., Alenizi F.A. Earth Science Informatics
63 Fine-tuning digital FIR filters with gray wolf optimization for peak performance R A.; Samiappan S.; Prabukumar M. Scientific reports
64 Nonparametric Statistical Feature Scaling Based Quadratic Regressive Convolution Deep Neural Network for Software Fault Prediction Sivavelu S., Palanisamy V. Computers, Materials and Continua
65 Secured and Sustainable Supply Chain Management Using Key Escrow Encryption Technique in Blockchain Mechanism Anitha A., Priya M., Nallakaruppan M.K., Natesan D., Kushagra Jaiswal C.N., Srivastava H.K. EAI Endorsed Transactions on Internet of Things
66 Hybridization of rough set?wrapper method with regularized combinational LSTM for seasonal air quality index prediction Manna T., Anitha A. Neural Computing and Applications
67 Assessment of land use and land cover change detection and prediction using deep learning techniques for the southwestern coastal region, Goa, India Naik N., Chandrasekaran K., Meenakshi Sundaram V., Panneer P. Environmental Monitoring and Assessment
68 Detection of Marchiafava Bignami disease using distinct deep learning techniques in medical diagnostics Satheesh Kumar J., Vinoth Kumar V., Mahesh T.R., Alqahtani M.S., Prabhavathy P., Manikandan K., Guluwadi S. BMC Medical Imaging
69 Geospatial approach in modeling linear, areal, and relief morphometric interactions in Dabus river basin ecology for sustainable water resource management Bahiru T.K., Aldosary A.S., Kafy A.-A., Rahman M.T., Nath H., Kalaivani S., Sarker D., Alsulamy S., Khedher K.M., Shohan A.A.A., Ferdous M.N., Elhag M. Groundwater for Sustainable Development
70 MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment Jagadeesh G., Gitanjali J., Vellingiri J., Pounambal M., Sathiyamoorthy E., Iwendi C. Journal of Supercomputing
71 Biochanin A prevents buccal pouch carcinogenesis by enhancing carcinogen detoxification and antioxidant status in hamsters Nivedha J., Ahmad Wadaan M., Gitanjali J., Kaliyamoorthi K., Subashchandrabose O., Carmel Raj T., Lakshmanan V., Ravindran B. Journal of King Saud University – Science
72 Exploring cutting-edge advances in green ammonia production and storage technologies Sarangi P.K., Srivastava R.K., Gitanjali J., Sathiyan G., Venkatesan G., Kandasamy S. Fuel
73 Evaluation on novel Kalina power generation system through exergoenvironmental analysis Maheswari G.U., Ganesh N.S., Srinivas T., Reddy B.V. Case Studies in Thermal Engineering
74 Medical Image Fusion for Brain Tumor Diagnosis Using Effective Discrete Wavelet Transform Methods Ramaraj V., Swamy M.V.A., Sankar M.K. Journal of Information Systems Engineering and Business Intelligence
75 Improving the BERT model for long text sequences in question answering domain Ramaraj V., Swamy M.V.A., Prince E.E., Kumar C. International Journal of Advances in Applied Sciences
76 GAN with CCSO: generative adversarial network-driven CAViaR competitive swarm optimizer for medical video super resolution Nathiya S.; Sujatha R. Multimedia Tools and Applications
77 Correlation between Vaccination and Child Mortality Rate Using Multivariate Linear Regression Model Revathi A., Kaladevi R., Vimaladevi M., Hariharan S., Cherukuri A.K., Sujatha R. Journal of Information and Knowledge Management
78 Improving the BERT model for long text sequences in question answering domain Ramaraj V., Swamy M.V.A., Prince E.E., Kumar C. International Journal of Advances in Applied Sciences
79 Brain Tumor Classification Using a Pre-Trained Auxiliary Classifying Style-Based Generative Adversarial Network Kumaar M.A.; Samiayya D.; Rajinikanth V.; Durai Raj Vincent P.M.; Kadry S. International Journal of Interactive Multimedia and Artificial Intelligence
80 iLIAC: An approach of identifying dissimilar groups on unstructured numerical image dataset using improved agglomerative clustering technique S S.K.; Ahmed S.T.; Fathima A.S.; Mathivanan S.K.; Jayagopal P.; Saif A.; Gupta S.K.; Sinha G. Multimedia Tools and Applications
81 A modified generative adversarial networks with Yolov5 for automated forest health diagnosis from aerial imagery and Tabu search algorithm Jayagopal P., Purushothaman Janaki K., Mohan P., Kondapaneni U.B., Periyasamy J., Mathivanan S.K., Dalu G.T. Scientific Reports
82 A modified generative adversarial networks with Yolov5 for automated forest health diagnosis from aerial imagery and Tabu search algorithm Jayagopal P., Purushothaman Janaki K., Mohan P., Kondapaneni U.B., Periyasamy J., Mathivanan S.K., Dalu G.T. Scientific Reports
83 Electric bus arrival and charging station placement assessment using machine learning techniques Reda H., Mohapatra S.K., Das T.K., Dash S.K. International Journal of Sustainable Engineering
84 The Metaverse for Cognitive Health: A Paradigm Shift Ramu S.P.; Srivastava G.; Chengoden R.; Victor N.; Maddikunta P.K.R.; Gadekallu T.R. IEEE Consumer Electronics Magazine
85 IncepV3Dense: Deep Ensemble based Average Learning Strategy for identification of Micro-nutrient deficiency in banana crop Sudhakar M., Swarna Priya R. IEEE Access
86 Priority Based Energy Efficient MAC Protocol by Varying Data Rate for Wireless Body Area Network Sangeetha R., Gandhi U.D. Computer Systems Science and Engineering
87 PrecisionLymphoNet: Advancing Malignant Lymphoma Diagnosis via Ensemble Transfer Learning with CNNs Rajadurai S., Perumal K., Ijaz M.F., Chowdhary C.L. Diagnostics
88 Secure and efficient data storage with Rivest Shamir Adleman algorithm in cloud environment Elumalai E.; Muruganandam D. Bulletin of Electrical Engineering and Informatics
89 CIA Security for Internet of Vehicles and Blockchain-AI Integration Hai T., Aksoy M., Iwendi C., Ibeke E., Mohan S. Journal of Grid Computing
90 A novel approach for self-driving car in partially observable environment using life long reinforcement learning Md A.Q., Jaiswal D., Mohan S., Innab N., Sulaiman R., Alaoui M.K., Ahmadian A. Sustainable Energy, Grids and Networks
91 Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things Nallakaruppan M.K., Somayaji S.R.K., Fuladi S., Benedetto F., Ulaganathan S.K., Yenduri G. IEEE Access
92 A novel QoS prediction model for web services based on an adaptive neuro-fuzzy inference system using COOT optimization Jithendra T., Khan M.Z., Sharief Basha S., Das R., Divya A., Chowdhary C.L., Alahmadi A., Alahmadi A.H. IEEE Access
93 FedHealthFog: A federated learning-enabled approach towards healthcare analytics over fog computing platform Tripathy S.S., Bebortta S., Chowdhary C.L., Mukherjee T., Kim S., Shafi J., Ijaz M.F. Heliyon
94 Comparative analysis of GAN-based fusion deep neural models for fake face detection Nallakaruppan M.K., Chowdhary C.L., Somayaji S., Chaturvedi H., R S., Rauf H.T., Sharaf M. Mathematical biosciences and engineering : MBE
95 PrecisionLymphoNet: Advancing Malignant Lymphoma Diagnosis via Ensemble Transfer Learning with CNNs Rajadurai S., Perumal K., Ijaz M.F., Chowdhary C.L. Diagnostics
96 Segmentation and detection of skin cancer using fuzzy cognitive map and deep Seg Net Kumar K.A., Vanmathi C. Soft Computing
97 Hybrid intelligent technique for intrusion detection in cyber physical systems with improved feature set Sagar M., Vanmathi C. Journal of Intelligent and Fuzzy Systems
98 Secured and Sustainable Supply Chain Management Using Key Escrow Encryption Technique in Blockchain Mechanism Anitha A., Priya M., Nallakaruppan M.K., Natesan D., Kushagra Jaiswal C.N., Srivastava H.K. EAI Endorsed Transactions on Internet of Things
99 Semantic Web Techniques for Clinical Topic Detection in Health Care Raman R.; Sahayaraj K.A.; Soni M.; Nayak N.R.; Govindaraj R.; Singh N.K. Computer Assisted Methods in Engineering and Science
100 PrecisionLymphoNet: Advancing Malignant Lymphoma Diagnosis via Ensemble Transfer Learning with CNNs Rajadurai S., Perumal K., Ijaz M.F., Chowdhary C.L. Diagnostics
101 An optimized handwritten polynomial equations solver using an enhanced inception V4 model Senthilkumar S.; Brindha K.; Chatterjee J.M.; Popat A.; Gupta L.; Verma A. Multimedia Tools and Applications
102 Opti-FOG: Optimizing Resource Allocation with Anti-Inspired FOG Node Selection Karthikeyan P.; Brindha K. IEEE Access
103 Explainable Soft Attentive EfficientNet for breast cancer classification in histopathological images Peta J., Koppu S. Biomedical Signal Processing and Control
104 A Framework for Platform-Agnostic Blockchain and IoT Based Insurance System Guruprakash J., Tokmakov D., Krithika L.B., Koppu S., Srinivasa Perumal R., Bekyarova-Tokmakova A., Milev M. IEEE Access
105 Industry 5.0 in Smart Education: Concepts, Applications, Challenges, Opportunities, and Future Directions Supriya Y., Bhulakshmi D., Bhattacharya S., Gadekallu T.R., Vyas P., Kaluri R., Sumathy S., Koppu S., Brown D.J., Mahmud M. IEEE Access
106 Enhancing Hyperspectral Image Classification for Land Use Land Cover with Dilated Neighbourhood Attention Transformer and Crow Search Optimization Tejasree G., Agilandeeswari L. IEEE Access
107 Optimal Semi-Fragile Watermarking based on Maximum Entropy Random Walk and Swin Transformer for Tamper Localization Aberna P., Agilandeeswari L. IEEE Access
108 An extensive review of hyperspectral image classification and prediction: techniques and challenges Tejasree G., Agilandeeswari L. Multimedia Tools and Applications
109 A hyperspectral unmixing model using convolutional vision transformer Bhakthan S.M., Loganathan A. Earth Science Informatics
110 Semi-Blind watermarking using convolutional attention-based turtle shell matrix for tamper detection and recovery of medical images Palani A.; Loganathan A. Expert Systems with Applications
111 A novel multi-class land use/land cover classification using deep kernel attention transformer for hyperspectral images Tejasree G., L A. Earth Science Informatics
112 Fuzzy Swin transformer for Land Use/ Land Cover change detection using LISS-III Satellite data MohanRajan S.N., Loganathan A., Manoharan P., Alenizi F.A. Earth Science Informatics
113 Land use/land cover (LULC) classification using deep-LSTM for hyperspectral images Tejasree G., Agilandeeswari L. Egyptian Journal of Remote Sensing and Space Science
114 A comprehensive review on secure biometric-based continuous authentication and user profiling Ayeswarya S.; John Singh K. IEEE Access
115 A novel modified switched capacitor multilevel inverter using SARC-DQRLC controlling mechanisms for grid systems Arun Prasad D.; Muralikrishnan G.; Navaneethan C.; Meenatchi S. International Journal of Hydrogen Energy
116 A Framework for Platform-Agnostic Blockchain and IoT Based Insurance System Guruprakash J., Tokmakov D., Krithika L.B., Koppu S., Srinivasa Perumal R., Bekyarova-Tokmakova A., Milev M. IEEE Access
117 Quantum Channel Optimization: Integrating Quantum-Inspired Machine Learning with Genetic Adaptive Strategies Vijay Anand R.; Magesh G.; Alagiri I.; Brahmam M.G.; Balusamy B.; Benedetto F. IEEE Access
118 Reliable water quality prediction and parametric analysis using explainable AI models Nallakaruppan M.K., Gangadevi E., Shri M.L., Balusamy B., Bhattacharya S., Selvarajan S. Scientific Reports
119 Industry 5.0 in Smart Education: Concepts, Applications, Challenges, Opportunities, and Future Directions Supriya Y., Bhulakshmi D., Bhattacharya S., Gadekallu T.R., Vyas P., Kaluri R., Sumathy S., Koppu S., Brown D.J., Mahmud M. IEEE Access
120 The Metaverse for Cognitive Health: A Paradigm Shift Ramu S.P.; Srivastava G.; Chengoden R.; Victor N.; Maddikunta P.K.R.; Gadekallu T.R. IEEE Consumer Electronics Magazine
121 An explainable transfer learning framework for multi-classification of lung diseases in chest X-rays Patel A.N., Murugan R., Srivastava G., Maddikunta P.K.R., Yenduri G., Gadekallu T.R., Chengoden R. Alexandria Engineering Journal
122 Remote Sensing for Agriculture in the Era of Industry 5.0-A Survey Victor N., Maddikunta P.K.R., Mary D.R.K., Murugan R., Chengoden R., Gadekallu T.R., Rakesh N., Zhu Y., Paek J. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
123 Software Defined Networking Assisted Electric Vehicle Charging: Towards Smart Charge Scheduling and Management S A.K.; Prathiba S.B.; Moorthy R.S.; Srivastava G.; Gadekallu T.R. IEEE Transactions on Network Science and Engineering
124 Aspect Category Detection of Mobile Edge Customer Reviews: A Distributed and Trustworthy Restaurant Recommendation System Abbas S.; Boulila W.; Driss M.; Victor N.; Sampedro G.A.; Abisado M.; Gadekallu T.R. IEEE Transactions on Consumer Electronics
125 Improved Transformer-Based Privacy-Preserving Architecture for Intrusion Detection in Secure V2X Communications Lai Q., Xiong C., Chen J., Wang W., Chen J., Gadekallu T.R., Cai M., Hu X. IEEE Transactions on Consumer Electronics
126 Privacy-Enhanced Pneumonia Diagnosis: IoT-Enabled Federated Multi-Party Computation in Industry 5.0 Siddique A.A.; Boulila W.; Alshehri M.S.; Ahmed F.; Gadekallu T.R.; Victor N.; Qadri M.T.; Ahmad J. IEEE Transactions on Consumer Electronics
127 Deep Incomplete Multi-View Clustering Via Information Bottleneck for Pattern Mining of Data in Extreme-Environment IoT Gao J.; Liu M.; Li P.; Laghari A.A.; Javed A.R.; Victor N.; Gadekallu T.R. IEEE Internet of Things Journal
128 Lightweight Blockchain-Enhanced Mutual Authentication Protocol for UAVs Wang W., Han Z., Gadekallu T.R., Raza S., Tanveer J., Su C. IEEE Internet of Things Journal
129 Sustainable Fog-Assisted Intelligent Monitoring Framework for Consumer Electronics in Industry 5.0 Applications Tripathy S.S., Bebortta S., Gadekallu T.R. IEEE Transactions on Consumer Electronics
130 The Metaverse for Cognitive Health: A Paradigm Shift Ramu S.P.; Srivastava G.; Chengoden R.; Victor N.; Maddikunta P.K.R.; Gadekallu T.R. IEEE Consumer Electronics Magazine
131 Review on Improved Machine Learning Techniques for Predicting Chronic Diseases Abirami L., Karthikeyan J. Optical Memory and Neural Networks (Information Optics)
132 Deep learning for intelligent demand response and smart grids: A comprehensive survey Boopathy P., Liyanage M., Deepa N., Velavali M., Reddy S., Maddikunta P.K.R., Khare N., Gadekallu T.R., Hwang W.-J., Pham Q.-V. Computer Science Review
133 2P3FL: A Novel Approach for Privacy Preserving in Financial Sectors Using Flower Federated Learning Dasari S.; Kaluri R. CMES – Computer Modeling in Engineering and Sciences
134 Industry 5.0 in Smart Education: Concepts, Applications, Challenges, Opportunities, and Future Directions Supriya Y., Bhulakshmi D., Bhattacharya S., Gadekallu T.R., Vyas P., Kaluri R., Sumathy S., Koppu S., Brown D.J., Mahmud M. IEEE Access
135 Consumer Product Recommendation System using Adapted PSO with Federated Learning Method Devarajan G.G.; Nagarajan S.M.; A D.; T V.; Kaluri R. IEEE Transactions on Consumer Electronics
136 An Effective Classification of DDoS Attacks in a Distributed Network by Adopting Hierarchical Machine Learning and Hyperparameters Optimization Techniques Dasari S., Kaluri R. IEEE Access
137 Evaluation of performance enhancement in Ethereum fraud detection using oversampling techniques Ravindranath V., Nallakaruppan M.K., Shri M.L., Balusamy B., Bhattacharyya S. Applied Soft Computing
138 Secured and Sustainable Supply Chain Management Using Key Escrow Encryption Technique in Blockchain Mechanism Anitha A., Priya M., Nallakaruppan M.K., Natesan D., Kushagra Jaiswal C.N., Srivastava H.K. EAI Endorsed Transactions on Internet of Things
139 Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things Nallakaruppan M.K., Somayaji S.R.K., Fuladi S., Benedetto F., Ulaganathan S.K., Yenduri G. IEEE Access
140 An Explainable AI framework for credit evaluation and analysis Nallakaruppan M.K., Balusamy B., Shri M.L., Malathi V., Bhattacharyya S. Applied Soft Computing
141 Decision Tree Based Crowd Funding for Kickstarter Projects Grover V., Anbarasi A., Fuladi S., Nallakaruppan M.K. EAI Endorsed Transactions on Scalable Information Systems
142 Comparative analysis of GAN-based fusion deep neural models for fake face detection Nallakaruppan M.K., Chowdhary C.L., Somayaji S., Chaturvedi H., R S., Rauf H.T., Sharaf M. Mathematical biosciences and engineering : MBE
143 Advancing solar energy integration: Unveiling XAI insights for enhanced power system management and sustainable future Nallakaruppan M.K., Shankar N., Bhuvanagiri P.B., Padmanaban S., Bhatia Khan S. Ain Shams Engineering Journal
144 Reliable water quality prediction and parametric analysis using explainable AI models Nallakaruppan M.K., Gangadevi E., Shri M.L., Balusamy B., Bhattacharya S., Selvarajan S. Scientific Reports
145 A Novel Early Detection and Prevention of Coronary Heart Disease Framework Using Hybrid Deep Learning Model and Neural Fuzzy Inference System Ramesh B., Lakshmanna K. IEEE Access
146 Deep learning for intelligent demand response and smart grids: A comprehensive survey Boopathy P., Liyanage M., Deepa N., Velavali M., Reddy S., Maddikunta P.K.R., Khare N., Gadekallu T.R., Hwang W.-J., Pham Q.-V. Computer Science Review
147 The Metaverse for Cognitive Health: A Paradigm Shift Ramu S.P.; Srivastava G.; Chengoden R.; Victor N.; Maddikunta P.K.R.; Gadekallu T.R. IEEE Consumer Electronics Magazine
148 Aspect Category Detection of Mobile Edge Customer Reviews: A Distributed and Trustworthy Restaurant Recommendation System Abbas S.; Boulila W.; Driss M.; Victor N.; Sampedro G.A.; Abisado M.; Gadekallu T.R. IEEE Transactions on Consumer Electronics
149 A Federated Deep Learning Framework for Privacy-Preserving Consumer Electronics Recommendations Wu J.; Zhang J.; Bilal M.; Han F.; Victor N.; Xu X. IEEE Transactions on Consumer Electronics
150 Privacy-Enhanced Pneumonia Diagnosis: IoT-Enabled Federated Multi-Party Computation in Industry 5.0 Siddique A.A.; Boulila W.; Alshehri M.S.; Ahmed F.; Gadekallu T.R.; Victor N.; Qadri M.T.; Ahmad J. IEEE Transactions on Consumer Electronics
151 Deep Incomplete Multi-View Clustering Via Information Bottleneck for Pattern Mining of Data in Extreme-Environment IoT Gao J.; Liu M.; Li P.; Laghari A.A.; Javed A.R.; Victor N.; Gadekallu T.R. IEEE Internet of Things Journal
152 An artificial intelligence-based decision support system for early and accurate diagnosis of Parkinson’s Disease T.R. M., V. V.K., Bhardwaj R., Khan S.B., Alkhaldi N., Victor N., Verma A. Decision Analytics Journal
153 Remote Sensing for Agriculture in the Era of Industry 5.0-A Survey Victor N., Maddikunta P.K.R., Mary D.R.K., Murugan R., Chengoden R., Gadekallu T.R., Rakesh N., Zhu Y., Paek J. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
154 Development of a double resampling based least-squares particle filter for accurate position estimation of a GPS receiver in Visakhapatnam region of the Indian subcontinent Kumar N.; Sirish Kumar P.; Victor N.; Gadekallu T.R.; Mohiddin M.K.; Tiwari S.; Minchula V.K. IEEE Sensors Journal
155 ERACMA: Expressive and Revocable Access Control With Multi-Authority for AIoT-Enabled Human Centric Consumer Electronics Zhuang Y.; Wang C.; Zheng W.; Victor N.; Gadekallu T.R. IEEE Transactions on Consumer Electronics
156 The Reliability and Economic Evaluation Approach for Various Configurations of EV Charging Stations Vaishali K., Prabha D.R. IEEE Access
157 Automated EEG based Emotion Detection using Bonobo Optimizer with Deep Learning on Human Computer Interaction Siva Satya Sreedhar P., Minu M.S., Vidyasri P., Omotunde H., Tamizharasi A., Logarasu R., Rama Prabha K.P., Subashree V. Journal of Intelligent Systems and Internet of Things
158 Peanut maturity detection assessment using cross-layer multi-perception neural network based on hyperspectral sensory image feature observation Balasubramaniyan M., Navaneethan C. Journal of Intelligent and Fuzzy Systems
159 A novel modified switched capacitor multilevel inverter using SARC-DQRLC controlling mechanisms for grid systems Arun Prasad D.; Muralikrishnan G.; Navaneethan C.; Meenatchi S. International Journal of Hydrogen Energy
160 Development of secure and authentic access controlling techniques using the pushback request response (PRR) approach for blockchain healthcare applications Venkatesan M., Mani P. Optical and Quantum Electronics
161 GNViT- An enhanced image-based groundnut pest classification using Vision Transformer (ViT) model Venkatasaichandrakanth P., Iyapparaja M. PLoS ONE
162 GNViT- An enhanced image-based groundnut pest classification using Vision Transformer (ViT) model P V., M I. PloS one
163 GROUNDNUT CROP PEST DETECTION AND CLASSIFICATION USING COMPREHENSIVE DEEPLEARNING MODELS Venkatasaichandrakanth P., Iyapparaja M. Suranaree Journal of Science and Technology
164 A survey on pest detection and classification in field crops using artificial intelligence techniques Venkatasaichandrakanth P., Iyapparaja M. International Journal of Intelligent Robotics and Applications
165 Long-Term Preference Mining with Temporal and Spatial Fusion For Point-of-Interest Recommendation Acharya M., Mohbey K.K., Rajput D.S. IEEE Access
166 A systematic review on diabetic retinopathy detection and classification based on deep learning techniques using fundus images Bhulakshmi D.; Rajput D.S. PeerJ Computer Science
167 Optimized Fuzzy Logic based Energy-Efficient Geographical Data Routing in Internet of Things Aravind K., Maddikunta P.K.R. IEEE Access
168 Deep learning for intelligent demand response and smart grids: A comprehensive survey Boopathy P., Liyanage M., Deepa N., Velavali M., Reddy S., Maddikunta P.K.R., Khare N., Gadekallu T.R., Hwang W.-J., Pham Q.-V. Computer Science Review
169 Remote Sensing for Agriculture in the Era of Industry 5.0-A Survey Victor N., Maddikunta P.K.R., Mary D.R.K., Murugan R., Chengoden R., Gadekallu T.R., Rakesh N., Zhu Y., Paek J. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
170 GPT (Generative Pre-trained Transformer) A Comprehensive Review on Enabling Technologies, Potential Applications, Emerging Challenges, and Future Directions Yenduri G., Ramalingam M., Chemmalar Selvi G., Supriya Y., Srivastava G., Maddikunta P.K.R., Deepti Raj G., Jhaveri R.H., Prabadevi B., Wang W., Vasilakos A.V., Gadekallu T.R. IEEE Access
171 An explainable transfer learning framework for multi-classification of lung diseases in chest X-rays Patel A.N., Murugan R., Srivastava G., Maddikunta P.K.R., Yenduri G., Gadekallu T.R., Chengoden R. Alexandria Engineering Journal
172 The Metaverse for Cognitive Health: A Paradigm Shift Ramu S.P.; Srivastava G.; Chengoden R.; Victor N.; Maddikunta P.K.R.; Gadekallu T.R. IEEE Consumer Electronics Magazine
173 Integration of 5G technologies for enhanced performance in optical network communication with channel allocation and reallocation Parveen Banu M., Jothilakshmi R., Radha Rammohan S., Vijay Anand R., Anandan P., Aly M.H. Optical and Quantum Electronics
174 Gradient scaling and segmented SoftMax Regression Federated Learning (GDS-SRFFL): a novel methodology for attack detection in industrial internet of things (IIoT) networks Rajasekaran V.A., Indirajithu A., Jayalakshmi P., Nayyar A., Balusamy B. Journal of Supercomputing
175 Quantum Channel Optimization: Integrating Quantum-Inspired Machine Learning with Genetic Adaptive Strategies Vijay Anand R.; Magesh G.; Alagiri I.; Brahmam M.G.; Balusamy B.; Benedetto F. IEEE Access
176 Energy-efficient cluster head using modified fuzzy logic with WOA and path selection using enhanced CSO in IoT-enabled smart agriculture systems Chandrasekaran S.K., Rajasekaran V.A. Journal of Supercomputing
177 VMMISD: An efficient load balancing model for Virtual Machine Migrations via fused Metaheuristics with Iterative Security Measures and Deep Learning Optimizations Brahmam M.G., Vijay Anand R. IEEE Access
178 IMNMAGN: Integrative Multimodal Approach for Enhanced Detection of Neurodegenerative Diseases Using fusion of Multidomain Analysis with Graph Networks Vijay Anand R., Shanmuga Priyan T., Brahmam M.G., Balusamy B., Benedetto F. IEEE Access
179 Deep learning for intelligent demand response and smart grids: A comprehensive survey Boopathy P., Liyanage M., Deepa N., Velavali M., Reddy S., Maddikunta P.K.R., Khare N., Gadekallu T.R., Hwang W.-J., Pham Q.-V. Computer Science Review
180 GPT (Generative Pre-trained Transformer) ? A Comprehensive Review on Enabling Technologies, Potential Applications, Emerging Challenges, and Future Directions Yenduri G., Ramalingam M., Chemmalar Selvi G., Supriya Y., Srivastava G., Maddikunta P.K.R., Deepti Raj G., Jhaveri R.H., Prabadevi B., Wang W., Vasilakos A.V., Gadekallu T.R. IEEE Access
181 Hyperspectral image classification using Walsh Hadamard transform- based key band selection and deep convolutional neural networks Lakshmi Priya G.G., Chandra Mouli P.V.S.S.R., Domnic S., Chemmalar Selvi G., Cho B.-K. International Journal of Remote Sensing
182 GPT (Generative Pre-trained Transformer) ? A Comprehensive Review on Enabling Technologies, Potential Applications, Emerging Challenges, and Future Directions Yenduri G., Ramalingam M., Chemmalar Selvi G., Supriya Y., Srivastava G., Maddikunta P.K.R., Deepti Raj G., Jhaveri R.H., Prabadevi B., Wang W., Vasilakos A.V., Gadekallu T.R. IEEE Access
183 Automatic detection of potholes using VGG-16 pre-trained network and Convolutional Neural Network Swain S., Tripathy A.K. Heliyon
184 Real-Time HealthCare Recommendation System for Social Media Platforms Maruthavani E., Shantharajah S. IEEE Access
185 An early-stage Alzheimer’s disease detection using various imaging modalities and techniques ? A mini-review Deenadayalan T.; Shantharajah S.P. Journal of Integrated Science and Technology
186 Detection of lanes, obstacles and drivable areas for self-driving cars using multifusion perception metrics Kumar A.K., Palanisamy V. Journal of Autonomous Intelligence
187 Nonparametric Statistical Feature Scaling Based Quadratic Regressive Convolution Deep Neural Network for Software Fault Prediction Sivavelu S., Palanisamy V. Computers, Materials and Continua
188 Visual attention condenser model for multiple disease detection from heterogeneous medical image modalities Kotei E.; Thirunavukarasu R. Multimedia Tools and Applications
189 A Novel Convolutional Neural Network Model for Automatic Speaker Identification from Speech Signals Pandian J.A., Thirunavukarasu R., Kotei E. IEEE Access
190 IoT sensor data retrieval and analysis through cloud environment for effective power management Ch S., K U., Yadav R.K., K.V D.S., N.P D., Sharma P. Measurement: Sensors
191 Multi-objective Meta-heuristic Technique for Energy Efficient Virtual Machine Placement in Cloud Computing Data Centers Vijaya C., Srinivasan P. Informatica (Slovenia)
192 Enriched energy optimized LEACH protocol for efficient data transmission in wireless sensor network Rajaram V.; Pandimurugan V.; Rajasoundaran S.; Rodrigues P.; Kumar S.V.N.S.; Selvi M.; Loganathan V. Wireless Networks
193 Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network Dinesh K.; Santhosh Kumar S.V.N. International Journal of Information Security
194 LAPEP?Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc network Jayashree S.; Santhosh Kumar S.V.N. Wireless Networks
195 Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks Rajasoundaran S.; Kumar S.V.N.S.; Selvi M.; Thangaramya K.; Arputharaj K. Wireless Networks
196 An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks Rajkumar Y.; Kumar S.V.N.S. Wireless Networks
197 Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles Rajasoundaran S.; Kumar S.V.N.S.; Selvi M.; Kannan A. Peer-to-Peer Networking and Applications
198 Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural network Bangali H., Rodrigues P., Pandimurugan V., Rajasoundaran S., Kumar S.V.N.S., Selvi M., Kannan A. Wireless Networks
199 GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks Dinesh K., Svn S.K. Peer-to-Peer Networking and Applications
200 A comprehensive survey on communication techniques for the realization of intelligent transportation systems in IoT based smart cities Rajkumar Y., Santhosh Kumar S.V.N. Peer-to-Peer Networking and Applications
201 A lightweight privacy preserving distributed certificate-less aggregate based mutual authentication scheme for vehicular adhoc networks Rajkumar Y., Kumar S.V.N.S. Peer-to-Peer Networking and Applications
202 An energy efficient Swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoT Shanmugapriya R., SVN S.K. Peer-to-Peer Networking and Applications
203 An efficient group signature based certificate less verification scheme for vehicular ad-hoc network Jayashree S., Kumar S.V.N.S. Wireless Networks
204 Chaos quantum optimization-based layered diagnosis framework for faulty sensor node diagnosis and classification in wireless sensor networks Babu N., Santhosh Kumar S.V.N. International Journal of Communication Systems
205 HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks Dinesh K.; Santhosh Kumar S.V.N. Peer-to-Peer Networking and Applications
206 PFCAS?Paring free certificate less aggregate scheme for ensuring efficient authentication in vehicular Ad-hoc networks Jayashree S.; Santhosh Kumar S.V.N. Peer-to-Peer Networking and Applications
207 SCIDP?Secure cloud-integrated data dissemination protocol for efficient reprogramming in internet of things Shanmugapriya R.; Santhosh Kumar S.V.N. Cluster Computing
208 An improved Harris Hawks optimizer based feature selection technique with effective two-staged classifier for network intrusion detection system Nandhini U.; SVN S.K. Peer-to-Peer Networking and Applications
209 Optimum design of planar quasi-Yagi antenna for wearable Internet of Things (IoT) applications Dass R.; Thirumoorthy G.; Ananthakrishnan G.; Kannan A.; Rajendran S.; Narayanan M.; Arputharaj K. Microwave and Optical Technology Letters
210 Deciphering Market Dynamics: A Data Science and Machine Learning Approach Using Chaos Theory for Trend Prediction Prabhakar K., Manjula V., Punitha P., Dudekula K.V., Ravi Teja P. International Journal of Intelligent Systems and Applications in Engineering
211 An Innovation development of deep-sea bacterial monitoring and classification based on artificial intelligence microbiological model Vidhyalakshmi M., Manjula V., Mickle Aancy H., Beulah Viji Christiana M., Jogendra Kumar M., Nirmala P., Almoallim H.S., Ali Alharbi S., Raghavan S.S. Automatika
212 Digital evolution: Investigating the dynamic interactions of learners with social media Pradeepa M., Kumaraperumal S., Kasat K., Phaneendra Maguluri L., Salma Shajahan U., Gaikwad S.M. Entertainment Computing
213 A study of learning models for COVID-19 disease prediction Jain S., Roy P.K. Journal of Ambient Intelligence and Humanized Computing
214 MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment Jagadeesh G., Gitanjali J., Vellingiri J., Pounambal M., Sathiyamoorthy E., Iwendi C. Journal of Supercomputing
215 A hybrid machine learning approach for enhanced anomaly detection in drinking water quality Kalaivanan K., Vellingiri J. International Journal of Environmental Studies
216 Federated recurrent-based adaptive battle royale algorithm for privacy-preserving data aggregation in industrial IoT: a signal, image, and video processing perspective Jagadeesh G., Pounambal M., ArivuSelvan K., Sathiyamoorthy E., Vellingiri J., Madhu Viswanatham V., Iwendi C. Signal, Image and Video Processing
217 Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution Vellingiri J.; Vedhavathy T.R.; Senthil Pandi S.; Bala Subramanian C. Peer-to-Peer Networking and Applications
218 Lightweight railroad semantic segmentation network and distance estimation for railroad Unmanned aerial vehicle images Rampriya R.S.; Nathan S.; Suganya R.; Prathiba S.B.; Perumal P.S.; Wang W. Engineering Applications of Artificial Intelligence
219 An early-stage Alzheimer’s disease detection using various imaging modalities and techniques ? A mini-review Deenadayalan T.; Shantharajah S.P. Journal of Integrated Science and Technology
220 Chaos quantum optimization-based layered diagnosis framework for faulty sensor node diagnosis and classification in wireless sensor networks Babu N., Santhosh Kumar S.V.N. International Journal of Communication Systems
221 Blockchain Based an Efficient and Secure Privacy Preserved Framework for Smart Cities Padma A., Ramaiah M. IEEE Access
222 GLSBIoT: GWO-based enhancement for lightweight scalable blockchain for IoT with trust based consensus Padma A., Ramaiah M. Future Generation Computer Systems
223 Remote Sensing for Agriculture in the Era of Industry 5.0-A Survey Victor N., Maddikunta P.K.R., Mary D.R.K., Murugan R., Chengoden R., Gadekallu T.R., Rakesh N., Zhu Y., Paek J. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
224 GPT (Generative Pre-trained Transformer) ? A Comprehensive Review on Enabling Technologies, Potential Applications, Emerging Challenges, and Future Directions Yenduri G., Ramalingam M., Chemmalar Selvi G., Supriya Y., Srivastava G., Maddikunta P.K.R., Deepti Raj G., Jhaveri R.H., Prabadevi B., Wang W., Vasilakos A.V., Gadekallu T.R. IEEE Access
225 An explainable transfer learning framework for multi-classification of lung diseases in chest X-rays Patel A.N., Murugan R., Srivastava G., Maddikunta P.K.R., Yenduri G., Gadekallu T.R., Chengoden R. Alexandria Engineering Journal
226 Lightweight railroad semantic segmentation network and distance estimation for railroad Unmanned aerial vehicle images Rampriya R.S.; Nathan S.; Suganya R.; Prathiba S.B.; Perumal P.S.; Wang W. Engineering Applications of Artificial Intelligence
227 Hand gesture classification framework leveraging the entropy features from sEMG signals and VMD augmented multi-class SVM T. P.; Elumalai V.K.; E. B. Expert Systems with Applications
228 A surface electromyography based hand gesture recognition framework leveraging variational mode decomposition technique and deep learning classifier Prabhavathy T., Elumalai V.K., Balaji E., Sandhiya D. Engineering Applications of Artificial Intelligence
229 Smart COVIDNet: designing an IoT-based COVID-19 disease prediction framework using attentive and adaptive-derived ensemble deep learning Karthikeyan D., Baskaran P., Somasundaram S.K., Sathya K., Srithar S. Knowledge and Information Systems
230 Deep iterative fuzzy pooling in unmanned robotics and autonomous systems for Cyber-Physical systems Ravindra Krishna Chandar V., Baskaran P., Mohanraj G., Karthikeyan D. Journal of Intelligent and Fuzzy Systems
231 Data-Driven Intelligent Condition Adaptation of Feature Extraction for Bearing Fault Detection Using Deep Responsible Active Learning Mahesh T.R., Chandrasekaran S., Ram V.A., Kumar V.V., Vivek V., Guluwadi S. IEEE Access
232 Augmented Intelligence Based COVID-19 Diagnostics and Deep Feature Categorization Based on Federated Learning Ahmed S.T., Venkatesan V.K., T R M., S R., Venkatesan M. IEEE Transactions on Emerging Topics in Computational Intelligence
233 Secure malicious node detection in flying ad-hoc networks using enhanced AODV algorithm Chandrasekar V., Shanmugavalli V., Mahesh T.R., Shashikumar R., Borah N., Kumar V.V., Guluwadi S. Scientific Reports
234 Deep transfer learning with fuzzy ensemble approach for the early detection of breast cancer Sannasi Chakravarthy S.R., Bharanidharan N., Vinoth Kumar V., Mahesh T.R., Alqahtani M.S., Guluwadi S. BMC Medical Imaging
235 An artificial intelligence-based decision support system for early and accurate diagnosis of Parkinson’s Disease T.R. M., V. V.K., Bhardwaj R., Khan S.B., Alkhaldi N., Victor N., Verma A. Decision Analytics Journal
236 Hybrid Ant Lion Mutated Ant Colony Optimizer Technique with Particle Swarm Optimization for Leukemia Prediction Using Microarray Gene Data Mahesh T.R., Santhakumar D., Balajee A., Shreenidhi H.S., Vinoth Kumar V., Annand J.R. IEEE Access
237 Transformative Breast Cancer Diagnosis using CNNs with Optimized ReduceLROnPlateau and Early Stopping Enhancements Mahesh T.R., Thakur A., Gupta M., Sinha D.K., Mishra K.K., Venkatesan V.K., Guluwadi S. International Journal of Computational Intelligence Systems
238 Breast Tumor Classification with Enhanced Transfer Learning Features and Selection Using Chaotic Map-Based Optimization Chakravarthy S., Nagarajan B., Kumar V.V., Mahesh T.R., Sivakami R., Annand J.R. International Journal of Computational Intelligence Systems
239 Mapping of soil suitability for medicinal plants using machine learning methods Roopashree S., Anitha J., Challa S., Mahesh T.R., Venkatesan V.K., Guluwadi S. Scientific Reports
240 Improved energy efficiency using adaptive ant colony distributed intelligent based clustering in wireless sensor networks Sharada K.A., Mahesh T.R., chandrasekaran S., Shashikumar R., Kumar V.V., Annand J.R. Scientific Reports
241 Realization and Prediction of IoT-based Dynamic Social Interactions for the Future Recommendations Kaladevi A.C., Kumar V.V., Velmurugan A.K., Gunasekaran K., Swapna B., Kumar V.D. Ad-Hoc and Sensor Wireless Networks
242 Local Entropy Based Remora Optimization and Sparse Autoencoders for Cancer Diagnosis through Microarray Gene Expression Analysis Bharanidharan N., Sannasi Chakravarthy S., Venkatesan V.K., Abbas M., Mahesh T.R., Mohan E., Venkatesan K. IEEE Access
243 High-Performance Technique for Item Recommendation in Social Networks using Multiview Clustering Anbazhagu U.V., Niveditha V.R., Bhat C.R., Mahesh T.R., Vinoth Kumar V., Swapna B. International Journal of Computers, Communications and Control
244 AN ELIXIR FOR BLOCKCHAIN SCALABILITY WITH CHANNEL BASED CLUSTERED SHARDING Kumar V.V., Padmavathi U., Ranjith C.P., Balaji J., Kumar C.N.S.V. Scalable Computing
245 Enhancing accessibility for improved diagnosis with modified EfficientNetV2-S and cyclic learning rate strategy in women with disabilities and breast cancer Al Moteri M., Mahesh T.R., Thakur A., Vinoth Kumar V., Khan S.B., Alojail M. Frontiers in Medicine
246 Flamingo Jelly Fish search optimization-based routing with deep-learning enabled energy prediction in WSN data communication Subramanian D., Subramaniam S., Natarajan K., Thangavel K. Network: Computation in Neural Systems
247 An integrated energy storage framework with significant energy management and absorption mechanism for machine learning assisted electric vehicle application Valarmathi K., Seetha J., Krishnamoorthy N.V., Hema M., Ramkumar G. Sustainable Computing: Informatics and Systems
248 Hybrid optimization assisted transmit antenna selection for massive MIMO technology Singh C.; Raja P.C.K. Multimedia Tools and Applications
249 Leveraging 5G and cloud computing for outlier detection in IoT environments: A KNN approach Sahaaya Arul Mary S.A.; Anwar Basha H.; Mohanraj G.; Kiruthikaa R.; Saranya N. Internet Technology Letters
250 Deep iterative fuzzy pooling in unmanned robotics and autonomous systems for Cyber-Physical systems Ravindra Krishna Chandar V., Baskaran P., Mohanraj G., Karthikeyan D. Journal of Intelligent and Fuzzy Systems
251 An enhanced framework for smart automated evaluations of answer scripts using NLP and deep learning methods G M., R.K N., M M., V S. Multimedia Tools and Applications
252 Breast Tumor Classification with Enhanced Transfer Learning Features and Selection Using Chaotic Map-Based Optimization Chakravarthy S., Nagarajan B., Kumar V.V., Mahesh T.R., Sivakami R., Annand J.R. International Journal of Computational Intelligence Systems
253 Intelligent Recognition of Multimodal Human Activities for Personal Healthcare Sannasi Chakravarthy S.R.; Bharanidharan N.; Vinoth Kumar V.; Mahesh T.R.; Khan S.B.; Almusharraf A.; Albalawi E. IEEE Access
254 Local Entropy Based Remora Optimization and Sparse Autoencoders for Cancer Diagnosis through Microarray Gene Expression Analysis Bharanidharan N., Sannasi Chakravarthy S., Venkatesan V.K., Abbas M., Mahesh T.R., Mohan E., Venkatesan K. IEEE Access
255 Deep transfer learning with fuzzy ensemble approach for the early detection of breast cancer Sannasi Chakravarthy S.R., Bharanidharan N., Vinoth Kumar V., Mahesh T.R., Alqahtani M.S., Guluwadi S. BMC Medical Imaging
256 DQN Approach for Adaptive Self-Healing of VNFs in Cloud-Native Network Arulappan A., Mahanti A., Passi K., Srinivasan T., Naha R., Raja G. IEEE Access
257 Terahertz Square Core Photonic Crystal Fiber Sensor: Revolutionizing Efficient Blood Cell Detection Through Refractive Index Sensing Based on Surface-Enhanced Spectroscopic Properties Kundu D., Hossain M.S., L T.M., Sahoo S., Karthikeyan S., Ramkumar G., Gopalan A., Prakash P., Ferdous A.H.M.I., Hossain S., Rashed A.N.Z. Plasmonics
258 Enhanced channel prediction in large-scale 5G MIMO-OFDM systems using pyramidal dilation attention convolutional neural network Rathish C.R., Manojkumar B., Thanga Mariappan L., Ashok P., Arun Kumar U., Balan K. Internet Technology Letters
259 A Novel Convolutional Neural Network Model for Automatic Speaker Identification from Speech Signals Pandian J.A., Thirunavukarasu R., Kotei E. IEEE Access
260 Bayesian decision model based reliable route formation in internet of things Kumar M.J., Mishra S., Reddy E.G., Rajmohan M., Murugan S., Vignesh N.A. Indonesian Journal of Electrical Engineering and Computer Science
261 Strategies for dimensionality reduction in hyperspectral remote sensing: A comprehensive overview Vaddi R., Phaneendra Kumar B.L.N., Manoharan P., Agilandeeswari L., Sangeetha V. Egyptian Journal of Remote Sensing and Space Science
262 Deep learning-powered malware detection in cyberspace: a contemporary review Redhu A., Choudhary P., Srinivasan K., Das T.K. Frontiers in Physics
263 Blockchain integration in healthcare: a comprehensive investigation of use cases, performance issues, and mitigation strategies Kasyapa M.S.B., Vanmathi C. Frontiers in Digital Health
264 Strategies for dimensionality reduction in hyperspectral remote sensing: A comprehensive overview Vaddi R., Phaneendra Kumar B.L.N., Manoharan P., Agilandeeswari L., Sangeetha V. Egyptian Journal of Remote Sensing and Space Science
265 Application of Graph Theory for Blockchain Technologies Jayabalasamy G., Pujol C., Latha Bhaskaran K. Mathematics
266 A Comprehensive Study of Deep Learning Techniques to Predict Dissimilar Diseases in Diabetes Mellitus Using IoT Balaraju R.; Lakshmanna K. Recent Advances in Computer Science and Communications
267 Recent Advancements in Fault Diagnosis of Spherical Roller Bearing: A Short Review Senthilnathan N., Babu T.N., Varma K.S.D., Rushmith S., Reddy J.A., Kavitha K.V.N., Prabha D.R. Journal of Vibration Engineering and Technologies
268 Systematic analysis of the role of different foods on breast, lung, and prostate cancer incidence Prasath S.T., Navaneethan C. Food Chemistry Advances
269 Photocatalytic degradation of drugs and dyes using a maching learning approach Anandhi G., Iyapparaja M. RSC Advances
270 Systematic approaches to machine learning models for predicting pesticide toxicity Anandhi G., Iyapparaja M. Heliyon
271 Efficient differential privacy enabled federated learning model for detecting COVID-19 disease using chest X-ray images Ahmed R.; Maddikunta P.K.R.; Gadekallu T.R.; Alshammari N.K.; Hendaoui F.A. Frontiers in Medicine
272 An IoMT-based Federated Learning Survey in Smart Transportation Karnam G.V.; Maddikunta P.K.R. Recent Advances in Computer Science and Communications
273 The Amalgamation of Federated Learning and Explainable Artificial Intelligence for the Internet of Medical Things: A Review Govardanan C.S.; Murugan R.; Yenduri G.; Gurrammagari D.R.; Bhulakshmi D.; Kandati D.R.; Supriya Y.; Gadekallu T.R.; Rathore R.S.; Jhaveri R. Recent Advances in Computer Science and Communications
274 A comprehensive review on transformer network for natural and medical image analysis Thirunavukarasu R.; Kotei E. Computer Science Review
275 A Comprehensive Review on Advancement in Deep Learning Techniques for Automatic Detection of Tuberculosis from Chest X-ray Images Kotei E.; Thirunavukarasu R. Archives of Computational Methods in Engineering
276 Amalgamation of Transfer Learning and Explainable AI for Internet of Medical Things Murugan R.; Paliwal M.; Patibandla R.S.M.L.; Shah P.; Balaga T.R.; Gurrammagari D.R.; Singaravelu P.; Yenduri G.; Jhaveri R. Recent Advances in Computer Science and Communications
277 The Amalgamation of Federated Learning and Explainable Artificial Intelligence for the Internet of Medical Things: A Review Govardanan C.S.; Murugan R.; Yenduri G.; Gurrammagari D.R.; Bhulakshmi D.; Kandati D.R.; Supriya Y.; Gadekallu T.R.; Rathore R.S.; Jhaveri R. Recent Advances in Computer Science and Communications
2023
SL. NO. TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL
1 RetU-Net: An Enhanced U-Net Architecture for Retinal Lesion Segmentation Sundar S.; Sumathy S. International Journal on Artificial Intelligence Tools
2 Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications Sudha K.S.; Jeyanthi N. Peer-to-Peer Networking and Applications
3 EDocDeDup: Electronic Document Data Deduplication Towards Storage Optimization Khaing M.M.; Jeyanthi N. International Journal of Performability Engineering
4 Optimizing rice plant disease detection with crossover boosted artificial hummingbird algorithm based AX-RetinaNet Sankareshwaran S.P.; Jayaraman G.; Muthukumar P.; Krishnan A.S. Environmental Monitoring and Assessment
5 Hierarchical localization algorithm for sustainable ocean health in large-scale underwater wireless sensor networks Ahmad T.; Li X.J.; Cherukuri A.K.; Kim K.-I. Sustainable Computing: Informatics and Systems
6 VitaDNet: A Deep Learning-Based Approach for Vitamin-D Deficiency Prediction Kasyap V.L.V.S.K.B.; Sumathi D.; Reddy M.S.J.; Bhagavan V.S.; Cherukuri A.K. Journal of Information and Knowledge Management
7 A Study of the Corporate Design Packaging of Malaysia’s Processed Food Siek H.L., Liew Y.M., Keoy K.H., Cherukuri A.K. Journal of Information and Knowledge Management
8 A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre Cherukuri A.K.; Sannuthi S.; Elagandula N.; Gadamsetty R.; Singh N.; Jain A.; Sumaiya Thaseen I.; Priya V.; Jonnalagadda A.; Kamalov F. Cybernetics and Information Technologies
9 An Approach for Privacy Preservation Assisted Secure Cloud Computation Swathi V., Vani M.P. Informatica (Slovenia)
10 XDLX: A Memory-Efficient Solution for Backtracking Applications in Big Data Environment using XOR-based Dancing Links Varalakshmi M.; Peer Mohideen P.U.; Thilagavathi M.; Lopez D. International Journal on Recent and Innovation Trends in Computing and Communication
11 Global Hunger Index: A multistage coefficient estimation analysis using machine learning techniques for a hunger free society Sreehari E.; Dhinesh Babu L.D. Journal of Cleaner Production
12 Computer-aided diagnosis using white shark optimizer with attention-based deep learning for breast cancer classification Chandana Mani R.K.; Kamalakannan J. Journal of Intelligent and Fuzzy Systems
13 Technique for breast cancer classification using semi-supervised deep convolutional neural networks with transfer learning models Mani R.K.C., Kamalakannan J. Current Science
14 ERNet: Enhanced ResNet for classification of breast histopathological images Mani R.K.C., Kamalakannan J. Electronic Letters on Computer Vision and Image Analysis
15 Ad hoc-obstacle avoidance-based navigation system using Deep Reinforcement Learning for self-driving vehicles Manikandan N.; Kaliyaperumal G.; Wang Y. IEEE Access
16 Hardware and Software Design for Mobile Robot s Navigation over On-road and Off-road Curvature Paths Manikandan N.S.; Kaliyaperumal G. IEEE Access
17 Energy-aware automatic video annotation tool for autonomous vehicle Manikandan N.S.; Ganesan K. International Journal of Computational Vision and Robotics
18 Energy-aware vehicle/pedestrian detection and close movement alert at nighttime in dense slow traffic on Indian urban roads using a depth camera Manikandan N.S.; Ganesan K. International Journal of Computational Vision and Robotics
19 Public Social Distance Monitoring System Using Object Detection YOLO Deep Learning Algorithm Vijayan R.; Mareeswari V.; Pople V. SN Computer Science
20 Deep Learning Perspectives to Detecting Intrusions in Wireless Sensor Networks Abhale A.B.; Jayaram Reddy A. International Journal of Intelligent Systems and Applications in Engineering
21 Enhancing intrusion detection recursive feature elimination with resampling in WSN Abhale A.B.; Avulapalli J.R. International Journal of System Assurance Engineering and Management
22 An Efficient Intrusion Detection System to Combat Cyber Threats using a Deep Neural Network Model Ramaiah M., Vanmathi C., Khan M.Z., Vanitha M., Deepa M. Journal of ICT Research and Applications
23 A Survey on Deep Learning Based Crop Yield Prediction Archana S.; Senthil Kumar P. Nature Environment and Pollution Technology
24 CPS in block chain smart city application based on distributed ledger based decentralized technique Hemalatha T.; Sangeetha K.; Sasi Kala Rani K.; Kanimozhi K.V.; Lawanyashri M.; Santhi K.; Deepalakshmi R. Measurement: Sensors
25 CPS in block chain smart city application based on distributed ledger based decentralized technique Hemalatha T.; Sangeetha K.; Sasi Kala Rani K.; Kanimozhi K.V.; Lawanyashri M.; Santhi K.; Deepalakshmi R. Measurement: Sensors
26 Parallelisation of machine learning models for credit card fraud detection Banu J.S.; Thaseen Ikram S.; Mohanraj V.; Sanapala K.; Katina P.F. International Journal of System of Systems Engineering
27 An Efficient Intrusion Detection System to Combat Cyber Threats using a Deep Neural Network Model Ramaiah M., Vanmathi C., Khan M.Z., Vanitha M., Deepa M. Journal of ICT Research and Applications
28 Comprehensive performance assessment of Multi-neural ensemble model for mortality prediction in ICU Fathima Begum M.; Narayan S. IEEE Access
29 Blindness detection in diabetic retinopathy using Bayesian variant-based connected component algorithm in Keras and TensorFlow Babu S.A.; Murali S.; Vijayan E.; Anand M.; Ramanathan L. Scientific and Technical Journal of Information Technologies, Mechanics and Optics
30 Sliding principal component and dynamic reward reinforcement learning based IIoT attack detection Ellappan V., Mahendran A., Subramanian M., Jotheeswaran J., Khadidos A.O., Khadidos A.O., Selvarajan S. Scientific Reports
31 A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre Cherukuri A.K.; Sannuthi S.; Elagandula N.; Gadamsetty R.; Singh N.; Jain A.; Sumaiya Thaseen I.; Priya V.; Jonnalagadda A.; Kamalov F. Cybernetics and Information Technologies
32 A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre Cherukuri A.K.; Sannuthi S.; Elagandula N.; Gadamsetty R.; Singh N.; Jain A.; Sumaiya Thaseen I.; Priya V.; Jonnalagadda A.; Kamalov F. Cybernetics and Information Technologies
33 An Efficient Intrusion Detection System to Combat Cyber Threats using a Deep Neural Network Model Ramaiah M., Vanmathi C., Khan M.Z., Vanitha M., Deepa M. Journal of ICT Research and Applications
34 Integration of artificial intelligence in software development process for implementing a secure healthcare system – a review Asha N.; Krishnan S.R.; Gitanjali J. International Journal of Medical Engineering and Informatics
35 Effect of Urbanization Through Land Coverage Classification Sangeetha S.K.B.; Kushwah V.S.; Sumangali K.; Sangeetha R.; Raja K.T.; Mathivanan S.K. Radio Science
36 Optimizing rice plant disease detection with crossover boosted artificial hummingbird algorithm based AX-RetinaNet Sankareshwaran S.P.; Jayaraman G.; Muthukumar P.; Krishnan A.S. Environmental Monitoring and Assessment
37 Image-based Mangifera Indica Leaf Disease Detection using Transfer Learning for Deep Learning Methods Dhawan K., Perumal R.S., Nadesh R.K. Electronic Letters on Computer Vision and Image Analysis
38 Exponential Chimp Optimization Algorithm based Deep Neuro-Fuzzy Network with MapReduce framework for fake news detection in big data analytics Kanchanamala P.; Selva Rani B.; Vairamuthu S. International Journal of Adaptive Control and Signal Processing
39 A New Approach to Neutrosophic Soft Sets and their Application in Decision Making Mohanty R.K., Tripathy B.K. Neutrosophic Sets and Systems
40 Pattern Prediction on Uncertain Big Datasets using Combined Light GBM and LSTM Model Divya Zion G., Tripathy B.K. International Journal of Advances in Soft Computing and its Applications
41 Multi-Level Security in Healthcare by Integrating Lattice-Based Access Control and Blockchain- Based Smart Contracts System Haritha T.; Anitha A. IEEE Access
42 XDLX: A Memory-Efficient Solution for Backtracking Applications in Big Data Environment using XOR-based Dancing Links Varalakshmi M.; Peer Mohideen P.U.; Thilagavathi M.; Lopez D. International Journal on Recent and Innovation Trends in Computing and Communication
43 Traffic and fragmentation aware algorithm for routing and spectrum assignment in Elastic Optical Network (EON) Selva Kumar S.; Kalaivani S.; Siddique Ibrahim S.P.; Swathi G. Optical Fiber Technology
44 Effect of Urbanization Through Land Coverage Classification Sangeetha S.K.B.; Kushwah V.S.; Sumangali K.; Sangeetha R.; Raja K.T.; Mathivanan S.K. Radio Science
45 Spatio-temporal analysis of land use/land cover change detection in small regions using self-supervised lightweight deep learning Naik N.; Chandrasekaran K.; Meenakshi Sundaram V.; Panneer P. Stochastic Environmental Research and Risk Assessment
46 Temporal convolutional network based rice crop yield prediction using multispectral satellite data Mohan A.; Venkatesan M.; Prabhavathy P.; Jayakrishnan A. Infrared Physics and Technology
47 DEEP YOLOv8-BASED HANDBALL DETECTION SYSTEM WITH TRANSFER LEARNING APPROACH Poovaraghan R.J., Prabhavathy P. Journal of Theoretical and Applied Information Technology
48 Segmentation quality assessment network-based object detection and optimized CNN with transfer learning for yoga pose classification for health care Vallabhaneni N.; Prabhavathy P. Soft Computing
49 Ensemble Text Summarization Model for COVID-19-Associated Datasets Chellatamilan T., Narayanasamy S.K., Garg L., Srinivasan K., Islam S.M.N. International Journal of Intelligent Systems
50 IDISense: IOT-based Dam Water Disaster Sensing and Prevention System Braveen M.; Anusha K.; Jerlin M.A.; Seetha R.; Sampath N. IEEE Sensors Journal
51 Traffic and fragmentation aware algorithm for routing and spectrum assignment in Elastic Optical Network (EON) Selva Kumar S.; Kalaivani S.; Siddique Ibrahim S.P.; Swathi G. Optical Fiber Technology
52 Integration of artificial intelligence in software development process for implementing a secure healthcare system – a review Asha N.; Krishnan S.R.; Gitanjali J. International Journal of Medical Engineering and Informatics
53 Optimizing rice plant disease detection with crossover boosted artificial hummingbird algorithm based AX-RetinaNet Sankareshwaran S.P.; Jayaraman G.; Muthukumar P.; Krishnan A.S. Environmental Monitoring and Assessment
54 Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology Henge S.K.; Jayaraman G.; Sreedevi M.; Rajakumar R.; Rashid M.; Alshamrani S.S.; Alnfiai M.M.; Alghamdi A.S. Networks and Heterogeneous Media
55 SCMA: Exploring Dual-Module Attention With Multi-Scale Kernels for Effective Feature Extraction Samad S.A., Gitanjali J. IEEE Access
56 Assessment of novel Kalina power system through exergoenvironmental perspective Ganesh N.S.; Maheswari G.U.; Srinivas T.; Reddy B.V. Journal of Thermal Analysis and Calorimetry
57 Public Social Distance Monitoring System Using Object Detection YOLO Deep Learning Algorithm Vijayan R.; Mareeswari V.; Pople V. SN Computer Science
58 Implementing deep-learning techniques for accurate fruit disease identification Sujatha R.; Mahalakshmi K.; Chatterjee J.M. Plant Pathology
59 Fog-Based Smart Cardiovascular Disease Prediction System Powered by Modified Gated Recurrent Unit Nancy A.A.; Ravindran D.; Vincent D.R.; Srinivasan K.; Chang C.-Y. Diagnostics
60 An Efficient CSPK-FCM Explainable Artificial Intelligence Model on COVID-19 Data to Predict the Emotion Using Topic Modeling Priya C., Durai Raj Vincent P.M. Journal of Advances in Information Technology
61 An active learning machine technique based prediction of cardiovascular heart disease from UCI-repository database Srinivasan S.; Gunasekaran S.; Mathivanan S.K.; M. B B.A.M.; Jayagopal P.; Dalu G.T. Scientific Reports
62 A Deep Learning Approach to Detect Microsleep Using Various Forms of EEG Signal Sangeetha S.K.B.; Mathivanan S.K.; Muthukumaran V.; Pughazendi N.; Jayagopal P.; Uddin M.S. Mathematical Problems in Engineering
63 Prescreening and Triage of COVID-19 Patients Through Chest X-Ray Images Using Deep Learning Model Rajendran S., Panneerselvam R.K., Kumar P.J., Rajasekaran V.A., Suganya P., Mathivanan S.K., Jayagopal P. Big Data
64 Breast Cancer Classification Using Synthesized Deep Learning Model with Metaheuristic Optimization Algorithm Thirumalaisamy S.; Thangavilou K.; Rajadurai H.; Saidani O.; Alturki N.; Mathivanan S.K.; Jayagopal P.; Gochhait S. Diagnostics
65 Detection for melanoma skin cancer through ACCF, BPPF, and CLF techniques with machine learning approach Kavitha P., Ayyappan G., Jayagopal P., Mathivanan S.K., Mallik S., Al-Rasheed A., Alqahtani M.S., Soufiene B.O. BMC Bioinformatics
66 Detection and classification of brain tumor using hybrid deep learning models Babu Vimala B., Srinivasan S., Mathivanan S.K., Mahalakshmi, Jayagopal P., Dalu G.T. Scientific Reports
67 Detection and classification of adult epilepsy using hybrid deep learning approach Srinivasan S.; Dayalane S.; Mathivanan S.; Rajadurai H.; Jayagopal P.; Dalu G.T. Scientific Reports
68 A Block-Based Feature Selection Method for Classification of Web Pages Abdullah A.; Sandeep Kumar M.; Prabhu J.; Balusamy B. International Journal of Intelligent Systems and Applications in Engineering
69 Deep learning models for predicting the position of the head on an X-ray image for Cephalometric analysis Prasanna K.; Jyothi C.B.; Mathivanan S.K.; Jayagopal P.; Saif A.; Samuel D.J. Intelligent Data Analysis
70 Classifying distinct emotions from parents of ASD child using EEG source data by combining Bernoulli Laplace Prior and graph neural networks ArulDass S.D.; Jayagopal P. Neural Computing and Applications
71 Prescreening and Triage of COVID-19 Patients Through Chest X-Ray Images Using Deep Learning Model Rajendran S., Panneerselvam R.K., Kumar P.J., Rajasekaran V.A., Suganya P., Mathivanan S.K., Jayagopal P. Big Data
72 A mutual certificate-based data privacy scheme for ubiquitous and sustainable computing system users Damodhar T.S.B.; Anandan P.; Nalini C.; Jerlin M.A.; Victor A.; Anusha K.; Jothilakshmi R. Sustainable Energy Technologies and Assessments
73 Cloud-Based Quad Deep Ensemble Framework for the Detection of COVID-19 Omicron and Delta Variants Tiwari R.S., Dandabani L., Das T.K., Khan S.B., Basheer S., Alqahtani M.S. Diagnostics
74 Enhancing Diagnostic Decision-Making: Ensemble Learning Techniques for Reliable Stress Level Classification Anand R.V., Md A.Q., Urooj S., Mohan S., Alawad M.A., C A. Diagnostics
75 Analysis of Deep Learning Methods for Healthcare Sector-Medical Imaging Disease Detection Sahu H., Kashyap R., Bhatia S., Dewangan B.K., Alkhaldi N.A., Babu S.A., Mohan S. Contemporary Mathematics (Singapore)
76 Novel framework based on ensemble classification and secure feature extraction for COVID-19 critical health prediction Priyadarshini R.; Quadir Md A.; Mohan S.; Alghamdi A.; Alrizq M.; Mohamad U.H.; Ahmadian A. Engineering Applications of Artificial Intelligence
77 A Cluster-Based Energy-Efficient Secure Optimal Path-Routing Protocol for Wireless Body-Area Sensor Networks Dass R.; Narayanan M.; Ananthakrishnan G.; Kathirvel Murugan T.; Nallakaruppan M.K.; Somayaji S.R.K.; Arputharaj K.; Khan S.B.; Almusharraf A. Sensors
78 Unlocking the Potential of Digital Twins: A Comprehensive Review of Concepts, Frameworks, and Industrial Applications Manickam S., Yarlagadda L., Gopalan S.P., Chowdhary C.L. IEEE Access
79 Digital Twin: Exploring the Intersection of Virtual and Physical Worlds Menon D.; Anand B.; Chowdhary C.L. IEEE Access
80 FedEHR: A Federated Learning Approach towards the Prediction of Heart Diseases in IoT-Based Electronic Health Records Bebortta S.; Tripathy S.S.; Basheer S.; Chowdhary C.L. Diagnostics
81 GEMM, a Genetic Engineering-based Mutual Model for Resource Allocation of Grid Computing Sharma S.K.; Chaurasia A.; Sharma V.S.; Chowdhary C.L.; Basheer S. IEEE Access
82 An Astute Automaton Model for Objects Extraction Using Outer Totality Cellular Automata (OTCA) Sharma S.K.; Sharma V.S.; Basheer S.; Chaurasia A.; Chowdhary C.L. IEEE Access
83 From Fake Reviews to Fake News: A Novel Pandemic Model of Misinformation in Digital Networks Govindankutty S.; Gopalan S.P. Journal of Theoretical and Applied Electronic Commerce Research
84 Modeling Rumor Spread and Influencer Impact on Social Networks Govindankutty S.; Padinjappurathu Gopalan S. IEEE Access
85 Unlocking the Potential of Digital Twins: A Comprehensive Review of Concepts, Frameworks, and Industrial Applications Manickam S., Yarlagadda L., Gopalan S.P., Chowdhary C.L. IEEE Access
86 An Efficient Intrusion Detection System to Combat Cyber Threats using a Deep Neural Network Model Ramaiah M., Vanmathi C., Khan M.Z., Vanitha M., Deepa M. Journal of ICT Research and Applications
87 Embedded Based Quadratic Boost Converter With Sliding Mode Controller for the Integration of Solar Photo-Voltaic Source With Microgrid S C.S., Govindaraj R., Chowdhury S., Singh S., Khan B. IEEE Journal of the Electron Devices Society
88 IDISense: IOT-based Dam Water Disaster Sensing and Prevention System Braveen M.; Anusha K.; Jerlin M.A.; Seetha R.; Sampath N. IEEE Sensors Journal
89 A comprehensive review on trust management approaches in fog computing Karthikeyan P., Brindha K. Journal of Intelligent and Fuzzy Systems
90 Blind nonlinear unmixing using nonnegative matrix factorization based bi-objective autoencoder Bhakthan S.M.; Loganathan A.; Bansal A. Indonesian Journal of Electrical Engineering and Computer Science
91 Multi-image Feature Map-Based Watermarking Techniques Using Transformer Palani A.; Loganathan A. International Journal of Electrical and Electronics Research
92 Intelligent Abstractive Text Summarization using Hybrid Word2Vec and Swin Transformer for Long Documents Mishra G.; Sethi N.; Agilandeeswari L.; Hu Y.-C. International Journal of Computer Information Systems and Industrial Management Applications
93 Vision Transformer-Based Watermark Generation for Authentication and Tamper Detection Using Schur Decomposition and Hybrid Transforms Aberna P.; Agilandeeswari L.; Bansal A. International Journal of Computer Information Systems and Industrial Management Applications
94 Non-redundant shift-invariant complex wavelet transform and fractional gorilla troops optimization-based deep convolutional neural network for video watermarking Mali S.D.; Agilandeeswari L. Journal of King Saud University – Computer and Information Sciences
95 Paradigm Shift Towards Federated Learning for COVID-19 Detection: A Survey Krithika L.B. Iraqi Journal of Science
96 A Multi-Round Zero Knowledge Proof Algorithm for Secure IoT and Blockchain Environments Rani D.C.; Janakiraman S.G.; Chandra K.S.; Thangavel E.P.; Kothamasu G.A.; Bhaskaran K.L.; Jayabalasamy G. International Journal of Safety and Security Engineering
97 Hybrid Deep Learning Algorithms for Dog Breed Identification – A Comparative Analysis Valarmathi B.; Srinivasa Gupta N.; Prakash G.; Hemadri Reddy R.; Saravanan S.; Shanmugasundaram P. IEEE Access
98 Federated Learning for the Healthcare Metaverse: Concepts, Applications, Challenges, and Future Directions Bashir A.K.; Victor N.; Bhattacharya S.; Huynh-The T.; Chengoden R.; Yenduri G.; Maddikunta P.K.R.; Pham Q.; Gadekallu T.R.; Liyanage M. IEEE Internet of Things Journal
99 A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision Systems Ramalingam M.; Selvi G.C.; Victor N.; Chengoden R.; Bhattacharya S.; Maddikunta P.K.R.; Lee D.; Piran M.J.; Khare N.; Yenduri G.; Gadekallu T.R. IEEE Access
100 A multidomain bio-inspired feature extraction and selection model for diabetic retinopathy severity classification: an ensemble learning approach Uppamma P.; Bhattacharya S. Scientific Reports
101 A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision Systems Ramalingam M.; Selvi G.C.; Victor N.; Chengoden R.; Bhattacharya S.; Maddikunta P.K.R.; Lee D.; Piran M.J.; Khare N.; Yenduri G.; Gadekallu T.R. IEEE Access
102 Federated Learning for the Healthcare Metaverse: Concepts, Applications, Challenges, and Future Directions Bashir A.K.; Victor N.; Bhattacharya S.; Huynh-The T.; Chengoden R.; Yenduri G.; Maddikunta P.K.R.; Pham Q.; Gadekallu T.R.; Liyanage M. IEEE Internet of Things Journal
103 Artificial intelligence and blockchain technology for secure smart grid and power distribution Automation: A State-of-the-Art Review Ayub Khan A., Ali Laghari A., Rashid M., Li H., Rehman Javed A., Reddy Gadekallu T. Sustainable Energy Technologies and Assessments
104 A Generalizable Deep Neural Network Method for Detecting Attacks in Industrial Cyber-Physical Systems Sakhnini J.; Karimipour H.; Dehghantanha A.; Yazdinejad A.; Gadekallu T.R.; Victor N.; Islam A. IEEE Systems Journal
105 Plant and Salamander Inspired Network Attack Detection and Data Recovery Model Sharma R.K.; Issac B.; Xin Q.; Gadekallu T.R.; Nath K. Sensors
106 FLPK-BiSeNet: Federated Learning Based on Priori Knowledge and Bilateral Segmentation Network for Image Edge Extraction Teng L.; Qiao Y.; Shafiq M.; Srivastava G.; Javed A.R.; Gadekallu T.R.; Yin S. IEEE Transactions on Network and Service Management
107 A Survey on Soft Computing Techniques for Federated Learning- Applications, Challenges and Future Directions Supriya Y.; Gadekallu T.R. Journal of Data and Information Quality
108 Novel residual hybrid machine learning for solar activity prediction in smart cities Abdulkadir R.A.; Hasan M.K.; Islam S.; Gadekallu T.R.; Pandey B.; Safie N.; Syv j rvi M.; Nasor M. Earth Science Informatics
109 A Secure Architectural Model Using Blockchain and Estimated Trust Mechanism in Electronic Consumers Kumar A., Rathee G., Kerrache C.A., Bilal M., Gadekallu T.R. IEEE Transactions on Consumer Electronics
110 From Assistive Technologies to Metaverse – Technologies in Inclusive Higher Education for Students with Specific Learning Difficulties: A Review Yenduri G.; Kaluri R.; Rajput D.S.; Lakshmanna K.; Gadekallu T.R.; Mahmud M.; Brown D.J. IEEE Access
111 Landslide Hazard Zonation Mapping using MCDM Techniques A study over Kodagu District, Karnataka Sreedevi N.; Karthikeyan J. Disaster Advances
112 Digital twin based Healthcare System (DTHS) for Earlier Parkinson Disease Identification and Diagnosis using Optimized Fuzzy based k-Nearest Neighbor Classifier Model Abirami L.; Karthikeyan J. IEEE Access
113 An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm Begum M.B.; Deepa N.; Uddin M.; Kaluri R.; Abdelhaq M.; Alsaqour R. Heliyon
114 Customer churning analysis using machine learning algorithms Prabadevi B.; Shalini R.; Kavitha B.R. International Journal of Intelligent Networks
115 An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm Begum M.B.; Deepa N.; Uddin M.; Kaluri R.; Abdelhaq M.; Alsaqour R. Heliyon
116 From Assistive Technologies to Metaverse – Technologies in Inclusive Higher Education for Students with Specific Learning Difficulties: A Review Yenduri G.; Kaluri R.; Rajput D.S.; Lakshmanna K.; Gadekallu T.R.; Mahmud M.; Brown D.J. IEEE Access
117 A Cluster-Based Energy-Efficient Secure Optimal Path-Routing Protocol for Wireless Body-Area Sensor Networks Dass R.; Narayanan M.; Ananthakrishnan G.; Kathirvel Murugan T.; Nallakaruppan M.K.; Somayaji S.R.K.; Arputharaj K.; Khan S.B.; Almusharraf A. Sensors
118 Reliable and Efficient Model for Water Quality Prediction and Forecasting Abdullah A., Chaturvedi H., Fuladi S., Ravuri N.J., Natesan D., Nallakaruppan M.K. International Journal of Advanced Computer Science and Applications
119 From Assistive Technologies to Metaverse – Technologies in Inclusive Higher Education for Students with Specific Learning Difficulties: A Review Yenduri G.; Kaluri R.; Rajput D.S.; Lakshmanna K.; Gadekallu T.R.; Mahmud M.; Brown D.J. IEEE Access
120 Multi Head Deep Neural Network Prediction Methodology for High-Risk Cardiovascular Disease on Diabetes Mellitus Ramesh B.; Lakshmanna K. CMES – Computer Modeling in Engineering and Sciences
121 Intelligent Face Recognition based Multi-Location Linked IoT based Car Parking System Rajyalakshmi V.; Lakshmanna K. IEEE Access
122 A lightweight energy consumption ensemble-based botnet detection model for IoT/6G networks Zhou J.; Hai T.; Jawawi D.N.A.; Wang D.; Lakshmanna K.; Maddikunta P.K.R.; Iwendi M. Sustainable Energy Technologies and Assessments
123 TKAGFL: A Federated Communication Framework under Data Heterogeneity Pei J.; Yu Z.; Li J.; Jan M.A.; Lakshmanna K. IEEE Transactions on Network Science and Engineering
124 A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision Systems Ramalingam M.; Selvi G.C.; Victor N.; Chengoden R.; Bhattacharya S.; Maddikunta P.K.R.; Lee D.; Piran M.J.; Khare N.; Yenduri G.; Gadekallu T.R. IEEE Access
125 A Generalizable Deep Neural Network Method for Detecting Attacks in Industrial Cyber-Physical Systems Sakhnini J.; Karimipour H.; Dehghantanha A.; Yazdinejad A.; Gadekallu T.R.; Victor N.; Islam A. IEEE Systems Journal
126 A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision Systems Ramalingam M.; Selvi G.C.; Victor N.; Chengoden R.; Bhattacharya S.; Maddikunta P.K.R.; Lee D.; Piran M.J.; Khare N.; Yenduri G.; Gadekallu T.R. IEEE Access
127 Federated Learning for the Healthcare Metaverse: Concepts, Applications, Challenges, and Future Directions Bashir A.K.; Victor N.; Bhattacharya S.; Huynh-The T.; Chengoden R.; Yenduri G.; Maddikunta P.K.R.; Pham Q.; Gadekallu T.R.; Liyanage M. IEEE Internet of Things Journal
128 An Optimal Topic Centric Crawler for Acquiring Bio-medical Themes Utilizing Gaussian Support Vector Regression Rajiv S., Navaneethan C. SN Computer Science
129 Component-Based Test Case Generation and Prioritization Using an Improved Genetic Algorithm Priya T.; Prasanna M. International Journal of Cooperative Information Systems
130 Review on Pest Detection and Classification in Agricultural Environments Using Image-Based Deep Learning Models and Its Challenges Venkatasaichandrakanth P., Iyapparaja M. Optical Memory and Neural Networks (Information Optics)
131 From Assistive Technologies to Metaverse – Technologies in Inclusive Higher Education for Students with Specific Learning Difficulties: A Review Yenduri G.; Kaluri R.; Rajput D.S.; Lakshmanna K.; Gadekallu T.R.; Mahmud M.; Brown D.J. IEEE Access
132 A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision Systems Ramalingam M.; Selvi G.C.; Victor N.; Chengoden R.; Bhattacharya S.; Maddikunta P.K.R.; Lee D.; Piran M.J.; Khare N.; Yenduri G.; Gadekallu T.R. IEEE Access
133 An Adaptive DeepLabv3+ for Semantic Segmentation of Aerial Images Using Improved Golden Eagle Optimization Algorithm Anilkumar P.; Venugopal P.; Maddikunta P.K.R.; Gadekallu T.R.; Al-Rasheed A.; Abbas M.; Soufiene B.O. IEEE Access
134 Moth Flame Optimization based ensemble classification for intrusion detection in intelligent transport system for smart cities Gadekallu T.R.; Kumar N.; Baker T.; Natarajan D.; Boopathy P.; Maddikunta P.K.R. Microprocessors and Microsystems
135 Federated Learning for the Healthcare Metaverse: Concepts, Applications, Challenges, and Future Directions Bashir A.K.; Victor N.; Bhattacharya S.; Huynh-The T.; Chengoden R.; Yenduri G.; Maddikunta P.K.R.; Pham Q.; Gadekallu T.R.; Liyanage M. IEEE Internet of Things Journal
136 A lightweight energy consumption ensemble-based botnet detection model for IoT/6G networks Zhou J.; Hai T.; Jawawi D.N.A.; Wang D.; Lakshmanna K.; Maddikunta P.K.R.; Iwendi M. Sustainable Energy Technologies and Assessments
137 Prescreening and Triage of COVID-19 Patients Through Chest X-Ray Images Using Deep Learning Model Rajendran S., Panneerselvam R.K., Kumar P.J., Rajasekaran V.A., Suganya P., Mathivanan S.K., Jayagopal P. Big Data
138 A Review of Energy-Efficient Secured Routing Algorithm for IoT-Enabled Smart Agricultural Systems kumar C.S.; Anand R.V. Journal of Biosystems Engineering
139 ICSMPC: Design of an Iterative-Learning Contextual Side Chaining Model for Improving Security of Priority-Aware Cloud Resources Brahmam M.G.; Vijay Anand R. Journal of Grid Computing
140 Customer churning analysis using machine learning algorithms Prabadevi B.; Shalini R.; Kavitha B.R. International Journal of Intelligent Networks
141 Moth Flame Optimization based ensemble classification for intrusion detection in intelligent transport system for smart cities Gadekallu T.R.; Kumar N.; Baker T.; Natarajan D.; Boopathy P.; Maddikunta P.K.R. Microprocessors and Microsystems
142 Steel Strip Quality Assurance With YOLOV7-CSF: A Coordinate Attention and SIoU Fusion Approach Raj G.D., Prabadevi B. IEEE Access
143 Monitoring and Recognition of Heart Health using Heartbeat Classification with Deep Learning and IoT Arulkumar V.; Vinod D.; Devipriya A.; Selvi C.G.; Surendran S.; Arif M. Journal of Machine and Computing
144 A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision Systems Ramalingam M.; Selvi G.C.; Victor N.; Chengoden R.; Bhattacharya S.; Maddikunta P.K.R.; Lee D.; Piran M.J.; Khare N.; Yenduri G.; Gadekallu T.R. IEEE Access
145 A Thermo-Structural Analysis of Die-Sinking Electrical Discharge Machining (EDM) of a Haynes-25 Super Alloy Using Deep-Learning-Based Methodologies Aneesh T., Mohanty C.P., Tripathy A.K., Chauhan A.S., Gupta M., Annamalai A.R. Journal of Manufacturing and Materials Processing
146 Prescreening and Triage of COVID-19 Patients Through Chest X-Ray Images Using Deep Learning Model Rajendran S., Panneerselvam R.K., Kumar P.J., Rajasekaran V.A., Suganya P., Mathivanan S.K., Jayagopal P. Big Data
147 NOVEL TECHNIQUE OF HEALTHCARE RECORD INDEXING AND RECOMMENDATION BASED ON TRENDING QUERIES IN SOCIAL MEDIA Elankannan M., Periyasamy S.S. Computing and Informatics
148 An Efficient Comparative Analysis of CNN-based Image Classification in the Jupyter Tool Using Multi-Stage Techniques Janarthanan S.; Ganesh Kumar T.; Uma K.; Arvindhan M.; Anandhan K.; Ramesh Kumar C. International Journal on Recent and Innovation Trends in Computing and Communication
149 Deep Convolutional Attention based Bidirectional Recurrent Neural Network for Measuring Correlated Colour Temperature from RGB Images Mane S.S.; Santra A.K. International Journal on Recent and Innovation Trends in Computing and Communication
150 Guided Co-operative Waderhunt Neural Network for Measuring the Temperature of Visible Heat Source Mane S.S., Santra A.K. International Journal of Intelligent Engineering and Systems
151 A comprehensive survey on fuzzy-based intelligent intrusion detection system for internet of things Nandhini U.; Kumar S.V.N.S. International Journal of Information and Computer Security
152 A comprehensive survey on effective key management schemes for secured authentication in vehicular ad hoc network Jayashree S., Santhosh Kumar S.V.N. International Journal of Information and Computer Security
153 A Multi-channel Convolutional Neural Network for Multilabel Sentiment Classification Using Abilify Oral User Reviews Trueman T.E.; Jayaraman A.K.; Jasmine S.; Ananthakrishnan G.; Narayanasamy P. Informatica (Slovenia)
154 A Cluster-Based Energy-Efficient Secure Optimal Path-Routing Protocol for Wireless Body-Area Sensor Networks Dass R.; Narayanan M.; Ananthakrishnan G.; Kathirvel Murugan T.; Nallakaruppan M.K.; Somayaji S.R.K.; Arputharaj K.; Khan S.B.; Almusharraf A. Sensors
155 LaneScanNET: A deep-learning approach for simultaneous detection of obstacle-lane states for autonomous driving systems Shunmuga Perumal P.; Wang Y.; Sujasree M.; Tulshain S.; Bhutani S.; Suriyah M.K.; Kumar Raju V.U. Expert Systems with Applications
156 An Optimal Topic Centric Crawler for Acquiring Bio-medical Themes Utilizing Gaussian Support Vector Regression Rajiv S., Navaneethan C. SN Computer Science
157 A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision Systems Ramalingam M.; Selvi G.C.; Victor N.; Chengoden R.; Bhattacharya S.; Maddikunta P.K.R.; Lee D.; Piran M.J.; Khare N.; Yenduri G.; Gadekallu T.R. IEEE Access
158 Safeguard confidential web information from malicious browser extension using Encryption and Isolation techniques Marimuthu M.; Mohanraj G.; Karthikeyan D.; Vidyabharathi D. Journal of Intelligent and Fuzzy Systems
159 ENHANCING RICE YIELDS IN RED SOIL THROUGH AZOTOBACTER CULTIVATION Kanna G.V.; Vijayalakshmi A.; Jothilakshmi R.; Kumar M.J.; Sumathi J.; Rajkumar M.; Koshariya A.K. Oxidation Communications
160 Maximizing network efficiency by optimizing channel allocation in wireless body area networks using machine learning techniques Rao V.C.S.; Shanmathi M.; Rajkumar M.; Haleem S.L.A.; Amirthalingam V.; Vanathi A. Internet Technology Letters
161 Empowering autonomous indoor navigation with informed machine learning techniques Uganya G.; Bremnavas I.; Prashanth K.V.; Rajkumar M.; Lalitha R.V.S.; Singh C. Computers and Electrical Engineering
162 Cluster-Based Protocol for Prioritized Message Communication in VANET Saha S.; Kumar V.V.; Niveditha V.R.; Kannan V.A.; Gunasekaran K.; Venkatesan K. IEEE Access
163 Efficient Assamese Word Recognition for Societal Empowerment: A Comparative Feature-Based Analysis. Borah N.; Baruah U.; Mahesh T.; Vinoth Kumar V.; Ramya Dorai D.; Annad J.R. IEEE Access
164 The stratified K-folds cross-validation and class-balancing methods with high-performance ensemble classifiers for breast cancer classification T R M.; V V.K.; V D.K.; Geman O.; Margala M.; Guduri M. Healthcare Analytics
165 Ensemble of Homogenous and Heterogeneous Classifiers using K-Fold Cross Validation with Reduced Entropy Venkatarathinam R.; Sivakami R.; Christodoss P.R.; Mahesh T.R.; Mohan E.; Kumar V.V. International Journal on Recent and Innovation Trends in Computing and Communication
166 Ensemble Federated Learning Approach for Diagnostics of Multi-Order Lung Cancer Subashchandrabose U.; John R.; Anbazhagu U.V.; Venkatesan V.K.; Thyluru Ramakrishna M. Diagnostics
167 Multiclass Paddy Disease Detection Using Filter-Based Feature Transformation Technique Bharanidharan N.; Sannasi Chakravarthy S.R.; Rajaguru H.; Vinoth Kumar V.; Mahesh T.R.; Guluwadi S. IEEE Access
168 Analysis and Attack Detection in GSM Mobile Network With an Intelligent Jammer Using ANFIS Classifier Sivaprakash S.; Anbazhagu U.V.; Perumal I.; Vinoth Kumar V.; Mahesh T.R.; Guluwadi S. IEEE Access
169 A Deep Learning Framework with an Intermediate Layer Using the Swarm Intelligence Optimizer for Diagnosing Oral Squamous Cell Carcinoma Nagarajan B., Chakravarthy S., Venkatesan V.K., Ramakrishna M.T., Khan S.B., Basheer S., Albalawi E. Diagnostics
170 Cancer Diagnosis through Contour Visualization of Gene Expression Leveraging Deep Learning Techniques Venkatesan V.K., Kuppusamy Murugesan K.R., Chandrasekaran K.A., Thyluru Ramakrishna M., Khan S.B., Almusharraf A., Albuali A. Diagnostics
171 Prediction of Water Quality using SoftMax-ELM optimized using Adaptive Crow-Search Algorithm Sannasi Chakravarthy S.R., Bharanidharan N., Venkatesan V.K., Abbas M., Rajaguru H., Mahesh T.R., Venkatesan K. IEEE Access
172 Optimizing Heterogeneity in IoT Infra Using Federated Learning and Blockchain-based Security Strategies Muthukumaran V., Sivakami R., Venkatesan V.K., Balajee J., Mahesh T.R., Mohan E., Swapna B. International Journal of Computers, Communications and Control
173 Trustworthy Artificial Intelligence and Automatic Morse Code Based Communication Recognition with Eye Tracking Medichalam K., Vijayarajan V., Kumar V.V., Iyer I.M., Vanukuri Y.K., Prasath V.B.S., Swapna B. Journal of Mobile Multimedia
174 Crop Information Retrieval Framework Based on LDW-Ontology and SNM-BERT Techniques Ezhilarasi K.; Hussain D.M.; Sowmiya M.; Krishnamoorthy N. Information Technology and Control
175 Image Processing Using Feature-Based Segmentation Techniques for the Analysis of Medical Images Ranjith C.P., Natarajan K., Madhuri S., Ramakrishna M.T., Bhat C.R., Venkatesan V.K. Engineering Proceedings
176 Multiple Disease Detection using Machine Learning Techniques Acharya D.; Eashwer K.; Kumar S.; Sivakumar R.; Kishoreraja P.C.; Srinivasagan R. International journal of online and biomedical engineering
177 Safeguard confidential web information from malicious browser extension using Encryption and Isolation techniques Marimuthu M.; Mohanraj G.; Karthikeyan D.; Vidyabharathi D. Journal of Intelligent and Fuzzy Systems
178 Improving Data Processing Speed on Large Datasets in a Hadoop Multi-node Cluster using Enhanced Apriori Algorithm Sundarakumar M.R.; Sharma R.; Fathima S.K.; Gokul Rajan V.; Dhayanithi J.; Marimuthu M.; Mohanraj G.; Sharma A.; Johny Renoald A. Journal of Intelligent and Fuzzy Systems
179 Multiclass Paddy Disease Detection Using Filter-Based Feature Transformation Technique Bharanidharan N.; Sannasi Chakravarthy S.R.; Rajaguru H.; Vinoth Kumar V.; Mahesh T.R.; Guluwadi S. IEEE Access
180 A Deep Learning Framework with an Intermediate Layer Using the Swarm Intelligence Optimizer for Diagnosing Oral Squamous Cell Carcinoma Nagarajan B., Chakravarthy S., Venkatesan V.K., Ramakrishna M.T., Khan S.B., Basheer S., Albalawi E. Diagnostics
181 Prediction of Water Quality using SoftMax-ELM optimized using Adaptive Crow-Search Algorithm Sannasi Chakravarthy S.R., Bharanidharan N., Venkatesan V.K., Abbas M., Rajaguru H., Mahesh T.R., Venkatesan K. IEEE Access
182 ZTMP: Zero Touch Management Provisioning Algorithm for the On-boarding of Cloud-native Virtual Network Functions Arulappan A.; Raja G.; Bashir A.K.; Mahanti A.; Omar M. Mobile Networks and Applications
183 Performance analysis of smart optimization antenna for wireless networks Abraham J.; Suriyan K.; Jackson B.; Natarajan M.; Lakshmanaperumal T.M. International Journal of Electrical and Computer Engineering
184 A Novel Energy Efficient Multi-Dimensional Virtual Machines Allocation and Migration at the Cloud Data Center Sharma N.K.; Bojjagani S.; Reddy Y.C.A.P.; Vivekanandan M.; Srinivasan J.; Maurya A.K. IEEE Access
185 Retracing-efficient IoT model for identifying the skin-related tags using automatic lumen detection Vivekananda G.N.; Almufti S.M.; Suresh C.; Samsudeen S.; Devarajan M.V.; Srikanth R.; Jayashree S. Intelligent Data Analysis
186 Next generation WDM-radio over fiber passive optical network: deep neural network based performance analysis Lawrence J.J.; Shanmuganathan V.; Manoharan R.; Ramachandran S.; Aly M.H.; Chakrabarti P. Optical and Quantum Electronics
187 Machine learning in photosynthesis: Prospects on sustainable crop development Varghese R.; Cherukuri A.K.; Doddrell N.H.; Doss C.G.P.; Simkin A.J.; Ramamoorthy S. Plant Science
188 A critical review of machine-learning for multi-omics marine metabolite datasets Manochkumar J.; Cherukuri A.K.; Kumar R.S.; Almansour A.I.; Ramamoorthy S.; Efferth T. Computers in Biology and Medicine
189 Internet of things in Healthcare: a conventional literature review Singh B.; Lopez D.; Ramadan R. Health and Technology
190 A Review of Deep Transfer Learning Strategy for Energy Forecasting Sankari S.S., Kumar P.S. Nature Environment and Pollution Technology
191 Exploring Huntington s Disease Diagnosis via Artificial Intelligence Models: A Comprehensive Review Ganesh S., Chithambaram T., Krishnan N.R., Vincent D.R., Kaliappan J., Srinivasan K. Diagnostics
192 Advancing genome editing with artificial intelligence: opportunities, challenges, and future directions Dixit S., Kumar A., Srinivasan K., Vincent P.M.D.R., Ramu Krishnan N. Frontiers in Bioengineering and Biotechnology
193 A Review on the Use of Modern Computational Methods in Alzheimer s Disease-Detection and Prediction De A.; Mishra T.K.; Saraf S.; Tripathy B.; Reddy S.S. Current Alzheimer Research
194 Exploring Huntington s Disease Diagnosis via Artificial Intelligence Models: A Comprehensive Review Ganesh S., Chithambaram T., Krishnan N.R., Vincent D.R., Kaliappan J., Srinivasan K. Diagnostics
195 Advancing genome editing with artificial intelligence: opportunities, challenges, and future directions Dixit S., Kumar A., Srinivasan K., Vincent P.M.D.R., Ramu Krishnan N. Frontiers in Bioengineering and Biotechnology
196 Computer Vision Based Machine Learning and Deep Learning Approaches for Identification of Nutrient Deficiency in Crops: A Survey Sudhakar M.; Swarna Priya R.M. Nature Environment and Pollution Technology
197 Internet of things in Healthcare: a conventional literature review Singh B.; Lopez D.; Ramadan R. Health and Technology
198 Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses Muhammad Z.; Anwar Z.; Javed A.R.; Saleem B.; Abbas S.; Gadekallu T.R. Technologies
199 Artificial Intelligence for Cognitive Health Assessment: State-of-the-Art, Open Challenges and Future Directions Javed A.R.; Saadia A.; Mughal H.; Gadekallu T.R.; Rizwan M.; Maddikunta P.K.R.; Mahmud M.; Liyanage M.; Hussain A. Cognitive Computation
200 Strength of Deep Learning-based Solutions to Secure Healthcare IoT: A Critical Review Mathew A.T.; Mani P. Open Biomedical Engineering Journal
201 Artificial Intelligence for Cognitive Health Assessment: State-of-the-Art, Open Challenges and Future Directions Javed A.R.; Saadia A.; Mughal H.; Gadekallu T.R.; Rizwan M.; Maddikunta P.K.R.; Mahmud M.; Liyanage M.; Hussain A. Cognitive Computation
202 Amalgamation of Blockchain with resource-constrained IoT devices for healthcare applications State of art, challenges and future directions Hegde P.; Maddikunta P.K.R. International Journal of Cognitive Computing in Engineering
203 On routing algorithms in the internet of vehicles: a survey Sahoo A.; Kumar Tripathy A. Connection Science
204 Strength of Deep Learning-based Solutions to Secure Healthcare IoT: A Critical Review Mathew A.T.; Mani P. Open Biomedical Engineering Journal
2022
SL. NO. TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL
1 Blockchain for Internet of Underwater Things: State-of-the-Art, Applications, Challenges, and Future Directions Bhattacharya S., Victor N., Chengoden R., Ramalingam M., Selvi G.C., Maddikunta P.K.R., Donta P.K., Dustdar S., Jhaveri R.H., Gadekallu T.R. Sustainability (Switzerland)
2 Security Framework for Internet of Things based Software Defined Networks using Blockchain Rani S., Babbar H., Srivastava G., Gadekallu T.R., Dhiman G. IEEE Internet of Things Journal
3 Blockchain-Based Two-Stage Federated Learning With Non-IID Data in IoMT System Lian Z., Zeng Q., Wang W., Gadekallu T.R., Su C. IEEE Transactions on Computational Social Systems
4 Automatic 3D Facial Landmark-Based Deformation Transfer on Facial Variants for Blendshape Generation Ingale A.K., Leema A.A., kim H.S., Udayan J.D. Arabian Journal for Science and Engineering
5 Multi-tier block truncation coding model using genetic auto encoders for gray scale images Rajasoundaran S., Santhosh Kumar S.V.N., Selvi M., Ganapathy S., Kannan A. Multimedia Tools and Applications
6 Two-phase classification: ANN and A-SVM classifiers on motor imagery BCI Mary Judith A., Baghavathi Priya S., Mahendran R.K., Gadekallu T.R., Ambati L.S. Asian Journal of Control
7 Polygonal approximation for digital image boundary using firefly algorithm Raja K.T., Ray B.K. Journal of Electronic Imaging
8 Modelling of different On-Chip inductors for radio frequency integrated circuits Muneeswaran D., Subramani J., Pandi T., Chenniappan N., Shanmugam M. Comptes Rendus de L’Academie Bulgare des Sciences
9 Web Hazard Identification and Detection Using Deep Learning – A Comparative Study Sivanantham S., Krishnamoorthy V., Karthikeyan D., Sakthivel M., Mohanraj V., Akshaya V. Journal of Pharmaceutical Negative Results
10 Categorical Data Clustering Using Harmony Search Algorithm for Healthcare Datasets Sharma A., Kumar P., Babulal K.S., Obaid A.J., Patel H. International Journal of E-Health and Medical Communications
11 Ensuring prompt cloud service provider based on service level agreement using fuzzy logics and decision support system Karthikeyan P., Sathiyamoorthy E. International Journal of Intelligent Enterprise
12 Information security protection for eHealth records using temporal hash signature Charanya R., Saravanaguru R.A.K., Aramudhan M. International Journal of Intelligent Enterprise
13 Secure Communication Model for Dynamic Task Offloading in Multi-Cloud Environment Usharani C., Krishna P.V., Akki P., Saritha V., Gitanjali J. International Journal on Recent and Innovation Trends in Computing and Communication
14 ILAT (Software as a Service): Interactive Learning Application Tool for Autism Screening and Assessment in children with Autism Spectrum Disorder Arivuselvan K., Nadesh R.K., Perumal R.S. International Journal on Recent and Innovation Trends in Computing and Communication
15 Edge Computing and Blockchain in Smart Agriculture Systems Prasad Ch.G.V.N., Mallareddy A., Pounambal M., Velayutham V. International Journal on Recent and Innovation Trends in Computing and Communication
16 Mixed Game-Based AoI Optimization for Combating COVID-19 With AI Bots Yang Y., Wang W., Yin Z., Xu R., Zhou X., Kumar N., Alazab M., Gadekallu T.R. IEEE Journal on Selected Areas in Communications
17 Covert communication for cooperative NOMA with two phases detection Peng H., Tian Z., Li X., Wang W., Nauryzbayev G., Rabie K., Gadekallu T.R. Alexandria Engineering Journal
18 Spatiotemporal Assessment of Satellite Image Time Series for Land Cover Classification Using Deep Learning Techniques: A Case Study of Reunion Island, France Navnath N.N., Chandrasekaran K., Stateczny A., Sundaram V.M., Panneer P. Remote Sensing
19 Skin lesion classification of dermoscopic images using machine learning and convolutional neural network Shetty B., Fernandes R., Rodrigues A.P., Chengoden R., Bhattacharya S., Lakshmanna K. Scientific Reports
20 Conceptualising a channel-based overlapping CNN tower architecture for COVID-19 identification from CT-scan images Tiwari R.S., D L., Das T.K., Srinivasan K., Chang C.-Y. Scientific Reports
21 Smart Water Resource Management Using Artificial Intelligence A Review Krishnan S.R., Nallakaruppan M.K., Chengoden R., Koppu S., Iyapparaja M., Sadhasivam J., Sethuraman S. Sustainability (Switzerland)
22 A Study of the Impacts of Air Pollution on the Agricultural Community and Yield Crops (Indian Context) Pandya S., Gadekallu T.R., Maddikunta P.K.R., Sharma R. Sustainability (Switzerland)
23 Dingo Optimization Based Cluster Based Routing in Internet of Things Aravind K., Maddikunta P.K.R. Sensors
24 Security in IoT Mesh Networks based on Trust Similarity Kavitha A., Reddy V.B., Singh N., Gunjan V.K., Lakshmanna K., Khan A.A., Wechtaisong C. IEEE Access
25 Energy Efficient End Device Aware Solution Through SDN in Edge-Cloud Platform Patra S.S., Govindaraj R., Chowdhury S., Shah M.A., Patro R., Rout S. IEEE Access
26 Survey on the Applications of Blockchain in Agriculture L.B K. Agriculture (Switzerland)
27 Incorporation of Energy Efficient Computational Strategies for Clustering and Routing in Heterogeneous Networks of Smart City Venkatesan V.K., Izonin I., Periyasamy J., Indirajithu A., Batyuk A., Ramakrishna M.T. Energies
28 Framework for Handling Rare Word Problems in Neural Machine Translation System Using Multi-Word Expressions Garg K.D., Shekhar S., Kumar A., Goyal V., Sharma B., Chengoden R., Srivastava G. Applied Sciences (Switzerland)
29 Simulating crop yield estimation and prediction through geospatial data for specific regional analysis Mathivanan S.K., Jayagopal P. Earth Science Informatics
30 Distributed-Ledger-Based Blockchain Technology for Reliable Electronic Voting System with Statistical Analysis Ch R., Kumari D J., Gadekallu T.R., Iwendi C. Electronics (Switzerland)
31 Detection and Classification of Tomato Crop Disease Using Convolutional Neural Network Sakkarvarthi G., Sathianesan G.W., Murugan V.S., Reddy A.J., Jayagopal P., Elsisi M. Electronics (Switzerland)
32 A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization Gautam S., Henry A., Zuhair M., Rashid M., Javed A.R., Maddikunta P.K.R. Electronics (Switzerland)
33 DocCompare: An Approach to Prevent the Problem of Character Injection in Document Similarity Algorithm Namburu A., Surendran A., Balaji S.V., Mohan S., Iwendi C. Mathematics
34 Optimized face-emotion learning using convolutional neural network and binary whale optimization Muthamilselvan T., Brindha K., Senthilkumar S., Saransh, Chatterjee J.M., Hu Y.-C. Multimedia Tools and Applications
35 Terahertz Micro-Strip Patch Antenna Design and Modelling for 6G Mobile Communication Jeyakumar P., Anandpushparaj J., Thanapal P., Meenatchi S., Dhamodaran M. Journal of Electrical Engineering and Technology
36 The Effectual Spectrum Defragmentation Algorithm with Holding Time Sensitivity in Elastic Optical Network (EON) Selva Kumar S., Kamalakannan J., Seetha R., Asha N., Raja K.T., Sree Dharinya S., Sucharitha M., Kalaivani S. International Journal of Optics
37 A Hybrid Deep Learning Based Assist System for Detection and Classification of Breast Cancer from Mammogram Images Narayanan L., Krishnan S., Robinson H. International Arab Journal of Information Technology
38 Heterogeneous sensor data fusion acquisition model for medical applications Dhanke J., Pradeepa M., Karthik R., Rampur V., Poonguzhali I., Chittapragada H. Measurement: Sensors
39 Survival Study on Different Water Quality Prediction Methods Using Machine Learning Kalaivanan K., Vellingiri J. Nature Environment and Pollution Technology
40 A High Secured Steganalysis Using QVDHC Model Akki P., Gitanjali J., Iwendi C., Sumathy S., Waheed A. International Journal on Recent and Innovation Trends in Computing and Communication
41 Modelling microscale impacts assessment of urban expansion on seasonal surface urban heat island intensity using neural network algorithms Saha M., Kafy A.-A., Bakshi A., Faisal A.-A., Almulhim A.I., Rahaman Z.A., Al Rakib A., Fattah M.A., Akter K.S., Rahman M.T., Zhang M., Rathi R. Energy and Buildings
42 Principal component analysis on face recognition using artificial firefirefly swarm optimization algorithm Asha N., Syed Fiaz A.S., Jayashree J., Vijayashree J., Indumathi J. Advances in Engineering Software
43 Digital Twins for Healthcare 4.0 – Recent Advances, Architecture, and Open Challenges Alazab M., Khan L.U., Koppu S., Ramu S.P., M I., Boobalan P., Baker T., Maddikunta P.K.R., Gadekallu T.R., Aljuhani A. IEEE Consumer Electronics Magazine
44 Curve-Aware Model Predictive Control (C-MPC) Trajectory Tracking for Automated Guided Vehicle (AGV) over On-Road, In-Door, and Agricultural-Land Manikandan S., Kaliyaperumal G., Hakak S., Gadekallu T.R. Sustainability (Switzerland)
45 Rice plant disease classification using dilated convolutional neural network with global average pooling Senthil Pandi S., Senthilselvi A., Gitanjali J., ArivuSelvan K., Gopal J., Vellingiri J. Ecological Modelling
46 Analysis on the Bus Arrival Time Prediction Model for Human-Centric Services Using Data Mining Techniques Shanthi N., Sathishkumar V.E., Upendra Babu K., Karthikeyan P., Rajendran S., Allayear S.M. Computational Intelligence and Neuroscience
47 Design and Analysis of Multilayered Neural Network-Based Intrusion Detection System in the Internet of Things Network Sangeetha S.K.B., Mani P., Maheshwari V., Jayagopal P., Sandeep Kumar M., Allayear S.M. Computational Intelligence and Neuroscience
48 An Efficient Signal Processing Algorithm for Detecting Abnormalities in EEG Signal Syamsundararao T., Selvarani A., Rathi R., Vini Contrast Media and Molecular Imaging
49 Computational and Mathematical Methods in Medicine Glioma Brain Tumor Detection and Classification Using Convolutional Neural Network Saravanan S., Kumar V.V., Sarveshwaran V., Indirajithu A., Elangovan D., Allayear S.M. Computational and Mathematical Methods in Medicine
50 A High-Capacity Reversible Data-Hiding Scheme for Medical Image Transmission Using Modified Elias Gamma Encoding Manikandan V.M., Murthy K.S.R., Siddineni B., Victor N., Maddikunta P.K.R., Hakak S. Electronics (Switzerland)
51 Optimal resource scheduling algorithm for cell boundaries users in heterogenous 5G networks Gatti R., Arjun Kumar G.B., Sunil Kumar K.N.,Palle S., Gadekallu T.R. Physical Communication
52 Influences of Aqueous Nanofluid Emulsion on Diesel Engine Performance, Combustion, and Emission: IoT (Emission Monitoring System) Venkatesh B., Babu J.C., Mathivanan S.K., Jayagopal P., Prasanna S.,Uddin M.S. Advances in Materials Science and Engineering
53 Deep Learning Based Load Forecasting with Decomposition and Feature Selection Techniques Subbiah S.S., Kumar S.P. Journal of Scientific and Industrial Research
54 Identifying peanut maturity based on Hyper Spectral Invariant Scaled Feature Selection using Adaptive Dense Net Recurrent Neural Network M B., C N. Measurement: Sensors
55 An overview of internet engineering task force mobility management protocols: approaches and its challenges Mahenthiran P., Muruganadam D. International Journal of Electrical and Computer Engineering
56 Cardiac disease detection using cuckoo search enabled deep belief network P N., Narayan S. Intelligent Systems with Applications
57 Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture Chaganti R., Varadarajan V., Gorantla V.S.,Gadekallu T.R., Ravi V. Future Internet
58 Design of resource matching model of intelligent education system based on machine learning Xiang C.-Z., Fu N.-X., Gadekallu T.R. EAI Endorsed Transactions on Scalable Information Systems
59 Towards computational solutions for precision medicine based big data healthcare system using deep learning models: A review Thirunavukarasu R., C G.P.D., R G., Gopikrishnan M., Palanisamy V. Computers in Biology and Medicine
60 Tear film breakup time-based dry eye disease detection using convolutional neural network Vyas A.H., Mehta M.A., Kotecha K., Pandya S., Alazab M., Gadekallu T.R. Neural Computing and Applications
61 Federated Learning for intrusion detection system: Concepts, challenges and future directions Agrawal S., Sarkar S., Aouedi O., Yenduri G., Piamrat K., Alazab M., Bhattacharya S., Maddikunta P.K.R., Gadekallu T.R. Computer Communications
62 A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis Rehman M.U., Shafique A., Ghadi Y.Y., Boulila W., Jan S.U., Gadekallu T.R., Driss M., Ahmad J. IEEE Transactions on Network Science and Engineering
63 Optimization driven model and segmentation network for skin cancer detection Anup Kumar K., Vanmathi C. Computers and Electrical Engineering
64 ECDSA-Based Water Bodies Prediction from Satellite Images with UNet Ch A., Ch R., Gadamsetty S., Iwendi C., Gadekallu T.R., Water (Switzerland)
65 Green-Tech CAV: Next Generation Computing for Traffic Sign and Obstacle Detection in Connected and Autonomous Vehicles Kumar V.D.A., Raghuraman M., Kumar A., Rashid M., Hakak S., Reddy M.P.K. IEEE Transactions on Green Communications and Networking
66 6G Driven Fast Computational Networking Framework for Healthcare Applications Srinivasu P.N., Ijaz M.F., Shafi J., Wozniak M., Sujatha R. IEEE Access
67 Privacy Preserving Attribute-Focused Anonymization Scheme for Healthcare Data Publishing Onesimu J.A., Karthikeyan J., Eunice J., Pomplun M., Dang H. IEEE Access
68 Dynamic resource provisioning and secured file sharing using virtualization in cloud azure Perumal K., Mohan S., Frnda J., Divakarachari P.B. Journal of Cloud Computing
69 A Web-Based Model to Predict a Neurological Disorder Using ANN Almazroi A.A., Alamin H., Sujatha R., Jhanjhi N.Z. Healthcare (Switzerland)
70 Addressing Binary Classification over Class Imbalanced Clinical Datasets Using Computationally Intelligent Techniques Kumar V., Lalotra G.S., Sasikala P., Rajput D.S., Kaluri R., Lakshmanna K., Shorfuzzaman M., Alsufyani A., Uddin M. Healthcare (Switzerland)
71 Multiconvolutional Transfer Learning for 3D Brain Tumor Magnetic Resonance Images Sangeetha S.K.B., Muthukumaran V., Deeba K., Rajadurai H., Maheshwari V., Dalu G.T. Computational Intelligence and Neuroscience
72 Investigation of Applying Machine Learning and Hyperparameter Tuned Deep Learning Approaches for Arrhythmia Detection in ECG Images Shanmugavadivel K., Sathishkumar V.E., Kumar M.S., Maheshwari V., Prabhu J., Allayear S.M. Computational and mathematical methods in medicine
73 Analysis on COVID-19 Infection Spread Rate during Relief Schemes Using Graph Theory and Deep Learning Palanivinayagam A., Panneerselvam R.K., Kumar P.J., Rajadurai H., Maheshwari V., Allayear S.M. Computational and Mathematical Methods in Medicine
74 IoT-Cloud-Based Smart Healthcare Monitoring System for Heart Disease Prediction via Deep Learning Nancy A.A., Ravindran D., Raj Vincent P.M.D., Srinivasan K., Gutierrez Reina D. Electronics (Switzerland)
75 Genetic Clustered Federated Learning for COVID-19 Detection Kandati D.R., Gadekallu T.R. Electronics (Switzerland)
76 Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach Selvaraj N.P., Paulraj S., Ramadass P., Kaluri R., Shorfuzzaman M., Alsufyani A., Uddin M. Electronics (Switzerland)
77 SWIN transformer based contrastive self- supervised learning for animal detection and classification Agilandeeswari L., Meena S.D. Multimedia Tools and Applications
78 Improved COVID-19 detection with chest x- ray images using deep learning Gupta V., Jain N., Sachdeva J., Gupta M., Mohan S., Bajuri M.Y., Ahmadian A. Multimedia Tools and Applications
79 Utilizing satellite and UAV data for crop yield prediction and monitoring through deep learning Mathivanan S.K., Jayagopal P. Acta Geophysica
80 Traffic flow prediction in inland waterways of Assam region using uncertain spatiotemporal correlative features Muthukumaran V., Natarajan R., Kaladevi A.C., Magesh G., Babu S. Acta Geophysica
81 Comprehensive analysis on sensor node fault management schemes in wireless sensor networks Babu N., Santhosh Kumar S.V.N. International Journal of Communication Systems
82 Edge computing network resource allocation based on virtual network embedding Zhan K., Chen N., Santhosh Kumar S.V.N., Kibalya G., Zhang P., Zhang H. International Journal of Communication Systems
83 An Enhanced Triadic Color Scheme for Content-Based Image Retrieval Sangeetha S.K.B., Mathivanan S.K., Pandi T., Arivu Selvan K., Jayagopal P., Teshite Dalu G. Mathematical Problems in Engineering
84 G-Sep: A Deep Learning Algorithm for Detection of Long-Term Sepsis Using Bidirectional Gated Recurrent Unit Rajmohan R., Kumar T.A., Julie E.G., Robinson Y.H., Vimal S., Kadry S., Crespo R.G. International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
85 A narrative review of medical image processing by deep learning models: Origin to COVID-19 Mareeswari V., Vijayan R., Sathiyamoorthy E., Ephzibah E.P. International Journal of Advanced Technology and Engineering Exploration
86 Evaluation of Dietary Habits in Relation to Covid-19 Mortality Rate Using Machine Learning Techniques Sujatha R., Chatterjee J.M., Thorunitha S.S., Nadhiya S. Journal of System and Management Sciences
87 A Deep Multimodal Adversarial Cycle- Consistent Network for Smart Enterprise System Li P., Laghari A.A., Rashid M., Gao J., Gadekallu T.R., Javed A.R., Yin S. IEEE Transactions on Industrial Informatics
88 Energy efficient fault tolerance techniques in green cloud computing: A systematic survey and taxonomy Bharany S., Badotra S., Sharma S., Rani S., Alazab M., Jhaveri R.H., Reddy Gadekallu T. Sustainable Energy Technologies and Assessments
89 Color contour texture based peanut classification using deep spread spectral features classification model for assortment identification Balasubramaniyan M., Navaneethan C. Sustainable Energy Technologies and Assessments
90 Incentive techniques for the Internet of Things: A survey Maddikunta P.K.R., Pham Q.-V., Nguyen D.C., Huynh-The T., Aouedi O., Yenduri G., Bhattacharya S., Gadekallu T.R. Journal of Network and Computer Applications
91 A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environment Khan A.A., Laghari A.A., Gadekallu T.R., Shaikh Z.A., Javed A.R., Rashid M., Estrela V.V., Mikhaylov A. Computers and Electrical Engineering
92 A new blockchain and fog computing model for blood pressure medical sensor data storage Mani V., Ghonge M.M., Chaitanya N.K., Pal O., Sharma M., Mohan S., Ahmadian A. Computers and Electrical Engineering
93 An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems Padinjappurathu Gopalan S., Chowdhary C.L., Iwendi C., Farid M.A., Ramasamy L.K. Sensors (Basel, Switzerland)
94 Relevant-Based Feature Ranking (RBFR) Method for Text Classification Based on Machine Learning Algorithm Jasti V.D.P., Kumar G.K., Kumar M.S., Maheshwari V., Jayagopal P., Pant B., Karthick A., Muhibbullah M. Journal of Nanomaterials
95 Multi-objective multi-verse optimizer based unsupervised band selection for hyperspectral image classification Sawant S.S., Prabukumar M., Loganathan A., Alenizi F.A., Ingaleshwar S. International Journal of Remote Sensing
96 Implementation of Combined Machine Learning with the Big Data Model in IoMT Systems for the Prediction of Network Resource Consumption and Improving the Data Delivery Sugadev M., Rayen S.J., Harirajkumar J., Rathi R., Anitha G., Ramesh S., Ramaswamy K. Computational Intelligence and Neuroscience
97 An Empirical Analysis of an Optimized Pretrained Deep Learning Model for COVID-19 Diagnosis Sangeetha S.K.B., Kumar M.S., Deeba K., Rajadurai H., Maheshwari V., Dalu G.T. Computational and Mathematical Methods in Medicine
98 Weather-based maize yield forecast in Saudi Arabia using statistical analysis and machine learning Jayagopal P., Muthukumaran V., Koti M.S., Kumar S.S., Rajendran S., Mathivanan S.K. Acta Geophysica
99 Comprehensive survey on data dissemination protocols for efficient reprogramming in Internet of Things Shanmugapriya R., Santhosh Kumar S.V.N. Concurrency and Computation: Practice and Experience
100 Feature Learning-Based Generative Adversarial Network Data Augmentation for Class-Based Few-Shot Learning Subedi B., Sathishkumar V.E., Maheshwari V., Kumar M.S., Jayagopal P., Allayear S.M. Mathematical Problems in Engineering
101 Recent Advancements in Privacy-aware Protocols of Source Location Privacy in Wireless Sensor Networks: a Survey Roy P.K., Tripathy A.K., Singh S.K., Li K.-C. Computer Science and Information Systems
102 COVID-19 Classification Using Medical Image Synthesis by Generative Adversarial Networks Nandhini Abirami R., Durai Raj Vincent P.M., Rajinikanth V., Kadry S. International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
103 Ensemble of Artificial Intelligence Techniques for Bacterial Antimicrobial Resistance (AMR) Estimation Using Topic Modeling and Similarity Measure Chakriswaran P., Vincent D.R., Kadry S. International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
104 Design of telemedicine information query system based on wireless sensor network Qian G., Gadekallu T.R. EAI Endorsed Transactions on Pervasive Health and Technology
105 An Empirical Study to Demonstrate that EdDSA can be used as a Performance Improvement Alternative to ECDSA in Blockchain and IoT Guruprakash J., Koppu S. Informatica (Slovenia)
106 Impact of Real-Time Information for Travellers: A Systematic Review Akhla A.A.N., Ling T.C., Shibghatullah A.S., Mon C.S., Cherukuri A.K., Yen C.L., Yi L.C. Journal of Information and Knowledge Management
107 An Investigation on the Impact of Technological Enablement on the Success of Entrepreneurial Adoption among Higher Education Students: A Comparative Study Keoy K.H., Thong C.L., Cherukuri A.K., Koh Y.J., Chit S.M., Lee L., Genaro J., Kwek C.L. Journal of Information and Knowledge Management
108 Guest Editorial: Security and Privacy Issues in Industry 4.0 Applications Alazab M., Gadekallu T.R., Su C. IEEE Transactions on Industrial Informatics
109 Assessing the impacts of vegetation cover loss on surface temperature, urban heat island and carbon emission in Penang city, Malaysia Rahaman Z.A., Kafy A.-A., Saha M., Rahim A.A., Almulhim A.I., Rahaman S.N., Fattah M.A., Rahman M.T., S K., Faisal A.-A., Al Rakib A. Building and Environment
110 A survey on COVID-19 impact in the healthcare domain: worldwide market implementation, applications, security and privacy issues, challenges and future prospects Shakeel T., Habib S., Boulila W., Koubaa A., Javed A.R., Rizwan M., Gadekallu T.R., Sufiyan M. Complex and Intelligent Systems
111 Cloud-based email phishing attack using machine and deep learning algorithm Butt U.A., Amin R., Aldabbas H., Mohan S., Alouffi B., Ahmadian A. Complex and Intelligent Systems
112 Health Informatics: Engaging Modern Healthcare Units: A Brief Overview Yogesh M.J., Karthikeyan J. Frontiers in Public Health
113 Medicine Drug Name Detection Based Object Recognition Using Augmented Reality Rupa C., Srivastava G., Ganji B., Tatiparthi S.P., Maddala K., Koppu S., Chun-Wei Lin J. Frontiers in Public Health
114 A Sequential Machine Learning-cum- Attention Mechanism for Effective Segmentation of Brain Tumor Ali T.M., Nawaz A., Ur Rehman A., Ahmad R.Z., Javed A.R., Gadekallu T.R., Chen C.-L., Wu C.-M. Frontiers in Oncology
115 Early Prediction of Lung Cancers Using Deep Saliency Capsule and Pre-Trained Deep Learning Frameworks Ramana K., Kumar M.R., Sreenivasulu K., Gadekallu T.R., Bhatia S., Agarwal P., Idrees S.M. Frontiers in Oncology
116 Fusion of Federated Learning and Industrial Internet of Things: A survey Boobalan P., Ramu S.P., Pham Q.-V., Dev K., Pandya S., Maddikunta P.K.R., Gadekallu T.R., Huynh-The T. Computer Networks
117 IoT enabled HELMET to safeguard the health of mine workers Singh N., Gunjan V.K., Chaudhary G., Kaluri R., Victor N., Lakshmanna K. Computer Communications
118 Healthcare Data Security Using Lightweight Protocol for Cyber Physical System Roy P.K., Singh A., Desai J.V., Singh S.K. IEEE Transactions on Network Science and Engineering
119 Collision avoidance approaches for autonomous mobile robots to tackle the problem of pedestrians roaming on campus road Manikandan N.S., Kaliyaperumal G. Pattern Recognition Letters
120 Ultra Super Fast Authentication Protocol for Electric Vehicle Charging Using Extended Chaotic Maps Wang W., Han Z., Alazab M., Gadekallu T.R., Zhou X., Su C. IEEE Transactions on Industry Applications
121 Improved Metaheuristic-Driven Energy- Aware Cluster-Based Routing Scheme for IoT-Assisted Wireless Sensor Networks Lakshmanna K., Subramani N., Alotaibi Y., Alghamdi S., Khalafand O.I., Nanda A.K. Sustainability (Switzerland)
122 Integration of Blockchain Technology and Federated Learning in Vehicular (IoT) Networks: A Comprehensive Survey Javed A.R., Hassan M.A., Shahzad F., Ahmed W., Singh S., Baker T., Gadekallu T.R. Sensors
123 IoT-Based Intelligent System for Internal Crack Detection in Building Blocks Babu J.C., Kumar M.S., Jayagopal P., Journal of Nanomaterials
124 Capability and Robustness of Novel Hybridized Artificial Intelligence Technique for Sediment Yield Modeling in Godavari River, India Yadav A., Joshi D., Kumar V., Mohapatra H., Iwendi C., Gadekallu T.R. Water (Switzerland)
125 E-commerce review sentiment score prediction considering misspelled words: a deep learning approach Jain S., Roy P.K. Electronic Commerce Research
126 A Modified Deep Learning Framework for Arrhythmia Disease Analysis in Medical Imaging Using Electrocardiogram Signal Anbarasi A., Ravi T., Manjula V.S., Brindha J., Saranya S., Ramkumar G., Rathi R. BioMed Research International
127 Prediction Performance of Deep Learning for Colon Cancer Survival Prediction on SEER Data Gupta S., Kalaivani S., Rajasundaram A., Ameta G.K., Oleiwi A.K., Dugbakie B.N. BioMed Research International
128 A Transfer Learning Approach with a Convolutional Neural Network for the Classification of Lung Carcinoma Humayun M., Sujatha R., Almuayqil S.N., Jhanjhi N.Z. Healthcare (Switzerland)
129 Harris Hawk Optimization: A Survey onVariants and Applications Tripathy B.K., Reddy Maddikunta P.K., Pham Q.-V., Gadekallu T.R., Dev K., Pandya S., Elhalawany B.M. Computational Intelligence and Neuroscience
130 Barnacles Mating Optimizer with Deep Transfer Learning Enabled Biomedical Malaria Parasite Detection and Classification Dutta A.K., Mageswari R.U., Gayathri A., Dallfin Bruxella J.M., Ishak M.K., Mostafa S.M., Hamam H. Computational Intelligence and Neuroscience
131 Cancer Detection and Prediction Using Genetic Algorithms Bhandari A., Tripathy B.K., Jawad K., Bhatia S., Rahmani M.K.I., Mashat A. Computational Intelligence and Neuroscience
132 Deep Learning-Based Privacy-Preserving Data Transmission Scheme for Clustered IIoT Environment Lakshmanna K., Kavitha R., Geetha B.T., Nanda A.K., Radhakrishnan A., Kohar R. Computational Intelligence and Neuroscience
133 PCA-Based Incremental Extreme Learning Machine (PCA-IELM) for COVID-19 Patient Diagnosis Using Chest X-Ray Images Kumar V., Biswas S., Rajput D.S., Patel H., Tiwari B. Computational Intelligence and Neuroscience
134 Novel Vision Transformer Based Bi-LSTM Model for LU/LC Prediction Javadi Hills, India Mohanrajan S.N., Loganathan A. Applied Sciences (Switzerland)
135 Automated sarcasm detection and classification using hyperparameter tuned deep learning model for social networks Vinoth D., Prabhavathy P. Expert Systems
136 Diagnosing Breast Cancer Based on the Adaptive Neuro-Fuzzy Inference System Chidambaram S., Ganesh S.S., Karthick A., Jayagopal P., Balachander B., Manoharan S. Computational and Mathematical Methods in Medicine
137 Diagnosis of Brain Tumor Using Light Weight Deep Learning Model with Fine- Tuning Approach Shelatkar T., Urvashi D., Shorfuzzaman M., Alsufyani A., Lakshmanna K. Computational and Mathematical Methods in Medicine
138 A Review on Deep Learning Techniques for IoT Data Lakshmanna K., Kaluri R., Gundluru N., Alzamil Z.S., Rajput D.S., Khan A.A., Haq M.A., Alhussen A. Electronics (Switzerland)
139 An effective deep learning model for grading abnormalities in retinal fundus images using variational auto-encoders Sundar S., Sumathy S. International Journal of Imaging Systems and Technology
140 IoT Based Smart Assist System to Monitor Entertainment Spots Occupancy and COVID 19 Screening During the Pandemic Narayanan K.L., Krishnan R.S., Robinson Y.H. Wireless Personal Communications
141 Tumor Detection on Microarray Data Using Grey Wolf Optimization with Gain Information Sree Devi K.D., Karthikeyan P., Moorthy U., Deeba K., Maheshwari V., Allayear S.M. Mathematical Problems in Engineering
142 Bio-Inspired PSO for Improving Neural Based Diabetes Prediction System Khan M.Z., Mangayarkarasi R., Vanmathi C., Angulakshmi M. Journal of ICT Standardization
143 Fault-Based Test Case Prioritization of Regression Testing Using Genetic Algorithm Priya T., Prasanna M. International Journal of e-Collaboration
144 Secure voting system for elections El-Gburi J., Srivastava G., Mohan S. International Journal of Computer Aided Engineering and Technology
145 Mobile Collaborative Secrecy Performance Prediction for Artificial IoT Networks Xu L., Zhou X., Li X., Jhaveri R.H., Gadekallu T.R., Ding Y. IEEE Transactions on Industrial Informatics
146 Water optimization technique for precision irrigation system using IoT and machine learning Maria Manuel Vianny D., John A., Kumar Mohan S., Sarlan A., Adimoolam, Ahmadian A. Sustainable Energy Technologies and Assessments
147 Humidity sensor based on fibre bragg grating for predicting microbial induced corrosion Raju B., Kumar R., Senthilkumar M., Sulaiman R., Kama N., Dhanalakshmi S. Sustainable Energy Technologies and Assessments
148 Authorship identification using ensemble learning Abbasi A., Javed A.R., Iqbal F., Jalil Z., Gadekallu T.R., Kryvinska N. Scientific Reports
149 AACF – Accessible Application-Centric Framework for the Internet of Things Backhauled Smart City Applications Cui Y., Song X., Liu J., Chen K., Shi G., Zhou J., Gs T. IEEE Transactions on Network Science and Engineering
150 A Novel Technique to Detect and Track Multiple Objects in Dynamic Video Surveillance Systems Adimoolam M., Mohan S., John A., Srivastava G. International Journal of Interactive Multimedia and Artificial Intelligence
151 Evaluating the Impact of Summer Drought on Vegetation Growth Using Space-Based Solar-Induced Chlorophyll Fluorescence Across Extensive Spatial Measures Pandiyan S., Govindjee G., Meenatchi S., Prasanna S., Gunasekaran G., Guo Y. Big Data
152 OTP-ER: an ordered transmission paradigm for effective routing in IoT based wireless sensor networks Jothi Kumar C., Deeban Chakravarthy V., Ramana K., Maddikunta P.K.R., Xin Q., Surya Narayana G. Optical and Quantum Electronics
153 Comparative analysis of FSO, OFC and diffused channel links in photonics using artificial intelligence based S-band, C- band and L-band of the attenuation metrics Karpagarajesh G., Santhana Krishnan R., Harold Robinson Y., Vimal S., Thamizharasan S., Subbulakshmi P., Kaliappan M. Optical and Quantum Electronics
154 Lower Back Pain Classification using Parameter Tuning Lenka S., Victor N. Research Journal of Pharmacy and Technology
155 Past, present and future of gene feature selection for breast cancer classification – a survey Chowdhary C.L., Khare N., Patel H., Koppu S., Kaluri R., Rajput D.S. International Journal of Engineering Systems Modelling and Simulation
156 Predicting Microscale Land Use/Land Cover Changes Using Cellular Automata Algorithm on the Northwest Coast of Peninsular Malaysia Rahaman Z.A., Kafy A.-A., Faisal A.-A., Al Rakib A., Jahir D.M.A., Fattah M.A., Kalaivani S., Rathi R., Mallik S., Rahman M.T. Earth Systems and Environment
157 Cyberbullying detection: an ensemble learning approach Roy P.K., Singh A., Tripathy A.K., Das T.K. International Journal of Computational Science and Engineering
158 An enhanced and hybrid fingerprint minutiae feature extraction method for identifying and authenticating the patient s noisy fingerprint Raghavan R., John Singh K. International Journal of System Assurance Engineering and Management
159 A Privacy-Enhanced Retrieval Technology for the Cloud-Assisted Internet of Things Wang T., Yang Q., Shen X., Gadekallu T.R., Wang W., Dev K. IEEE Transactions on Industrial Informatics
160 Data Freshness Optimization Under CAA in the UAV-Aided MECN: A Potential Game Perspective Wang W., Srivastava G., Lin J.C., Yang Y., Alazab M., Gadekallu T.R. IEEE Transactions on Intelligent Transportation Systems
161 A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks Liyanage M., Pham Q.-V., Dev K., Bhattacharya S., Maddikunta P.K.R., Gadekallu T.R., Yenduri G. Journal of Network and Computer Applications
162 Secure routing for LEO satellite network survivability Li H., Shi D., Wang W., Liao D., Gadekallu T.R., Yu K. Computer Networks
163 Heart rate and blood pressure measurement based on photoplethysmogram signal using fast Fourier transform Sharma A., Tanwar R.S., Singh Y., Sharma A., Daudra S., Singal G., Gadekallu T.R., Pancholi S. Computers and Electrical Engineering
164 Covid-19 fake news sentiment analysis Iwendi C., Mohan S., khan S., Ibeke E., Ahmadian A., Ciano T. Computers and Electrical Engineering
165 XGBRS Framework Integrated with Word2Vec Sentiment Analysis for Augmented Drug Recommendation Paliwal S., Mishra A.K., Mishra R.K., Nawaz N., Senthilkumar M. Computers, Materials and Continua
166 Imbalanced Classification in Diabetics Using Ensembled Machine Learning Kumar M.S., Khan M.Z., Rajendran S., Noor A., Dass A.S., Prabhu J. Computers, Materials and Continua
167 A novel unsupervised ensemble framework using concept-based linguistic methods and machine learning for twitter sentiment analysis Bibi M., Abbasi W.A., Aziz W., Khalil S., Uddin M., Iwendi C., Gadekallu T.R. Pattern Recognition Letters
168 Bio-Imaging-Based Machine Learning Algorithm for Breast Cancer Detection Safdar S., Rizwan M., Gadekallu T.R., Javed A.R., Rahmani M.K.I., Jawad K., Bhatia S. Diagnostics
169 Hypertuned Deep Convolutional Neural Network for Sign Language Recognition Mannan A., Abbasi A., Javed A.R., Ahsan A., Gadekallu T.R., Xin Q. Computational Intelligence and Neuroscience
170 Performance Evaluation of Seis Tutor Using Cognitive Intelligence-Based “kirkpatrick Model” Singh N., Gunjan V.K., Kadiyala R., Xin Q., Gadekallu T.R. Computational Intelligence and Neuroscience
171 Diagnosis of Retinal Diseases Based on Bayesian Optimization Deep Learning Network Using Optical Coherence Tomography Images Subramanian M., Kumar M.S., Sathishkumar V.E., Prabhu J., Karthick A., Ganesh S.S., Meem M.A. Computational Intelligence and Neuroscience
172 Real-Time Twitter Spam Detection and Sentiment Analysis using Machine Learning and Deep Learning Techniques Rodrigues A.P., Fernandes R., Aakash A., Abhishek B., Shetty A., Atul K., Lakshmanna K., Shafi R.M. Computational Intelligence and Neuroscience
173 Multimodal Medical Image Fusion of Positron Emission Tomography and Magnetic Resonance Imaging Using Generative Adversarial Networks Nandhini Abirami R., Durai Raj Vincent P.M., Srinivasan K., Manic K.S., Chang C.-Y. Behavioural Neurology
174 Multiobjectives for Optimal Geographic Routing in IoT Health Care System Aravind K., Maddikunta P.K.R. Complexity
175 Perimeter Degree Technique for the Reduction of Routing Congestion during Placement in Physical Design of VLSI Circuits Lakshmanna K., Shaik F., Gunjan V.K., Singh N., Kumar G., Shafi R.M. Complexity
176 Pansharpening scheme using spatial detail injection based convolutional neural networks Saxena N., Saxena G., Khare N., Rahman M.H. IET Image Processing
177 COVID-19 health analysis and prediction using machine learning algorithms for Mexico and Brazil patients Iwendi C., Huescas C.G.Y., Chakraborty C., Mohan S. Journal of Experimental and Theoretical Artificial Intelligence
178 Incentive Mechanisms for Smart Grid: State of the Art, Challenges, Open Issues, Future Directions Bhattacharya S., Chengoden R., Srivastava G., Alazab M., Javed A.R., Victor N., Maddikunta P.K.R., Gadekallu T.R. Big Data and Cognitive Computing
179 A Study on Diverse Methods and Performance Measures in Sentiment Analysis Rani M.S., Sumathy S. Recent Patents on Engineering
180 Test Case Generation for Arduino Programming Instructions using Functional Block Diagrams Padmanabhan M. Trends in Sciences
181 Non-invasive Detection of Parkinson s Disease Using Deep Learning Chowdhary C.L., Srivatsan R. International Journal of Image, Graphics and Signal Processing
182 Tiling algorithm with line-based transform for rapid ship detection and wake feature extraction in ALOS-2 SAR sensor data Selvaraj D., Krishnamurthy E., Sasikumar D., Sivankutty L., Kaliyaperumal G. International Journal of Applied Science and Engineering
183 A review on smart city – IoT and deep learning algorithms, challenges Rajyalakshmi V., Lakshmanna K. International Journal of Engineering Systems Modelling and Simulation
184 An adaptive neuro-fuzzy inference for blockchain-based smart job recommendation system Ephzibah E.P., Sujatha R., Chatterjee J.M. International Journal of Information and Decision Sciences
185 Henry MaxNet: tversky index based feature selection and competitive swarm henry gas solubility optimization integrated Deep Maxout network for intrusion detection in IoT Boopathi M. International Journal of Intelligent Robotics and Applications
186 Smart Agricultural Decision Support Systems for Predicting Soil Nutrition Value Using IoT and Ridge Regression Sudha M.K., Manorama M., Aditi T. Agris On-line Papers in Economics and Informatics
187 Towards reliable electronic exam networks El-Gburi J., Srivastava G., Mohan S. International Journal of Computer Aided Engineering and Technology
188 Evolution of Industry and Blockchain Era: Monitoring Price Hike and Corruption using BIoT for Smart Government and Industry 4.0 Hasan M.K., Akhtaruzzaman M., Kabir S.R., Gadekallu T.R., Islam S., Magalingam P., Hassan R., Alazab M., Alazab M.A. IEEE Transactions on Industrial Informatics
189 Catalysis of neural activation functions: Adaptive feed-forward training for big data applications Sarkar S., Agrawal S., Baker T., Maddikunta P.K.R., Gadekallu T.R. Applied Intelligence
190 A Multistage Heterogeneous Stacking Ensemble Model for Augmented Infant Cry Classification Joshi V.R., Srinivasan K., Vincent P.M.D.R., Rajinikanth V., Chang C.-Y. Frontiers in Public Health
191 Computational techniques for the automated detection of mycobacterium tuberculosis from digitized sputum smear microscopic images: A systematic review Kotei E., Thirunavukarasu R. Progress in Biophysics and Molecular Biology
192 Resource Search Method of Mobile Intelligent Education System Based on Distributed Hash Table Shen Y.-B., Gadekallu T.R. Mobile Networks and Applications
193 CONTROL-CORE: A Framework for Simulation and Design of Closed- Loop Peripheral Neuromodulation Control Systems Kathiravelu P., Arnold M., Fleischer J., Yao Y., Awasthi S., Goel A.K., Branen A., Sarikhani P., Kumar G., Kothare M., Mahmoudi B. IEEE Access
194 A new lightweight conditional privacy preserving authentication and key agreement protocol in social internet of things for vehicle to smart grid networks Agilandeeswari L., Paliwal S., Chandrakar A., Prabukumar M. Multimedia Tools and Applications
195 A supervised learning-based approach for focused web crawling for IoMT using global co-occurrence matrix Rajiv S., Navaneethan C. Expert Systems
196 Identifying region specific seasonal crop for leaf borne diseases by utilizing deep learning techniques Jayagopal P., Rajendran S., Mathivanan S.K., Sathish Kumar S.D., Raja K.T., Paneerselvam S. Acta Geophysica
197 A Deep Convolutional Neural Network Based Approach for Effective Neonatal Cry Classification Ashwini K., Durai Raj Vincent P.M. Recent Advances in Computer Science and Communications
198 Similarity Learning-Based Supervised Discrete Hash Signature Scheme for authentication of smart home scenario Sudha K.S., Jeyanthi N. International Journal of Information Technology (Singapore)
199 Industry 5.0: A survey on enabling technologies and potential applications Maddikunta P.K.R., Pham Q.-V., B P., Deepa N., Dev K., Gadekallu T.R., Ruby R., Liyanage M. Journal of Industrial Information Integration
200 EPPDA: An Efficient Privacy- Preserving Data Aggregation Federated Learning Scheme Song J., Wang W., Gadekallu T.R., Cao J., Liu Y. IEEE Transactions on Network Science and Engineering
201 Hand gesture recognition based on a Harris Hawks optimized Convolution Neural Network Gadekallu T.R., Srivastava G., Liyanage M., M. I., Chowdhary C.L., Koppu S., Maddikunta P.K.R. Computers and Electrical Engineering
202 Risk monitoring strategy for confidentiality of healthcare information Rizwan M., Shabbir A., Javed A.R., Srivastava G., Gadekallu T.R., Shabir M., Hassan M.A. Computers and Electrical Engineering
203 Detection of tyre defectsusingweighted quality-based convolutional neural network Rajeswari M., Julie E.G., Robinson Y.H., Joseph E., Arun A.S., Sebastian E., Kumar R., Long H.V., Son L.H. Soft Computing
204 Banana Plant Disease Classification Using Hybrid Convolutional Neural Network Narayanan K.L., Krishnan R.S., Robinson Y.H., Julie E.G., Vimal S., Saravanan V., Kaliappan M. Computational Intelligence and Neuroscience
205 Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review Majid M., Habib S., Javed A.R., Rizwan M., Srivastava G., Gadekallu T.R., Lin J.C.-W. Sensors
206 Privacy Preserving Multi-Party Key Exchange Protocol for Wireless Mesh Networks Roy A.K., Nath K., Srivastava G., Gadekallu T.R., Lin J.C.-W. Sensors
207 CAPSO: Chaos Adaptive Particle Swarm Optimization Algorithm Duan Y., Chen N., Chang L., Ni Y., Santhosh Kumar S.V.N., Zhang P. IEEE Access
208 Situation-aware BDI Reasoning to Detect Early Symptoms of Covid 19 using Smartwatch Saleem K., Saleem M., Zeeshan R., Javed A.R., Alazab M., Gadekallu T.R., Suleman A. IEEE Sensors Journal
209 Hash-Based Deep Learning Approach for Remote Sensing Satellite Imagery Detection Gadamsetty S., Ch R., Ch A., Iwendi C., Gadekallu T.R. Water (Switzerland)
210 A neural network aided attuned scheme for gun detection in video surveillance images Manikandan V.P., Rahamathunnisa U. Image and Vision Computing
211 An Intrusion Detection and Prevention Protocol for Internet of Things Based Wireless Sensor Networks Krishnan R., Krishnan R.S., Robinson Y.H., Julie E.G., Long H.V., Sangeetha A., Subramanian M., Kumar R. Wireless Personal Communications
212 Hybrid Energy-based Secured clustering technique for Wireless Sensor Networks Saveetha P., Robinson Y.H., Shanmuganathan V., Kadry S., Nam Y. Journal of Internet Technology
213 Analysis of breast cancer prediction and visualisation using machine learning models Magesh G., Swarnalatha P. International Journal of Cloud Computing
214 Big data in healthcare made simple to save people’s lives Anand R.V., Meenakshisundaram I., Jothikumar R., Chaitanya P.K. International Journal of Cloud Computing
215 InfusedHeart: A Novel Knowledge- Infused Learning Framework for Diagnosis of Cardiovascular Events Pandya S., Gadekallu T.R., Reddy P.K., Wang W., Alazab M. IEEE Transactions on Computational Social Systems
216 Transfer learning approach in deep neural networks for uterine fibroid detection Sundar S., Sumathy S. International Journal of Computational Science and Engineering
217 A Novel Model Based on Window-Pass Preferences for Data-Emergency-Aware Scheduling in Computer Networks Jemmali M., Denden M., Boulila W., Jhaveri R.H., Srivastava G., Gadekallu T.R. IEEE Transactions on Industrial Informatics
218 A survey on blockchain for big data: Approaches, opportunities, and future directions Deepa N., Pham Q.-V., Nguyen D.C., Bhattacharya S., Prabadevi B., Gadekallu T.R., Maddikunta P.K.R., Fang F., Pathirana P.N. Future Generation Computer Systems
219 Location Recommendation Based on Mobility Graph With Individual and Group Influences Pan X., Cai X., Song K., Baker T., Gadekallu T.R., Yuan X. IEEE Transactions on Intelligent Transportation Systems
220 An Empirical Model to Predict the Diabetic Positive Using Stacked Ensemble Approach Sivashankari R., Sudha M., Hasan M.K., Saeed R.A., Alsuhibany S.A., Abdel-Khalek S. Frontiers in Public Health
221 Geo Spatial Based Real Time Monitoring on Eutrophic Evaluation of Porunai River Basin for Pollution Risk Assessment Gopikumar S., Banu J.R., Harold Robinson Y., Raja S., Vimal S., Pelusi D., Kaliappan M. European Journal of Remote Sensing
222 FL-PMI: Federated Learning-Based Person Movement Identification through Wearable Devices in Smart Healthcare Systems Arikumar K.S., Prathiba S.B., Alazab M., Gadekallu T.R., Pandya S., Khan J.M., Moorthy R.S. Sensors
223 A Joint Resource Allocation, Security with Efficient Task Scheduling in Cloud Computing Using Hybrid Machine Learning Techniques Bal P.K., Mohapatra S.K., Das T.K., Srinivasan K., Hu Y.-C. Sensors
224 Construction of Sports Safety Information Mining Platform Based on Multimedia Data Sharing Technology Cao X.-Z., Gadekallu T.R. Mobile Networks and Applications
225 Sentiment analysis for user reviews using Bi-LSTM self-attention based CNN model Bhuvaneshwari P., Rao A.N., Robinson Y.H., Thippeswamy M.N. Multimedia Tools and Applications
226 A neuro-fuzzy based healthcare framework for disease analysis and prediction Nagarajan R., Thirunavukarasu R. Multimedia Tools and Applications
227 Crop Classification for Agricultural Applications in Hyperspectral Remote Sensing Images Agilandeeswari L., Prabukumar M., Radhesyam V., Phaneendra K.L.N.B., Farhan A. Applied Sciences (Switzerland)
228 An intelligent machine learning-based sarcasm detection and classification model on social networks Vinoth D., Prabhavathy P. Journal of Supercomputing
229 Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier Ikram S.T., Priya V., Anbarasu B., Cheng X., Ghalib M.R., Shankar A. Journal of Supercomputing
230 A Contemporary Review on Utilizing Semantic Web Technologies in Narayanasamy S.K., Srinivasan K., Hu Y.-C., Electronics (Switzerland)
231 An empirical intrusion detection system based on XGBoost and bidirectional long- short term model for 5G and other telecommunication technologies Karthikraja C., Senthilkumar J., Hariharan R., Usha Devi G., Suresh Y., Mohanraj V. Computational Intelligence
232 COVID-19 Detection Based on Lung Ct Scan Using Deep Learning Techniques Kogilavani S.V., Prabhu J., Sandhiya R., Kumar M.S., Subramaniam U., Karthick A., Muhibbullah M., Imam S.B.S. Computational and Mathematical Methods in Medicine
233 Hybrid Fuzzy AHP and Fuzzy TOPSIS Decision Model for Aquaculture Species Selection Padma T., Shantharajah S.P., Ramadoss P. International Journal of Information Technology and Decision Making
234 Multilevel controller-assisted intrinsically modified ant colony optimization heuristic- based load-balancing model for mega cloud infrastructures Govardhan P., Srinivasan P. International Journal of Communication Systems
235 Attention Aware Deep Learning Model for Wireless Capsule Endoscopy Lesion Classification and Localization Muruganantham P., Balakrishnan S.M. Journal of Medical and Biological Engineering
236 Cooperative and feedback based authentic routing protocol for energy efficient IoT systems Gayathri A., Prabu A.V., Rajasoundaran S., Routray S., Narayanasamy P., Kumar N., Qi Y. Concurrency and Computation: Practice and Experience
237 Deep Convolutional Nets Learning Classification for Artistic Style Transfer Dinesh Kumar R., Golden Julie E., Harold Robinson Y., Vimal S., Dhiman G., Veerasamy M. Scientific Programming
238 Developing an optimal MapReduce function for wireless sensor networks in a secure way Vedhanayagam P. International Journal of Computer Aided Engineering and Technology
239 Certificateless Aggregated Signcryption Scheme for Cloud-Fog Centric Industry 4.0 Dohare I., Singh K., Ahmadian A., Mohan S., Reddy M P.K. IEEE Transactions on Industrial Informatics
240 Federated learning enabled digital twins for smart cities: Concepts, recent advances, and future directions Ramu S.P., Boopalan P., Pham Q.-V., Maddikunta P.K.R., Huynh-The T., Alazab M., Nguyen T.T., Gadekallu T.R. Sustainable Cities and Society
241 Exergoeconomic Analysis of a Novel Zeotropic Mixture Power System Ganesh N.S., Maheswari G.U., Srinivas T., Reddy B.V. International Journal of Precision Engineering and Manufacturing – Green Technology
242 Evaluation of drought using satellite solar-induced chlorophyll fluorescence during crop development stage over Xinjiang, China Pandiyan S., Navaneethan C., Vijayan R., Gunasekaran G., Khan K.Y., Guo Y. Measurement: Journal of the International Measurement Confederation
243 Efficient resource allocation in fog computing using QTCS model Iyapparaja M., Alshammari N.K., Kumar M.S., Krishnan S.S.R., Chowdhary C.L. Computers, Materials and Continua
244 A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep Learning Akshay Kumaar M., Samiayya D., Vincent P.M.D.R., Srinivasan K., Chang C.-Y., Ganesh H. Frontiers in Public Health
245 Detecting COVID-19-Related Fake News Using Feature Extraction Khan S., Hakak S., Deepa N., Prabadevi B., Dev K., Trelova S. Frontiers in Public Health
246 A Comprehensive Survey on Computer Forensics: State-of-the-art,Tools, Techniques, Challenges, and Future Directions Javed A.R., Ahmed W., Alazab M., Jalil Z.,Kifayat K., Gadekallu T.R. IEEE Access
247 Prediction of heart abnormalities using deep learning model and wearabledevices in smart health homes Shafi J., Obaidat M.S., Krishna P.V., Sadoun B., Pounambal M., Gitanjali J. Multimedia Tools and Applications
248 Predicting attributes based movie success through ensemble machine learning Gupta V., Jain N., Garg H., Jhunthra S., Mohan S., Omar A.H., Ahmadian A. Multimedia Tools and Applications
249 DOA tracking for seamless connectivity in beamformed IoT- based drones Balamurugan N.M., Mohan S., Adimoolam M., John A., reddy G T.,Wang W. Computer Standards and Interfaces
250 Stealth assessment strategy in distributed systems using optimal deep learning with game based learning Rajendran D., Prasanna S. Journal of Supercomputing
251 Forecasting COVID-19: Vector Autoregression-Based Model Rajab K., Kamalov F., Cherukuri A.K. Arabian Journal for Science and Engineering
252 Self-organizing Maps and Bayesian Regularized Neural Network for Analyzing Gasoline and Diesel Price Drifts Sujatha R., Chatterjee J.M., Priyadarshini I., Hassanien A.E., Mousa A.A.A., Alghamdi S.M. International Journal of Computational Intelligence Systems
253 Heart failure patient survival analysis with multi kernel support vector machine Sujatha R., Chatterjee J.M., Jhanjhi N.Z., Tabbakh T.A., Almusaylim Z.A. Intelligent Automation and Soft Computing
254 Prediction of suitable candidates for covid-19 vaccination Sujatha R., Venkata Siva Krishna B., Chatterjee J.M., Naidu P.R., Jhanjhi N.Z., Charita C., Mariya E.N., Baz M. Intelligent Automation and Soft Computing
255 Cnn based driver drowsiness detection system using emotion analysis Varun Chand H., Karthikeyan J. Intelligent Automation and Soft Computing
256 Energy Optimization for Green Communication in IoT Using Harris Hawks Optimization Dev K., Maddikunta P.K.R., Gadekallu T.R., Bhattacharya S., Hegde P., Singh S. IEEE Transactions on Green Communications and Networking
257 An analysis on polygonal approximation techniques for digital image boundary Raja K.T., Ray B.K. Journal of Mobile Multimedia
258 Genetic algorithm-conditional mutual information maximization based feature selection for bot attack classification in iot devices Kavitha G., Elango N.M. Journal of Mobile Multimedia
259 Temporal Weighted Averaging for Asynchronous Federated Intrusion Detection Systems Agrawal S., Chowdhuri A., Sarkar S., Selvanambi R., Gadekallu T.R. Computational Intelligence and Neuroscience
260 Toward an Autonomous Incubation System for Monitoring Premature Infants Alqaheri H., Sujatha R., Chatterjee J.M., Shooriya S., Kumar S.A., Satish N. Studies in Informatics and Control
261 Wavelet enabled ranking and clustering-based band selection and three-dimensional spatial feature extraction for hyperspectral remote sensing image classification Manoharan P., Vaddi R. Journal of Applied Remote Sensing
262 Clinical Decision Support System for Detection of Dengue: A Case Comparison Using AHP and Fuzzy AHP Mohapatro A., Mahendran S.K., Das T.K. Journal of Cases on Information Technology
263 An IoT and artificial intelligence-based patient care system focused on COVID-19 pandemic Goar V.K., Yadav N.S., Chowdhary C.L., Kumaresan P., Mittal M. International Journal of Networking and Virtual Organisations
264 A comprehensive survey on aspect- based sentiment analysis Yadav K., Kumar N., Maddikunta P.K.R., Gadekallu T.R. International Journal of Engineering Systems Modelling and Simulation
2021
SL. NO. TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL
1 Review on implementation of IoT for environmental condition monitoring in the agriculture sector Arun Kumar K., Karthikeyan J. Journal of Ambient Intelligence and Humanized Computing
2 Improving the Classification of Alzheimer’s Disease Using Hybrid Gene Selection Pipeline and Deep Learning Mahendran N., Vincent P.M.D.R., Srinivasan K., Chang C.-Y. Frontiers in Genetics
3 Low-Light Image Enhancement Based on Generative Adversarial Network Nandhini Abirami R., Durai Raj Vincent P.M. Frontiers in Genetics
4 A deep learning framework with an embedded-based feature selection approach for the early detection of the Alzheimer’s disease Mahendran N., P M D.R.V. Computers in Biology and Medicine
5 Fault-Resilience for Bandwidth Management in Industrial Software- Defined Networks Jhaveri R.H., Ramani S.V., Srivastava G., Gadekallu T.R., Aggarwal V. IEEE Transactions on Network Science and Engineering
6 Ontology-Enabled Emotional Sentiment Analysis on COVID-19 Pandemic-Related Twitter Streams Narayanasamy S.K.,Srinivasan K., Mian Qaisar S., Chang C.-Y. Frontiers in Public Health
7 Genetic CFL: Hyperparameter Optimization in Clustered Federated Learning Agrawal S., Sarkar S., Alazab M., Maddikunta P.K.R., Gadekallu T.R., Pham Q.-V. Computational Intelligence and Neuroscience
8 Deep learning-based transfer learning for classification of skin cancer Jain S., Singhania U., Tripathy B., Nasr E.A., Aboudaif M.K., Kamrani A.K. Sensors
9 The smart pill sticker: Introducing a smart pill management system based on touch- point technology Kataria G., Dhyani K., Patel D., Srinivasan K., Malwade S., Syed Abdul S. Health Informatics Journal
10 A hybrid learning approach for the stage- wise classification and prediction of COVID-19 X-ray images Adimoolam M., Govindharaju K., John A., Mohan S., Ahmadian A., Ciano T. Expert Systems
11 Dynamic Private Modulus Based Password Conditional Privacy Preserving Authentication and Key-Agreement Protocol for VANET Paliwal S., Cherukuri A.K., Gao X.-Z. Wireless Personal Communications
12 Exploring Internet Meme Activity during COVID-19 Lockdown Using Artificial Intelligence Techniques Priyadarshini I., Chatterjee J.M., Sujatha R., Jhanjhi N., Karime A., Masud M. Applied Artificial Intelligence
13 Optimal Feature Selection and Hybrid Classification for Autism Detection in Young Children Guruvammal S.,Chellatamilan T., Deborah L.J. Computer Journal
14 ResMem-Net: memory based deep CNN for image memorability estimation Praveen A., Noorwali A., Samiayya D., Khan M.Z., Durai R.V.P.M., Bashir A.K., Alagupandi V. PeerJ Computer Science
15 Computational trust evaluation algorithm for cloud models using fuzzy logic approach Thakare V.R., John S.K. International Journal of Ad Hoc and Ubiquitous Computing
16 Lion plus firefly algorithm for ternary- based anomaly detection in semantic graphs in smart cities Reddy M.S.K., Rajput D.S. International Journal of Ad Hoc and Ubiquitous Computing
17 Recent advances in blockchain technology: A survey on applications and challenges Hakak S., Khan W.Z., Gilkar G.A., Assiri B., Alazab M., Bhattacharya S., Reddy G.T. International Journal of Ad Hoc and Ubiquitous Computing
18 A hybrid threat model for system-centric and attack-centric for effective security design in SDLC Viswanathan G., Prabhu P.J. Web Intelligence
19 A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT) Swapna Sudha K., Jeyanthi N. Cybernetics and Information Technologies
20 A systematic analysis of identity based encryption (IBE) Karrothu A., Norman J. International Journal of Knowledge-Based and Intelligent Engineering Systems
21 A Three-Tier Authentication Scheme for Kerberized Hadoop Environment Hena M., Jeyanthi N. Cybernetics and Information Technologies
22 Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models Ikram S.T., Cherukuri A.K., Poorva B., Ushasree P.S., Zhang Y., Liu X., Li G. Cybernetics and Information Technologies
23 Detection and localisation of cars in indoor parking through UWB radar-based sensing system Rajendran S., Mathivanan S.K., Somanathan M.S., Geetha M., Jayagopal P., Venkatasen M., Mani P., Christopher J. International Journal of Ultra Wideband Communications and Systems
24 Isolated word-based spoken dialogue system using odia phones Swain B.K., Mohanty S., Chowdhary C.L. Recent Advances in Computer Science and Communications
25 Remote monitoring of indoor/outdoor movement in epidemiological situations utilising UWB transceivers Rajendran S., Jayagopal P., Mathivanan S.K., Prasanna S., Manivannan S.S., Kumar P.J.,Venkatasen M., Mani P. International Journal of Ultra Wideband Communications and Systems
26 High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem Jayabalasamy G., Koppu S. Journal of King Saud University – Computer and Information Sciences
27 Adaptive practical Byzantine fault tolerance consensus algorithm in permission blockchain network Navaroj G.I., Julie E.G., Robinson Y.H. International Journal of Web and Grid Services
28 Socioeconomic impact due to COVID-19: An empirical assessment Gupta V., Santosh K.C., Arora R., Ciano T., Kalid K.S., Mohan S. Information Processing and Management
29 Recent advances in evolving computing paradigms: Cloud, edge, and fog technologies Angel N.A., Ravindran D., Vincent P.M.D.R., Srinivasan K., Hu Y.-C. Sensors
30 5G Data Offloading Using Fuzzification with Grasshopper Optimization Technique Balaji V.R., Kalavathi T., Vellingiri J., Rajkumar N., Padhy V.P. Computer Systems Science and Engineering
31 Blockchain and PUF-based Lightweight Authentication Protocol for Wireless Medical Sensor Networks Wang W., Qiu C., Yin Z., Srivastava G., Gadekallu T.R., Alsolami F., Su C. IEEE Internet of Things Journal
32 Reinforced resource management in vehicular fog computing using deep beacon power control protocol Kumar T.A., Rajmohan R., Julie E.G., Robinson Y.H., Vimal S., Kadry S. International Journal of Web and Grid Services
33 A peer-to-peer blockchain based interconnected power system Ahmed M.M., Hasan M.K., Shafiq M., Qays M.O., Gadekallu T.R., Nebhen J., Islam S. Energy Reports
34 Context-sensitive lexicon for imbalanced text sentiment classification using bidirectional LSTM Pavan Kumar M.R., Jayagopal P. Journal of Intelligent Manufacturing
35 Cascading 1D-Convnet Bidirectional Long Short Term Memory Network with Modified COCOB Optimizer: A Novel Approach for Protein Secondary Structure Prediction Sonsare P.M., C G. Chaos, Solitons and Fractals
36 Secure-Enhanced Federated Learning for AI-Empowered Electric Vehicle Energy Prediction Wang W., Fida M.H., Lian Z., Yin Z., Pham Q., Gadekallu T.R., Dev K., Su C. IEEE Consumer Electronics Magazine
37 Improved whale optimization based band selection for hyperspectral remote sensing image classification Manoharan P., Boggavarapu P.K.L.N. Infrared Physics and Technology
38 Enhanced Border and Hole Detection for Energy Utilization in Wireless Sensor Networks Robinson Y.H., Lawrence T.S., Julie E.G., Kumar R., Thong P.H., Son L.H. Arabian Journal for Science and Engineering
39 SmartPharma: Blockchain Enabled Internet of Things for Smart Pharmaceutical Traceability System Kavitha Margret M., Golden Julie E., Harold Robinson Y., Vijayanandh D., Vimal S., Kadry S., El- Sherbeeny A.M., El- Meligy M.A. IETE Journal of Research
40 Big data integration enhancement based on attributes conditional dependency and similarity index method Kolisetty V.V., Rajput D.S. Mathematical Biosciences and Engineering
41 A Two-stage Text Feature Selection Algorithm for Improving Text Classification Ashokkumar P., Siva Shankar G., Srivastava G., Maddikunta P.K.R., Gadekallu T.R. ACM Transactions on Asian and Low- Resource Language Information Processing
42 TAMIZHI: Historical Tamil-Brahmi Script Recognition Using CNN and MobileNet Dhivya S., Usha Devi G. ACM Transactions on Asian and Low- Resource Language Information Processing
43 Study on Automated Approach to Recognize Characters for Handwritten and Historical Document Dhivya S., Usha Devi G. ACM Transactions on Asian and Low- Resource Language Information Processing
44 Image and signal processing in the underwater environment Reddy P.C.S., Pradeepa M., Venkatakiran S., Walia R., Saravanan M., Pillai V.J. Journal of Nuclear Energy Science and Power Generation Technology
45 Fundamentals, present and future perspectives of speech enhancement Das, N., Chakraborty, S., Chaki, J., Padhy, N., Dey, N. International Journal of Speech Technology
46 Pattern analysis based acoustic signal processing: a survey of the state-of-art Chaki, J. International Journal of Speech Technology
47 B Smart Technologies in Engineering Applications of Cyber Physical System in Healthcare: Sensing, Imaging, Computing and Networking Dukiya, R., Perumal, K. Recent Advances in Computer Science and Communications
48 Federated Learning for Cybersecurity: Concepts, Challenges and Future Directions Alazab M., R M S.P., M P., Reddy P., Gadekallu T.R., Pham Q. IEEE Transactions on Industrial Informatics
49 Blockchain for Edge of Things: Applications, Opportunities, and Challenges Gadekallu T.R., Pham Q., Nguyen D.C., Maddikunta P.K.R., Deepa N., B P., Pathirana P.N., Zhao J., Hwang W. IEEE Internet of Things Journal
50 Distributed authentication framework for Hadoop based bigdata environment Hena M., Jeyanthi N. Journal of Ambient Intelligence and Humanized Computing
51 FogQSYM: An Industry 4.0 Analytical Model for Fog Applications Iyapparaja M., Kumar M.S., Krishnan S.S.R.,Chowdhary C.L., Yoon B., Singh S., Cho G.H. Computers, Materials and Continua
52 SCB-HC-ECC’Based Privacy Safeguard Protocol for Secure Cloud Storage of Smart Card’Based Health Care System Senthilkumar S., Brindha K., Kryvinska N., Bhattacharya S., Reddy Bojja G. Frontiers in Public Health
53 An intelligent tutoring system for new student model using fuzzy soft set-based hybrid optimization algorithm Chandrasekhar U., Khare N. Soft Computing
54 Interoperable permissioned-blockchain with sustainable performance Punathumkandi S., Sundaram V.M., Panneer P. Sustainability (Switzerland)
55 Evaluation of risk causing factors for the incidence of neck and shoulder pain in adolescents using fuzzy analytic hierarchy process Padma T., Shantharajah S.P. International Journal of Information and Decision Sciences
56 A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions Javed A.R., Jalil Z., Zehra W., Gadekallu T.R., Suh D.Y., Piran M.J. Engineering Applications of Artificial Intelligence
57 A new fuzzy adaptive algorithm to classify imbalanced data Patel H., Rajput D.S., Stan O.P., Miclea L.C. Computers, Materials and Continua
58 Multi-class imbalanced image classification using conditioned GANs Pavan Kumar M.R., Jayagopal P. International Journal of Multimedia Information Retrieval
59 Automatic hate speech detection in english-odia code mixed social media data using machine learning techniques Mohapatra S.K., Prasad S., Bebarta D.K., Das T.K., Srinivasan K., Hu Y.- C. Applied Sciences (Switzerland)
60 FBDR-Fuzzy Based DDoS Attack Detection and Recovery Mechanism for Wireless Sensor Networks Pajila P.J.B., Julie E.G., Robinson Y.H. Wireless Personal Communications
61 Feature based opinion analysis on social media tweets with association rule mining and multi-objective evolutionary algorithms Meesala S.R., Subramanian S. Concurrency and Computation: Practice and Experience
62 A survey on challenges in transforming No-SQL Data to SQL data and storing in cloud storage based on user requirement Shantharajah S.P., Maruthavani E. International Journal of Performability Engineering
63 Effectiveness of contact tracing using KNN for COVID-19 Venkatasen M., Mathivanan S.K., Mani P., Jayagopal P., Thanapal P., Somanathan M.S., Upendra Babu K., Elangovan D. Journal of Mobile Multimedia
64 Protein classification using machine learning and statistical techniques Gupta C.L.P., Bihari A., Tripathi S. Recent Advances in Computer Science and Communications
65 ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs Khan T., Singh K., Hasan M.H., Ahmad K., Reddy G.T., Mohan S., Ahmadian A. Future Generation Computer Systems
66 PPSF: A Privacy-Preserving and Secure Framework using Blockchain-based Machine-Learning for IoT-driven Smart Cities Kumar P., Kumar R., Srivastava G., Gupta G.P., Tripathi R., Gadekallu T.R., Xiong N. IEEE Transactions on Network Science and Engineering
67 AACFAccessible Application-Centric Framework for the Internet of Things Backhauled Smart City Applications Cui Y., Song X., Liu J., Chen K., Shi G., Zhou J., Tamizharasi G. IEEE Transactions on Network Science and Engineering
68 Data-centric routing and caching approach for mobile and social sensing applications Shynu P.G., Al-Turjman F. Computers and Electrical Engineering
69 Identify glomeruli in human kidney tissue images using a deep learning approach Shubham S., Jain N., Gupta V., Mohan S., Ariffin M.M., Ahmadian A. Soft Computing
70 Security in Next Generation Mobile Payment Systems: A Comprehensive Survey Ahmed W., Rasool A., Javed A.R., Kumar N., Gadekallu T.R., Jalil Z.,Kryvinska N. IEEE Access
71 Security Enhanced Sentence Similarity Computing Model Based on Convolutional Neural Network Sun Q., Huang X., Kibalya G., Kumar N., Kumar S.V.N.S., Zhang P., Xie D. IEEE Access
72 Delineation of field boundary from multispectral satellite images through U-Net segmentation and template matching M S.K., Jayagopal P. Ecological Informatics
73 Fuzzy Guided Autonomous Nursing Robot through Wireless Beacon Network Narayanan K.L., Krishnan R.S., Son L.H., Tung N.T., Julie E.G., Robinson Y.H., Kumar R., Gerogiannis V.C. Multimedia Tools and Applications
74 Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks Rajasoundaran S., Kumar S.V.N.S., Selvi M., Ganapathy S., Rakesh R., Kannan A. Wireless Networks
75 A hadoop based framework integrating machine learning classifiers for anomaly detection in the internet of things Thaseen I.S., Mohanraj V., Ramachandran S., Sanapala K., Yeo S.-S. Electronics (Switzerland)
76 Hybrid Inception v3 XGBoost Model for Acute Lymphoblastic Leukemia Classification Ramaneswaran S., Srinivasan K., Vincent P.M.D.R., Chang C.-Y. Computational and Mathematical Methods in Medicine
77 Expert system for stable power generation prediction in microbial fuel cell Srinivasan K., Garg L., Chen B.-Y., Alaboudi A.A., Jhanjhi N.Z., Chang C.-T., Prabadevi B., Deepa N. Intelligent Automation and Soft Computing
78 A Review on Deep Learning Architecture and Methods for MRI Brain Tumour Segmentation Angulakshmi M., Deepa M. Current medical imaging
79 Literature review on software testing techniques and test suite reduction frameworks/tools Asha N., Mani P. International Journal of Advanced Intelligence Paradigms
80 Multilevel thresholding based follicle detection and classification of polycystic ovary syndrome from the ultrasound images using machine learning Gopalakrishnan C., Iyapparaja M. International Journal of Systems Assurance Engineering and Management
81 Improving the accuracy of item recommendations by combining collaborative and content-based recommendations: A hybrid approach Parasuraman D., Elumalai S. International Journal of Advanced Intelligence Paradigms
82 Fuzzy based feature engineering architecture for sentiment analysis of medical discussion over online social networks Pavan Kumar C.S., Dhinesh Babu L.D. Journal of Intelligent and Fuzzy Systems
83 Machine learning based deep job exploration and secure transactions in virtual private cloud systems Rajasoundaran S., Prabu A.V., Routray S., Kumar S.V.N.S., Malla P.P., Maloji S., Mukherjee A., Ghosh U. Computers and Security
84 Deep neural networks based approach for battery life prediction Bhattacharya S., Maddikunta P.K.R., Meenakshisundaram I., Gadekallu T.R., Sharma S., Alkahtani M., Abidi M.H. Computers, Materials and Continua
85 Investigation of digital video broadcasting application employing the modulation formats like QAM and PSK using OWC, FSO, and LOS-FSO channels Karpagarajesh G., Santhana Krishnan R., Harold Robinson Y., Vimal S., Kadry S., Nam Y. Alexandria Engineering Journal
86 An intelligent hybrid system for forecasting stock and forex trading signals using optimized recurrent flann and case-based reasoning Bebarta D.K., Das T.K., Chowdhary C.L., Gao X.- Z. International Journal of Computational Intelligence Systems
87 Storage and Proximity Management for Centralized Personal Health Records Using an IPFS-based Optimization Algorithm Mubashar A., Asghar K., Javed A.R., Rizwan M., Srivastava G., Gadekallu T.R., Wang D., Shabbir M. Journal of Circuits, Systems and Computers
88 Industrial-IoT-hardware security- improvement using plan load optimization method in cloud Basheer S., Gopu M., Mathew R.M., Bivi M.A., Prabu M. International Journal of Systems Assurance Engineering and Management
89 Language dialect based speech emotion recognition through deep learning techniques Rajendran S., Mathivanan S.K., Jayagopal P., Venkatasen M., Pandi T., Sorakaya Somanathan M., Thangaval M., Mani P. International Journal of Speech Technology
90 Design and development of ternary-based anomaly detection in semantic graphs using metaheuristic algorithm Reddy M.S.K., Rajput D.S. International Journal of Digital Crime and Forensics
91 GraphCrypto: Next generation data security approach towards sustainable smart city building Mishra A.K., Puthal D., Tripathy A.K. Sustainable Cities and Society
92 Classification and categorization of COVID-19 outbreak in Pakistan Ayoub A., Mahboob K., Javed A.R., Rizwan M., Gadekallu T.R., Abidi M.H., Alkahtani M. Computers, Materials and Continua
93 Deep Learning Assisted Neonatal Cry Classification via Support Vector Machine Models Ashwini K., Vincent P.M.D.R., Srinivasan K., Chang C.-Y. Frontiers in Public Health
94 Scalable algorithm for generation of attribute implication base using FPgrowth and spark Chunduri R.K., Cherukuri A.K. Soft Computing
95 Cloud- and IoT-based deep learning technique-incorporated secured health monitoring system for dead diseases Malarvizhi Kumar P., Hong C.S., Chandra Babu G., Selvaraj J., Gandhi U.D Soft Computing
96 A review on h-index and its alternative indices Bihari A., Tripathi S., Deepak A Journal of Information Science
97 Sparse Bayesian learning based channel estimation in FBMC/OQAM industrial IoT networks Wang H., Li X., Jhaveri R.H., Gadekallu T.R., Zhu M., Ahanger T.A., Khowaja S.A. Computer Communications
98 Machine learning prediction models for chronic kidney disease using national health insurance claim data in Taiwan Krishnamurthy S., Kapeleshh K.S., Dovgan E., Lu’trek M., Gradi’ek Pileti’ B., Srinivasan K., Li Y.-C., Gradi’ek A., Syed-Abdul S. Healthcare (Switzerland)
99 Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks Santhosh Kumar S.V.N., Palanichamy Y., Selvi M., Ganapathy S., Kannan A., Perumal S.P. Wireless Networks
100 Hybrid Cache Management in Ad Hoc Networks Krishnan C.G., Robinson Y.H., Julie E.G., Bamini A.M.A., Kumar R., Thong P.H., Son L.H Wireless Personal Communications
101 Detection of Diabetic Retinopathy Using a Fusion of Textural and Ridgelet Features of Retinal Images and Sequential Minimal Optimization Classifier Ramasamy L.K., Padinjappurathu S.G., Kadry S., Dama’evi’ius R PeerJ Computer Science
102 An approach to merge domain ontologies using granular computing Priya M., Aswani Kumar C. Granular Computing
103 A hybrid feature selection model based on improved squirrel search algorithm and rank aggregation using fuzzy techniques for biomedical data classification Nagarajan G., Dhinesh Babu L.D. Network Modeling Analysis in Health Informatics and Bioinformatics
104 Naive Bayes and deep learning model for wireless intrusion detection systems Rajadurai H., Gandhi U.D. International Journal of Engineering Systems Modelling and Simulation
105 A Review on Various Applications of Reputation Based Trust Management Govindaraj R., Govindaraj P., Chowdhury S., Kim D., Tran D.-T., Le A.N. International Journal of Interactive Mobile Technologies
106 Rating Prediction Method for ItemBased collaborative Filtering Recommender Systems Using Formal Concept Analysis Chemmalar Selvi G., Lakshmi Priya G.G. EAI Endorsed Transactions on Energy Web
107 Early tumor diagnosis in brain MR images via deep convolutional neural network model Das T.K., Roy P.K., Uddin M., Srinivasan K., Chang C.-Y., Syed-Abdul S. Computers, Materials and Continua
108 Performance comparison of deep cnn models for detecting driver’s distraction Srinivasan K., Garg L., Datta D., Alaboudi A.A., Jhanjhi N.Z., Agarwal R., Thomas A.G. Computers, Materials and Continua
109 Machine translation using deep learning for universal networking language based on their structure Ali M.N.Y., Rahman M.L., Chaki J., Dey N., Santosh K.C. International Journal of Machine Learning and Cybernetics
110 Multi-criteria-based approach for job scheduling in industry 4.0 in smart cities using fuzzy logic Kumar P.M., Babu G.C., Selvaraj A., Raza M., Luhach A.K., Díaz V.G Soft Computing
111 Iterative weighted EM and iterative weighted EM’-index for scientific assessment of scholars Bihari A., Tripathi S., Deepak A. Scientometrics
112 Deep CNN and Deep GAN in Computational Visual PerceptionDriven Image Analysis Nandhini Abirami R., Durai Raj Vincent P.M., Srinivasan K., Tariq U., Chang C.-Y. Complexity
113 Performance Assessment of Certain Machine Learning Models for Predicting the Major Depressive Disorder among IT Professionals during Pandemic times Vincent P.M.D.R., Mahendran N., Nebhen J., Deepa N., Srinivasan K., Hu Y.-C. Computational Intelligence and Neuroscience
114 Shadow detection from images using fuzzy logic and PCPerturNet Chaki J. IET Image Processing
115 Dispersed dummy selection approach for location-based services to preempt user-profiling Manju A.B., Sumathy S. Concurrency Computation
116 Identity preserving multi-pose facial expression recognition using fine tuned VGG on the latent space vector of generative adversarial network Abirami R.N., Vincent P.M.D.R Mathematical Biosciences and Engineering
117 A Spectrum Defragmentation Algorithm Using Jellyfish Optimization Technique in Elastic Optical Network (EON) Selvakumar S., Manivannan S.S. Wireless Personal Communications
118 Sentiment Analysis on Twitter Data by Using Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) Gandhi U.D., Malarvizhi Kumar P., Chandra Babu G., Karthick G. Wireless Personal Communications
119 Eeccrn: Energy enhancement with css approach using q-learning and coalition game modelling in crn Shanmuganathan V., Kalaivani L., Kadry S., Suresh A., Harold Robinson Y., Lim S Information Technology and Control
120 IoT based smart health monitoring with CNN using edge computing Vimal S., Harold Robinson Y., Kadry S., Long H.V., Nam Y. Journal of Internet Technology
121 A study of computational trust models in cloud security Thakare V.R., Singh J.K International Journal of Grid and High Performance Computing
122 Public Key Encryption with Equality Test for Industrial Internet of Things Based on Near-Ring Muthukumaran V., Manimozhi I., Sundar P.P.V., Karthikeyan T., Gopu M. International Journal of e-Collaboration
123 PPHE-automatic detection of sensitive attributes in a privacy preserved Hadoop environment using data mining techniques Umapathy K., Khare N International Journal of Computer Aided Engineering and Technology
124 K-means clustering-based radio neutron star pulsar emission mechanism Shrimali S., Pandey A., Chowdhary C.L Recent Advances in Computer Science and Communications
125 An analytical hierarchical processbased weighted assessment of factors contributing precipitation Vaishnavi B., Karthikeyan J., Yarrakula K. International Journal of Intelligent Enterprise
126 Cloud based extensible business management suite and data predictions Dukiya R., Perumal K. Recent Advances in Computer Science and Communications
127 An efficient attribute reduction and fuzzy logic classifier for heart disease and diabetes prediction Gadekallu T.R., Gao X.-Z. Recent Advances in Computer Science and Communications
128 A Machine Learning Way to Classify Autism Spectrum Disorder Sujatha R., Aarthy S.L., Chatterjee J.M., Alaboudi A., Jhanjhi N.Z International Journal of Emerging Technologies in Learning
129 Fuzzy deep learning-based crop yield prediction model for sustainable agronomical frameworks Elavarasan D., Durai Raj Vincent P.M Neural Computing and Applications
130 Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model Movassagh A.A., Alzubi J.A., Gheisari M., Rahimi M., Mohan S., Abbasi A.A., Nabipour N. Journal of Ambient Intelligence and Humanized Computing
131 Providing diagnosis on diabetes using cloud computing environment to the people living in rural areas of India Rajput D.S., Basha S.M., Xin Q., Gadekallu T.R., Kaluri R., Lakshmanna K., Maddikunta P.K.R. Journal of Ambient Intelligence and Humanized Computing
132 Whale optimization-based band selection technique for hyperspectral image classification Phaneendra Kumar B.L.N., Manoharan P. International Journal of Remote Sensing
133 Identifying and classifying plant disease using resilient LF-CNN B.V. G., G. U.D. Ecological Informatics
134 A method of progression detection for glaucoma using K-means and the GLCM algorithm toward smart medical prediction Vimal S., Robinson Y.H., Kaliappan M., Vijayalakshmi K., Seo S Journal of Supercomputing
135 An approach to forecast impact of Covid-19 using supervised machine learning model Mohan S., John A., Abugabah A., Adimoolam M., Kumar Singh S., kashif Bashir A., Sanzogni L. Software – Practice and Experience
136 Performance assessment of supervised classifiers for designing intrusion detection systems: A comprehensive review and recommendations for future research Panigrahi R., Borah S., Bhoi A.K., Ijaz M.F.,Pramanik M., Jhaveri R.H., Chowdhary C.L. Mathematics
137 A Threat Categorization of Risk-Based approach for analyzing Security Threats early phase in SDLC Viswanathan G., Jayagopal P Arabian Journal for Science and Engineering
138 Band selection strategies for hyperspectral image classification based on machine learning and artificial intelligent techniques ‘Survey Sawant S.S., Manoharan P., Loganathan A. Arabian Journal of Geosciences
139 Development of Fuzzy Enabled Coverage Hole Detection Algorithm in Wireless Sensor Networks Robinson Y.H., Lawrence T.S., Julie E.G., Vimal S. Wireless Personal Communications
140 Enhanced Energy Proficient Encoding Algorithm for Reducing Medium Time in Wireless Networks Robinson Y.H., Julie E.G., Jacob I.J., Lawrence T.S., Saravanan V., Darney P.E Wireless Personal Communications
141 Inherent Security-aware Resource Utilizing Methodology for Cloud Environments Gopala Krishnan C., Golden Julie E., Harold Robinson Y. Wireless Personal Communications
142 ANFIS PD Plus I Control On Simscape Model of Nonlinear Physical System Umamaheswari K., Prabhakar G., Viji K., Thanapal P. Control Engineering and Applied Informatics
143 A new venture to image encryption using combined chaotic system and integer wavelet transforms Subashanthini S., Pounambal M. International Journal of Cloud Computing
144 A study and analysis of forecasts in resource allocation using ARIMA in cloud environment Rajalakshmi L., Sathiyamoorthy E Turkish Journal of Computer and Mathematics Education
145 An intelligent network intrusion detection system using particle swarm optimization (PSO) and deep network networks (DNN) Preethi D., Khare N. International Journal of Swarm Intelligence Research
146 Classification of cricket videos using finite state machines Ellappan V., Rajkumar R. International Journal of Information Technology and Management
147 Deep learning based recurrent neural networks to enhance the performance of wind energy forecasting: A review Paramasivan S.K. Revue d’Intelligence Artificielle
148 Landslide Hazard Zonation Mapping using Power Method based AHP for Saklespur, India Sreedevi N., Karthikeyan J. ndian Journal of Ecology
149 Some algorithms under non-parametric framework versus an unsupervised approach Ray B.K. Computer Science Review
150 Quantum-inspired ensemble approach to multi-attributed and multi-agent decision-making M.S. I., Cherukuri A.K. Applied Soft Computing
151 CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network using CNN and Attention-based GRU Rehman A., Ur Rehman S., Khan M., Alazab M., G T.R. IEEE Transactions on Network Science and Engineering
152 COVID19: Forecasting Air Quality Index and Particulate Matter (PM2.5) Mangayarkarasi R., Vanmathi C., Khan M.Z., Noorwali A., Jain R., Agarwal P. Computers, Materials and Continua
153 Deep Learning-Based Hookworm Detection in Wireless Capsule Endoscopic Image Using AdaBoost Lakshminarayanan K., Muthukumaran N., Robinson Y.H., Computers, Materials and Continua
154 Performance assessment of a novel power generation system Ganesh N.S., Maheswari G.U., Srinivas T., Reddy B.V. IET Renewable Power Generation
155 Blockchain-based Secure Healthcare Application for Diabetic-Cardio Disease Prediction in Fog Computing Shynu P.G., Menon V.G., Kumar R., Kadry S., Nam Y. IEEE Access
156 A Bayesian regularized neural network for analyzing bitcoin trends Sujatha R., Mareeswari V., Chatterjee J.M., Mousa A.A.A., Hassanien A.E. IEEE Access
157 BCD-WERT: a novel approach for breast cancer detection using whale optimization based efficient features and extremely randomized tree algorithm Abbas S., Jalil Z., Javed A.R., Batool I., Khan M.Z., Noorwali A., Gadekallu T.R., Akbar A. PeerJ Computer Science
158 Deep Neural Network to Predict Answer Votes on Community Question Answering Sites Roy P.K. Neural Processing Letters
159 Smart Animal Detection and Counting Framework for Monitoring Livestock in an Autonomous Unmanned Ground Vehicle Using Restricted Supervised Learning and Image Fusion Meena S.D., Agilandeeswari L. Neural Processing Letters
160 Spam review detection using self attention based CNN and bi-directional LSTM Bhuvaneshwari P., Rao A.N., Robinson Y.H. Multimedia Tools and Applications
161 A secured distributed detection system based on IPFS and blockchain for industrial image and video data security Kumar R., Tripathi R., Marchang N., Srivastava G., Gadekallu T.R., Xiong N.N. Journal of Parallel and Distributed Computing
162 Integrated Ranking Algorithm for Efficient Decision Making Deepa N., Prabadevi B., Srivastava G. International Journal of Information Technology and Decision Making
163 An effective data mining techniques based optimal paddy yield cultivation: a rational approach Vinoth B., Elango N.M. Paddy and Water Environment
164 3-Dimensional Manifold and Machine Learning Based Localization Algorithm for Wireless Sensor Networks Robinson Y.H., Vimal S., Julie E.G., Lakshmi Narayanan K., Rho S. Wireless Personal Communications
165 Machine Learning Based Detection and a Novel EC-BRTT Algorithm Based Prevention of DoS Attacks in Wireless Sensor Networks Lakshmi Narayanan K., Santhana Krishnan R., Golden Julie E., Harold Robinson Y., Shanmuganathan V. Wireless Personal Communications
166 Ternary-based feature level extraction for anomaly detection in semantic graphs: an optimal feature selection basis Reddy M.S.K., Rajput D.S. Sadhana – Academy Proceedings in Engineering Sciences
167 Remote health patient monitoring system for early detection of heart disease Babu G.C., Shantharajah S.P. International Journal of Grid and High Performance Computing
168 DARE-SEP: A Hybrid Approach of Distance Aware Residual Energy-Efficient SEP for WSN Naeem A., Javed A.R., Rizwan M., Abbas S., Lin J.C., Gadekallu T.R. IEEE Transactions on Green Communications
169 Heart disease prediction system using ensemble of machine learning algorithms Rajendran N.A., Vincent D.R. Recent Patents on Engineering
170 Hybrid approach for semantic similarity calculation between Tamil words Karuppaiah D., Durai Raj Vincent P.M. International Journal of Innovative Computing and Applications
171 LIS4: Lesk Inspired Sense Specific Semantic Similarity using WordNet Kandasamy S., Cherukuri A.K. Journal of Information and Knowledge Management
172 Data mining of paddy cultivation patterns and water resource management in late samba season of Tamilnadu Vinoth B., Elango N.M. SSRG International Journal of Engineering Trends and Technology
173 A fine-tuned feature descriptor for pedestrian action recognition in autonomous vehicles Ushapreethi P., Priya G.G.L. International Journal of Vehicle Information and Communication Systems
174 Robustness for authentication of the human using face, Ear, and Gait multimodal biometric system Singh L.K., Khanna M., Thawkar S., Gopal J. International Journal of Information System Modeling and Design
175 Adoption of E-Learning during Lockdown in India Mathivanan S.K., Jayagopal P., Ahmed S., Manivannan S.S., Kumar P.J., Raja K.T., Dharinya S.S., Prasad R.G. International Journal of Systems Assurance Engineering and Management
176 Real-time 3D reconstruction techniques applied in dynamic scenes: A systematic literature review Ingale A.K., J. D.U. Computer Science Review
177 Regularized deep clustering approach for effective categorization of maize diseases Gokulnath B.V., Gandhi U.D. Journal of Ambient Intelligence and Humanized Computing
178 Optimal 5G network slicing using machine learning and deep learning concepts Abidi M.H., Alkhalefah H., Moiduddin K., Alazab M., Mohammed M.K., Ameen W., Gadekallu T.R. Computer Standards and Interfaces
179 Field-programmable gate arrays in a low power vision system Suresh P., Saravanakumar U., Iwendi C., Mohan S., Srivastava G. Computers and Electrical Engineering
180 Recognition of food type and calorie estimation using neural network Kumar R.D., Julie E.G., Robinson Y.H., Vimal S., Seo S. Journal of Supercomputing
181 An intrusion detection system using optimized deep neural network architecture Ramaiah M., Chandrasekaran V., Ravi V., Kumar N. Transactions on Emerging Telecommunications Technologies
182 Roughsets-based approach for predicting battery life in iot Kaluri R., Rajput D.S., Xin Q., Lakshmanna K., Bhattacharya S., Gadekallu T.R., Maddikunta P.K.R. Intelligent Automation and Soft Computing
183 Tyre inspection through multi-state convolutional neural networks Sivamani C., Rajeswari M., Julie E.G., Robinson Y.H., Shanmuganathan V., Kadry S., Nam Y. Intelligent Automation and Soft Computing
184 An Effective Traceback Network Attack Procedure for Source Address Verification Balraj S., Leelasankar K., Ayyanar A., Yesudhas H.R., Kumar R., Long H.V., Hoang Son L. Wireless Personal Communications
185 Enhanced QoS Through Optimized Architecture for Video Streaming Applications in Heterogeneous Networks Duraimurugan S., Avudaiammal R., Vincent P.M.D.R. Wireless Personal Communications
186 Image retrieval using intensity gradients and texture chromatic pattern: Satellite images retrieval Jacob I.J., Paulraj B., Darney P.E., Long H.V., Tuan T.M., Yesudhas H.R., Shanmuganathan V., Eanoch G.J. International Journal of Data Warehousing and Mining
187 Human action recognition in videos using convolution long short-term memory network with spatio-temporal networks Sarabu A., Santra A.K. Emerging Science Journal
188 A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques Singh G., Khare N. International Journal of Computers and Applications
189 A hybrid approach towards content-based image retrieval for colored images using enhanced first type of pessimistic covering based lower approximation multi-granular rough sets R R., K J.S. Evolutionary Intelligence
190 Trust-aware routing framework for internet of things Sankar S., Somula R., Lakshmana Kumar R., Srinivasan P., Amala Jayanthi M. International Journal of Knowledge and Systems Science
191 E-farming management system using data mining techniques Kaviarasan S., Vanitha M. International Journal of Intelligent Unmanned Systems
192 An efficient privacy-preserving deep learning scheme for medical image analysis Andrew Onesimu J., Karthikeyan J. Journal of Information Technology Management
193 Machine Learning Assisted Information Management Scheme in Service Concentrated IoT Manogaran G., Alazab M., Saravanan V., Rawal B.S., Shakeel P.M., Sundarasekar R., Nagarajan S.M., Kadry S.N., Montenegro-Marin C.E. IEEE Transactions on Industrial Informatics
194 An ensemble machine learning approach through effective feature extraction to classify fake news Hakak S., Alazab M., Khan S., Gadekallu T.R., Maddikunta P.K.R., Khan W.Z. Future Generation Computer Systems
195 Novel framework of GIS based automated monitoring process on environmental biodegradability and risk analysis using Internet of Things Gopikumar S., Banu J.R., Robinson Y.H., Shanmuganathan V., Kadry S., Rho S. Environmental Research
196 A reinforced random forest model for enhanced crop yield prediction by integrating agrarian parameters Elavarasan D., Vincent P.M.D.R. Journal of Ambient Intelligence and Humanized Computing
197 Analysis and evaluation of the regional air quality index forecasting based on web-text sentiment analysis method Gao K., Anandhan P., Kumar R. Environmental Impact Assessment Review
198 Prediction modelling of COVID using machine learning methods from B-cell dataset Jain N., Jhunthra S., Garg H., Gupta V., Mohan S., Ahmadian A., Salahshour S., Ferrara M. Results in Physics
199 An Emotion Care Model using Multimodal Textual Analysis on COVID-19 Gupta V., Jain N., Katariya P., Kumar A., Mohan S., Ahmadian A., Ferrara M. Chaos, Solitons and Fractals
200 A social immunity based approach to suppress rumors in online social networks Srinivasan S., L D D.B. International Journal of Machine Learning and Cybernetics
201 Secrecy Outage Probability of Relay Selection Based Cooperative NOMA for IoT Networks Li H., Chen Y., Zhu M., Sun J., Do D.-T., Menon V.G., P. G. S. IEEE Access
202 Multi-objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities Alazab M., Lakshmanna K., G T.R., Pham Q.-V., Reddy Maddikunta P.K. Sustainable Energy Technologies and Assessments
203 Accessing Covid19 epidemic outbreak in Tamilnadu and the impact of lockdown through epidemiological models and dynamic systems Rajendran S., Jayagopal P. Measurement: Journal of the International Measurement Confederation
204 Keyword weight optimization using gradient strategies in event focused web crawling Rajiv S., Navaneethan C. Pattern Recognition Letters
205 SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles Kumar R., Kumar P., Tripathi R., Gupta G.P., Gadekallu T.R., Srivastava G. Computer Networks
206 Unmanned Aerial Vehicles in Smart Agriculture: Applications, Requirements, and Challenges Maddikunta P.K.R., Hakak S., Alazab M., Bhattacharya S., Gadekallu T.R., Khan W.Z., Pham Q. IEEE Sensors Journal
207 Adaptive beam formation and channel allocation using substance near multicast protocol and CS-iEHO Velusamy Y., Manickam R., Chinnaswamy S., Eanoch G.J., Yesudhas H.R., Kumar R., Long H.V. Soft Computing
208 Sustainable task scheduling strategy in cloudlets Mukherjee D., Nandy S., Mohan S., Al-Otaibi Y.D., Alnumay W.S. Sustainable Computing: Informatics and Systems
209 EMMM: Energy-efficient mobility management model for context-aware transactions over mobile communication Yadav A.K., Singh K., Ahmadian A., Mohan S., Hussain Shah S.B., Alnumay W.S. Sustainable Computing: Informatics and Systems
210 Energy-efficient cluster head selection through relay approach for WSN Rathore P.S., Chatterjee J.M., Kumar A., Sujatha R. Journal of Supercomputing
211 Exploration of sentiment analysis and legitimate artistry for opinion mining Kumar R.S., Saviour Devaraj A.F., Rajeswari M., Julie E.G., Robinson Y.H., Shanmuganathan V. Multimedia Tools and Applications
212 Learning automata and reservation based secure smart parking system: Methodology and simulation analysis Waheed A., Krishna P.V., J G., Sadoun B., Obaidat M. Simulation Modelling Practice and Theory
213 A bio-inspired defensive rumor confinement strategy in online social networks Srinivasan S., Dhinesh B.L.D. Journal of Organizational and End User Computing
214 Longitudinal strain waves propagating in an infinitely long cylindrical rod composed of generally incompressible materials and its Jacobi elliptic function solutions Silambarasan R., Baskonus H.M., Vijay Anand R., Dinakaran M., Balusamy B., Gao W. Mathematics and Computers in Simulation
215 Performance of deep learning vs machine learning in plant leaf disease detection Sujatha R., Chatterjee J.M., Jhanjhi N.Z., Brohi S.N. Microprocessors and Microsystems
216 Route manipulation aware Software-Defined Networks for effective routing in SDN controlled MANET by Disney Routing Protocol J M., S P., P J., V M., B S.K., P S. Microprocessors and Microsystems
217 A pragmatic approach to understand hebbian cell assembly Cherukuri A.K., Shivhare R., Abraham A., Li J., Jonnalagadda A. International Journal of Cognitive Informatics and Natural Intelligence
218 Word sense disambiguation in Tamil using indo-wordnet and cross-language semantic similarity Karuppaiah D., Durai Raj Vincent P.M. International Journal of Intelligent Enterprise
219 Topological properties of multigranular rough sets on intuitionistic fuzzy approximation spaces Reddy A.J., Tripathy B.K. International Journal of Intelligent Enterprise
220 A new dominant point detection technique for polygonal approximation of digital planar closed curves Kalaivani S., Ray B.K. International Journal of Intelligent Enterprise
221 Finding location of fake and phantom source for source location privacy in wireless sensor network Rimjhim, Roy P.K., Singh J.P. International Journal of Communication Networks and Distributed Systems
222 Efficient learning from two-class categorical imbalanced healthcare data Mathews L., Seetha H. International Journal of Healthcare Information Systems and Informatics
223 Palmprint Recognition Using Hessian Matrix and Two-Component Partition Method Chaki J., Dey N. International Journal of Digital Crime and Forensics
224 Design and Evaluation of Wi-Fi Offloading Mechanism in Heterogeneous Networks Vinoth Kumar V., Ramamoorthy S., Dhilip Kumar V., Prabu M., Balajee J.M. International Journal of e-Collaboration
225 Robust attack detection approach for iiot using ensemble classifier Priya V., Thaseen I.S., Gadekallu T.R., Aboudaif M.K., Nasr E.A. Computers, Materials and Continua
226 Distinct two-stream convolutional networks for human action recognition in videos using segment-based temporal modeling Sarabu A., Santra A.K. Data
227 Face Analysis Using Row and Correlation Based Local Directional Pattern Perumal S.R., Mouli C.P.V.S.S.R. Electronic Letters on Computer Vision and Image Analysis
2020
SL. NO. TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL
1 Deep learning to filter SMS Spam Roy P.K., Singh J.P., Banerjee S. Future Generation Computer Systems
2 An efficient XGBoost–DNN-based classification model for network intrusion detection system Devan P., Khare N. Neural Computing and Applications
3 Quantum Aspects of High Dimensional Conceptual Space: a Model for Achieving Consciousness Ishwarya M.S., Kumar C.A. Cognitive Computation
4 Hybrid context enriched deep learning model for fine-grained sentiment analysis in textual and visual semiotic modality social data Kumar A., Srinivasan K., Cheng W.-H., Zomaya A.Y. Information Processing and Management
5 A novel automata and neural network based fault diagnosis system for PLC controlled manufacturing systems Ghosh A., Wang G.-N., Lee J. Computers and Industrial Engineering
6 SVM-enabled intelligent genetic algorithmic model for realizing efficient universal feature selection in breast cyst image acquired via ultrasound sensing systems Chang C.-Y., Srinivasan K., Chen M.-C., Chen S.-J. Sensors (Switzerland)
7 Predicting drug responsiveness with deep learning from the effects on gene expression of Obsessive–Compulsive Disorder affected cases Sekaran K., Sudha M. Computer Communications
8 Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT Vimal S., Khari M., Dey N., Crespo R.G., Harold Robinson Y. Computer Communications
9 LNR-PP: Leaf Node Count and RSSI Based Parent Prediction Scheme to Support QoS in Presence of Mobility in 6LoWPAN Suganya P., C.H. P.R. Computer Communications
10 An efficient public key secure scheme for cloud and IoT security Thirumalai C., Mohan S., Srivastava G. Computer Communications
11 Periodic waves of the non dissipative double dispersive micro strain wave in the micro structured solids Gao W., Silambarasan R., Baskonus H.M., Anand R.V., Rezazadeh H. Physica A: Statistical Mechanics and its Applications
12 AVRM: adaptive void recovery mechanism to reduce void nodes in wireless sensor networks Ayyasamy A., Julie E.G., Robinson Y.H., Balaji S., Kumar R., Son L.H., Thong P.H., Priyadarshini I. Peer-to-Peer Networking and Applications
13 A hybrid meta-heuristic approach for optimization of routing and spectrum assignment in Elastic Optical Network (EON) Selvakumar S., Manivannan S.S. Enterprise Information Systems
14 Bio-inspired dual cluster heads optimized routing algorithm for wireless sensor networks Visu P., Praba T.S., Sivakumar N., Srinivasan R., Sethukarasi T. Journal of Ambient Intelligence and Humanized Computing
15 Quality assessment of tire shearography images via ensemble hybrid faster region-based convnets Chang C.-Y., Srinivasan K., Wang W.-C., Ganapathy G.P., Vincent D.R., Deepa N. Electronics (Switzerland)
16 An algorithmic approach to rank the disambiguous entities in Twitter streams for effective semantic search operations Senthil Kumar N., Dinakaran M. Sadhana – Academy Proceedings in Engineering Sciences
17 A neuro-fuzzy approach to detect rumors in online social networks Srinivasan S., Dhinesh Babu L.D. International Journal of Web Services Research
18 Genetic algorithm influenced top-n recommender system to alleviate new user cold start problem Moses S.J., Babu D.L.D. International Journal of Swarm Intelligence Research
19 Analysing thalamus and its sub nuclei in MRI brain image to distinguish schizophrenia subjects using back propagation neural network ArivuSelvan K., Sathiya Moorthy E. International Journal of Internet Technology and Secured Transactions
20 Fundamentals, present and future perspectives of speech enhancement Das N., Chakraborty S., Chaki J., Padhy N., Dey N. International Journal of Speech Technology
21 Predicting bipolar disorder and schizophrenia based on non- overlapping genetic phenotypes using deep neural network Karthik S., Sudha M. Evolutionary Intelligence
22 Learnability of interestingness with semantic similarity and reasoning in the knowledge base of decision support systems Rajendran S., Prabhu J. International Journal of Web Portals
23 Effective feature selection using hybrid Ga-EHO for classifying big data siot Iyapparaja M., Deva Arul S. International Journal of Web Portals
24 Optimal feature selection through a cluster-based DT learning (CDTL) in heart disease prediction Magesh G., Swarnalatha P. Evolutionary Intelligence
25 Bi-level user authentication for enriching legitimates and eradicating duplicates in cloud infrastructure Thandeeswaran R., Saleem Durai M.A. International Journal of Computer Aided Engineering and Technology
26 A framework for ranking hospitals based on customer perception using rough set and soft set techniques Mohapatro A., Mahendran S.K., Das T.K. International Journal of Healthcare Information Systems and Informatics
27 Survey on IoT security and challenges of IoT forensics Joseph A., John Singh K. Test Engineering and Management
28 Anaphora and coreference resolution: A review Sukthanker R., Poria S., Cambria E., Thirunavukarasu R. Information Fusion
29 Fuzzy Logic based Smart Irrigation System using Internet of Things Krishnan R.S., Julie E.G., Robinson Y.H., Raja S., Kumar R., Thong P.H., Son L.H. Journal of Cleaner Production
30 Unsupervised band selection based on weighted information entropy and 3D discrete cosine transform for hyperspectral image classification Sawant S.S., Manoharan P. International Journal of Remote Sensing
31 Ultrasonic sensors-assisted corrosion studies on surface coated AlSi9Cu3 alloy die castings Hu Y.-C., Selvaraj S.K., Subramanian M., Srinivasan K., Narayanan S. Coatings
32 Early detection of diabetic retinopathy using pca-firefly based deep learning model Gadekallu T.R., Khare N., Bhattacharya S., Singh S., Maddikunta P.K.R., Ra I.-H., Alazab M. Electronics (Switzerland)
33 A novel PCA-firefly based XGBoost classification model for intrusion detection in networks using GPU Bhattacharya S., Siva Ramakrishnan S., Praveen Kumar Reddy M., Kaluri R., Singh S., Thippa Reddy G., Alazab M., Tariq U. Electronics (Switzerland)
34 Improving quality-of-service in fog computing through efficient resource allocation Mani S.K., Meenakshisundaram I. Computational Intelligence
35 Deep learning techniques for traffic flow prediction in intelligent transportation system: A survey George S., Santra A.K. Test Engineering and Management
36 Evolving dictionary based sentiment scoring framework for patient authored text Kumar C.S.P., Babu L.D.D. Evolutionary Intelligence
37 Enhancing blockchain performance using parallel merkle root and parallel proof of work Thilagavathi M., Lopez D. Journal of Advanced Research in Dynamical and Control Systems
38 Pattern analysis based acoustic signal processing: a survey of the state-of-art Chaki J. International Journal of Speech Technology
39 SMSS: Does social, mobile, spatial and sensor data have high impact on big data analytics Govardanan C.S., Gnanapandithan L.P.G. International Journal of Intelligent Enterprise
40 An efficient crop identification using deep learning Agila N., Senthil Kumar P. International Journal of Scientific and Technology Research
41 An Efficient Technique for Three- Dimensional Image Visualization through Two-Dimensional Images for Medical Data Gunasekaran G., Venkatesan M. Journal of Intelligent Systems
42 A New Representation of Intuitionistic Fuzzy Systems and Their Applications in Critical Decision Making Son L.H., Ngan R.T., Ali M., Fujita H., Abdel- Basset M., Giang N.L., Manogaran G., Priyan M.K. IEEE Intelligent Systems
43 Realizing a Stacking Generalization Model to Improve the Prediction Accuracy of Major Depressive Disorder in Adults Mahendran N., Durai Raj Vincent P.M., Srinivasan K., Sharma V., Jayakody D.K. IEEE Access
44 A new integrated approach based on the iterative super-resolution algorithm and expectation maximization for face hallucination Lakshminarayanan K., Krishnan R.S., Julie E.G., Robinson Y.H., Kumar R., Son L.H., Hung T.X., Samui P., Thi Ngo P.T., Bui D.T. Applied Sciences (Switzerland)
45 A two-fold fusion fuzzy framework to restore non-uniform illuminated blurred image Chaki J. Optik
46 An efficient hybrid fuzzy‐clustering driven 3D‐ modeling of magnetic resonance imagery for enhanced brain tumor diagnosis Kanniappan S., Samiayya D., Durai Raj Vincent P.M., Srinivasan K., Jayakody D.N.K., Reina D.G., Inoue A. Electronics (Switzerland)
47 An improved long short-term memory networks with Takagi-Sugeno fuzzy for traffic speed prediction considering abnormal traffic situation George S., Santra A.K. Computational Intelligence
48 A novel methodology for the development of an optimal agricultural crop field using Internet of Things Manikandan R., Prasanna S., Ashwin M., Sathish Kumar L., Pandiyan S. Computational Intelligence
49 Earlier detection of rumors in online social networks using certainty-factor- based convolutional neural networks Santhoshkumar S., Dhinesh Babu L.D. Social Network Analysis and Mining
50 Exploring breast cancer classification of histopathology images from computer vision and image processing algorithms to deep learning Chowdhary C.L., Shynu P.G., Gurani V.K. International Journal of Advanced Science and Technology
51 A review on the significance of machine learning for data analysis in big data Kolisetty V.V., Rajput D.S. Jordanian Journal of Computers and Information Technology
52 Exploring digital signal processing concepts using on-line graphical DSP simulator Sasi G., Thanapal P., Arvind Shriram R.K., Balaji V.S., Elamaran V. International Journal of Advanced Science and Technology
53 Social internet of things using big data analytics and security aspects – a review Deva Arul S., Iyapparaja M. Electronic Government
54 Classification of heart disease using cluster based DT learning Mohan S., Thirumalai C., Rababah A. Journal of Computer Science
55 Optimal feature extraction and classification-oriented medical insurance prediction model: machine Chowdhury S., Mayilvahanan P., Govindaraj R. International Journal of Computers and Applications
56 An improved trusted on-demand multicast routing with qos for wireless networks Gopal J., Vellingiri J., Gitanjali J., Arivuselvan K., Sudhakar S. International Journal of Advanced Trends in Computer Science and Engineering
57 Low power area efficient adaptive FIR filter for hearing aids using distributed arithmetic architecture Praveen Sundar P.V., Ranjith D., Karthikeyan T., Vinoth Kumar V., Jeyakumar B. International Journal of Speech Technology
58 A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks Numan M., Subhan F., Khan W.Z., Hakak S., Haider S., Reddy G.T., Jolfaei A., Alazab M. IEEE Access
59 Analysis of Dimensionality Reduction Techniques on Big Data Reddy G.T., Reddy M.P.K., Lakshmanna K., Kaluri R., Rajput IEEE Access
60 A deep neural networks based model for uninterrupted marine environment monitoring G. T.R., R.M. S.P., Parimala M., Chowdhary C.L., M. P.K.R., Hakak S., Khan W.Z. Computer Communications
61 Hyperspectral band selection based on metaheuristic optimization approach Sawant S., Manoharan P. Infrared Physics and Technology
62 Hyperspectral image classification using CNN with spectral and spatial features integration Vaddi R., Manoharan P. Infrared Physics and Technology
63 A novel user interaction middleware component system for ubiquitous soft computing environment by using fuzzy agent computing system Vasanthi R., Jayavadivel R., Prasadh K., Vellingiri J., Akilarasu G., Sudhakar S., Balasubramaniam P.M. Journal of Ambient Intelligence and Humanized Computing
64 Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything R.M S.P., Bhattacharya S., Maddikunta P.K.R., Somayaji S.R.K., Lakshmanna K., Kaluri R., Hussien A., Gadekallu T.R. Journal of Parallel and Distributed Computing
65 A review on classification of imbalanced data for wireless sensor networks Patel H., Singh Rajput D., Thippa Reddy G., Iwendi C., Kashif Bashir A., Jo O. International Journal of Distributed Sensor Networks
66 An Effective Congestion Control Scheme for MANET with Relative Traffic Link Matrix Routing Krishnamoorthy D., Vaiyapuri P., Ayyanar A., Harold Robinson Y., Kumar R., Long H.V., Son L.H. Arabian Journal for Science and Engineering
67 Attention Mechanism with Gated Recurrent Unit Using Convolutional Neural Network for Aspect Level Opinion Mining Rani M.S., Subramanian S. Arabian Journal for Science and Engineering
68 A quantum approach in LiFi security using quantum key distribution Vinoth Kumar V., Karthikeyan T., Praveen Sundar P.V., Magesh G., Balajee J.M. International Journal of Advanced Science and Technology
69 28 GHZ printed antenna for 5G communication with improved gain using array Kavitha M., Dinesh Kumar T., Gayathri A., Koushick V. International Journal of Scientific and Technology Research
70 A survey on workload prediction models in cloud based on spot instances for proactive auto scaling strategy Secaran R.Y., Sathiyamoorthy E. Journal of Critical Reviews
71 An approach for facial recognition using deep learning Gopal J., Menon S.R., Vellingiri J., Arivuselvan K., Kamalakannan J. Journal of Advanced Research in Dynamical and Control Systems
72 Dimensionality reduction of fuzzy soft sets using fpso algorithm Chandrasekhar U., Khare N. International Journal of Advanced Science
73 Dynamic thresholding based ancient character recognition using enhanced convolution neural network Balasubramanie P., Vellingiriraj E.K., Logesh Babu R., Dinakaran M. International Journal of Advanced Science and Technology
74 Event recognition and classification in sports video using HMM Ellappan V., Rajkumar R. International Journal of Computer Aided Engineering and Technology
75 Probabilistic approach for channel selection in centralized cognitive scheme utilizing invasive weed optimization Sumathi D., Manivannan S.S. International Journal of Advanced Trends in Computer Science and Engineering
76 Tricky information applicable answer interest optimization by intellect methods Mohankumar P., Vijayan R., Mareeswari V. International Journal of Scientific and Technology Research
77 A stacked ensemble learning model for intrusion detection in wireless network Rajadurai H., Gandhi U.D. Neural Computing and Applications
78 Crop Yield Prediction Using Deep Reinforcement Learning Model for Sustainable Agrarian Applications Elavarasan D., Durairaj Vincent P.M. IEEE Access
79 A Multidirectional LSTM Model for Predicting the Stability of a Smart Grid Alazab M., Khan S., Krishnan S.S.R., Pham Q.-V., Reddy M.P.K., Gadekallu T.R. IEEE Access
80 Review of Health Prognostics and Condition Monitoring of Electronic Components Bhargava C., Sharma P.K., Senthilkumar M., Padmanaban S., Ramachandaramurthy V.K., Leonowicz Z., Blaabjerg F., Mitolo M. IEEE Access
81 KeySplitWatermark: Zero Watermarking Algorithm for Software Protection against Cyber-Attacks Iwendi C., Jalil Z., Javed A.R., Thippa Reddy G., Kaluri R., Srivastava G., Jo O. IEEE Access
82 Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN Thangaramya K., Kulothungan K., Indira Gandhi S., Selvi M., Santhosh Kumar S.V.N., Arputharaj K. Soft Computing
83 Green communication in IoT networks using a hybrid optimization algorithm Maddikunta P.K.R., Gadekallu T.R., Kaluri R., Srivastava G., Parizi R.M., Khan M.S. Computer Communications
84 Deep neural networks to predict diabetic retinopathy Gadekallu T.R., Khare N., Bhattacharya S., Singh S., Maddikunta P.K.R., Srivastava G. Journal of Ambient Intelligence and Humanized Computing
85 Cost optimization of secure routing with untrusted devices in software defined networking Yazdinejad A., Parizi R.M., Dehghantanha A., Srivastava G., Mohan S., Rababah A.M. Journal of Parallel and Distributed Computing
86 SMO-DNN: Spider monkey optimization and deep neural network hybrid classifier model for intrusion detection Khare N., Devan P., Chowdhary C.L., Bhattacharya S., Singh G., Singh S., Yoon B. Electronics (Switzerland)
87 Realizing an integrated multistage support vector machine model for augmented recognition of unipolar depression Srinivasan K., Mahendran N., Vincent D.R., Chang C.-Y., Syed-Abdul S. Electronics (Switzerland)
88 Precision agriculture and farming using Internet of Things based on wireless sensor network Sanjeevi P., Prasanna S., Siva Kumar B., Gunasekaran G., Alagiri I., Vijay Anand R. Transactions on Emerging Telecommunications Technologies
89 Realizing the resolution enhancement of tube-to-tube plate friction welding microstructure images via hybrid sparsity model for improved weld interface defects diagnosis Srinivasan K., Deepa N., Durai Raj Vincent P.M., Senthil Kumaran S. Journal of Internet Technology
90 A novel solution for economizing water by a mix of technologies with a low cost approach Rajalakshmi N.R., Baskar M., Jayalakshmi P., Thiagarajan R., Mohan I. International Journal of Advanced Science and Technology
91 Hybrid optimization algorithm for providing big data classification Margret M.K., Devi S.S., Goldenjulie E., Vijayanandh D., Robinson Y.H. International Journal of Advanced Science and Technology
92 Privacy preserving sensitive data publishing using (k,n,m) anonymity approach Victor N., Lopez D. Journal of Communications Software and Systems
93 Flood inundation mapping of lower Godavari river basin using remote sensing and GIS Vaishnavi B., Yarrakula K., Karthikeyan J. Indian Journal of Ecology
94 Automated road safety surveillance system using hybrid cnn-lstm approach Babitha D., Ismail M., Chowdhury S., Govindaraj R., Prakash K.B. International Journal of Advanced Trends in Computer Science and Engineering
95 Skeleton-based STIP feature and discriminant sparse coding for human action recognition Ushapreethi P., Lakshmi Priya G.G. International Journal of Intelligent Unmanned Systems
96 Transfer learning techniques for emotion classification on visual features of images in the deep learning network Tamil Priya D., Divya Udayan J. International Journal of Speech Technology
97 A hybrid model collaborative movie recommendation system using K- means clustering with ant colony optimisation Sandeep Kumar M., Prabhu J. International Journal of Internet Technology and Secured Transactions
98 Energy aware task scheduling using hybrid firefly – GA in big data Senthilkumar M., Ilango P. International Journal of Advanced Intelligence Paradigms
99 Biometric based multi-authority inner product encryption for electronic health record Exceline C.E., Norman J. EAI Endorsed Transactions on Pervasive Health and Technology
100 Outfit selection recommendation system using classification techniques Gupta N.S., Thanishvi D.S., Valarmathi B. International Journal on Emerging Technologies
101 Evolution of privacy preservation models in location-based services Manju A.B., Subramanian S. Advances in Science, Technology and Engineering Systems
102 SDPBDVC: Secure data processing on big data using visual cryptography Brindha K., Jeyanthi N. International Journal of Services, Technology and Management
103 Word based language model using long short term memory for disabilities Guruvammal S., Chellatamilan T., Deborah L.J. International Journal of Psychosocial Rehabilitation
104 Crime prediction using machine learning and testing with classification models Kavithakumari K.S., Uma K., Rameshkumar C., Bashakhaja M. International Journal of Psychosocial Rehabilitation
105 Machinelearning and deep learning techniques in diagnosing alzheimers disease-a review Sudha B., Srinivasan K. International Journal of Advanced Science and Technology
106 Adaptive filtering and artificial intelligence methods on fetal ECG extraction Pradeepa M., Kumaraperumal S. Journal of Critical Reviews
107 A Centralized Cluster-Based Hierarchical Approach for Green Communication in a Smart Healthcare System Yang G., Jan M.A., Menon V.G., Shynu P.G., Aimal M.M., Alshehri M.D. IEEE Access
108 An Adaptive and Flexible Brain Energized Full Body Exoskeleton with IoT Edge for Assisting the Paralyzed Patients Jacob S., Alagirisamy M., Menon V.G., Kumar B.M., Jhanjhi N.Z., Ponnusamy V., Shynu P.G., Balasubramanian V. IEEE Access
109 ITFDS: Channel-aware integrated time and frequency-based downlink LTE scheduling in MANET Tuan L.M., Son L.H., Long H.V., Priya L.R., Soundar K.R., Robinson Y.H., Kumar R. Sensors (Switzerland)
110 Survey on Land Use/Land Cover (LU/LC) change analysis in remote sensing and GIS environment: Techniques and Challenges MohanRajan S.N., Loganathan A., Manoharan P. Environmental Science and Pollution Research
111 A machine learning forecasting model for COVID-19 pandemic in India Sujath R., Chatterjee J.M., Hassanien A.E. Stochastic Environmental Research and Risk Assessment
112 An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture Swarna Priya R.M., Maddikunta P.K.R., Parimala M., Koppu S., Gadekallu T.R., Chowdhary C.L., Alazab M. Computer Communications
113 Computational system to classify Cyber Crime offenses using machine learning Ch R., Gadekallu T.R., Abidi M.H., Al-Ahmari A. Sustainability (Switzerland)
114 A New Supervised Clustering Framework Using Multi Discriminative Parts and Expectation–Maximization Approach for a Fine-Grained Animal Breed Classification (SC-MPEM) Sundaram D.M., Loganathan A. Neural Processing Letters
115 An AI-based intelligent system for healthcare analysis using Ridge- Adaline Stochastic Gradient Descent Classifier Deepa N., Prabadevi B., Maddikunta P.K., Gadekallu T.R., Baker T., Khan M.A., Tariq U. Journal of Supercomputing
116 Predicting autism spectrum disorder from associative genetic markers of phenotypic groups using machine learning Sekaran K., Sudha M. Journal of Ambient Intelligence and Humanized Computing
117 Blended multi-modal deep convnet features for diabetic retinopathy severity prediction Bodapati J.D., Veeranjaneyulu N., Shareef S.N., Hakak S., Bilal M., Maddikunta P.K.R., Jo O. Electronics (Switzerland)
118 Internet of Green Things with autonomous wireless wheel robots against green houses and farms Ram C.R.S., Ravimaran S., Krishnan R.S., Julie E.G., Robinson Y.H., Kumar R., Son L.H., Thong P.H., Thanh N.Q., Ismail M. International Journal of Distributed Sensor Networks
119 An integrated intrusion detection system using correlation-based attribute selection and artificial neural network Sumaiya Thaseen I., Saira Banu J., Lavanya K., Rukunuddin Ghalib M., Abhishek K. Transactions on Emerging Telecommunications Technologies
120 A distributed collaborative trust service recommender system for secure cloud computing Benjula Anbu Malar M.B., Prabhu J. Transactions on Emerging Telecommunications Technologies
121 An empirical model in intrusion detection systems using principal component analysis and deep learning models Rajadurai H., Gandhi U.D. Computational Intelligence
122 Extraction of qualitative behavior rules for industrial processes from reduced concept lattice Dias S.M., Zárate L.E.,Song M.A.J., Vieira N.J., Kumar C.A. Intelligent Data Analysis
123 Enhanced adaptive distributed energy- efficient clustering (EADEEC) for wireless sensor networks Poluru R.K., Praveen Kumar Reddy M., Basha S.M., Patan R., Kallam S. Recent Advances in Computer Science and Communications
124 Preserving learnability and intelligibility at the point of care with assimilation of different speech recognition techniques Rajendran S., Jayagopal P. International Journal of Speech Technology
125 Intrusion detection in software defined networking using snort and mirroring Sampath N., Sadhasivam J., Jayavel S., Chindarmony N.S., Sharma S. SSRG International Journal of Engineering Trends and Technology
126 Chest X-ray investigation: A convolutional neural network approach Das T.K., Lal Chowdhary C., Gao X.Z. Journal of Biomimetics, Biomaterials and Biomedical Engineering
127 Gaussian hybrid fuzzy clustering and radial basis neural network for automatic brain tumor classification in MRI images Sathish P., Elango N.M. Evolutionary Intelligence
128 Prediction of user interest fluctuation using fuzzy neural networks in web search N C S., Ch P.R. International Journal of Intelligent Unmanned Systems
129 A comparative study on transformation of UML/OCL to other specifications Thangaraj J., Ulaganathan S. Recent Advances in Computer Science and Communications
130 A weighted assignment approach using recommendation routing for congestion control in wireless sensor networks-WEAR Somayaji S.R.K., Thangavelu A.K. Recent Advances in Computer Science and Communications
131 Comprehensive data analysis and prediction on IPL using machine learning algorithms Amala Kaviya V.S., Mishra A.S., Valarmathi B. International Journal on Emerging Technologies
132 Survey of genetic algorithm approach in machine learning Sadhasivam J., Jayavel S., Rathore A. SSRG International Journal of Engineering Trends and Technology
133 Decision-making in cognitive paradoxes with contextuality and quantum formalism M.S I., Cherukuri A.K. Applied Soft Computing Journal
134 Graph based feature extraction and hybrid classification approach for facial expression recognition Krithika L.B., Priya G.G.L. Journal of Ambient Intelligence and Humanized Computing
135 Invariant Features-Based Fuzzy Inference System for Animal Detection and Recognition Using Thermal Images Meena D., Agilandeeswari L. International Journal of Fuzzy Systems
136 Performance Prediction and Interpretation of a Refuse Plastic Fuel Fired Boiler Shaha A.P., Singamsetti M.S., Tripathy B.K., Srivastava G., Bilal M., Nkenyereye L. IEEE Access
137 ECMCRR-MPDNL for Cellular Network Traffic Prediction with Big Data Dommaraju V.S., Nathani K., Tariq U., Al-Turjman F., Kallam S., Reddy M P.K., Patan R. IEEE Access
138 Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networks Krishnan R.S., Julie E.G., Robinson Y.H., Kumar R.,Thong P.H., Son L.H. Computers and Security
139 Failure assessment of pressure vessels made of plain carbon steel by using modified inherent flaw model in DL based industry optimization intelligent processing Joemax Agu M., Gopikumar S., Vimal S., Harold Robinson Y. Measurement: Journal of the International Measurement Confederation
140 An efficient segmentation and classification system in medical images using intuitionist possibilistic fuzzy C-mean clustering and fuzzy SVM algorithm Chowdhary C.L., Mittal M., Kumaresan P., Pattanaik P.A., Marszalek Z. Sensors (Switzerland)
141 Intelligent animal detection system using sparse multi discriminative-neural network (SMD-NN) to mitigate animal-vehicle collision Meena S.D., Loganathan A. Environmental Science and Pollution Research
142 Multilayer Convolutional Neural Network to Filter Low Quality Content from Quora Roy P.K. Neural Processing Letters
143 Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignment Xu X., Han M., Nagarajan S.M., Anandhan P. Computer Communications
144 Deep learning disease prediction model for use with intelligent robots Koppu S., Maddikunta P.K.R., Srivastava G. Computers and Electrical Engineering
145 Energy efficiency maximization algorithm for underwater Mobile sensor networks Pasupathi S., Vimal S., Harold-Robinson Y., Khari M., Verdú E., Crespo R.G. Earth Science Informatics
146 Hyperspectral image classification using fuzzy-embedded hyperbolic sigmoid nonlinear principal component and weighted least squares approach Phaneendra Kumar B.L.N., Prabukumar M. Journal of Applied Remote Sensing
147 FSSCaps-DetCountNet: Fuzzy soft sets and CapsNet-based detection and counting network for monitoring animals from aerial images Sundaram D.M., Loganathan A. Journal of Applied Remote Sensing
148 Traffic Prediction Using Multifaceted Techniques: A Survey George S., Santra A.K. Wireless Personal Communications
149 Affective emotion classification using feature vector of image based on visual concepts Priya D.T., Udayan J.D. International Journal of Electrical Engineering Education
150 A novel smart meal planner website with online store and dietician consultancy-for this modern era-from the human-computer interaction practitioners’ perspective Vellingiri J., Suraj A., Gopal J., Gitanjali J. International Journal of Advanced Trends in Computer Science and Engineering
151 Channel-based encrypted binary arithmetic coding in wireless sensor networks Subramanian B., Yesudhas H.R., Enoch G.J. Ingenierie des Systemes d’Information
152 Social economic impact of COVID-19 outbreak in India M S.K., V M., J P., M P., P J., P S., M.B B.A.M., Jothikumar R. International Journal of Pervasive Computing and Communications
153 Enhanced resemblance measures for integration in image-rich information networks Jothikumar R., Kumar T.R., Jayalakshmi P., Baskar M., Thiagarajan R., Mohan I. Journal of Critical Reviews
154 Impact of multimedia competencies of faculties on the effectiveness of engineering lectures Ushapreethi P. Journal of Critical Reviews
155 Survey of various algorithms used in twitter for sentiment analysis Sadhasivam J.,Kalivaradhan R.B., Jayavel S. SSRG International Journal of Engineering Trends and Technology
156 Machine learning and artificial intelligence based Diabetes Mellitus detection and self- management: A systematic review Chaki J., Thillai Ganesh S., Cidham S.K., Ananda Theertan S. Journal of King Saud University – Computer and Information Sciences
157 Mechanism of the effect of traditional Chinese medicine fumigation on blood lactic acid in exercise body Gang R., Nagarajan S.M., Anandhan P. Journal of Ambient Intelligence and Humanized Computing
158 EC-ElGamal and Genetic Algorithm-Based Enhancement for Lightweight Scalable Blockchain in IoT Domain Guruprakash J., Koppu S. IEEE Access
159 Latency Evaluation of SDFGs on Heterogeneous Processors Using Timed Automata Rajadurai S., Alazab M., Kumar N., Gadekallu T.R. IEEE Access
160 Fuzzy Inspired Deep Belief Network for the Traffic Flow Prediction in Intelligent Transportation System Using Flow Strength Indicators George S., Santra A.K. Big data
161 N-Sanitization: A semantic privacy- preserving framework for unstructured medical datasets Iwendi C., Moqurrab S.A., Anjum A., Khan S., Mohan S., Srivastava G. Computer Communications
162 Application of active remote sensing in confirmation rights and identification of mortgage supply-demand subjects of rural land in Guangdong Province Hu S., Fu Z., Jackson Samuel R.D., Anandhan P. European Journal of Remote Sensing
163 Energy-aware grid-based data aggregation scheme in routing protocol for agricultural internet of things Sankar S., Srinivasan P., Luhach A.K., Somula R., Chilamkurti N. Sustainable Computing: Informatics and Systems
164 A novel predicate based access control scheme for cloud environment using open stack swift storage Anilkumar C., Subramanian S. Peer-to-Peer Networking and Applications
165 Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions Preethi D., Khare N. Peer-to-Peer Networking and Applications
166 A novel grid and place neuron’s computational modeling to learn spatial semantics of an environment Shrivastava R., Kumar P., Tripathi S., Tiwari V., Rajput D.S., Gadekallu T.R., Suthar B., Singh S., Ra I.-H. Applied Sciences (Switzerland)
167 Suspicious activity detection using deep learning in secure assisted living IoT environments Vallathan G., John A., Thirumalai C., Mohan S.K., Srivastava G., Lin J.C.-W. Journal of Supercomputing
168 Tree-based convolutional neural networks for object classification in segmented satellite images Robinson Y.H., Vimal S., Khari M., Hernández F.C.L., Crespo R.G. International Journal of High Performance Computing Applications
169 Multispectral and hyperspectral images based land use / land cover change prediction analysis: an extensive review Navin M.S., Agilandeeswari L. Multimedia Tools and Applications
170 Deep learning based genome analysis and NGS-RNA LL identification with a novel hybrid model Ramamurthy M., Krishnamurthi I., Vimal S., Robinson Y.H. BioSystems
171 Stochastic approach for channel selection in cognitive radio networks using optimization techniques Sumathi D., Manivannan S.S. Telecommunication Systems
172 Forest data visualization and land mapping using support vector machines and decision trees Radhakrishnan S., Lakshminarayanan A.S., Chatterjee J.M., Hemanth D.J. Earth Science Informatics
173 Fragmented handwritten digit recognition using grading scheme and fuzzy rules Chaki J., Dey N. Sadhana – Academy Proceedings in Engineering Sciences
174 EM- and EM’-index Sequence: Construction and Application in Scientific Assessment of Scholars Bihari A., Tripathi S., Deepak A., Kumar P. Measurement
175 A survey on plant disease prediction using machine learning and deep learning techniques Gokulnath B.V., Usha Devi G. Inteligencia Artificial
176 ACO-based enhanced energy-efficient intelligent routing protocol for MANET Jayalakshmi P., Saravanan R. International Journal of Grid and Utility Computing
177 An efficient computational model for assessing the stability characteristics of electro-active natural bio-resources Jhawar D., Sharma P., Sharma A., Srinivasan K., Chen B.-Y. Recent Advances in Computer Science and Communications
178 A framework for multimedia event classification with convoluted texture feature Kanagaraj K., Lakshmi Priya G.G. Recent Advances in Computer Science and Communications
179 Irrigation control system-data gathering in WSN using IOT Kumar K.A., Jayaraman K. International Journal of Communication Systems
180 A study on data de-duplication schemes in cloud storage Kumar P.M., Usha Devi G., Basheer S., Parthasarathy P. International Journal of Grid and Utility Computing
181 An enhanced two factor authentication for e-healthcare system Likitha S., Saravanan R. International Journal of Internet Manufacturing and Services
182 Comprehensive review on land use/land cover change classification in remote sensing Navin M.S., Agilandeeswari L. Journal of Spectral Imaging
183 PMCAR: proactive mobility and congestion aware route prediction mechanism in IoMT for delay sensitive medical applications to ensure reliability in COVID-19 pandemic situation Pandi S., Ch P.R. International Journal of Pervasive Computing and Communications
184 IoT role in prevention of COVID-19 and health care workforces behavioural intention in India – an empirical examination R V.A., J P., P J K., SS M., Rajendran S., Kumar K.R., S S., Jothikumar R. International Journal of Pervasive Computing and Communications
185 Learning models for concept extraction from images with drug labels for a unified knowledge base utilizing NLP and IoT tasks Rajendran S., Prabhu J. International Journal of Information Technology and Web Engineering
186 Performance evaluation of transactions in blockchain based on workload using queueing model Santhi K., Lawanya Shri M. Journal of Green Engineering
187 Fast hash-based high secure hiding technique for digital data security Shrimali S., Kumar A., John Singh K. Electronic Government
188 Hybrid coherent encryption scheme for multimedia big data management using cryptographic encryption methods Stephen Dass A., Prabhu J. International Journal of Grid and Utility Computing
189 Defining theoretical foundations to unified metamodel for model reusability Thangaraj J., Ulaganathan S. Recent Advances in Computer Science and Communications
190 Boosted-DEPICT: an effective maize disease categorization framework using deep clustering Gokulnath B.V., Usha Devi G. Neural Computing and Applications
191 R-CNN and wavelet feature extraction for hand gesture recognition with EMG signals Shanmuganathan V., Yesudhas H.R., Khan M.S., Khari M., Gandomi A.H. Neural Computing and Applications
192 A heuristic angular clustering framework for secured statistical data aggregation in sensor networks Krishnasamy L., Dhanaraj R.K., Gopal D.G., Gadekallu T.R., Aboudaif M.K., Nasr E.A. Sensors (Switzerland)
193 Analytical study of hybrid techniques for image encryption and decryption Chowdhary C.L., Patel P.V., Kathrotia K.J., Attique M., Kumaresan P., Ijaz M.F. Sensors (Switzerland)
194 Improved diver communication system by combining optical and electromagnetic trackers Kataria A., Ghosh S., Karar V., Gupta T., Srinivasan K., Hu Y.-C. Sensors (Switzerland)
195 Prevention of Hello Flood Attack in IoT using combination of Deep Learning with Improved Rider Optimization Algorithm Aditya Sai Srinivas T., Manivannan S.S. Computer Communications
196 Penetration testing framework for smart contract Blockchain Bhardwaj A., Shah S.B.H., Shankar A., Alazab M., Kumar M., Gadekallu T.R. Peer-to-Peer Networking and Applications
197 COVID-19 patient health prediction using boosted random forest algorithm Iwendi C., Bashir A.K., Peshkar A., Sujatha R., Chatterjee J.M., Pasupuleti S., Mishra R., Pillai S., Jo O. Frontiers in Public Health
198 A new framework for hyperspectral image classification using Gabor embedded patch based convolution neural network Boggavarapu L.N.P.K., Manoharan P. Infrared Physics and Technology
199 CNN based hyperspectral image classification using unsupervised band selection and structure-preserving spatial features Vaddi R., Manoharan P. Infrared Physics and Technology
200 A hybrid optimization approach for hyperspectral band selection based on wind driven optimization and modified cuckoo search optimization Sawant S., Manoharan P. Multimedia Tools and Applications
201 A hybrid CFS filter and RF-RFE wrapper-based feature extraction for enhanced agricultural crop yield prediction modeling Elavarasan D., Durai Raj Vincent P.M., Srinivasan K., Chang C.- Y. Agriculture (Switzerland)
202 Integrating encryption techniques for secure data storage in the cloud Seth B., Dalal S., Jaglan V., Le D.-N., Mohan S., Srivastava G. Transactions on Emerging Telecommunications Technologies
203 Person identification with aerial imaginary using SegNet based semantic segmentation Manickam R., Kumar Rajan S., Subramanian C., Xavi A., Eanoch G.J., Yesudhas H.R. Earth Science Informatics
204 HEALTH of THINGS MODEL for CLASSIFYING HUMAN HEART SOUND SIGNALS USING CO- OCCURRENCE MATRIX and SPECTROGRAM Arora V., Ng E.Y.-K., Leekha R.S., Verma K., Gupta T., Srinivasan K. Journal of Mechanics in Medicine and Biology
205 A comparative study about workload prediction from one time forecast with cyclic forecasts using ARIMA model for cloud environment Yuvha Secaran R., Sathiyamoorthy E. EAI Endorsed Transactions on Energy Web
206 A modified cuckoo search algorithm based in this issue: Spectral preprocessing to compensate for packaging film / using neural nets to invert the prosail canopy model optimal band subset selection approach for hyperspectral image classification Sawant S.S., Prabukumar M., Samiappan S. Journal of Spectral Imaging
207 A novel method for deduplication of information storage managing in cloud computing Santhi K., Lawanya Shri M., Gangadevi E., Meenatchi S., Navaneethan C. International Journal of Psychosocial Rehabilitation
208 A secure and privacy-preserving approach to protect user data across cloud based online social networks Khare N., Kumaran U. International Journal of Grid and High Performance Computing
209 A survey of band selection techniques for hyperspectral image classification Sawant S.S., Prabukumar M. Journal of Spectral Imaging
210 An adaptive service monitoring system in a cloud computing environment Sathiyamoorthy E., Karthikeyan P. International Journal of Grid and High Performance Computing
211 Exquisite Analysis of Popular Machine Learning–Based Phishing Detection Techniques for Cyber Systems Das M., Saraswathi S., Panda R., Mishra A.K., Tripathy A.K. Journal of Applied Security Research
212 Innovative shopping through mobile using Google’s arcore Sathish Kumar P., Chandra Prakash S., Ajith Kumar K., Shri M.L., Santhi K., Mon F.A. International Journal of Psychosocial Rehabilitation
213 Monitoring and analysis of the recovery rate of Covid-19 positive cases to prevent dangerous stage using IoT and sensors Kumar K.R., Iyapparaja M., Niveditha V.R., Magesh S., Magesh G., Marappan S. International Journal of Pervasive Computing and Communications
214 Secure virtual machine migration technique using blockchain Lawanya Shri M., Santhi K., Gangadevi E., Meenatchi S., Navaneethan C. International Journal of Psychosocial Rehabilitation
215 Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack Anbu Malar M.B.B., J P. International Journal of Pervasive Computing and Communications
216 Service-Oriented Broker for Effective Provisioning of Cloud Services – a Survey Nagarajan R., Thirunavukarasu R. International Journal of Computing and Digital Systems
217 A novel optimal feature selection technique for medical data classification using ANOVA based whale optimization Moorthy U., Gandhi U.D. Journal of Ambient Intelligence and Humanized Computing
218 Thermoeconomic investigation on advanced Kalina power generation system Uma Maheswari G., Shankar Ganesh N., Srinivas T., Reddy B.V. Energy Reports
219 Optimization of routing-based clustering approaches in wireless sensor network: Review and open research issues Manuel A.J., Deverajan G.G., Patan R., Gandomi A.H. Electronics (Switzerland)
220 Antlion re-sampling based deep neural network model for classification of imbalanced multimodal stroke dataset Thippa Reddy G., Bhattacharya S., Maddikunta P.K.R., Hakak S., Khan W.Z., Bashir A.K., Jolfaei A., Tariq U. Multimedia Tools and Applications
221 Compression based clustering technique for enhancing accuracy in web scale videos Pillai K.G.R., Radhakrishnan K., Ramakrishnan D., Yesudhas H.R., Eanoch G.J., Kumar R., Long H.V., Son L.H. Multimedia Tools and Applications
222 A new 3D convolutional neural network (3D-CNN) framework for multimedia event detection Kanagaraj K., Priya G.G.L. Signal, Image and Video Processing
223 An intelligent ensemble of long-short- term memory with genetic algorithm for network anomaly identification Thaseen I.S., Chitturi A.K., Al-Turjman F., Shankar A., Ghalib M.R., Abhishek K. Transactions on Emerging Telecommunications Technologies
224 Hybrid optimization routing management for autonomous underwater vehicle in the internet of underwater things Robinson Y.H., Vimal S., Julie E.G., Khari M., Expósito-Izquierdo C., Martínez J. Earth Science Informatics
225 High-performance implementation of a two-bit geohash coding technique for nearest neighbor search Varalakshmi M., Kesarkar A.P., Lopez D. Concurrency Computation
226 Auto encoder based dimensionality reduction and classification using convolutional neural networks for hyperspectral images Ramamurthy M., Robinson Y.H., Vimal S., Suresh A. Microprocessors and Microsystems
227 A novel approach for merging ontologies using formal concept analysis Priya M., Kumar C.A. International Journal of Cloud Computing
228 A queuing theory model for e-health cloud applications Kumar M.S., Raja M.I. International Journal of Internet Technology and Secured Transactions
229 An approach to feature selection in intrusion detection systems using machine learning algorithms Kavitha G., Elango N.M. International Journal of e-Collaboration
230 An early prevention method for node failure in wireless sensor networks Krishnan S.S.R., Thangavelu A. International Journal of Internet Technology and Secured Transactions
231 An effective prediction model for online course dropout rate Narayanasamy S.K., Elçi A. International Journal of Distance Education Technologies
232 Automated intelligent public lighting system Senthilkumar S., Brindha K., Jena A. International Journal of Internet Technology and Secured Transactions
233 Chronological and exponential-based Lion optimisation for optimal resource allocation in cloud Devagnanam J., Elango N.M. International Journal of Grid and Utility Computing
234 Coverless VoIP steganography using hash and hash Deepikaa S., Saravanan R. Cybernetics and Information Technologies
235 Data storage security in the cloud environment using the honey pot system Malar B.A., Prabhu J. International Journal of e-Collaboration
236 Efficient clustering of water distribution network using affinity propagation Somisetti V.S.S., Palla S.H. Ingenierie des Systemes d’Information
237 EFS-LSTM (Ensemble-based feature selection with LSTM) classifier for intrusion detection system Preethi D., Khare N. International Journal of e-Collaboration
238 Enhancing the mobility support in internet of things Sankar S., Srinivasan P. International Journal of Fuzzy System Applications
239 Generative adversarial networks: a survey on applications and challenges Pavan Kumar M.R., Jayagopal P. International Journal of Multimedia Information Retrieval
240 Hybrid machine learning model for healthcare monitoring systems Nallakaruppan M.K., Kumaran U.S. International Journal of Internet Technology and Secured Transactions
241 Hybrid swarm intelligence for feature selection on IoT-based infrastructure Nallakaruppan M.K., Kumaran U.S. International Journal of Cloud Computing
242 Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor Network Ashwini B. Abhale, Manivannan S.S. Optical Memory and Neural Networks (Information Optics)
243 Survey of methodologies for quantifying software reliability Viswanathan G., Prabhu J. International Journal of Internet Technology and Secured Transactions
244 A method of landfill leachate management using internet of things for sustainable smart city development Gopikumar S., Raja S., Robinson Y.H., Shanmuganathan V., Chang H., Rho S. Sustainable Cities and Society
245 Deep learning and medical image processing for coronavirus (COVID-19) pandemic: A survey Bhattacharya S., Reddy Maddikunta P.K., Pham Q.-V., Gadekallu T.R., Krishnan S S.R., Chowdhary C.L., Alazab M., Jalil Piran M. Sustainable Cities and Society
246 Forecasting of the SARS-CoV-2 epidemic in India using SIR model, flatten curve and herd immunity Venkatasen M., Mathivanan S.K., Jayagopal P., Mani P., Rajendran S., Subramaniam U.S., Ramalingam A.C., Rajasekaran V.A., Indirajithu A., Sorakaya Somanathan M. Journal of Ambient Intelligence and Humanized Computing
247 A physical memristor based Muthuswamy–Chua–Ginoux system Ginoux J.-M., Muthuswamy B., Meucci R., Euzzor S., Di Garbo A., Ganesan K. Scientific Reports
248 Multiclass model for agriculture development using multivariate statistical method Deepa N., Khan M.Z., Prabadevi B., Vincent D.R.P.M., Maddikunta P.K.R., Gadekallu T.R. IEEE Access
249 Pilot decontamination using asynchronous fractional pilot scheduling in massive MIMO systems Zahoor M.I., Dou Z., Shah S.B.H., Khan I.U., Ayub S., Gadekallu T.R. Sensors (Switzerland)
250 A secure data deduplication system for integrated cloud-edge networks Shynu P.G., Nadesh R.K., Menon V.G., Venu P., Abbasi M., Khosravi M.R. Journal of Cloud Computing
251 Predictive model for battery life in IoT networks Maddikunta P.K.R., Srivastava G., Gadekallu IET Intelligent Transport Systems
252 Security and privacy of UAV data using blockchain technology Ch R., Srivastava G., Reddy Gadekallu T., Maddikunta P.K.R., Bhattacharya S. Journal of Information Security and Applications
253 Detection of the triple riding and speed violation on two-wheelers using deep learning algorithms Mallela N.C., Volety R., R S.P., R. K N. Multimedia Tools and Applications
254 Biometric template security using DNA codec based transformation Jacob I.J., Betty P., Darney P.E., Raja S., Robinson Y.H., Julie E.G. Multimedia Tools and Applications
255 Medical information retrieval systems for e-Health care records using fuzzy based machine learning model L A.J.P., Sengan S., G K K., J V., Gopal J., Velayutham P., V S. Microprocessors and Microsystems
256 Modelling Spatial Drivers for LU/LC Change Prediction Using Hybrid Machine Learning Methods in Javadi Hills, Tamil Nadu, India MohanRajan S.N., Loganathan A. Journal of the Indian Society of Remote Sensing
257 Social and QoS based trust model for secure clustering for wireless body area network Ramaswamy S., Norman J. International Journal of Electrical Engineering Education
258 Constrained multifacility location problems – A review Santra A.K. International Journal of Industrial Engineering : Theory Applications and Practice
259 Defensive modeling of fake news through online social networks Shrivastava G., Kumar P., Ojha R.P., Srivastava P.K., Mohan S., Srivastava G. IEEE Transactions on Computational Social Systems
260 Heart sound interference cancellation from lung sound using dynamic neighbourhood learning-particle swarm optimiser based optimal recursive least square algorithm Mekala A.M., Chandrasekaran S. International Journal of Biomedical Engineering and Technology
261 Energy-aware multipath routing protocol for internet of things using network coding techniques Sankar S., Srinivasan P., Ramasubbareddy S., Balamurugan B. International Journal of Grid and Utility Computing
262 Intelligent prediction approach for diabetic retinopathy using deep learning based convolutional neural networks algorithm by means of retina photographs Thomas G.A.S., Robinson Y.H., Julie E.G., Shanmuganathan V., Rho S., Nam Y. Computers, Materials and Continua
263 Machine Learning Based Computational Gene Selection Models: A Survey, Performance Evaluation, Open Issues, and Future Research Directions Mahendran N., Durai Raj Vincent P.M., Srinivasan K., Chang C.-Y. Frontiers in Genetics
264 Reinforced XGBoost machine learning model for sustainable intelligent agrarian applications Elavarasan D., Vincent D.R. Journal of Intelligent and Fuzzy Systems
265 Context-aware resource management and alternative pricing model to improve enterprise cloud adoption Balaji M., Ch A.K. Concurrency Computation
266 Adaptive Decentralized Tracking Control for Nonlinear Large-Scale Systems Chandran K., Zhang W., Murugesan R., Prasanna S., Baseera A., Pandiyan S. International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
267 Pattern Mining Approaches Used in Social Media Data Chaki J., Dey N., Panigrahi B.K., Shi F., Fong S.J., Sherratt R.S. International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
268 Multi-modal prediction of breast cancer using particle swarm optimization with non-dominating sorting Vijayalakshmi S., John A., Sunder R., Mohan S., Bhattacharya S., Kaluri R., Feng G., Tariq U. International Journal of Distributed Sensor Networks
269 A unique data identification system for wireless sensor networks based on enhanced arithmetic coding Subramanian B., Yesudhas H.R., Eanoch G.J. Ingenierie des Systemes d’Information
270 Web application for traffic monitoring and guidance Sujatha R., Teja A., Naveen P., Chatterjee J.M., Aarthy S.L., Hassanien A.E. Journal of System and Management Sciences
271 A comparative study on delay-tolerant network routing protocols Angulakshmi M., Deepa M., Vanitha M., Mangayarkarasi R., Nagarajan I. International Journal of Intelligent Unmanned Systems
272 Computational approach for character identification and retrieval of grantha inscription Dhivya S., Usha Devi G., Deepanjali S., Tom R.J., Kumar S. International Journal of Advanced Trends in Computer Science and Engineering
2019
SL.NO TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL ISBN/ISSN NUMBER
1 IoT based fall detection and ambient assisted system for the elderly Chandra I., Sivakumar N., Gokulnath C.B., Parthasarathy P. Cluster Computing 1386-7857
2 Periodicity Mining, “a Time Inference over High Utility Item set mining” – A study Arunkumar M.S, Suresh P, Gunavathi C, Preethi S International Journal of Recent Technology and Engineering 2277-3878
3 Real time sentiment analysis of e-commerce websites using machine learning algorithms Sudheer K., Valarmathi B. International Journal of Mechanical Engineering and Technology 0976-6340
4 Analyzing Gene Expression Data By Using Crfm-Covering Rough Set Fuzzy C-Medoids Clustering Approach Journal of Web Engineering 1540-9589
5 Comparative study on dimensionality reduction for disease diagnosis using fuzzy classifier R.Sujatha , E.P.Ephzibah, Sree Dharinya , G. Uma Maheswari, V.Mareeswari, Vamsi Pamidimarri International Journal of Engineering & Technology 2227-524X
6 ANALYSING EFFECTIVE METHODOLOGIES USED FOR TEXT CLUSTERING USING WEIGHTED ALGORITHMS S.Sree Dharinya ARPN Journal of Engineering and Applied Sciences 1819-6608
7 Analysis and comparison of routing attacks and preventive measures in IoT environment Aditya Sai Srinivas T., Manivannan S.S. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
8 Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm Srinivas Koppu,Madhu Viswanatham Vankadara Evolutionary Intelligence 1864-5909
9 High Utility Infrequent Itemset Mining Using a Customized Ant Colony Algorithm M.S. Arunkumar, P.Suresh, C.Gunavathi International Journal of Parallel Programming 0885-7458
10 Integration of fuzzy DEMATEL and FMCDM approach for evaluating knowledge transfer effectiveness with reference to GSD project outcome Gopal J., Sangaiah A.K., Basu A., Gao X.Z. International Journal of Machine Learning and Cybernetics 1868-8071
11 Adaptive mechanism for distributed query processing and data loading using the RDF data in the cloud Ranichandra Dharmaraj C., Tripathy B. International Journal of Communication Systems 1074-5351
12 Investigation on different clustering techniques in wireless sensor networks Meenatchi S., Prabu S. International Journal of Advanced Intelligence Paradigms 1755-0386
13 Analysis of performance measures to improve the quality of service in cloud based e-government web portal Priya V., Subha S., Balamurugan B. Electronic Government 1740-7494
14 an overview of web socket: the future real time communication Dr.M.P.vani bhumji International journal of engineering and technology 2395-0056
15 Adaptive cruise control and cooperative cruise control in real life traffic situation Ravikumar C.V., Venugopal P., Jagannadha Naidu K., Satheesh Kumar S., Koppu S. International Journal of Mechanical Engineering and Technology 0976-6340
16 Encrypted image-based data hiding technique using elliptic curve ElGamal cryptography Jayanthi R., John Singh K. International Journal of Reasoning-based Intelligent Systems 1755-0556
17 A Fuzzy Linguistic Approach-Based Non-malicious Noise Detection Algorithm for Recommendation System Sharon Moses J., Dhinesh Babu L.D. International Journal of Fuzzy Systems 1562-2479
18 A case study on partial homomorphic encryption: Breast cancer diagnosis Sushmetha N., Vairamuthu S., Selvarani B. International Journal of Pure and Applied Mathematics 1311-8080
19 Optimization of QoS parameters using scheduling techniques in heterogeneous network Chandra I., Prabha K.H., Sivakumar N. Personal and Ubiquitous Computing 1617-4909
20 DTCF: Deadline task consolidation first for energy minimisation in cloud data centres Sanjeevi P., Viswanathan P. International Journal of Networking and Virtual Organisations 1470-9503
21 A fuzzy-based decision-making broker for effective identification and selection of cloud infrastructure services Nagarajan R., Thirunavukarasu R. Soft Computing 1432-7643
22 A case study on commending user in social media based on user information and rating of product in interface forums Deepa M., Santhi K., Lawnyashri M., Malar M.B.B.A., Priya G., Mon F.A. International Journal of Civil Engineering and Technology 0976-6308
23 Density Based Traffic Management Using IoT M Pounambal K Lalitha International Journal of Pure and Applied Mathematics 1314-3395
24 Coagulation attacks over networked UAVs: concept, challenges, and research aspects Vishal Sharma., Dushantha Nalin K. Jayakody., Kathiravan Srinivasan., Ravinder Kumar International Journal of Engineering & Technology 2227-524X
25 Energy-efficient border intrusion detection using pipeline monitoring system Jeevitha K., Manivannan S.S. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
26 Optimized approach for data sharing in WRN using NS2 simulation Shalini R., Manivannan S.S. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
27 Dimensionality reduced local directional number pattern for face recognition Srinivasa perumal ramalingam., Chandra mouli paturu venkata subbu sita rama Journal of Ambient Intelligence and Humanized Computing 1868-5137
28 Hybrid rough fuzzy soft classifier based multi-class classification model for agriculture crop selection Deepa N., Ganesan K. Soft Computing 1432-7643
29 Machine learning based approach for pothole detection Karmel A., Adhithiyan M., Senthil Kumar P. International Journal of Civil Engineering and Technology 0976-6308
30 Heart disease classification system using optimised fuzzy rule based algorithm Reddy G.T., Khare N. International Journal of Biomedical Engineering and Technology 1752-6418
31 Optimized feature extraction for precise sign gesture recognition using Self-Improved Genetic Algorithm Kaluri R., Reddy C.H.P. International Journal of Engineering and Technology Innovation 2223-5329
32 Concept Lattice Simplification in Formal Concept Analysis Using Attribute Clustering K. S., Ch. A.K. Journal of Ambient Intelligence and Humanized Computing 1868-5137
33 Stock Prediction Using Machine-Learning Algorithms Jayavel, Senthil Rathore, Arpit Sadhasivam, Jayakumar International Journal of Engineering and Advanced Technology 22498958
34 Agent Based Hybrid Routing Protocol for Vehicular Ad Hoc Networks Dr. P.S.Nithyadharshini1 , Dr. SanthiyaKumari2 and * Dr. M.Pounambal3 International Journal of Pure and Applied Mathematics 1314-3395
35 An empirical study on peer-to-peer sharing of resources in mobile cloud environment Nadesh R.K., Aramudhan M. International Journal of Electrical and Computer Engineering 2088-8708
36 A survey of block chain technology for digitization in india Manikandan N., Vijayakumar K., Anusha K. International Journal of Civil Engineering and Technology 0976-6308
37 Software Effort Estimation Techniques E J Sai Pavan Chowdary R Charanya International Journal for Research in Applied Science & Engineering Technology (IJRASET) 23219653
38 TSCBA-A Mitigation System for ARP Cache Poisoning Attacks Prabadevi, B; Jeyanthi, N; Cybernetics and Information Technologies 1311-9702
39 Analytical Model for Sybil Attack Phases in Internet of Things Mishra A.K., Tripathy A.K., Puthal D., Yang L.T. IEEE Internet of Things Journal 2327-4662
40 A walk-through: complete survey on blood pressure monitoring devices and applications Jeyanthi, N; Thandeeswaran, R; Gokulnath, BV; Biomedical Research 0970-938X
41 Haloop approach for concept generation in formal concept analysis Chunduri R.K., Cherukuri A.K. Journal of Information and Knowledge Management 0219-6492
42 A cloud broker framework for infrastructure service discovery using semantic network Nagarajan R., Thirunavukarasu R., Shanmugam S. International Journal of Intelligent Engineering and Systems 2185-310X
43 A framework to mitigate ARP sniffing attacks by cache poisoning Prabadevi B., Jeyanthi N. International Journal of Advanced Intelligence Paradigms 1755-0386
44 Recommendation systems: A beginner’s perspective Selva Rani B., Ananda Kumar S. International Journal of Pure and Applied Mathematics 1311-8080
45 Region-specific multi-attribute white mass estimation-based mammogram classification Padmavathy T.V., Vimalkumar M.N., Sivakumar N. Personal and Ubiquitous Computing 1617-4909
46 Intrusion detection model using feature extraction and LPBoost technique Thaseen I.S., Kumar Ch.A. International Journal of Internet Technology and Secured Transactions 1748-569X
47 Detection of Intrusion by Stochastic Gradient Descent and K-means Clustering Suraj Saha., Riya Shaji., Abhijeet Giri., John Singh. K Research article
48 A framework for prediction using rough set and real coded genetic algorithm Rathi R., Acharjya D.P. Arabian journal of science and engineering 2193-567X
49 Decision support systems – An overview Rahamathunnisa U., Chellappa B. International Journal of Mechanical Engineering and Technology 0976-6340
50 An automated detection of human disease using supervised learning method Manivannan S.S., Lakshmi S.K. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
51 TRAM-based VM handover with dynamic scheduling for improved QoS of cloud environment Nadesh R.K., Aramudhan M. International Journal of Internet Technology and Secured Transactions 1748-569X
52 A Fuzzy-Based Intelligent Cloud Broker with MapReduce Framework to Evaluate the Trust Level of Cloud Services Using Customer Feedback Nagarajan R., Thirunavukarasu R., Shanmugam S. International Journal of Fuzzy Systems 1562-2479
53 Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing Shynu P.G., Singh K.J. International Journal of Embedded Systems 1741-1068
54 Energy-Aware task scheduling using hybrid Firefly-BAT (FFABAT) in Big data Senthilkumar M. Cybernetics and Information Technologies 1311-9702
55 Intelligent intrusion detection system using temporal analysis and type-2 fuzzy neural classification Rama Prabha K.P., Jeyanthi N. International Journal of Internet Technology and Secured Transactions 1748-569X
56 Arranging job flow on hadoop Navaneethan C., Meenatchi S., Iyapparaja M., Thanapal P. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
57 Maching language prediction algorithm for crypto currency Prasanna M., Iyapparaja M., Thanapal P., Navaneethan C., Meenatchi S. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
58 The sequence way of performance analysis for device to device communication Meenatchi S., Navaneethan C., Iyapparaja M., Thanapal P., Suganya P. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
59 Case study on big data inspection in pharmaceutical services Iyapparaja M., Prasanna M., Thanapal P., Meenatchi S., Navaneethan C. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
60 BMAQR: Balanced multi attribute QoS aware replication in HDFS Kumar P.J., Ilango P. International Journal of Internet Technology and Secured Transactions 1748-569X
61 Angle Based Energy and Power Efficient Node Detection Routing Protocol for MANET Jayalakshmi Periyasamy., R. Saravanan. Recent Patents on Computer Science 1874-4796
62 Vehicular Cloud for Smart Driving Using Internet of Things Vijayarangam S., Megalai J., Krishnan S., Nagarajan S., Devi M.R., Lokesh S. Journal of Medical Systems 0148-5598
63 Visualizing trade-off between performance and energy in parallel computations Maheswari G.U., Subha S. Journal of Computational and Theoretical Nanoscience 1546-1955
64 Walsh Hadamard kernel-based texture feature for multimodal MRI brain tumour segmentation Angulakshmi M., Lakshmi Priya G.G. International Journal of Imaging Systems and Technology 0899-9457
65 Multi-Layer Cluster Based Energy Aware Routing Protocol for Internet of Things Sankar, S.; Srinivasan, P. Cybernetics and Information Technologies 1311-9702
66 An intelligent neuro-genetic framework for effective intrusion detection Rama Prabha K.P., Jeyanthi N. International Journal of Reasoning-based Intelligent Systems 1755-0556
67 An improved carry save adder design S Subha International Journal of Advanced Science and Research 2455-4227
68 A novel recommender system based on FFT with machine learning for predicting and identifying heart diseases Narayan S., Sathiyamoorthy E. Neural Computing and Applications 0941-0643
69 Calorie Measurement Predicting the Nutrient Content of Food using image Analysis Thamarai, Nivetha, P.M. Durai Raj Vincent, S.S. Manivannan Research Journal of Pharmacy and Technology 0974-3618
70 Internet of Things Based Digital Lock System S Sankar., P Srinivasan Journal of Computational and Theoretical Nanoscience 1546-1955
71 The significance of holographic data storage in cost effective and faster data transfer rates Bhavani S., Chhabra S. International Journal of Civil Engineering and Technology 0976-6308
72 Region-based colour image spatial fusion steganographic system PV Krishna., P Viswanathan International Journal of Multimedia Intelligence and Security 2042-3462
73 Link stable routing with minimal delay nodes for MANETs P Jayalakshmi., R Saravanan International Journal of Social and Humanistic Computing 1752-6124
74 Providing privacy and dimensional search on longitudinal data using safe computing: A case study Deepa M., Santhi K., Lawnya Shri M., Benjula Anbu Malar M.B., Priya G., Mon F.A. International Journal of Civil Engineering and Technology 0976-6308
75 Fuzzy Logic Based Energy Aware Routing Protocol for Internet of Things S.Sankar., P.Srinivasan International Journal Intelligent Systems and Applications 2074-904X
76 A reference model for testing internet of things based applications Jacob P.M., Mani P. Journal of Engineering Science and Technology 1823-4690
77 A review on graph-based semi-supervised learning methods for hyperspectral image classification Sawant S.S., Prabukumar M. Egyptian Journal of Remote Sensing and Space Science 1110-9823
78 Quantum aspects of high dimensional formal representation of conceptual spaces M S Ishwarya., Aswani Kumar Cherukuri Artificial Intelligence 1694-0814
79 Ant colony optimization algorithm with Internet of Vehicles for intelligent traffic control system Kumar P.M., Devi G U., Manogaran G., Sundarasekar R., Chilamkurti N., Varatharajan R. Computer Networks 1389-1286
80 Software architecture pattern selection model for internet of things based systems Jacob P.M., Mani P. IET Software 1751-8806
81 Secure wireless communication and surveillance system Swarnalatha P., Anandakumar S., Vairamuthu S., Priya S.R.M., Sathyaraj R. International Journal of Civil Engineering and Technology 0976-6308
82 Self service software Vijay Anand R., Prabhu J., Jayalakshmi P. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
83 Semantic filtering and event extraction of twitter streams through RDF and SPARQL Kumar N.S., Dinakaran M. International Journal of Computer Information Systems and Industrial Management Applications 2150-7988
84 Smart green resource conservation approach for smart IoT cloud Shanmugam G.S., Shantharajah S.P., Sriman Narayana Iyengar N.C. Journal of Computational and Theoretical Nanoscience 1546-1955
85 Smart home-control and monitoring system for power and security management Gami M., Brindha K., Sudha S., Thandeeswaran R., Priya M. International Journal of Civil Engineering and Technology 0976-6308
86 Secure big data storage using training dataset filtering-K nearest neighbour classification with elliptic curve cryptography Ezhilarsan E., Dinakaran M. Journal of Computational and Theoretical Nanoscience 1546-1955
87 Scalable formal concept analysis algorithms for large datasets using Spark Chunduri R.K., Cherukuri A.K. Journal of Ambient Intelligence and Humanized Computing 1868-5137
88 An improved tumour identification with Gabor Wavelet segmentation Chowdhary C.L., Das T.K., Gurani V., Ranjan A. Research Journal of Pharmacy and Technology 0974-3618
89 An efficient implementation of mobile Raspberry Pi Hadoop clusters for Robust and Augmented computing performance Srinivasan K., Chang C.-Y., Huang C.-H., Chang M.-H., Sharma A., Ankur A. Journal of Information Processing Systems 1976-913X
90 Three-dimensional discrete cosine transform-based feature extraction for hyperspectral image classification Prabukumar M., Sawant S., Samiappan S., Agilandeeswari L. Journal of Applied Remote Sensing 1931-3195
91 Spam review detection on e-commerce sites Nandhini G., Muthamilselvan T., Alagiri I., Thanapal P. International Journal of Civil Engineering and Technology 0976-6308
92 Survey on data analytics techniques in healthcare using IOT platform Babu G.C., Shantharajah S.P. International Journal of Reasoning-based Intelligent Systems 1755-0556
93 Role based access control design using three-way formal concept analysis Subramanian C.M., Cherukuri A.K., Chelliah C. International Journal of Machine Learning and Cybernetics 1868-8071
94 Removing leaf petioles and auto locating apex-base points using straight line interpolation and bisection Visu P., Sivakumar N., Kumaresan P., Yokesh Babu S., Ramesh P.S. Multimedia Tools and Applications 1380-7501
95 Query expansion using named entity disambiguation for a question-answering system Kandasamy S., Cherukuri A.K. Concurrency Computation 1532-0626
96 Public key cryptography using sphere and spheroid John Singh K., Gagneja K. International Journal of Communication Networks and Distributed Systems 1754-3916
97 A new Quantum Tunneling Particle Swarm Optimization algorithm for training feedforward neural networks Geraldine Bessie Amali D., Dinakaran M. International Journal of Intelligent Systems and Applications 2074-904X
98 Providing cyber security using machine learning for social networks Sheba Pari N., Chandrababu M., Senthil Kumar K. Indian Journal of Public Health Research and Development 0976-0245
99 Smart home observing and control security system: A case study Santhi K., Deepa M., Shri M.L., Malar M.B.B.A., Priya G., Mon F.A. International Journal of Civil Engineering and Technology 0976-6308
100 Evaluating the performance of supervised classification models: Decision tree and Naïve Bayes Using KNIME Basha S.M., Rajput D.S., Poluru R.K., Bharath Bhushan S., Basha S.A.K. International Journal of Engineering and Technology(UAE) 2227-524X
101 Lattice based Conceptual Spaces to Explore Cognitive Functionalities for Prosthetic Arm MS Ishwarya., Aswani Kumar Cherukuri Artificial Intelligence 1694-0814
102 On the positioning likelihood of UAVs in 5G networks Sharma V., Jayakody D.N.K., Srinivasan K. Physical Communication 1874-4907
103 Curvelet transform based feature extraction and selection for multimedia event classification Kanagaraj K., Priya G.G.L. Journal of King Saud University – Computer and Information Sciences 1319-1578
104 Online social networking services and spam detection approaches in opinion mining – A review Rani M.S., Sumathy S. International Journal of Web Based Communities 1477-8394
105 Design and implementation of energy efficient reconfigurable networks (WORN-DEAR) for BAN in IOT environment (BIOT) Kumaresan P., Prabukumar M. International Journal of Reasoning-based Intelligent Systems 1755-0556
106 Diagnosing sudden and gradual drifts in business process Thanapal P., Meenatchi S., Navaneethan C., Iyapparaja M., Prasanna M. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
107 Public key encryption for SAFE transfer of one time password Thirumalai C., Budugutta S. International Journal of Pure and Applied Mathematics 1311-8080
108 Cluster-based EA-PATM protocol for energy consumption in hierarchical WSNs Meenatchi S., Prabu S. International Journal of Reasoning-based Intelligent Systems 1755-0556
109 Online compilers for android using mobile cloud computing Vijayan R., Mareeswari V., Gunesekaran G., Balasubramanian V., Senthil Kumar R. International Journal of Civil Engineering and Technology 0976-6308
110 Parsing based sarcasm detection from literal language in tweets Basha S.M., Rajput D.S. Recent Patents on Computer Science 2213-2759
111 Predicting dispersion of radionuclides through parallel approach Uma Maheswari, G., Subha, S ProProgress in Industrial Ecology, An International Journal 1476-8917
112 Future of Storage Technologies Bhavani S, Charanya R, Mahadevan R, Malathy E, Priya M International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
113 Octagonal picture languages Govindaraj R., Mahendran A. International Journal of Reasoning-based Intelligent Systems 1755-0556
114 Nano drive: Privacy preserving decentralized storage Seetha R., Malisetty N. International Journal of Mechanical Engineering and Technology 0976-6340
115 MAFONN-EP: A Minimal Angular Feature Oriented Neural Network based Emotion Prediction system in image processing Krithika L.B., Lakshmi Priya G.G. Journal of King Saud University – Computer and Information Sciences 1319-1578
116 IoT based smart garbage collector for smart cities Rajaprabha M.N., Jayalakshmi P., Anand R.V., Asha N. International Journal of Civil Engineering and Technology 0976-6308
117 A survey: energy-efficient sensor and VM selection approaches in green computing for X-IoT applications Mekala M.S., Viswanathan P. International Journal of Computers and Applications 1206-212X
118 Forecasting yield by integrating agrarian factors and machine learning models A survey Dhivya Elavarasan, Durai Raj Vincent, Vishal Sharma, Albert Y. Zomaya, Kathiravan Srinivasan Computers and Electronics in Agriculture 0168-1699
119 Proficient information method for inconsistency detection in multiple data sources Bazeer Ahamed B., Ramkumar T. International Journal of Artificial Intelligence 0974-0635
120 Properties of multigranular rough sets on fuzzy approximation spaces and their application to rainfall prediction Tripathy B.K., Bhambhani U. International Journal of Intelligent Systems and Applications 2074-904X
121 Machine Learning and Deep Learning Methods in Heart Disease (HD) Research Kusuma S, Divya Udayan J International Journal of Pure and Applied Mathematics 0972-9828
122 Integrated Intrusion Detection Model Using Chi-Square Feature Selection and Ensemble of Classifiers I. Sumaiya Thaseen., Ch. Aswani Kumar., Amir Ahmad Arabian Journal for Science and Engineering 1319-8025
123 A scaled-down neural conversational model for chatbots Mathur S., Lopez D. Concurrency Computation 1532-0626
124 Image anonymization using clustering with pixelization Ria. Elin Thomas., Sharmila K. Banu., B. K. Tripathy International Journal of Engineering & Technology 2227-524X
125 Internet of Things based Ambient assisted living for Elderly People Health Monitoring S. Sankar., P. Srinivasan., R. Saravanakumar Research Journal of Pharmacy and Technology 0974-3618
126 Energy and Load Aware Routing Protocol for Internet of Things S Sankar., P Srinivasan International Journal of Advances in Applied Sciences 2252-8814
127 A study of handwritten characters recognition through neural networks using data mining approaches Bothra G., Bhattacharya S., Deepa P. International Journal of Mechanical Engineering and Technology 0976-6340
128 Comparison of multi-criteria recommendation system for improving accurate prediction Sandeepkumar M., Prabhu J. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
129 A survey, design and analysis of IoT security and QoS challenges Kesavan M., Prabhu J. International Journal of Information System Modeling and Design 1947-8186
130 A review on various sniffing attacks and its mitigation techniques Prabadevi B., Jeyanthi N. Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
131 Predicting user behaviour on E-Commerce site using Ann Srinivas A.S., Ramasubbareddy S., Manivannan S.S., Govinda K. International Journal of Engineering and Technology(UAE) 2227-524X
132 Non-Intrusive Transaction Aware Filtering During Enterprise Application Modernization Ravikumar Ramadoss., N. M. Elango., Satheesh Abimannan., Ching-Hsien Hsu Journal of Supercomputing 0920-8542
133 Privacy-preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing P.G. Shynu., K. John Singh International Journal of Embedded Systems 1741-1068
134 Band clustering using expectation-maximization algorithm and weighted average fusion-based feature extraction for hyperspectral image classification Prabukumar M., Shrutika S. Journal of Applied Remote Sensing 1931-3195
135 Classification of breast abnormality using decision tree based on GLCM features in mammograms Kamalakannan J., Babu M.R. International Journal of Computer Aided Engineering and Technology 1757-2657
136 An amoeboid approach for identifying optimal citation flow in big scholarly data network Nivash J.P., Dhinesh Babu L.D. International Journal of Communication Systems 1074-5351
137 PFB+- tree for big data memory management system Santhi K., Chellatamilan T., Valarmathi B. Indian Journal of Public Health Research and Development 0976-0245
138 Performing item-based recommendation for mining multi-source big data by considering various weighting parameters Thillainayagam V., Kunjithapatham S., Thirunavukarasu R. International Journal of Engineering and Technology(UAE) 2227-524X
139 A supervised aspect level sentiment model to predict overall sentiment on tweeter documents Basha S.M., Rajput D.S. International Journal of Metadata, Semantics and Ontologies 1744-2621
140 A Diabetes Case Management Study in a Rural Setting in India Radhakrishnan, S.Email Author, Rajakumar, C.A., Radhakrishnan, B. Professional Case Management 19328087
141 Predicting justice delivery time using Machine learning Megha Kanwar ,Prabhavathy.P International Journal of Pure and Applied Mathematics 1314-3395
142 A Cloud Based Natural Hazard Detection and Warning System Nishanth A, Vanmathi C International Journal of Research and Scientific Innovation (IJRSI) 2321-2705
143 Smart Home Automation in Air Conditioning using Data Mining and Image Processing Ishaan Arora, Vanmathi C, International Journal of Engineering Trends and Technology (IJETT) 2231-5381
144 Detecting Streaming of Twitter Spam Using Hybrid Method Senthil Murugan N., Usha Devi G. Wireless Personal Communications 0929-6212
145 A complete survey on blood pressure monitoring devices and applications Thandeeswaran R Jeyanthi N, Gokulnath BV Biomedical Research 0970-938X
146 Advanced Vehicle Safety and Monitoring System, Akhil Sharma, Vanmathi C International Journal of Engineering Science Invention Research & Development 2349-6185
147 Transportation Service System for Grocery Kart using Genetic Algorithm Deepank Kartikey, Vanmathi C International Journal of Engineering Trends and Technology (IJETT) 2231-5381
148 Weighing Type Rain Gauge with Weather Monitoring System Rajkumar R, Vanmathi C, International Journal of Research and Scientific Innovation (IJRSI) 2321-2705
149 Design and development of exponential lion algorithm for optimal allocation of cluster resources in cloud Devagnanam J., Elango N.M. Cluster Computing 1386-7857
150 ENCRYPTION AND DECRYPTION OF GRAY SCALE IMAGES USING SCALABLE CODING MECHANISM K.UMA International Journal of Mechanical Engineering and Technology (IJMET) 0976-6340
151 Comparative study on dimensionality reduction for disease diagnosis using fuzzy classifier Sujatha, R., Ephzibah, E.P., Dharinya, S., Uma Maheswari, G., Mareeswari, V., Pamidimarri, V. International Journal of Engineering and Technology(UAE) 2227524X
152 Analyzing Gene Expression Data By Using Crfm-Covering Rough Set Fuzzy C-Medoids Clustering Approach Avulapalli Jayaram Reddy, B.K Tripathy Journal of Web Engineering 1540-9589
153 WhaleRank: An optimisation based ranking approach for software requirements prioritisation Anand R.V., Dinakaran M. International Journal of Environment and Waste Management 1478-9876
154 Predictive mathematical model for solving multi-criteria decision-making problems Deepa N., Ganesan K., Sethuramasamyraja B. Neural Computing and Applications 0941-0643
155 Performance analysis of pre-cancerous mammographic image enhancement feature using non-subsampled shearlet transform Padmavathy T.V., Vimalkumar M.N., Nagarajan S., Babu G.C., Parthasarathy P. Multimedia Tools and Applications 1380-7501
156 In-Mapper combiner based MapReduce algorithm for processing of big climate data Manogaran G., Lopez D., Chilamkurti N. Future Generation Computer Systems 0167-739X
157 An Interval valued fuzzy soft set based optimization algorithm for high yielding seed selection Sooraj T.R., Tripathy B.K. International Journal of Fuzzy System Applications 2156-177X
158 Design of I-shaped dual C-slotted rectangular microstrip patch antenna (I-DCSRMPA) for breast cancer tumor detection Padmavathy T.V., Venkatesh P., Bhargava D., Sivakumar N. Cluster Computing 1386-7857
159 IOT BASED SMART GARBAGE COLLECTOR FOR SMART CITIES M N Rajaprabha, P Jayalakshmi, R Vijay Anand and N Asha International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
160 Energy saving offloading scheme for mobile cloud computing using CloudSim Thanapal P., Durai M.A.S. International Journal of Advanced Intelligence Paradigms 1755-0386
161 Walsh Hadamard kernel‐based texture feature for multimodal MRI brain tumour segmentation M. Angulakshmi, G. G Lakshmi Priya International Journal of Imaging Systems and Technology 1098-1098
162 Brain tumour segmentation from MRI using superpixels based spectral clustering Angulakshmi, M., Lakshmi Priya, G.G Journal of King Saud University – Computer and Information Sciences. Elsevier 1319-1578
163 An intelligent decision support system to prevent and control of dengue Lopez D., Manogaran G., Varatharajan R., Abbas K.M. Journal of Ambient Intelligence and Humanized Computing 1868-5137
164 Experimenting with runtime and energy tradeoffs in high-performance computing G Uma Maheswari, S Subha , Progress in Industrial Ecology12(1-2), pp. 154-163 1476-8917
165 Resourceful Investigte Encryption Method using Data Hunt in Mobile Cloud Service A. S. Syed Navaz , Asha. N , Vanmathi Chandrasekaran , J. Jayashree ARPN Journal of Engineering and Applied Sciences 1819-6608
166 Embarrassingly parallel GPU based matrix inversion algorithm for big climate data assimilation Varalakshmi M., Kesarkar A.P., Lopez D. International Journal of Grid and High Performance Computing 1938-0259
167 A Review on Utilizing Queuing Models for Improving Performance in Cloud M. Sathish Kumar, M. Iyappa Raja Jour of Advance Research in Dynamical & Control Systems 1943-023X
168 RFID BASED AUTOMATED GATE SECURITY SYSTEM Asha. N, A. S. Syed Navaz, J. Jayashree and J. Vijayashree ARPN Journal of Engineering and Applied Sciences 1819-6608
169 Detecting spams in social networks using ML algorithms �€“ a review Murugan N.S., Devi G.U. International Journal of Environment and Waste Management 1478-9876
170 Face Recognition and Detection with New Image Enhancement Techniques A.S.Syed Navaz and Asha. N Jour of Adv Research in Dynamical & Control Systems 1943-023X
171 Applying Knowledge Based Heuristic Method for Efficient Test Automation Asha. N and Prasanna Mani Jour of Adv Research in Dynamical & Control Systems 1943-023X
172 Knowledge-based Acceptance Test driven agile Approach for Quality Software Development Asha. N and Prasanna Mani International Journal of Recent Technology and Engineering (IJRTE) 2277-3878
173 Efficient routing based on core relay intermediate nodes in MANET Jayalakshmi P., Saravanan R. Electronic Government 1740-7494
174 Earthquake analysis: Visualizing seismic data with python Tulsyan S., Bahl B., Kaya S., Reddy G.T. Lecture Notes in Computational Vision and Biomechanics 2212-9391
175 A novel approach to perform analysis and prediction on breast cancer dataset using R Basha S.M., Rajput D.S., Iyengar N.C.S.N., Caytiles R.D. International Journal of Grid and Distributed Computing 2005-4262
176 WIRELESS HEALTH ACQUISITION SYSTEM USING INTERNET OF THINGS Dr.K.Uma International Journal of Mechanical Engineering and Technology (IJMET) 0976-6340
177 RESOURCEFUL INVESTIGATE ENCRYPTION METHOD USING DATA HUNT IN MOBILE CLOUD SERVICE A. S. Syed Navaz, Asha. N, Vanmathi Chandrasekaran and J. Jayashree ARPN Journal of Engineering and Applied Sciences 1819-6608
178 Group Decision Making through Interval Valued Intuitionistic Fuzzy Soft Sets BK Tripathy., TR Sooraj., RK Mohanty., A Panigraghi International Journal of Fuzzy System Applications 2156-177X
179 Implementation of moving object detection and categorization from hevc compressed surveillance video Kruthi S., Kamalakannan J. International Journal of Mechanical Engineering and Technology 0976-6340
180 BGFS: Design and development of brain genetic fuzzy system for data classification Chandrasekar Ravi., Neelu Khare Journal of Intelligent Systems 0334-1860
181 Neighborhood Rough-Sets-Based Spatial Data Analytics Sharmila Banu K.., B. K. Tripathy Encyclopedia of Information Science and Technology, Fourth Edition
182 A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks Rama Prabha K.P., Jeyanthi N. Wireless Personal Communications 0929-6212
183 Tracking eye center location based on inner product detector MythiliBoopathi , Nivetha R Journal of International Pharmaceutical Research 1674-0440
184 Smart City Based on Cloud Computing and IoT Mythili BoopathiS. Pati International Journal of Civil Engineering and Technology 0976-6308
185 Comparison of NoSQL Database and Traditional Database-An emphatic analysis M. Sandeep Kumar., Prabhu. J INTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION 2549-9610
186 A Survey of Big Data Analytics Using Machine Learning Algorithms usha moorthy., usha devi gandhi HCI Challenges and Privacy Preservation in Big Data Security 15225-28636
187 Future of storage technologies Bhavani, S., Charanya, R., Mahadevan, R., Malathy, E., Priya, M. International Journal of Civil Engineering and Technology 0976-6308
188 Robust Face Recognition Using Enhanced Local Binary Pattern Srinivasa Perumal R., Nadesh R. K., Senthil Kumar N. C Bulletin of Electrical Engineering and Informatics 2089-3191
189 Optimization of Seed Selection for Higher Product using Interval Valued Hesitant Fuzzy Soft sets BK Tripathy., Sooraj.T.R Songklanakarin Journal of Science and Technology 0125-3395
190 Experimenting with runtime and energy tradeoffs in high-performance computing Uma Maheswari, G., Subha, S Progress in Industrial Ecology 1476-8917
191 Enhancing security for end users in cloud computing environment using hybrid encryption technique Nadesh R.K., Srinivasa Perumal R., Shynu P.G., Gaurav Sharma1 International Journal of Engineering and Technology 0975-4024
192 ONLINE COMPILERS FOR ANDROID USING MOBILE CLOUD COMPUTING Vijayan R, Mareeswari V, Gunesekaran G,Balasubramanian V,Senthil Kumar R International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
193 Mapping USE Specifications into Spec# Jagadeeswaran T Senthilkumaran U Software Technologies: Applications and Foundations 0302-9743
194 A risk-centric defensive architecture for threat modelling in e-government application Venkatasen M., Mani P. Electronic Government 1740-7494
195 Model Reusability and Multidirectional Transformation using Unified Metamodel Jagadeeswaran T, Senthilkumaran U IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER) 1854-8419
196 Quick fix for obstacles emerging in management recruitment measure using IOT-based candidate selection Nallakaruppan, M.K., Senthil Kumaran, U. Service Oriented Computing and Applications 18632386
197 Verification of Cloud Based Information Integration Architecture using Colored Petri Nets Murale Narayanan., Aswani Kumar Cherukuri International Journal of Computer Network and Information Security
198 Secure big data storage using training dataset filtering-K nearest neighbour classification with elliptic curve cryptography Ezhilarsan E, Dinakaran M Journal of Computational and Theoretical Nanoscience 15461955
199 D‐ConvNet: Deep learning model for enhancement of brain MR images Kathiravan Srinivasan, Vishal Sharma, DNK Jayakody, Durai Raj Vincent Basic & Clinical Pharmacology & Toxicology
200 Robust design and validation of balanced tournaments via Hamiltonian path Kathiravan Srinivasan, Desh Deepak Pathak Ravinder Kumar, Durai Raj Vincent, Chuan-Yu Chang Journal of Information and Optimization Sciences 0252-2667
201 Semantic filtering and event extraction of twitter streams through RDF and SPARQL Kumar, NS, Dinakaran, M International Journal of Computer Information Systems and Industrial Management Applications 21507988
202 Design and development of microstrip patch antenna with circular and rectangular slot for structural health monitoring Padmavathy T.V., Bhargava D.S., Venkatesh P., Sivakumar N. Personal and Ubiquitous Computing 1617-4909
203 Propels in compiler construction for versatile figuring Ezilarasan, E, Dinakaran, M, Boominathan P, Krishnamoorthy, A, Naresh, K International Journal of Internet Technology and Secured Transactions 1748569
204 An adaptive fault tolerance mechanism in Grid computing Nithyadharshini P.S., Pounambal M., Nagaraju D., Saritha V. ARPN Journal of Engineering and Applied Sciences 1819-6608
205 PSPO: a framework for cost-effective service placement optimisation during enterprise modernisation on hybrid clouds Ravikumar Ramadoss., N.M. Elango., A. Satheesh., Ching-Hsien Hsu International Journal of Web and Grid Services 1741-1106
206 A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases Kumar P.M., Devi Gandhi U. Computers and Electrical Engineering 0045-7906
207 An optimized feature selection based on genetic approach and support vector machine for heart disease Gokulnath C.B., Shantharajah S.P. Cluster Computing 1386-7857
208 An Efficient and Secure Content Contribution and Retrieval content in Online Social Networks using Level-level Security Optimization and Content Visualization Algorithm Kumaran Umapathy., Neelu Khare Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
209 Performance Analysis of Clustering Algorithm in Data Mining in R Language Avulapalli Jayaram Reddy, Balakrushna Tripathy , Seema Nimje, Communications in Computer and Information Science 1865-0929
210 Load balancing prototype for cost proficient fault tolerant geo-distributed datacenters Anusha, K., Manikandan, N., Nallakaruppan, M.K., Rahamathunnissa, U. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
211 Application of Soft Set in Game Theory B. K. Tripathy Sooraj., T. R. Radhakrishna., N. Mohanty Encyclopedia of Information Science and Technology, Fourth Edition
212 Secure Group Key Sharing Protocols and Cloud System Vaishali Ravindra Thakar., John Singh K Encyclopedia of Information Science and Technology, Fourth Edition
213 Secure data storage in cloud computing to avoiding some cipher text attack Gundala Swathi., Gundala Swathi JOURNAL OF INFORMATION and OPTIMIZATION SCIENCES 0252-2667
214 Optimal Decision Tree Fuzzy Rule-Based Classifier (ODT-FRC) For Heart Disease Prediction Using Improved Cuckoo Search Algorithm Subhashini Narayan, Jagadeesh Gobal International Journal of Business Intelligence and Data Mining 1743-8187
215 Brain tumour segmentation from MRI using superpixels based spectral clustering Angulakshmi M., Lakshmi Priya G.G. Journal of King Saud University – Computer and Information Sciences 1319-1578
216 Depth Impurity Pruned Strategies for Extracting High Utility Itemsets K. Santhi1*, B.Valarmathi2, T.Chellatamilan3 International Journal of Engineering & Technology 2227-524X
217 Software Project Management Risk Management Literature Review CHARANYA R International Journal for Research in Applied Science & Engineering Technology (IJRASET)
218 Student performance dashboard using mining approach Suganya D., Kumar K., Ramesh P.S., Suganthan C. International Journal of Pure and Applied Mathematics 1311-8080
219 Predicting life time of heart attack patient using improved c4.5 classification algorithm Jothikumar R., Susi S., Sivakumar N., Ramesh P.S. Research Journal of Pharmacy and Technology 0974-3618
220 Scheduling tasks using Bat’s algorithm in cloud sim Gitanjali J., Sathiyamoorthi E., Mummadisetti A., Dammu R.S., Kadari R.R. International Journal of Pure and Applied Mathematics 1311-8080
221 Survey on the role of IoT in intelligent transportation system Varun Chand H., Karthikeyan J. Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
222 Comparative study on dimensionality reduction for disease diagnosis using fuzzy classifier Sujatha R., Ephzibah E.P., Dharinya S., Uma Maheswari G., Mareeswari V., Pamidimarri V. International Journal of Engineering and Technology(UAE) 2227-524X
223 An empirical machine learning approach to extract and rank multi-word product names using iCIW approach Sivashankari R., Valarmathi B. Journal of Engineering Science and Technology 1823-4690
224 Parallel AES algorithm for performance improvement in data analytics security for IoT Manikandan N., Subha S. International Journal of Networking and Virtual Organisations 1470-9503
225 A Study of Handwritten Characters Recgnition through Neural Networks using Data Mining approaches Gaurav Bothra, Sweta Bhattacharya and Deepa P. International Journal of Mechanical Engineering and Technology 09766340
226 Secure medical data transmission by using collaborative neighbour based method in WBAN Devi L., Shantharajah S.P. World Review of Science, Technology and Sustainable Development 1741-2242
227 , Predicting dispersion of radionuclides through parallel approach G Uma Maheswari, S Subha Progress in Industrial Ecology 12(1-2), pp. 35-45 1476-8917
228 Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles Priyan M.K., Devi G.U. Cluster Computing 1386-7857
229 One-Dimension Force Balance System for Hypersonic Vehicle an experimental and Fuzzy Prediction Approach Kalaiarassan G., Krishan., Somanadh M., Thirumalai C., Senthil Kumar M. Materials Today: Proceedings 2214-7853
230 A SURVEY ON IMPLEMENTATION METHODS AND APPLICATIONS OF SENTIMENT Sudheer K and B.Valarmathi International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
231 Stout unidirectional face recognition system in hands of DRBF methodology Sudhan M., Dharun V.S., Swarna Priya R.M. International Journal of Pure and Applied Mathematics 1311-8080
232 Software Project Management Risk Management Literature Review CHARANYA R International Journal of Innovative Science and Research Technology(IJISRT)
233 Secured cloud banking transactions using two-way verification process Anitha A., Varalakhshmi M., Mary Mekala A., Subashanthini., Thilagavathy M. International Journal of Civil Engineering and Technology 0976-6308
234 A rule based classifcation for vegetable production using rough set and genetic algorithm Rathi R., Acharjya D.P. International Journal of Fuzzy System Applications 2156-177X
235 Modified dimensionality reduced local directional pattern for facial analysis Srinivasa Perumal R, Chandra Mouli P.V.S.S.R Journal of Ambient Intelligence and Humanized Computing 1868-5137
236 Group and hierarchical key management for secure communications in internet of things Karrothu A., Norman J. International Journal of Communication Systems 1074-5351
237 Dr. Cloud- IOT Based Health Monitoring System Aditya Shukla, Vanmathi C International Journal of Scientific Research in Computer Sciences and Engineering 2456-3307
238 A survey on applications of internet of things in healthcare domain Mugauri P.C., Aravind K., Deshmukh A., Vhansure F., Kavitha B.R. Research Journal of Pharmacy and Technology 0974-3618
239 Security strategies for cloud identity management – a study Anilkumar C., Sumathy S. International Journal of Engineering and Technology(UAE) 2227-524X
240 RST invariant robust video watermarking algorithm using quaternion curvelet transform Agilandeeswari L., Ganesan K. Multimedia Tools and Applications 1380-7501
241 Robustness of DR-LDP over PCANet for face analysis Ramalingam S.P., Chandra Mouli P.V.S.S.R. International Journal of Multimedia Information Retrieval 2192-6611
242 Calorie measurement: predicting the nutrient content of food using image analysis Thamarai., Nivetha., Durai Raj Vincent P.M., Manivannan S.S. Research Journal of Pharmacy and Technology 0974-3618
243 An efficient method for secure 2D image visualization and transmission through chaotic confusion and pixel diffusion Gunasekaran G., Venkatesan M. Pertanika Journal of Science and Technology 0128-7680
244 Multi-class classification using hybrid soft decision model for agriculture crop selection Deepa N., Ganesan K. Neural Computing and Applications 0941-0643
245 Tri-texture feature extraction and region growing-level set segmentation in breast cancer diagnosis Aarthy S.L., Prabu S. International Journal of Biomedical Engineering and Technology 1752-6418
246 Spam filtering and phishing in facebook Gitanjali J., Jagadeesh G., Mummadisetti A., Dammu R.S., Kadari R.R. International Journal of Pure and Applied Mathematics 1311-8080
247 Impact of Gradient ascent and Boosting algorithm in classification Basha S.M., Rajput D.S., Vandhan V. International Journal of Intelligent Engineering and Systems 2185-310X
248 Generating various kolam patterns using new kolam picture grammar Govindaraj R., Mahendran A. International Journal of Internet Technology and Secured Transactions 1748-569X
249 HIoTPOT: Surveillance on IoT Devices against Recent Threats Gandhi U.D., Kumar P.M., Varatharajan R., Manogaran G., Sundarasekar R., Kadu S. Wireless Personal Communications 0929-6212
250 Hybrid IT architecture by gene-based cryptomata (HITAGC) for lightweight security services Thirumalai, C., Viswanathan, P. Service Oriented Computing and Applications 1863-2386
251 High utility itemset mining using partition utility list structure Arunkumar M.S., Suresh P., Gunavathi C. Journal of Computational and Theoretical Nanoscience 1546-1955
252 A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT) Gopinath, M.P., Arasi, G.S., Kavisankar, L., Sathyaraj, R., Karthi, S., Aarthy, S.L., & Balusamy, B. (2018) Neural Computing and Applications 0941-0643
253 Secure and Optimized Real-Time System for Internet of Medical Things Using MATuino and ThingSpeak Analytics Ranjani, J., A. Shanthoshini Selvapriya, and E. Vijayan Journal of Testing and Evaluation 00903973
254 Implementing self adaptiveness in whale optimization for cluster head section in Internet of Things Reddy M.P.K., Babu M.R. Cluster Computing 1386-7857
255 Buyagain grocery recommender algorithm for Online shopping of grocery and gourmet foods Moses S.J., Dhinesh Babu L.D. International Journal of Web Services Research 1545-7362
256 CONVENTIONAL IMPLEMENTATION OF LFS SYSTEM FOR DEVELOPMENT OF LINUX OPERATING SYSTEM M.Priya J. Raju International Journal of Pure and Applied Mathematics 13118080
257 Health data analytics using scalable logistic regression with stochastic gradient descent Manogaran G., Lopez D. International Journal of Advanced Intelligence Paradigms 1755-0386
258 Feature extraction using LR-PCA hybridization on twitter data and classification accuracy using machine learning algorithms Murugan N.S., Devi G.U. Cluster Computing 1386-7857
259 G-L fractional differential operator modified using auto-correlation function: Texture enhancement in images Hemalatha S & Margret Anouncia S Ain Shams Engineering Journal 2090-4479
260 Predictive Cloud resource management framework for enterprise workloads Balaji M., Aswani Kumar C., Rao G.S.V.R.K. Journal of King Saud University – Computer and Information Sciences 1319-1578
261 Advancing knowledge on Regulating and saving of the Animals Health with Sensor and Networks through IoT Subrata Chowdhury, P.Mayilvahanan, Ramya Govindaraj Jour of Adv Research in Dynamical & Control Systems
262 Videocompression techniques: A review Singh J.K., Gagneja K., Raghuvanshi U. International Journal of Pure and Applied Mathematics 1311-8080
263 A Comparative Analysis on Smart Farming Techniques using Internet of Things (IoT) Pramod Mathew Jacob, Prasanna M, Parveen Sultana H Helix 2277-3495
264 Knowledge-based Acceptance Test driven agile Approach for Quality Software Development N. Asha, Prasanna Mani International Journal of Recent Technology and Engineering 2277-3878
265 A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system Manogaran G., Varatharajan R., Lopez D., Kumar P.M., Sundarasekar R., Thota C. Future Generation Computer Systems 0167-739X
266 A Descriptive Study on Contents Being Generalized in News Apps and Smartphone Users’ Attitude Towards Them Surendheran Kaliyaperumal OmniScience: A Multi-disciplinary Journal 2347-9949
267 Mining DNA Sequence Patterns with Constraints Using Hybridization of Firefly and Group Search Optimization Lakshmanna K., Khare N. Journal of Intelligent Systems 0334-1860
268 A Novel Genetic Algorithm for Solving Machine Part Cell Formation Problem considering alternative Process Plans Sowmiya N., Valarmathi B., Srinivasa Gupta N., Essaki Muthu P., Rajendran C. Materials Today: Proceedings 2214-7853
269 Outlet sales analysis using r and various machine learning algorithms Singh J.K., Gagneja K., Bhushan V. International Journal of Pure and Applied Mathematics 1311-8080
270 Improved scrum method through staging priority and cyclomatic complexity to enhance software process and quality Vijay Anand R., Dinakaran M. International Journal of Internet Technology and Secured Transactions 1748-569X
271 Wireless camera network with enhanced SIFT algorithm for human tracking mechanism Usha Devi G., Priyan M.K., Gokulnath C. International Journal of Internet Technology and Secured Transactions 1748-569X
272 LocPSORank-prediction of ranking of web services using location-based clustering and PSO algorithm Mareeswari V., Sathiyamoorthy E. International Journal of Web Services Research 1545-7362
273 A firefly inspired game dissemination and QoS-based priority pricing strategy for online social network games Raj E.D., Dhinesh Babu L.D. International Journal of Bio-Inspired Computation 1758-0366
2018
SL.NO TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL ISBN/ISSN NUMBER
1 A Comparative Analysis of Firefly and FuzzyFirefly based Kernelized Hybrid C-Means Algorithms B.K. Tripathy, Anmol Agrawal, A. Jayaram Reddy 1 I.J. Intelligent Systems and Applications 2074-904X
2 IoT based machine learning techniques for climate predictive analysis Nallakaruppan, M.K., Senthil Kumaran, U. International Journal of Recent Technology and Engineering 22773878
3 Patients Health Monitoring System Using IOT Sudha Senthilkumar, Brindha.K, Charanya R, Abishek Kumar Indian Journal of Public Health Research & Development 0976-0245
4 Fragmented plant leaf recognition: Bag-of-features, fuzzy-color and edge-texture histogram descriptors with multi-layer perceptron Chaki J., Dey N., Moraru L., Shi F. Optik 0030-4026
5 Walsh Hadamard Transform for Simple Linear Iterative Clustering (SLIC)Superpixel based Spectral Clustering of Multimodal MRI Brain Tumour Segmentation M. Angulakshmi, G. G Lakshmi Priya Innovation and Research in BioMedical engineering- Elesiver 1959-0318
6 An efficient algorithm for dynamic task offloading using cloudlets in mobile cloud computing Shobha Rani, D., Pounambal, M., Saritha, V. International Journal of Communication Systems 1099-1131
7 A Big Data Recommendation Engine Framework Based on Local Pattern Analytics Strategy for Mining Multi-Sourced Big Data Venkatesan, T., Saravanan, K., Ramkumar, T. Journal of Information and Knowledge Management 0219-6492
8 CLAY-MIST: IoT-cloud enabled CMM index for smart agriculture monitoring system Mekala M.S., Viswanathan P. Measurement: Journal of the International Measurement Confederation 0263-2241
9 Sentiment analysis of Amazon products using ensemble machine learning algorithm Jayakumar Sadhasivam, Ramesh Babu Kalivaradhan International Journal of Mathematical, Engineering and Management Sciences 2455-7749
10 Implementation of Collage Grammar in Kolam Grammar to Generate Kolam Patterns in Picture Languages Ramya Govindaraj, M.Anand International Journal of Innovative Technology and Exploring Engineering (IJITEE) 22783075
11 Health Machine Sensors Network Controlling and Generating Trust Count in the Servers Platform through IoT Subrata Chowdhury, P. Mayilvahananan, Ramya Govindaraj International Journal of Recent Technology and Engineering (IJRTE) 2277-3878
12 A survey on internet of vehicles: Applications, technologies, challenges and opportunities Priyan M.K., Usha Devi G. International Journal of Advanced Intelligence Paradigms 1755-0386
13 Performance analysis of cloud computing using series of queues with Erlang service K.Santhi, R.Saravanan International Journal of Internet Technology and Secured Transactions 1748-5703
14 Accurate facial ethnicity classification using artificial neural networks trained with galactic swarm optimization algorithm Bagchi, C, Geraldine Bessie Amali, D, Dinakaran, M Advances in Intelligent Systems and Computing 21945357
15 A novel dyadic multiresolution wavelet image steganography using N-ary C. Vanmathi; S. Prabu International Journal of Internet Technology and Secured Transactions 1748-5703
16 Performance comparison of various feature descriptors in object category detection application using SVM classifier Kavitha B R , Ramya G, Priya G International Journal of Innovative Technology and Exploring Engineering 22783075
17 A roadmap towards implementing parallel aspect level sentiment analysis Basha S.M., Rajput D.S. Multimedia Tools and Applications 1380-7501
18 K-means and hierarchical based clustering in suicide analysis Sujatha, R., Sree Dharinya, S., Ephzibah, E.P., Thangam, R.K. International Journal of Engineering and Advanced Technology 22498958
19 AN ANALYSIS OF SECURITY ISSUES IN CLOUD COMPUTING M B BENJULA ANBU MALAR J PRABHU International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
20 A Suite of Load Balancing Algorithms and Service Broker Policies for Cloud: A Quantitative Analysis with Different User Grouping Factor in Cloud Kumar PJ, Suganya P, Komal Malhotra, Payal Yadav International Journal of Recent Technology and Engineering (IJRTE) 2277-3878
21 Reduction of Artefacts in JPEG-XR Compressed Images Kai-Lung Hua, Ho Thi Trang, Kathiravan Srinivasan, Yung-Yao Chen, Chun-Hao Chen, Vishal Sharma, Albert Y Zomaya MDPI Sensors 1424-8220
22 EFF-FAS: Enhanced Fruit Fly Optimization Based Search and Tracking By Flying Ad Hoc Swarm Vishal Sharma, Roberto Sabatini, Subramanian Ramasamy, Kathiravan Srinivasan, Rajesh Kumar International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) 1743-8225
23 A Comprehensive Survey On Various Semantic Based Video/Image Retrieval Techniques Tamil Priya D, Divya Udayan J International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2278-3075
24 Evaluating and Visualizing Influential Node Using Various Measures in Social Network Data G. Kavitha and N. M. Elango journal of Computational and Theoretical Nanoscience 1546-1955
25 Distribution of Frequency Words Using Hierarchical Clustering Method in R Shakila Basheer1, S. Mariyam Aysha Bivi2, G. Kavitha3 ∗, P. V. Praveen Sundar4, C. Kousalya3, and B. Lokeshwari3 Journal of Computational and Theoretical Nanoscience 1546-1955
26 Analysis and Visualize Text Mining Using Twitter Data in R Shakila Basheer1, Rincy Merlin Mathew2, G. Kavitha3 ∗, K. Nivetha3, S. Kalai Selvi3, and R. Sandhya3 Journal of Computational and Theoretical Nanoscience 1546-1955
27 Location-Based Collaborative Filtering for Web Service Recommendation Mareeswari Venkatachalaappaswamy, Vijayan Ramaraj, Saranya Ravichandran Recent Patents on Computer Science 2213-2759
28 Evaluating and Visualizing influential Node Using Various Measures in Social Network Data G.kavitha and N M ELango journal of Computational and Theoretical Nanoscience 1546-1955
29 Deep Learning for Short Answer Scoring Surya, K., Gayakwad, E., Nallakaruppan, M.K. International Journal of Recent Technology and Engineering 22773878
30 A survey on different continuous authentication systems Ayeswarya S., Norman J. International Journal of Biometrics 1755-8301
31 K-means and hierarchical based clustering in suicide analysis Sujatha.R,Sree Dharinya.S,Ephzibah,Kirubathangam.R International Journal of Engineering and Advanced Technology 2249-8958
32 Risk-based availability modelling and reputation management on fault tolerant cloud computing systems Deepa Mani; Anand Mahendran International Journal of Internet Technology and Secured Transactions (IJITST) 1748-569X
33 Decision-making tool for crop selection for agriculture development Deepa N., Ganesan K. Neural Computing and Applications 0941-0643
34 Predicting Autism Spectrum Disorder Using Machine Learning Algorithms with Jaundice Symptomatic Analysis Sharath Chandrika M B, Nallakaruppan M K, Siva Rama Krishnan S, Senthilkumar N C International Journal of Recent Technology and Engineering 2277-3878
35 Real-Time Classification of Twitter Trends using Support Vector Machine with Location Tracking Vijayan Ramaraj, G Gunasekaran, Prasanna Santhanam, S Meenatchi, Kishore Kumar K International Journal of Innovative Technology and Exploring Engineering 2278-3075
36 Semantic analysis – internet of things, study of past, present and future of IoT Snigdha Gharami, B.Prabadevi, Anupama Bhimnath Electronic Government , an International Journal 1740-7494
37 Pattern Analysis of Genetics and Genomics: A Survey of the State-of-art Jyotismita Chaki, Nilanjan Dey Multimedia Tools and Applications (Springer) 1380-7501
38 Pattern Mining Approaches used in Sensor-Based Biometric Recognition: A Review Jyotismita Chaki, Nilanjan Dey, Fuqian Shi , R. Simon Sherratt IEEE Sensors 1530-437X
39 A heuristic method for initial dominant point detection for polygonal approximations S. Kalaivani , Bimal Kumar Ray Soft Computing 1432-7643
40 A Survey and Analysis of various Objective Functions Defined for RPL in 6LoWPAN Suganya. P, Pradeep Reddy. C.H International Journal of Recent Technology and Engineering 2277-3878
41 Car Sales Prediction Using Machine Learning Algorithmns Madhuvanthi.K, Nallakaruppan.M.K, Senthilkumar N C, Siva Rama Krishnan S International Journal of Innovative Technology and Exploring Engineering 2278-3075
42 Comparative Performance Analysis of Various Classifiers for Cloud E-Health Users T. MuthamilSelvan,B. Balamurugan International Journal of E-Health and Medical Communications 1947-315X
43 Continuous Monitoring and Detection of Epileptic Seizures using Wearable Device Darshan Mehta, Tanay Deshmukh, Yokesh Babu Sundaresan,, P.Kumaresan Advances in Intelligent Systems and Computing Smart Innovations in Communication and Computational Sciences Proceedings of ICSICCS-2018, 2194-5357
44 Predicting Austim Spectrum Disorder Using Machine Learning Algorithms with Jaundice Symptomatic Analysis Sharath Chandrika M B, Nallakaruppan M K, Siva Rama Krishnan S, Senthilkumar N C International Journal of Recent Technology and Engineering 2277-3878
45 Stochastic Multifacility Location Problem under Triangular Area Constraint with Squared Euclidean Norm A. K. Santra Journal of Scientific & Industrial Research 0022-4456
46 Test Suite Reduction based on knowledge Reuse: An Adaptive Elitism Based Intellect approach (AEBI) using Clustering Technique Asha N and Prasanna Mani International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2278-3075
47 Prediction Intelligence System Based Real Time Monitoring of Yoga Performers Mani Prasanna, Thangavelu Arun Kumar, Sangaiah Arun Kumar, Mohamed Iqubal Jawid Nazir Recent Patents on Computer Science 1874-4796
48 Walsh Hadamard Transform for Simple Linear Iterative Clustering (SLIC) Superpixel Based Spectral Clustering of Multimodal MRI Brain Tumor Segmentation M Angulakshmi, GG Lakshmi Priya Innovation and Research in BioMedical engineering (IRBM) 1959-0318
49 Predictive analysis of stocks using data mining Magesh, G., Swarnalatha, P. Smart Innovation, Systems and Technologies 2190-3018
50 Classification of breast cancer based on thermal image using support vector machine Aarthy, S.L., Prabu, S. International Journal of Bioinformatics Research and Applications 1744-5485
51 Estimating the distance of a human from an object using 3D image reconstruction Swarna Priya, R.M., Gunavathi, C., Aarthy, S.L. Advances in Intelligent Systems and Computing 2194-5357
52 Big data analysis for anomaly detection in telecommunication using clustering techniques Gunavathi, C., Swarna Priya, R.M., Aarthy, S.L Advances in Intelligent Systems and Computing 2194-5357
53 VoIP Steganography Methods, a Survey S. Deepikaa, R. Saravanan CYBERNETICS AND INFORMATION TECHNOLOGIES 1311-9702
54 Flow based classification for specification based intrusion detection in software defined networking: Flowclassify Sampath N, Dinakaran M International Journal of Software Innovation 21667160
55 Performance Comparison of Various Feature Descriptors in Object Category Detection Application using SVM Classifier Kavitha B R , G. Ramya, G.Priya International Journal of Innovative Technology and Exploring Engineering 2278-3075
56 Energy-Efficient virtual machine selection based on resource ranking and utilization factor approach in cloud computing for IoT Mekala M.S., Viswanathan P. Computers and Electrical Engineering 0045-7906
57 Effective Classification of Major Depressive Disorder Patients using Machine Learning Techniques Nivedhitha M, Durairaj Vincent P M Recent patents on computer science 2213-2759
58 Machine learning on medical dataset Gopinath, M.P., Aarthy, S.L., Manchanda, A., Rishadh Advances in Intelligent Systems and Computing 2194-5357
59 Design of Secure Ehealth System Through Temporal Shadow using Blockchain R Charanya, Ra. K Saravanaguru, M Aramudhan International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2278-3075
60 K-means and hierarchical based clustering in suicide analysis Sujatha.R,Sree Dharinya.S,Ephzibah,Kirubathangam.R International Journal of Engineering and Advanced Technology 2249-8958
61 New Approach Data Encryption using Key Generation and DS-PEKS Algorithm Pratik Badala, Senthilkumar N C Research Journal of Engineering and Technology 0976-2973
62 Crime Pattern Matching based on Process Execution Context – An Evidence Acquisition Technique Asha Joseph and K. John Singh Journal of Advanced Research in Dynamical and Control Systems 1943-023X
63 Histogram-Equalized Hypercube Adaptive Linear Regression for Image Quality Assessment Balakrishnan, N., Shantharajah, S.P. Sadhana – Indian Academy of Engineering and Sciences 0256-2499
64 A Survey, International Journal of Advanced Intelligence Paradigms R. Jayanthi and K. John Singh International Journal of Advanced Intelligence Paradigms 0
65 Predicting ozone layer concentration using machine learning techniques Srinivas, A.S., Somula, R., Govinda, K., Manivannan, S.S. Springer Briefs in Applied Sciences and Technology 2191-530X
66 Healthcare Android Application Shakila Basheer, Nithya Sampath, Jayakumar Sadhasivam R. Ilampirai R. Ramya Bharathi V. Ilakkiya Journal of Computational and Theoretical Nanoscience 1546-1955
67 An empirical comparison of supervised learning algorithms and hybrid WDBN algorithm for MOOC courses Jayakumar Sadhasivam Ramesh Babu Kalivaradhan Journal of Ambient Intelligence and Humanized Computing 1868-5137
68 Image encryption techniques for data transmission in networks: A survey Jayanthi R., John Singh K. International Journal of Advanced Intelligence Paradigms 1755-0386
69 Accessibility Using Human Face Object and Text Recognition for Visually Impaired People V. Mareeswari, Vijayan Ramaraj, G. Uma Maheswari, R. Sujatha, Preethi. E International Journal of Innovative Technology and Exploring Engineering 22783075
70 Machine Learning Based Classification of Cervical Cancer Using K-Nearest Neighbour, Random Forest and Multilayer Perceptron Algorithms Shakila Basheer S. Mariyam Aysha Bivi S. Jayakumar Arpit Rathore Balajee Jeyakumar Journal of Computational and Theoretical Nanoscience 1546-1955
71 Review on recent developments in frequent itemset based document clustering, its research trends and applications D. S. Rajput International journal of data analysis techniques and strategies, InderScience 1755-8069
72 Ignition Pollution Check Yadav, V., Khatana, D., Bajoria, M., Nallakaruppan, M.K., Singh, S.P. International Journal of Innovative Technology and Exploring Engineering 22783075
73 Data cryptography based on musical notes on a fingerboard along with a dice Tripathy, A.K., Das, T.K., Navaneethan, C. Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
74 Comparison of particle swarm optimization and simulated annealing applied to travelling salesman problem Sumathi, M., Rahamathunnisa, U., Anitha, A., Das, D., Nallakaruppan, M.K. International Journal of Innovative Technology and Exploring Engineering 22783075
75 Location-Based Collaborative Filtering for Web Service Recommendation Venkatachalaappaswamy, M., Ramaraj, V., Ravichandran, S. Recent Patents on Computer Science 1874-4796
76 Classifying streaming of Twitter data based on sentiment analysis using hybridization Senthil Murugan N & Usha Devi G Neural Computing and Applications 0941-0643
77 Analyzing Financial Data and Mutual Funds Recommendation by Using Big Data Analytics Nithya Sampath Jayakumar Sadhasivam R. Raj Kumar M. Sathish Kumar Balajee Jeyakumar P. V. PraveenSundar Journal of Computational and Theoretical Nanoscience 1546-1955
78 An approach to aggregate the partial rank list of web services in e-business Mareeswari V., Sathiyamoorthy E. International Journal of e-Business Research 1548-1131
79 Securing one-time password generation using elliptic-curve cryptography with self-portrait photograph for mobile commerce application Ramasamy, P., Ranganathan, V., Palanisamy, V., Kadry, S. Multimedia Tools and Applications 1380-7501
80 Monitoring individual medical record by using wearable body sensors Gopal J,Sathiyamoorthy E,Mohammed Ayaz R Smart Innovation, Systems and Technologies 21903018
81 An Optimized Breast Cancer Diagnosis System Using a Cuckoo Search Algorithm and Support Vector Machine Classifier Manoharan prabukumar., Loganathan agilandeeswari., Arun kumar sangaiah Hybrid Intelligence for Image Analysis and Understanding 1868-5137
82 Intelligent intrusion detection techniques for secure communications in wireless networks: A survey Rama Prabha K.P., Jeyanthi N. International Journal of Advanced Intelligence Paradigms 1755-0386
83 32-Bit One Instruction Core: A Low-Cost,Reliable, and Fault-Tolerant Core for Multi-core Systems Venkatesha, S. and Parthasarathi, R Journal of Testing and Evaluation 0090-3973
84 Implementation of enhanced canny recognition algorithm and non – natural neural system based speech fusion for sightless persons Arunkumar, P., Shantharajah, S.P. Multimedia Tools and Applications 1380-7501
85 E-health cloud security using timing enabled proxy re-encryption V Vijayakumar, MK Priyan, G Ushadevi, R Varatharajan, G Manogaran, Prathamesh Vijay Tarare Mobile Networks and Applications 1383-469X
86 MMSI: A multi-mode service invocation algorithm to improve the connectivity in accessing cloud services in heterogeneous mobile cloud Nadesh R.K., Aramudhan M. International Journal of Advanced Intelligence Paradigms 1755-0386
87 A Comparative Study On Transformation of UML/OCL to Other Specifications Jagadeeswaran T, Senthilkumaran U Recent Patents on Computer Science 2213-2759
88 Health care arrangement system for Doctor-Patient Communications Angulakshmi.M, Sudha.S, Brindha.K Indian Journal for Public health and Research development 0976-0245
89 Accessibility using human face, object and text recognition for visually impaired people Mareeswari, V., Vijayan Ramaraj, , Uma Maheswari, G., Sujatha, R., Preethi, E International Journal of Innovative Technology and Exploring Engineering 2278-3075
90 Network Support Data Analysis for Fault Identification Using Machine Learning Parthasarathy Panchatcharam Shakila Basheer, Usha Devi Gandhi International Journal of Software Innovation 2166-7160
91 Accurate facial ethnicity classification using artificial neural networks trained with galactic swarm optimization algorithm Bagchi, C., Geraldine Bessie Amali, D., Dinakaran, M. Advances in Intelligent Systems and Computing 2194-5357
92 Agricultural leaf blight disease segmentation using indices based histogram intensity segmentation approach Kalaivani.S, Shantharajah.S.P, Padma.T, Multimedia Tools and Applications 1380-7501
93 Optimal body mass index cutoff point for cardiovascular disease and high blood pressure Chandra Babu, G., Shantharajah, S.P. Neural Computing and Applications 0941-0643
94 Gurumurthy S., Senthilkumar N.C., Ghalib M.R. A study of digital signal processing application for remote patient monitoring system using live EEG data transmission International Journal of Applied Engineering Research 0973-4562
95 Jeyanthi N., Thandeeswaran R., Vinithra J. RQA based approach to detect and prevent DDOS attacks in VoIP networks Cybernetics and Information Technologies 1311-9702
96 Angulakshmi M. A survey on multi-relational database based classification approaches International Journal of Applied Engineering Research 0973-4562
2017
S.NO. TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL ISBN/ISSN NUMBER
1 A Novel Women Chaperone “An Anti-Violation Technology” Prabhu J , Thanapal P , Vijayanand R , Kirubathagam R , Sundaravadivazhagan B International Journal of Pure and Applied Mathematics 1314-3395
2 Classification: Grouping The Users Based On Their Web Search Using Fuzzy Logic Senthilkumar N C, Ch Pradeep Reddy International Journal of Pure and Applied Mathematics 1314-3395
3 An Empirical Study Of Various Load Balancing Algorithms For Cloud Computing M Lawanyashri, S Subha. B Balamurugan International Journal of Pure and Applied Mathematics 1314-3395
4 An Improved Floating Point Addition Algorithm S Subha ARPN Journal of Engineering and Applied Sciences 1819-6608
5 Analysis Of Performance Measures To Handle Medical Ecommerce Shopping Cart Abandonment In Cloud, V Priya, S Subha, B Balamurugan Informatics in Medicine Unlocked-Elsevier, March 2017 2352-9148
6 Energy Aware Fruitfly Optimization Algorithm For Load Balancing In Cloud Computing Environments M. Lawanya Shri, S Subha, Balusamy International Journal of Intelligent Engineering and Systems, 2185-310
7 A Credential Data Privacy Preserving In Web Environment Using Secure Data Contribution Retrieval Algorithm” Kumaran U, Neelu Khare International Journal of Intelligent Engineering and Systems 2185-310
8 2D Chaotic Map Based On 2D Adaptive Grey Wolf Algorithm For Ultra Sound Medical Image Security Srinivas Koppu & Viswanatham International Journal of Intelligent Engineering and System 2185-310
9 3D Reconstruction Of A Scene From Multiple 2D Images Srinivas Koppu, Swarna Priya, R. M., Aarthy, S. L., Gunavathi, C., Venkatesh, P. & Gao, X. Z International Journal of Civil Engineering and Technology (IJCIET) 0976-6316
10 A Case Study : 3D City Generation Using Procedural Modeling Framework And Evaluations Trategies Divya Udayan J, M.Priya, R.Charanya, Tamil Priya. D And Boyu Gao International Journal of Civil Engineering & Technology (IJCIET) 0976-6316
11 Enchanced Id Based Ring Signature By Validating Time Slots In Cloud Environment Nithya S International Journal of Mechanical Engineering and Technology 0976-6340
12 A Case Study On Coactive Subject Modelling For Acclaiming Technical Articles Praveen Kumar Reddy M, Rajesh Kaluri, Kuruva Lakshmanna, Nagaraja G, Swamy T, Guokun Li International Journal of Mechanical Engineering and Technology (IJMET) 0976-6340
13 A Case Study On Cost Estimation Of Cloud Service Using Fuzzy Approach Srinivas Koppu, Joy Bhowmick., Madhu V. Satheesh S. And Tsung C.H International Journal of Pure and Applied Mathematics, 13118080
14 A Case Study: 3D City Generation Using Procedural Modeling Framework And Evaluation Strategies M.Priya International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
15 A Case Study: Analysis Of Single Phase And Hybrid Cascade Multilevel Inverter With Pwm And Level Inverters M.Priya International Journal of Mechanical Engineering and Technology (IJMET) 0976-6340
16 A Case Study: Home Environment Monitoring System Using Internet Of Things R. Raghavan, John Singh. K, Thippa Reddy. G, Sudheer. K, Venkatesh. P And Stephen Olatunde Olabiyisi International Journal of Mechanical Engineering and Technology 0976-6359
17 A Case Study: Usb Device Charging And Fitness Monitor With Smart Safety Shoe And Iot John Singh. K, Sagar G. V, Sushmita Lenka, Belwin Edward. J, Jacob Raglend. I, Stephen Olatunde Olabiyisi, International Journal of Mechanical Engineering and Technology 0976-6359
18 A Comprehensive Overview On The Foundations Of Formal Concept Analysis K. Sumangali Ch. Aswani Kumar Knowledge Management & E-Learning 2073-7904
19 A Computer Aided System To Detect Breast Masses Using Digital Mammograms Sujatha,R., Gao, X.-Z.,Gopinath, M.P., Prabu, S.,Murali, S.,Mohanasundaram, R., Kumar, N.S. International journal of Civil Engineering and Technology 0976 – 6316
20 A Condorcet Voting Theory Based Ahp Approach For Mcdm Problems Sweta Bhattacharya, V. Raju Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
21 A Fast Enhanced Secure Image Chaotic Cryptosystem Based On Hybrid Chaotic Magic Transform Srinivas Koppu & Viswanatham Modelling and Simulation in Engineering 16875591
22 A Framework For Attribute Selection In Marketing Using Rough Computing And Formal Concept Analysis T. K. Das IIMB Management Review 0970-3896
23 A Framework For Computational Offloading To Extend The Energy Of Mobile Devices In Mobile Cloud Computing. Thanapal, P., & Durai, M. S. International Journal of Embedded Systems 1741-1076
24 A Framework To Mitigate Arp Sniffing Attacks By Cache Poisoning B. Prabadevi, N. Jeyanthi International Journal of Advanced Intelligence Paradigms (Inderscience) 1755-0386
25 A Mobile Application Based Smart System For Supporting Yoga Activities And Health Monitoring Prasanna M, Arunkumar T, Arunkumar S Research Journal of Pharmacy and Technology 0974-360X
26 A Naive-Bayes Strategy For Sentiment Analysis On Demonetization And Indian Budget 2017-Case-Study Jasmine Norman, Mangayarkarasi R, Vanitha M, Praveen Kumar T, Umamaheswari G International Journal of Pure and Applied Mathematics 1314-3399
27 A New Algorithm For Password Encryption And Decryption M.Iyapparaja Journal of Advanced Research and Dynamical & Control Systems 1943-023X
28 A Novel Temporal Access Control Scheme For Outsourced Data In Cloud With User Revocation P. G. Shynu And K. John Singh Electronic Government, an International Journal, 1740-7508
29 A Novel Threshold Based Multi-Authority Access Control System In Cloud Storage Environment M.Lawanyashri International Journal of Pure and Applied Mathematics 1314-3399
30 A Prevention Model For Web Application Session Hijack Attacks In Wireless Networks Using Mac Appended Session Id S.S.Manivannan, E.Sathiyamoorthy Journal of Advanced Research in Dynamical and Control Systems 1943-023X
31 A Privacy-Preserving Secure Access Control Mechanism In Cloud M.Iyapparaja Journal of Advanced Research and Dynamical & Control Systems 1943-023X
32 A Real Time Monitoring System For Yoga Practitioners Prasanna M, Arunkumar T, Akshat Sharma, Nikhil Chaudhari International Journal of Intelligent Engineering and Systems 2185-3118
33 A Replica Detection Scheme Based On The Deviation In Distance Travelled Sliding Window For Wireless Sensor Networks Alekha Kumar Mishra, Asis Kumar Tripathy, Arun Kumar, And Ashok Kumar Turuk Wireless Communications and Mobile Computing, 1530-8677
34 A Review Of Soft Computing Techniques In Short-Term Load Forecasting Senthil Kumar P International Journal of Applied Engineering Research 0973-4562
35 A Review On Various Encoding Scehmes Used In Digital Dna Data Storage A.Swati, Forum Mathuria, S.Bhavani, E.Malathy, R.Mahadevan International Journal of Civil Engineering and Technology 0976-6308
36 A Study On Different Types Of Authentication Techniques In Data Security Dinesh Kumar D, K.Vijay, S.Bhavani, E.Malathy, R.Mahadevan International Journal of Civil Engineering and Technology 0976-6308
37 A Survey On Fault Detection Techniques In Different Machines – An Image Processing Approach U.Rahamathunnisa,Babu Chellappa Chetty And A.Clement King International Journal of Civil Engineering and Technology 0976-6316
38 A Survey On Feature Selection Methods In Microarray Gene Expression Data For Cancer Classification Gunavathi C, Premalatha K, Sivasubramanian K Research Journal of Pharmacy and Technology 0974-360X
39 An Access Control Models In Cloud Computing: A Review Priya G, Kavitha Br, Ramya G , Kumaresan P , Feslin Anish Mon International Journal of Pure and Applied Mathematics ISSN: 1311
40 An Analysis And Performance Evaluation Of Nosql Databases For Efficient Data Management In E-Health Clouds S L Aarthy Internation Journal of Pure and Applied Mathematics 13118080
41 An Approach For Dynamic Replica Allocation For Sparse (Urban/Sub-Urban) And Dense Regions (City Side) In Vanet Kumar P J, Manikandan, N., Suganya, P., Sureka, S International Journal of Civil Engineering and Technology 0976-6308
42 An Approach To Evaluate The Availability Of System In Cloud Computing Using Fault Tree Technique M.Deepa, M.Anand INASS 2185-3118
43 An Efficient And Secure Biometric Authentication Scheme For M-Commerce R. Thandeeswaran, Hamid Mcheick, Hemant Agrawal, Ajay Thakur, N. Jeyanthi, Rajan Slathia, International Journal of Civil Engineering and Technology 0976 – 6308
44 An Efficient Deep Learning Neural Network Based Brain Tumor Detection System Chinmayi, L Agilandeeswari, M Prabukumar, K Muralibabu International Journal of Pure and Applied Mathematics, 1314-3395
45 An Efficient Hybrid Approach For Hyperspectral Image Classification, L Agilandeeswari, M Prabukumar, S Sathishkumar International Journal of Pure and Applied Mathematics, 1314-3395
46 A Survey On Iot Related Patterns Siva Kumar N International Journal of Pure and Applied Mathematics 1314-3395
47 An Enhanced Abe Based Secure Access Control Scheme For E-Health Clouds P. G. Shynu And K. John Singh International Journal of Intelligent Engineering and Systems 2185-3118
48 An Enhanced Cp-Abe Based Access Control Algorithm For Point To Multi-Point Communication In Cloud Computing P. G. Shynu And K. John Singh Journal of Information Science and Engineering 1016-2364
49 An Enhanced Framework For Sign Gesture Recognition Using Hidden Markov Model And Adaptive Histogram Technique Rajesh Kaluri, Pradeep Reddy Ch International Journal of Intelligent Engineering and Systems 2185-3118
50 An Enhanced Virtual Backoff Algorithm For Wireless Sensor Networks Babu, P.R., Krishna, P.V., Saritha, V., Pounambal, M International Journal of Wireless and Mobile Computing 17411084
51 An Intelligent Approach Of Query Process Optimisation Using Cooperative Semantic Caching Techniqu P.Mohankumar Journal of Engineering science and Technology 1823-4690
52 An Overview Of Data Mining Techniques And Its Applications G.Kavitha,N.M.Elango International Journal of Civil Engineering and Technology 9766308
53 Analysis Of Using Sparse Matrix Storage Formats In Image Compression Techniques Banu,J.S, Babu.M.R, Thaseen,I.S And Balamurugan.P International Journal of Pure and Applied Mathematics 1311-8080
54 Analyzing Customer Sentiments Using Machine Learning Techniques Magesh G, Dr.P.Swarnalatha International Journal of Civil Engineering and Technology (IJCIET Journal) 0976 – 6316
55 Assessment And Optimisation Of User Imprecise Queries In Cloud Environments P.Mohankumar International journal of Intelligent Engineering and system 2185-3118
56 Automatic Brain Tumour Segmentation Techniques – A Review Angulakshmi.M, Lakshmi Priya. Gg International Journal of Imaging Systems and technology 1098-1098
57 Automatic Grading System For Mangoes Using Multiclass Svm Classifier L Agilandeeswari, M Prabukumar, Goel Shubham International Journal of Pure and Applied Mathematics 1311-1314
58 Availability Modelling Of Fault Tolerant Cloud Computing System M.Deepa, M.Anand INASS 2185-3118
59 An Evolutionary Secre Energy Efficient Routing Protocol In Iot Praveen Kumar Reddy, Rajasekhara Babu International Journal intelligent engineering and systems 1311063047
60 Big Data And Its Applications: A Survey Magesh G, Dr.P.Swarnalatha Research Journal of Pharmaceutical, Biological and Chemical Sciences 0975-8585
61 Big Data Management With Machine Learning Inscribed By Domain Knowlegde For Health Care Sujatha R., E.P.Ephzibah International Journal of Engineering & Technology 2227-524X
62 Biomarker Selection From Gene Expression Data For Tumour Categorization Using Bat Algorithm Gunavathi Chellamuthu, Premalatha Kandasamy, Sivasubramanian Kanagaraj International Journal of Intelligent Engineering & Systems 2185-3118
63 Bluetooth Based Low Power Data Acquisition System For Ban Kumaresan P Prabukumar M, International Journal of Pure and applied Mathematics – Special issue on Computer and Communication Editors 1311-8083
64 Case Study: A Line Following Robot For Hospital Management Kumaresan P,Priya.G,Kavitha B R, Ramya G, M.Lawanyashri International Journal of Pure and Applied Mathematics 1311-1314
65 Ciphertext-Scheme Based On Attribute Hybrid Encryption In Cloud Computing. Meenatchi, S., Navaneethan, C., Iyapparaja, M., Thanapal, P., & Prabhakaran, R., Jour of Adv Research in dynamic & Control System 1943-023X
66 Clustering Of Wireless Sensor Networks Nallakaruppan, M.K., Ilango, P., Deepa, N., Muthukumarappan, A. Research Journal of Pharmacy and Technology 9743618
67 Comparative Study On Performance Analysis Of Time Series Syed Muzamil Basha, Yang Zhenning, Dharmendra Singh Rajput, Iyengar N.Ch.S.N. And Ronnie D. Caytiles International Journal of Grid and Distributed Computing 2207-6379
68 Computer Numerical Control Machine Based On Machine Learning Kumaresan P Balavignesh G, Kavitha B R, Ramya Govindaraj, Venkatesan S International Journal of Pure and applied Mathematics – Special issue on Computer and Communication Editors 1311-8080
69 An Enhanced Trust Startegy For Online Social Networks Using Probalistic Reputation Features Raj E D, Babu L.D.D Neurocomputing 9252312
70 Concept Compression In Formal Concept Analysis Using Entropy-Based Attribute Priority K. Sumangali Ch. Aswani Kumar Applied Artificial Intelligence An International Journal 0883-9514
71 Context Residual Energy Based Trust Management In Mobile Adhoc Networks R. Vijayan, N. Jeyanthi International Journal of Communication Networks and Distributed Systems (Inderscience 1754-3916
72 Covering Rough Set Fuzzy C- Medoids (Crfm) Clustering Algorithm For Gene Expression Data A.Jayaram Reddy Journal of Advanced Research in Dynamical and Control Systems 1943-023X
73 Crypto Currencies For Digital Currency Using Cipher Text And Sha 256 Sukhbir, C.P., Manivannan Journal of Advanced Research in Dynamical and Control Systems 1943-023X
74 Customized Services To Generate Test Suits For Testing Custom Software Application System Based On Knowledge Reuse Asha N, Prasanna M Journal of Advanced Research in Dynamical and Control Systems 1943-023X
75 Decision Making Tool For Crop Selection For Agriculture Development N. Deepa, K.Ganesan Neural Computing and Applications 1433-3058
76 Detection Of Anaemia From Tongue Datasets By Image Processing Sujatha, R., Aarthy, S.L., Charulatha, A.R. And Sasikala, T.M.S International Journal of Research in Pharmaceutical Sciences 0975-7538
77 Development Of Advanced Encryption Standard Architecture With Sbox Validity Vanitha. M And S. Subha Walailak Journal of Science and Technology 2228-835X
78 Discovery Of Drug And Medicine Using Datamining Techniques Anish Chittora , A.Mary Mekala Research Journal of Pharmacy and Technology 0974-3618
79 Domain Specific Predictive Analytics: A Case Study With R Syed Muzamil Basha, Yang Zhenning, Dharmendra Singh Rajput, Iyengar N.Ch.S.N. And Ronnie D. Caytiles International Journal of Multimedia and Ubiquitous Engineering 1975-0080
80 Dynamic Data Partitioning And Virtual Chunking For Effective Data Retrieval M.Vanitha, R.Mangayarkarasi, Jasmine Norman, R.Sakthivel, K.Baranitharan International Journal of Pure and Applied Mathematics 1311-8080
81 Dynamic Energy Optimization Technique In Mobile Cloudlet For Mobile Cloud Computing Using Effective Offloading Algorithm P.Priya, S.P.Shantharajah Journal of Theoretical and Applied Information Technolog 1992-8645
82 Effective Evaluation Of Prediction Accuracy Using Optimization Algorithm, Brindha.K, Sudha.S , Rathi.R And Charanya.S, International Journal of Pure and Applied Mathematics 1311-8080
83 Effective Mining Approach To Produce Quality Search Results Using Proposed Approach Elavarasan D, Durai Raj Vincent International Journal of Intelligent Engineering and Systems 2185-3118
84 Energy Efficient Consumption For Quality Based Sleep Scheduling In Wireless Sensor Networks A. S. Syed Navaz, N. Asha And D. Sumathi ARPN Journal of Engineering and Applied Sciences 1819-6608
85 Energy Efficient Node Selection Algorithm Based On Node Performance Index And Random Waypoint Mobility Model In Internet Of Vehicles P M Kumar, Ushadevi Gandhi, R Varatharajan, Gunasekaran Manogaran, R Jidhesh, Thanjai Vadivel Cluster Computing 1573-7543
86 Integration Of Fuzzy Dematel And Fmcdm Approach For Evaluating Knowledge Transfer Effectiveness With Reference To Gsd Project Outcome Jagadeesh G, Arun Kumar S, X.Z.Gao International Journal of Machine Learning and cybernetics 1868-8071
87 Enhanced Dtls With Coap-Based Authentication Scheme For The Internet Of Things In Healthcare Application Pm Kumar, Ud Gandhi The Journal of Supercomputing 0920-8542
88 Enhancing Trust In Mobile Adhoc Network Using Trust And Dynamic With Energy Efficient Multipath Routing Protocol Vijayan R , Jeyanthi N International Journal of Signal and Imaging Systems Engineering 1748-0698
89 Estimating Construction Data Using An Authenticated Application For Urban Planning S.Sree Dharinya, Ephzibah.E.P, Divya Udayan, R. Kirubathangam, & Charanya.R International Journal of Civil Engineering and Technology (IJCIET) 9766308
90 Evaluating The Impact Of Feature Selection On Overall Performance Of Sentiment Analysis Syed Muzamil Basha, Dharmendra Singh Rajput ACM Digital Library 978-1-4503
91 Evolutionary And Neural Computing Based Decision Support System For Disease Diagnosis From Clinical Data Sets In Medical Practice, M. Sudha Journal of Medical Systems 1573-689X
92 Feature Selection For Privacy Preserving In Data Mining With Linear Regression Using Genetic Algorithm Kumaran U, Neelu Khare Journal of Advanced Research in Dynamical and Control Systems 1943-023X
93 Flowagent: Software Defined Firewall Rule Generator For Network Intrusion Detection System Nithya S International Journal of Intelligent Engineering and Systems 2185-3118
94 Forward Secrecy Scheme For Data Sharing In Cloud M. Lawanya Shri , G.Priya, M.B.Benjula Anbumalar, Deepa Mani, K.Santhi International Journal of Pure and Applied Mathematics 1311-8080
95 Handling Stakeholder Conflict By Agile Requirement Prioritization Using Apriori Technique Rv Anand, M.Dinakaran Computers & Electrical Engineering 0045-7906
96 Hb-Ppac: Hierarchy-Based Privacy Preserving Access Control Technique In Public Cloud Sudha Senthilkumar,Madhu Viswanatham International journal of High Performance computing and networking 1740-0570
97 Information Retrieval For Question Answering System Using Knowledge Based Query Reconstruction By Adapted Lesk And Latent Semantic Analysis Saravanakumar K, Aswani Kumar Cherukuri International Journal of Computer Science and Applications 0972-9038
98 Intelligent Decision Support System Based On Rough Set And Fuzzy Logic Approach For Efficacious Precipitation Forecast, M. Sudha Decision Science Letters 19295812
99 Intelligent Face Recognition And Navigation System Using Neural Learning For Smart Security In Internet Of Things Pm Kumar, Ud Gandhi Cluster Computing 1573-7543
100 Intrusion Detection Model Using Fusion Of Chi-Square Feature Selection And Multi Class Svm I.Sumaiya Thaseen, Journal of King Saud University-Computer and Information Sciences 1319-1578
101 A Hybrid Cluster Head Selection Model For Iot Praveen Kumar Reddy M springer 1058601712
102 K-Means Modification For Scalability S.Bhavani,Sumit Patel, Dhanashri Patil, Yash Shah, Rushikesh Babar, Abhishek Rathi International Journal of Civil Engineering and Technology 0976-6308
103 Llvm Compiler R.Bansal, Jasmine Norman,Mangayarkarasi R,Vanitha M, Chandramouliswaran S International Journal of Pure and Applied Mathematics 1311-8080
104 Luggage Tracking System Using Iot Sudha Senthilkumar, Brindha.K, Rathi.R, Charanya. R, Mayank Jain International Journal of Pure and Applied Mathematics 1314-3395
105 Metrics Based Evaluation For Disease Affection In Distinct Cities M.Iyapparaja Research Journal of Pharmacy and Technology 0974-3618
106 Multi-Voting And Binary Search Tree-Based Requirements Prioritisation For E-Service Software Project Development Vijayanand R, Dinakaran M Electronic Government, an International Journal 1740-7494
107 Network Life Time Uniformed By Mutual Nodes Cooperation And Life Nodes Relay In Wsn’S. Thanapal, P., Prabhakaran, R., Meenatchi, S., Navaneethan, C., & Iyapparaja, M. Jour of Adv Research in dynamic & Control System 1943-023X
108 Non-Intrusive Transaction Aware Filtering During Enterprise Application Modernizationra Ramadoss, R., Elango, N.M., Abimannan, S., Hsu, C.-H. Journal of Supercomputing 0920-8542
109 Soft Sequential Recognition Approach For User Activity Using A Wearable Device Prabhavathy P IJMET 9766359
110 Opinion Mining Services Using Machine Learning Sujatha. R, M Sai Praneeth And M Lakshmi Deepak Journal of Chemical and Pharmaceutical Sciences 0974-2115
111 Optimal Decision Tree Fuzzy Rule Based Classifier (Odt-Frc) For Heart Disease Prediction Using Improved Cuckoo Search Algorithm” Subhashini Narayan , Jagadeesh Gobal International Journal of Business Intelligence and Data Mining. 1943-023X
112 Optimizing Health Care Records By Preventing Duplication In Cloud Sujatha R, Kaviya P.S International Journal of Research in Pharmaceutical Sciences 0975-7538
113 Overview Of Securing Multimedia Content Using Efficient Encryption Methods And Modes K. John Singh And Kunal Gagneja International Journal of Advanced and Applied Sciences 2313-3724
114 Parallel Aes Algorithm For Performance Improvement In Data Analytics Security For Iot Manikandan N, Subha S International Journal of Networking and Virtual Organisations 1470-9503
115 Passive Incidental Alertness—Based Link Visualization For Secure Data Transmission In Manet S.Uma, S.P.Shantharajah, C.Rani Journal of Applied Security Research 1936-1610
116 Prediction Of Diabetes Using Data Mining Techniques V. Mareeswari, Saranya R, Mahalakshmi R, Preethi E Research Journal of Pharmacy and Technology 0974-3618
117 Preventing From Phishing Attack By Implementing Url Pattern Matching Technique In Web U.Rahamathunnisa,N.Manikandan,U.Senthilkumaran And C.Niveditha International Journal of Civil Engineering and Technology 0976-6316
118 Rating Prediction Based On Social Sentiment From Textual Reviews M. Deepa, K. Santhi, M. B. Benjulaanbu Malar,Priya . G, M. Lawanya Shri International Journal of Pure and Applied Mathematics 1311-8080
119 Robust Classification Of Hyperspectral Remote Sensing Images Combined With Multihypothesis Prediction And 3 Dimensional Discrete Wavelet Transform Boggavarapu L N P, M Prabukumar International Journal of Pure and Applied Mathematics, 1311-8080
120 Secret Image Enhanced Sharing Using Visual Cryptography K.Brindha, N.Jeyanthi Cybernetics and Information Technologies 1314-4081
121 Secured Sharing Data In Cloud Using Revocable Storage Identity Based Encryption M.Iyapparaja Journal of Advanced Research and Dynamical & Control Systems 1943-023X
122 Securing Portable Document Format File Using Extended Visual Cryptography To Protect Cloud Data Storage K.Brindha, N.Jeyanthi International Journal of Network Security 1816-3548
123 Security Algorithms In Cloud Computing: A Review, M B Benjula Anbu Malar, Lawanyasri International Journal of Pure and Applied Mathematics 1314-3395
124 Security Solution For Arp Cache Poisoning Attacks In Large Data Center Networks B. Prabadevi, N. Jeyanthi Cybernetics and Information Technologies 1311-9702
125 Smart Cooking Oil Analyzer Using Dielectric Constant Metric Sriniavs Koppu., Rajesh D., Srinivasa Perumal R., Satheesh Kumar S., Rajeev Pankaj Nelapati International Journal of Pure and Applied Mathematics, 1311-8080
126 Software Management Issues In Mobile Application Development Deepa N, M. Senthilkumar, M.K.Nallakaruappn, R.Chandrasekar, B R Kavitha ,Anand Muthukumarappan International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
127 Specification Based Intrusion Detection In Software Defined Networking Nithya S International Journal of Pure and Applied Mathematics 1314-3395
128 An Improved Multiplication Algorithm Subha S International Journal of Pure and Applied Mathematics 1311-8080
129 Stable Multipath Routing Protocol Using Different Route Selection Mechanism For Mobile Ad-Hoc Networks. Alagiri, I., Muthamil Selvan, T., Thanapal, P., & Navaneethan C. Inernational journal of pure and applied mathematics 1314-3395
130 Statistical Feature Ranking And Fuzzy Supervised Learning Approach In Modeling Regional Rainfall Prediction Systems M. Sudha AGRIS on-line Papers in Economics and Informatics 1804-1930
131 Stratified Sampling Method Based Training Pixels Selection For Hyper Spectral Remote Sensing Image Classification M Radhesyam, Vaddi, Prabukumar M International Journal of Pure and Applied Mathematics, 1314-3395
132 Successive Shape Based Image Registration L Agilandeeswari, M Prabukumar, Chinmay, K Muralibabu, Sudharani International Journal of Pure and Applied Mathematics, 1314-3395
133 Survey About Segmentation Feature Extraction And Classification Of Disease Affected Leaf Using Digital Image S.Kalaivani, S.P.Shantharajah Journal of Advanced Research in Dynamical and Control System 1943-023X
134 Techiecardia-A System For Detection And Prediction Of Sudden Cardiac Arrests M.Iyapparaja Journal of Advanced Research and Dynamical & Control Systems 1943-023X
135 Test Case Generation For Embedded System Software Using Uml Interaction Diagram Mani P, Prasanna M Journal of Engineering Science and Technology 1823-4690
136 Swf Scheduled Workflow Integration Profile For The Connectivity Problems In Radiology Workflow Prabadevi. B, International Journal of Intelligent Engineering and Systems 9758585
137 Two Layered Optimized System Using Bluetooth And Hipherlan Interfaced Wireless Sensor Networks M.Iyapparaja Journal of Advanced Research and Dynamical & Control Systems 1943-023X
138 User Web Access Recording And Mining For Business Intelligence Sindhuja, T.,S.S. Manivannan Journal of Advanced Research in Dynamical and Control Systems 1943-023X
139 Weighted Fuzzy Rule Based Sentiment Prediction Analysis On Tweets Syed Muzamil Basha, Yang Zhenning, Dharmendra Singh Rajput, Iyengar N.Ch.S.N And Ronnie D. Caytiles International Journal of Grid and Distributed Computing 2207-6379
140 Cloud Based Automated Framework For Semantic Rich Ontology Construction And Similarity Computation For E-Health Applications T. Muthamilselvan , B. Balamurugan Informatics in Medicine Unlocked 2352-9148
141 Hybrid Approach For Data Classification In E-Health Cloud T. Muthamilselvan , B. Balamurugan International Journal of Intelligent Engineering and Systems 2185-3118
142 Role Of Automation In Waste Management And Recent Trends Raghavendra Desai, M Parimala International Journal of Environment and Waste Management 1478-9868
143 An Optimized Replica Allocation Algorithm Amidst Of Selfish Nodes In Manet Kumar Pj, Ilango P Wireless Personal Communication, Springer 0929-6212
144 Mqrc: Qos Aware Multimedia Data Replication In Cloud Kumar Pj, Ilango P International Journal of BioMedical Engineering and Technology 1752-6418
145 Upper Bound Tighter Item Caps For Fast Frequent Itemsets Mining For Uncertain Data Implemented Using Splay Trees Shashikiran.V And S.Murali International Journal of Pure and Applied Mathematics 1311-8080
146 Energy Efficient Cluster Head Selection Algorithm In Wireless Sensor Networks Using Ea-Fkpso Protocol Meenatchi, S., & Prabu, S. Jour of Adv Research in Dynamical & Control Systems. 1943-023X
147 Test Case Generation For Real Time System Software Using Specification Diagram Prasanna M international journal of intelligent engineering and systems 2185-3118
148 An Intelligent Lung Cancer Diagnosis System Using Cuckoo Search Optimization And Support Vector Machine Classifier Prabukumar M, Agilandeeswari, L. And Ganesan. K Journal of Ambient Intelligence and Humanized Computing 1868-5137
149 Heart Disease Prediction System Using Ann, Rbf And Cbr N. Sivakumar, R.Jothikumar, P.S.Ramesh & Suganthan International Journal of Pure and Applied Mathematics 1314-3395
150 Applying Reversible Data Hiding For Medical Images In Hybrid Domain Using Haar And Modified Histogram Vanmathi Chandrasekaran, Prabu Sevugan, International Journal of Intelligent Engineering and Systems 2185-3118
151 Image Steganography Using Fuzzy Logic And Chaotic For Large Payload And High Imperceptibility Vanmathi C., Prabu S International Journal of Fuzzy Systems 1562-2479
152 A Comparative Study Of Statistical And Rough Computing Models In Predictive Data Analsis A. Anitha, D. P. Acharjya International Journal of Ambient Computing and Intelligence (IJACI) 1941-6237
153 Crop Suitability Prediction In Vellore District Using Rough Set On Fuzzy Approximation Space And Neural Network A. Anitha, D. P. Acharjya Neural Computing and Applications 0941-0643
154 Optimal View Point Selection In Direct Volume Rendering For 3D Visualization Gunasekaran, G., & Venkatesan, M. International Journal of Intelligent Engineering and Systems 2185-3118
155 An Efficient Technique For Three-Dimensional Image Visualization Through Two-Dimensional Images For Medical Data Gunasekaran, G., & Venkatesan, M. Journal of Intelligent Systems 2191-026X
156 A Novel Method For Smart Vehicle Safety K.Uma, Anand Kannan, Journal of Advanced Research in Dynamical and Control Systems 1943-023X
157 Alert On Detection Of Hazardous Changes In Environmental Parameters Using Gsm K.Uma Journal of Advanced Research in Dynamical and Control Systems 1943-023X
158 Smart Vehicle Safety Using Efficient Technique To The Vehicle Traveller’S K.Uma Journal of Advanced Research in Dynamical and Control Systems 1943-023X
159 The Challenges And Issues On Big Data Analytics K.Uma, Anand Kannan Journal of Advanced Research in Dynamical and Control Systems 1943-023X
160 An Analysis Of Decision Theoretic Kernalized Rough Intuitionistic Fuzzy C-Means Ryan Serrao, B.K.Tripathy And A.Jayaram Reddy Advances in Intelligent Systems and Computing 2194-5357
161 Hocs : Host Oscommunication Service Jayakumar Sadhasivam, Senthil Jayavel, Balajee Jayakumar, Shoaib Merchant International Journal of Civil Engineering and Technology 0976-6316
162 A Review On Polygonal Approximation Techniques Of The Digital Planar Curves Kalaivani S International Journal of pure and Applied Mathematics 1311-8080
163 Review Of Gaming And Its Evolution Over Networks Jaya Kumar S International Journal of Civil Engineering and Technology 0976-6316
164 Convoluted Local Binary Pattern Based Grouping Neural Network For Face Emotion Recognition Krithika L B,Lakshmi Priya Gg Journal of Engineering Science and Technology Review 1791-2377
165 A Case Study Of Carry Skip Adder And Design Of Feed-Forward Mechanism To Improve The Speed Of Carry Chain Premson Y, Sakthivel.R,Vivek.T, Vanitha M International Journal of Pure and Applied Mathematics 1311-8080
166 Performance Analysis Of Cloud Computing In Healthcare Systemusing Tandem Queues K.Santhi, R.Saravanan International Journal of Intelligent Engineering and Systems 2185-3118
167 Performance Analysis Of Cloud Computing Bulkservice Using Queueing Models K.Santhi, R.Saravanan International Journal of Applied Engineering Research 1311-8080
168 Performance Analysis Of Cloud Computing Using Batch Queueing Models In Healthcare Systems K.Santhi, R.Saravanan Research Journal of Pharmacy and Technology 0974-360X
169 Clustering Algorithm In Possibilistic Exponential Fuzzy C-Mean Segmenting Medical Images Chiranji Lal Chowdhary JOURNAL OF BIOMIMETICS, BIOMATERIALS AND BIOMEDICAL ENGINEERING 2296-9845
170 Modelling The H1Ni Influenza Using Mathematical And Neural Network Approaches Daphne Lopez, Gunasekaran M, Jagan Mohan Biomedical Research 0970-938X
171 Parametric Model To Predict H1N1 Influenza In Vellore District, Tamil Nadu, India Daphne Lopez, Gunasekaran Monoharan Handbook of Statistics 1992-8408
172 A Survey On Big Data Arcitectures And Machine Learning Algorithms In Healthcare Gunasekaran M,Daphne Lopez International Journal of Biomedical Engineering and Technology 1752-6418
173 A Gaussian Process Based Big Data Processing Framework In Cluster Computing Environment Gunasekaran M,Daphne Lopez Cluster Computing 1386-7857
174 Disease Surveillance System For Big Climate Data Processing And Dengue Transmission Gunasekaran M,Daphne Lopez International Journal of Amient Computing and Intelligence 1941-6237
175 Document Level Prioritization And Identificataion Of Dominant Multi-Word Named Products In Customer Reviews Sivashankar,Valarmathi Aab Journal of Science & Engineering 2191-4281
176 A Heuristic Approach To Machine-Part Cell Formation In The Presence Of Alternative Process Plans Sowmiya N, Srinivasa Gupta, Valarmathi, Poonambalam International Journal of Advanced Manufacturing Technology 14333015
177 A Review Of Categorical Data Clustering Methodologies Based On Recent Studies Sowmiya,Valarmathi IIOAB Journal 9763104
178 Brain Tumour Segmentation From Mri Using Superpixels Based Spectral Clustering. Angulakshmi, M., Gg Lakshmi Priya Journal of King Saud University-Computer and Information Sciences 1319-1578
179 Procedural Restoration Of Texture And Restruing Geometry From Façade Image Divya Udayan IEEE access 21693536
180 A Study On Tailor-Made Security Schemes To Defend Iots M N Rajaprabha, P Jayalakshmi, R Vijay Anand International Journal of Advance Research in Science and Engineering 2319-8354
181 Bike Sharing Prediction Using Deep Neural Networks Thirumalai, Chandrasegar And Koppuravuri, Ravisankar. JOIV: International Journal on Informatics Visualization 2549-9610
182 Comparative Study On Various Graph Algorithms, . 414-419 Angulakshmi., Rathi,R., Sudha, S., Brindha,K., International journal of advance research in science and engineering 2319-8346
183 Honey Bee Foreaging Algorithm For Load Balancing In Cloud Computing Optimization Sudha, S., Brindha,K., Rathi,R.,Angulakshmi., Jothi.,Thirani., International Journal of Engineering Science and Computing 2321-3361
184 A Case Study On Cognitively Improvised Min-Max Algorithm For Distributed Computer Systems, Sudha, S., Brindha,K., Rathi,R.,Nishanth,A., Vivek,P., International Journal for Scientific Research & Development 906-911
185 A Case Study On Performance Analysis Of Routing Protocols In Mobile Adhoc Netwoks Nallakaruppan.M.K, N. Deepa,Pranava Kumar.R, Sudhanshu Gera,Arpit Chikara International Journal for Science and Advance Research in Technology 2395-1052
186 Analysis Of Agricultural Data Using Big Data Analytics Ravishankar K, Sidhardha K, Prabadevi B Journal of chemical and pharmaceutical Sciences 0974-2115
187 A Data Security Self-Attribute System In Cloud Computing and Communication Engineering Kumaresan P Dhanesh Lokhande International Journal of Innovative Research in Computer 2320-9798
188 A Modified Synthetic Division Algorithm S Subha International Journal of Computational and Applied Mathematics 2349-5103
189 A Novel Based Ranking Radically Influential Web Environment Users, M B Benjula Anbu Malar International Journal of Advance Research in Science and Engineering 2319-8354
190 A Novel Method Of Real Time City Scale Taxi Trip Distribution M B Benjula Anbu Malar International Journal of Advance Research in Science and Engineering 2319-8354
191 A Study On Travel Recommendation System Angulakshmi , Rathi.R , Dr.Sudha Senthilkumar , Dr.K.Brindha , Rajat Tandon International Journal of Engineering Science and Computing, December 2321 3361
192 A Survey On Trust Models In Cloud Computing Kumaresan P Ramya Govindaraj Kavitha B R International Journal of Advance research in Science and Engineering 2319-8354
193 A Synthetic Division Algorithm With Positive Remainder S Subha International Journal of Advanced Science and Research 2455-4227
194 Agriculture E-Commerce Website, M B Benjula Anbu Malar International Journal of Advance Research in Science and Engineering , 2319-8354
195 Agronomic Disaster Management Using Artificial Intelligence – A Case Study M. Sudha International Journal of Computer Science and Business Intelligence 2364-4168
196 An Efficient And Secured Data Storage Scheme In Cloud Computing, M B Benjula Anbu Malar International Journal of Advance Research in Science and Engineering 2319-8354
197 Applications Of Iot In Green Environment Kumaresan P, Darshan K N, Kavitha B R, Ramya Govindaraj International Journal of Advance research in Science and Engineering 2319-8354
198 Big Data In Healthcare: A Review Magesh G, P.Swarnalatha Emerging trends in Computer Engineering and Research, IIOAB Journal 0976-3104
199 Cloud With Iot In Smart Parking Sujatha R, Rahul Gorai, Harshita Wadhwa, Shivani Tripathi International Journal of Innovative Research in Management, Engineering and Technology 2456-0448
200 Computational Intelligence Based Sports Success Prediction System Using Functional Pattern Growth Tree – A Case Study M. Sudha International Journal of Computational Intelligence Research 0974-1259
201 Content Based Image Retrieval Using Hadoop And Hipi Kumaresan P, Kavitha B R, Ramya Govindaraj International Journal of Advance research in Science and Engineering 2319-8354
202 Detection Of Phishing Pages Over The Internet Using Anti-Phishing Techniques P Jayalakshmi, M N Rajaprabha, R Vijay Anand International Journal of Advance Research in Science and Engineering 2319-8354
203 Expelling Undesired Targets From An Image Exploiting Surface Synthesis And Dispersion and Communication Engineering Based Technique Kumaresan P, Pratik Bhosale International Journal of Innovative Research in Computer 2320-9798
204 Framework For Reliable Re Encryption In Cloud Magesh G, P.Swarnalatha Journal of Chemical and Pharmaceutical Sciences 0974-2115
205 Fuzzy-Set Based Privacy Preserving Access Control Techniques In Cloud (Fb-Ppac) Brindha.K, Sudha.S ,Sushmitakumari International Journal of Artificial Intelligence 2252-8938
206 Gdfs Based Data Encryption Technique In Cloud Computing Environments M B Benjula Anbu Malar International Journal of Advance Research in Science and Engineering 2319-8354
207 Heart Disease Prediction Using Data Mining Techniques Nallakaruppan.M.K, N. Deepa, Moin Ahmed, Tanuja, Ajith Kumar,Pranava Kumar.R International Journal of Engineering Science and Computing 2321-3361
208 An Improved Tumour Identification With Gabor Wavelet Segmentation Ciranji Lal Choudahary Research 2321 3361
209 Inquiry Based E-Learning System Using Personalized Knowledge Search P Jayalakshmi, M N Rajaprabha, R Vijay Anand And K Venkatesan International Journal of Advance Research in Science and Engineering 2319-8354
210 Instant Medical Care And Drug Suggestion Service Using Data Mining And Machine Learning Based Intelligent Self-Diagnosis Medical System M. Sudha International Journal of Advanced Life Sciences 2277-758X
211 Iris Recognition System Magesh G, Ravee Sundararajan International Research Journal of Engineering and Technology (IRJET) 2395-0056
212 Leaf Disease Detection Using Image Processing Sujatha, R, Y Sravan Kumar And Garine Uma Akhil Journal of Chemical and Pharmaceutical Sciences 0974-2115
213 Precision Agriculture Using Real Time Environmental Parameters And Internet Of Things and Communication Engineering Kumaresan P Ketan Prakash Kandagale International Journal of Innovative Research in Computer 2320-9798
214 Privacy Preserving And Secret Based Navigation Scheme In Vehicular Adhocnetwork : A Case Study M B Benjula Anbu Malar International Journal of Advance Research in Science and Engineering , 2319-8354
215 Reconfigurable Interpolation Filter Architecture Design Satheesh Kumar S, Venugopal P, Srinivas Koppu, Rajeev Pankaj N, Rajesh Kaluri, Madhusudhana Rao International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 2278-8875
216 Reconstruction Of Per Packet Routing Path M B Benjula Anbu Malar International Journal of Advance Research in Science and Engineering 2319-8354
217 Smarter Way To Access Multiple Mobile Cloud Applications Without Interoperability Issues. Thanapal, P., Marimuthu, K., Rajkumar, S., & Niranchana, R. I.J. Wireless and Microwave Technologies 2076-1449
218 Temperature Controlled Dc Fan Sudha, S., Brindha,K., Rathi,R.,Hardi,S., Kataria,S., International journal of advance research in science and engineering 498-506
219 User Authentication Framework With Improved Performance In Multi-Cloud Environment R. Thandeeswaran, M A Saleem Durai American Journal of Computer Science and Information Technology 2349-3917
220 Validation Of Automated Test Cases With Specification Path Mani P, Prasanna M Journal of statistics and Management Systems 0972-0510
221 Weather Modeling Using Data-Driven Adaptive Rough-Neuro-Fuzzy Approach M. Sudha Current World Environment 0973-4929
222 Assessment Of Unfair User Rating In Multidisciplinary System V.Mareeswari, Bala Prasanth P Research Journal of Pharmaceutical, Biological and Chemical Sciences 0975-8585
223 Pattern Recognition Using Pca Algorithms Uma Maheswari G, Ephzibah E P, Mareeswari V Research Journal of Pharmaceutical, Biological and Chemical Sciences 0975-8585
224 Fog Computing – Enhancing The Maximum Energy Consumption Of Data Servers Priyanka C, Prabadevi, Jeyanthi N IDL – International Digital Library Of Technology & Research 2349-302X
225 Anomaly Based Intrusion Detection Methods In Network Infrastructure – A Survey Dhanabal L, S.P.Shantharajah, T. Padma Asian Journal of Research in Social Sciences and Humanities 2249-7315
226 Survey Of Image Segmentation Algorithm For Medical Images: Challenges And Methodologies P Chinmayi, M Prabukumar, L Agilandeeswari RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES 0975-8585
227 Data Replication In Current Generation Computing Environment Kumar Pj, Ilango P International Journal of Engineering trends and Technology, 2231-5381
228 Data Replication In Conventional Computing Environment Kumar Pj, Ilango P International Journal of Computer Trends and Technology 2231-2803.
229 Case Study- Machine Learning Based On Scenario Analysis Prabadevi. B, Vanmathi. C, Krithika. L. B, Sudha. S, Vivek Akabote International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2456-3307
230 Precise Investigations Of Software Quality Alice Auxilia .L, Asha .N, Vanmathi .C International Journal of Engineering Science and Computing, 2321-3361
231 Intrusion Detection System Based On Artificial Intelligence
  1. Anitha,Sv Revathi, S Jeevanantham,
  2. Eliza Godwin
International Journal of Technology 2231-3915
232 Mooc : A Framework For Learners Using Learning Style Jayakumar Sadhasivam And Ramesh Babu Kalivaradhan International Education and Research Journal 2454-9916
233 Review On Sentiment Analysis A Learners’ Opinion Jayakumar Sadhasivam And Ramesh Babu Kalivaradhan IIOAB – Emerging trends in Computer Engineering and Research 0976-3104
234 Comparative Study On Web Based Software Project Management Tools Jayakumar Sadhasivam International Journal of Modern Computer Science 2320-7868
235 Data Load Balancing In A Big Data Heterogeneous Environment P Jayalakshmi, M N Rajaprabha, R Vijay Anand And K Venkatesan International Journal of Advance Research in Science and Engineering 2319-8354
236 I Voting P Jayalakshmi, M N Rajaprabha, R Vijay Anand And K Venkatesan International Journal of Advance Research in Science and Engineering 2319-8354
237 A Novel Method For Key Aggregation On Data Sharing In Cloud Stoeage Environment K.Shanthi, M.Deepa, M.Lawanya Shri International Journal of Advance Research in Science and Engineering 2319-8354
238 Implementation Of Morphological Image Processing Algorithm Using Mammograms Tk Das, Cl Chowdhary journal of chemical and proceessing 9742-115
239 A Review On Internet Of Things And Its Applications In Healthcare Chiranji Lal Chowdhary Journal of Chemical and Pharmaceutic al Sciences 0974-2115
2016
S.NO.PUBLICATION DETAILS (INCL COMPLETE BIBLIOGRAPHY)
1.

Raj, E. D., & Babu, L. D. (2016). A fuzzy adaptive resonance theory inspired overlapping

community detection method for online social networks.

Knowledge-Based Systems, 113, 75-87.

2.

Vijayakumar, P., Chang, V., Deborah, L. J., Balusamy, B., & Shynu, P. G. (2016).

Computationally efficient privacy preserving

anonymous mutual and batch authentication schemes for vehicular ad hoc networks.

Future Generation Computer Systems.

3.

Loganathan, A., & Kaliyaperumal, G. (2016). An adaptive HVS based video watermarking

scheme for multiple watermarks using BAM neural networks and fuzzy inference system.

Expert Systems with Applications, 63, 412-434.

4.

PVSSR, C. M. (2016). Dimensionality reduced local directional pattern (DR-LDP) for face recognition.

Expert Systems with Applications, 63, 66-73.

5.

Boobalan, M. P., Lopez, D., & Gao, X. Z. (2016). Graph clustering using k-Neighbourhood

Attribute Structural similarity.

Applied Soft Computing, 47, 216-223.

6.

Deepa, N., & Ganesan, K. (2016). Multi-class classification using hybrid soft decision model

for agriculture crop selection.

Neural Computing and Applications, 1-14.

7.

Lopez, D., & Sekaran, G. (2016). Climate change and disease dynamics-a big data perspective.

International Journal of Infectious Diseases, 45(1):23-24.

8.

Singh, P. K., Kumar, C. A., & Li, J. (2016). Knowledge representation using interval-valued

fuzzy formal concept lattice.

Soft Computing., 20(4), 1485-1502.

9.

Agilandeeswari, L., & Ganesan, K. (2016). A bi-directional associative memory based multiple

image watermarking on cover video.

Multimedia Tools and Applications, 75(12), 7211.

10.

Agilandeeswari, L., & Ganesan, K. (2016). A robust color video watermarking scheme based on hybrid embedding techniques.

Multimedia Tools Appl., 75(14), 8745-8780.

11.

Ahamed, B. B., & Ramkumar, T. (2016). An intelligent web search framework for performing efficient retrieval of data.

Computers & Electrical Engineering, 56, 289-299.

12.

Balakrishnan, S. M., & Sangaiah, A. K. (2016). Integrated QoUE and QoS approach for optimal service

composition selection in internet of services (IoS).

Multimedia Tools and Applications, 1-28.

13.

Sujatha, R., & Ezhilmaran, D. (2016). A new efficient SIF-based FCIL (SIF–FCIL) mining algorithm in

predicting the crime locations.

Journal of Experimental & Theoretical Artificial Intelligence, 28(3), 561-579.

14.

Pounambal, M., & Krishna, P. V. (2016). Efficient channel assignment method for multimedia

traffic in wireless mesh networks.

International Journal of Communication Systems, 29(5), 929-941.

15.

Singh, P. K., Aswani Kumar, C., & Gani, A. (2016). A comprehensive survey on formal concept

analysis, its research trends and applications. International Journal of Applied Mathematics and

Computer Science, 26(2), 495-516.

16.

Tripathy, A. K., Chinara, S., & Sarkar, M. (2016). An application of wireless brain–computer interface

for drowsiness detection.

Biocybernetics and Biomedical Engineering, 36(1), 276-284.

17.

Navaneethan, C., & Prabha, K. H. (2016). Optimizing Network Layer with Adaptive Modulation for

Time Varying Channel.

Wireless Personal Communications, 90(2), 1003-1019.

18.

Balasubramanian, V., Nagarajan, S. G., & Veerappagoundar, P. (2016). Mahalanobis distance-the

ultimate measure for sentiment analysis.

Int. Arab J. Inf. Technol., 13(2), 252-257.

19.

Nalinipriya, G., Maheswari, K. G., Balusamy, B., Kotteswari, K., & Kumar Sangaiah, A. (2016).

Availability modeling for multi-tier cloud environment. Intelligent Automation & Soft Computing, 1-8.

20.

Kumar, C. A., Mouliswaran, S. C., Li, J. H., & Chandrasekar, C. (2016). Role based access control design

using triadic concept analysis.

Journal of Central South University, 23(12), 3183-3191.

21.

Swathi, G., & Saravanan, R. (2016). A Framework for Efficient Routing in MANET using Index Routing

Tables-based Algorithms.

Defence Science Journal, 66(6), 568.

22.

Deepa, N., & Ganesan, K. (2016). Mahalanobis Taguchi system based criteria selection tool for

agriculture crops.

Sādhanā, 41(12), 1407-1414.

23.

Leo Dencelin X, Ramkumar, T. (2016). Analysis of multilayer perceptron machine learning

approach in classifying protein secondary structures.

Biomedical Research. Special Issue- Computational Life Science and Smarter Technological

Advancement, August 2016, S166-S173.

24.

Rajavel, D., & Shantharajah, S. P. (2016). Scrambling algorithm for encryption of text using

cube rotation artificial intelligence technique.

Biomedical Research. Special Issue-Computational Life Science and Smarter Technological

Advancement, August 2016, S251-S256.

25.

Das, T. K., & Nahar, K. M. (2016). A Voice Identification System using Hidden Markov Model.

Indian Journal of Science and Technology, 9(4).

26.

Manikandan, N., & Subha, S. (2016). Software Design Challenges in Time Series Prediction Systems

Using Parallel Implementation of Artificial Neural Networks.

The Scientific World Journal, 2016.

27.Subha, S. (2016). A Power Saving Set Associative Cache Model. Indian Journal of Science and Technology, 9(6).
28.

Praveen Kumar Reddy M. & M. Rajasekhara Babu (2016). A scalable approach for improving dynamic

multithreaded applications on NUMA based architectures.

ARPN Journal of Engineering and Applied Sciences, 11(3), 1494-1503.

29.

Narayanan, M., & Cherukuri, A. K. (2016). A study and analysis of recommendation systems

for location-based social network (LBSN) with big data.

IIMB Management Review, 28(1), 25-30.

30.

Jayanthi R, Siva Rama Krishnan S, Rama Prabha K P., (2016). Spoofing Assault

Identification and Limiting Several Adversaries in Wireless Networks.

International Journal of Applied Engineering Research, 11(1), 286-289.

31.

Shynu, P. G., & Singh, K. J. (2016). A Comprehensive Survey and Analysis on Access

Control Schemes in Cloud Environment.

Cybernetics and Information Technologies, 16(1), 19-38.

32.

Subha, S. (2016). A literature survey on cpu cache reconfiguration. ARPN Journal of

Engineering and Applied Sciences. 11(5), 3008-3012.

33.

Prasanna, S., & Ezhilmaran, D. (2016). A Survey of Stock Price Prediction & Estimation

Using Data Mining Techniques.

International Journal of Applied Engineering Research, 11(6), 4097-4099.

34.

Vijayan, R., & Jeyanthi, N. (2016). A survey of trust management in mobile ad hoc networks.

International Journal of Applied Engineering Research, 11(4), 2833-2838.

35.

Thanapal P., Saleem Durai M A., (2016). A survey on application partitioning for mobile cloud computing.

International Journal of Pharmacy and Technology. 8(1), 10574-10589.

36.

Suganya P, (2016). A survey on various security measures used in cloud.

International Journal of Pharmacy and Technology. 8(1), 3644-3647

37.

Prathik, A., Uma, K., & Anuradha, J. (2016). An Overview of application of Graph theory.

International Journal of ChemTech Research, 9(2), 242-248.

38.

Anusha, K., & Sathiyamoorthy, E. (2016). Comparative study for feature selection

algorithms in intrusion detection system.

Automatic Control and Computer Sciences, 50(1), 1-9.

39.

Seetha R & Saravanan R. (2016). Digital Signature Schemes for group communication: A Survey.

International Journal of Applied Engineering Research, 11(6), 4416-4422.

40.

Rathi R., (2016). Hybridization of soft computing framework – a survey.

International Journal of Pharmacy & Technology, 8(1), 3594-3602.

41.

Das, T. K. (2016). Intelligent techniques in decision making: A survey.

Indian Journal of Science and Technology, 9(12).

42.

Anand, R. V., & Dinakaran, M. (2016). Popular Agile Methods in Software Development:

Review and Analysis. International Journal of Applied Engineering Research, 11(5), 3433-3437.

43.

Fiaz, A. S., Asha, N., Sumathi, D., & Navaz, A. S. (2016). Data Visualization: Enhancing

Big Data More Adaptable and Valuable.

International Journal of Applied Engineering Research, 11(4), 2801-2804.

44.

Thandeeswaran, R., & Durai, M. S. (2016). Wide-ranging Survey on Authentication Mechanisms.

International Journal of Applied Engineering Research, 11(6), 4114-4117.

45.

Sharon Moses J., Babu, L. D. (2016). A locality centred recommendation system combining

CNM clustering technique with fuzzy preference tree-based ranking algorithm.

International Journal of Business Intelligence and Data Mining, 11(1), 63-84.

46.

Siva Rama Krishnan S., karthik Balasubramanian, Arun Kumar T., Challenges in Data Aggregation

in Wireless Sensor Network – A Review. International Journal of Applied Engineering Research, 11(7), 5342-5345.

47.

Panneer, P., & Tripathy, B. K. (2016). Covering Rough Clustering Approach for Unstructured Activity Analysis.

International Journal of Intelligent Information Technologies (IJIIT), 12(2), 1-11.

48.

Kumar, K. S., & Deepa, K. (2016). Medical Query Expansion using UMLS. Indian Journal

of Science and Technology, 9(14).

49.

Bhushan, S. B. Reddy. C. H., Pradeep (2016). A network qos aware service ranking using

hybrid ahp-promethee

method in multi-cloud domain. International Journal of Engineering Research in Africa, 24.

50.

Senthil Kumar P., Daphne Lopez., (2016). A Review on Feature Selection Methods for High

Dimensional Data.

International Journal of Engineering and Technology, 8(2), 669-672.

51.

Hemalatha S., Margret Anouncia S., (2016). A Review on Human Identification Systems using

Biometrics Fingerprint Matching,

Internation Journal of Pharmacy and Technolog, 8(1), 3604-3610.

52.

Pushparaj R., Dinakaran M., (2016). An Energy aware routing for Manets using Dynamic power

threshold with load balancing.

World Applied Sciences Journal, 34(1), 120-127.

53.

SenthilKumar M, Ilango P., (2016). Analysis of DNA data using Hadoop Distributed File System.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(3).

54.

Dharinya, S. (2016). Analysis of document summarization and word classification in a smart

environment.

Indian Journal of Science and Technology, 9(19).

55.

Sangamithra A., Vani. M.P., (2016). Analysis of Network Security Spasms and Circumvention.

International Journal of Engineering and Technology, 8(2), 604-608.

56.

Thippa Reddy, G., & Khare, N. (2016). FFBAT-Optimized Rule Based Fuzzy Logic Classifier

for Diabetes.

In International Journal of Engineering Research in Africa (Vol. 24, pp. 137-152). Trans Tech Publications.

57.

Manogaran, G., Thota, C., & Kumar, M. V. (2016). Meta Cloud Data Storage architecture for

Big Data security

in cloud computing. Procedia Computer Science, 87, 128-133.

58.

Suganya P., Pradeep Reddy Ch., (2016). Potential threats caused by malicious nodes and various counter

measures available in MANET: A Survey. Research Journal of Pharmaceutical, Biological and

Chemical Sciences, 7(3), 1012-1016.

59.

Senthilkumar, M. N. M., & Senthilkumaran, U. (2016). Review of asymmetric key cryptography in wireless

sensor networks. International Journal of Engineering and Technology, 8(2), 859-862.

60.

Gunasekaran G., Venkatesan M., (2016). Review on Visualization Techniques for Medical Data and its Application.

Research Journal of Pharmaceutical, Biological and Chemical Science, 7(3), 169-173.

61.

Gagneja, K., & Singh, J. (2016). Survey and analysis of security issues on RSA algorithm for digital video data.

Journal of Discrete Mathematical Sciences and Cryptography, 19(1), 39-55.

62.

Rajesh kaluri, (2016). A Comparative study on image segmentation techniques. International Journal of Pharmacy

and Technology, 8(2), 12712-12717.

63.

Srinivas Koppu, Madhu Viswanathan, (2016). A Novel Chaotic Image Encryption System for color images based

Arnold Cat Map and Efficient Pixel Shuffling. International Journal of Pharmacy and Technology, 8(2), 13353-13361.

64.

Subha, S., & Sakthivel, R. (2016). A Power Saving Multiplication Algorithm. International Journal of Applied

Engineering Research, 11(9), 6200-6203.

65.

Manikandan N., Subha S., (2016). A Review on evaluating the usage of multiple cores effectively in personal

computer based applications. International Journal of Pharmacy & Technology, 8(2), 3916-3927.

66.

Dinakaran M., (2016). A Review on requirement of self sustainable natural farming and

application of information

and communication technology (Agro Informatics) for agriculture in India. International Journal

of Pharmacy & Technology, 8(2), 3944-3956.

67.

Nagaraja G., Pradeep Reddy Ch., (2016). A Survey on group key management frameworks for secure group

communication in mobile Ad hoc Networks. International Journal of Pharmacy & Technology, 8(2), 4121-4129.

68.

Srinivas Koppu, Madhu Viswanatham V., (2016). A Survey on security issues: Digital Images. International Journal

of Pharmacy & Technology, 8(2), 13420-13427.

69.

Santhi K., Saravanan R., (2016). A Survey on queueing models for cloud computing. International Journal of Pharmacy

& Technology, 8(2), 3964-3977.

70.

Manivannan S.S., (2016). A Systematic survey of routing attacks and counter measures in wireless networks.

International Journal of Pharmacy & Technology, 8(2), 3957-3963.

71.

Agilandeeswari, L., & Ganesan, K. (2016). An efficient hilbert and integer wavelet transform

based video watermarking.

Journal of Engineering Science and Technology, 11(3), 327-345.

72.

Kuruva Lakshmanna, Rajesh Kaluri, Thippa Reddy G., Nagaraja G., Dhenesh V Subramanian, (2016).

An enhanced algorithm for frequent pattern mining from Biological sequences. International

Journal of Pharmacy & Technology, 8(2), 12776-12784.

73.

Subha, S. (2016). An Improved Non-Restoring Algorithm. International Journal of Applied

Engineering Research, 11(8), 5452-5454.

74.

Rajesh Kaluri, Pradeep Reddy Ch., (2016). An overview of Human Gesture Recognition.

International Journal of Pharmacy & Technology, 8(2), 12037-12045.

75.

Arivu Selvan K., Sathiyamoorthy E., (2016). Automated Retrieval of medical images based on

distinct features using Fuzzy Logic approach.

International Journal of Pharmacy & Technology, 8(2), 13230-13239.

76.

Rahamathunnisa U., Saravanan R., (2016). Classificationn of Noise in Video – A Review.

International Journal of Pharmacy & Technology, 8(2), 3928-3932.

77.

Kumar, N. S., & Muruganantham, D. (2016). Disambiguating the Twitter Stream Entities and Enhancing

the Search Operation Using DBpedia Ontology: Named Entity Disambiguation for Twitter Streams.

International Journal of Information Technology and Web Engineering (IJITWE), 11(2), 51-62.

78.

Deepa M., Santhi K., Benjula Anbu Malar M.B., Lawanya Shri M., (2016).

Distributed Detection of malicious

nodes in wireless sensor networks under Byzantine Attack. International Journal of Pharmacy

& Technology, 8(2), 13546-13552.

79.

Lawanya Shri M., Benjula Anbu Malar M.B., Santhi K., Deepa M., (2016). E-Learning system

with Hierarchical

attribute set based encryption access control in cloud. International Journal of Pharmacy &

Technology, 8(2), 12785-12792.

80.

Mohankumar, S., & Balasubramanian, V. (2016). Identifying Effective Features and Classifiers for Short

Term Rainfall Forecast Using Rough Sets Maximum Frequency Weighted Feature Reduction Technique.

CIT. Journal of Computing and Information Technology, 24(2), 181-194.

  
81.

Dharmendra Singh Rajput, Praveen Kumar Reddy M, Shrivastava D.P., (2016).

Mining Frequent Termset for

Web document data using Genetic Algorithm. International Journal of

Pharmacy & Technology, 8(2), 4038-4054.

82.

Mohankumar P., Balamurugan, (2016). Optimality analysis of query processing using various

caching approaches –

A Review. International Journal of Pharmacy & Technology, 8(2), 3739-3751.

83.

Manivannan, S. S., & Sathiyamoorthy, E. (2016). Preventing health care web applications from

session hijack attacks

using session key authentication and distributed session id. ARPN Journal of Engineering and

Applied Sciences,11(13), 8257-8263.

84.

Perumal, V. (2016). Randomized Symmetric Crypto Spatial Fusion Steganographic System.

Journal of ICT Research and Applications, 10(1), 15-28.

85.

Durai Raj Vincent P M., (2016). RSA Encryption Algorithm – A Survey on its various forms and

its security level.

International Journal of Pharmacy & Technology, 8(2), 12230-12240.

86.

Durai Raj Vincent P M., (2016). Secured Healthcare Date exchange using proposed security scheme.

International Journal of Pharmacy & Technology, 8(2), 12144-12154.

87.

Prabukumar, M., & Ray, B. K. (2016). Semi-circular angle-based one bit circle generation algorithm

on a hexagonal grid.

International Journal of Computer Aided Engineering and Technology, 8(3), 199-216.

88.

Krithika, L. B. Lakshmi Priya G G. (2016). Student Emotion Recognition System (SERS)

for E-Learning

Improvement Based on Learner Concentration Metric. Procedia Computer Science, 85, 767-776.

89.

Kaushik Roy, Ramya G., (2016). Survey on mobile vulnerability issues and basic security policies.

International Journal of Pharmacy & Technology, 8(2), 3823-3833.

90.

Hemalatha, S., & Anouncia, S. M. (2016). A Computational Model for Texture

Analysis in Images with Fractional Differential Filter for Texture Detection. International

Journal of Ambient Computing and Intelligence, 7(2).

91.

Chowdhary, C. L., & Acharjya, D. P. (2016). A hybrid scheme for breast cancer detection using

intuitionistic fuzzy rough set technique.

International Journal of Healthcare Information Systems and Informatics, 11(2).

92.

Senthilkumar, M., & Ilango, P. (2016). A Survey on Job Scheduling in Big Data. Cybernetics

and Information Technologies, 16(3), 35-51.

93.

Malar, M. B. A., Shri, M. L., Deepa, M., & Santhi, K. (2016). Approach for Secure Authorized

Deduplication using Hybrid Cloud. International Journal of Applied Engineering Research,

11(15), 8480-8482.

94.

Ramachandran, P., & Dinakaran, M. (2016). Signal Strength and Residual Power Based Optimum

Transmission Power Routing for Mobile Ad hoc Networks. Procedia Computer Science, 92, 168-174.

95.

Parimala, M., & Lopez, D. (2016). Spatio-temporal graph clustering algorithm based on attribute

and structural similarity.

International Journal of Knowledge-based and Intelligent Engineering Systems, 20(3), 149-160.

96.

Das, A. J., Wahi, A., Kothari, I., & Raskar, R. (2016). Ultra-portable, wireless smartphone

spectrometer for rapid,

non-destructive testing of fruit ripeness. Scientific reports, 6, 32504.

97.

Anusha, K., & Sathiyamoorthy, E. (2016). OMAMIDS: Ontology Based Multi-Agent Model

Intrusion Detection System for Detecting

Web Service Attacks. Journal of Applied Security Research, 11(4), 489-508.

98.

Prabhavathy P, Tripathy BK, Venkatesan Meenakshi Sundaram, (2016). Covering based

refined Rough K-Means Algorithm,

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(5), 2142-2151.

99.

Senthil Kumar N, Kauser Ahamed P. (2016). Pervasive utilization of PSO techniques over

twitter data streams.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(5), 796-803.

100.

Anitha, A., & Acharjya, D. P. (2016). Customer Choice of Super Markets using Fuzzy

Rough Set on Two Universal Sets

and Radial Basis Function Neural Network. International Journal of Intelligent Information

Technologies (IJIIT), 12(3), 20-37.

101.

Vincent, P. D. R., & Sathiyamoorthy, E. (2016). A novel and efficient public key encryption

algorithm. International

Journal of Information and communication technology, 9(2), 199-211.

102.

Shivhare, R., & Kumar, C. A. (2016). On the cognitive process of abstraction. Procedia

Computer Science, 89, 243-252.

103.

Ramu, S. P., & Sevugan, P. (2016), An approach for efficient pre-processing of multi-temporal

hyperspectral satellite

imagery., The IIOAB Journal, 7(5), 12-20.

104.

Kumaran U., Neelu Khare, (2016). An Empirical study of security in Text mining for large

datasets. International

Journal of Control theory and applications, 9(6), 2737-2743.

105.

Prasanna, S., & Ezhilmaran, D. (2016). Association rule mining using enhanced apriori with

modified GA for stock

prediction. International Journal of Data Mining, Modelling and Management, 8(2), 195-207.

106.

Mani P., Prasanna M., (2016). A Study on functional specification based test case generation

for real-time systems.

International Journal of Engineering and Technology, 8(4), 1801-1806.

107.

Lakshmanna, K., & Khare, N. (2016). Constraint-based measures for DNA sequence mining

using group search

optimization algorithm. International Journal of Intelligent Engineering and systems, 9(3), 91-100.

108.

Radhakrishnan, S., & Devarasan, E. (2016). Computing the Probability on Socio Economic

Factors to Predict the Crime

Locations by Means of Joint Probability Based AMABC-FCIL. International Journal of Intelligent

Engineering & Systems, 9(3), 80-90.

109.

Bhushan, S. B., & Reddy, P. (2016). BB-LBA: biogeography-based load balancing algorithm in multi

cloud domain.

International Journal of Internet Protocol Technology, 9(2-3), 100-106.

110.

Balakrishnan, S. M., & Sangaiah, A. K. (2016). Aspect-oriented middleware framework for resolving

service discovery

issues in Internet of Things. International Journal of Internet Protocol Technology, 9(2-3), 62-78.

111.

Arivuselvan K., Sathiyamoorthy E., (2016). Analysing EEG sub-bands to distinguish between

individuals with neural

disorder using Back propagation neural network. International Journal of Pharma and

Bio sciences, 7(4), 80-87.

112.

Kumar, S., Saravanakumar, K., & Deepa, K. (2016). On Privacy and Security in Social Media–

A Comprehensive Study.

Procedia Computer Science, 78, 114-119.

113.

Pranusha Soma, Arivuselvan K., (2016). Automated Recognition of Emotions From Facial

Expressions using Back

propagation Neural networks. Research Journal of Pharmaceutical, Biological and Chemical Sciences,

7(4), 1895-1902.

114.

Magesh G., (2016). A review paper: Student attitude towards computer science. International

Journal of Pharmacy &

Technology, 8(3), 4653-4666.

115.

Angulakshmi M., (2016). Big Data Analytics – A Review. International Journal of Pharmacy &

Technology, 8(3), 4634-4639.

116.

Sudha Senthilkumar, Madhu Viswanatham, (2016). Survey on Data Access Control techniques in

cloud computing.

International Journal of Pharmacy & Technology, 8(3), 17442-17461.

117.

Kavitha G., (2016). Factors associated with improving quality of healthcare services. International

Journal of Pharmacy

& Technology, 8(3), 4844-4856.

118.

Praveen Kumar Reddy M., Nagaraja G., (2016). Creating trusted learning by using QR based

U learning System.

International Journal of Pharmacy & Technology, 8(3), 18268-18272.

119.

Rajeswari C., (2016). Performance analysis of sports persons using data mining based ranking

and classification

methods. International Journal of Pharmacy & Technology, 8(3), 18070-18097.

120.

Sree Dharinya S., Kirubathangam R., (2016). Analyzing a selection strategy for data De-duplication in large datasets.

International Journal of Pharmacy & Technology, 8(3), 16590-16595.

121.

Chandrasegar Thirumalai, (2016). Physicians drug encoding system using an efficient and secured linear public key

cryptosystem (ESLPKC). International Journal of Pharmacy & Technology, 8(3), 16296-16303.

122.

Prabhu J., (2016). A survey on slim process with developers in agile software. International Journal of

Pharmacy & Technology, 8(3), 15558-15565.

123.

Asha N., (2016). Customer segregation in banking organisation using knowledge management. International

Journal of Pharmacy & Technology, 8(3), 17645-17649.

124.

Vijay Anand R., Dinakaran M., (2016). Automation Framework to perform measure actions from NBI.

International Journal of Pharmacy & Technology, 8(3), 16261-16276.

125.

Chiranji Lal Chowdhary, (2016). A review of feature extraction application areas in medical imaging.

International Journal of Pharmacy & Technology, 8(3), 4501-4509.

126.

Navaneethan C., (2016). A Literature Review on energy saving along with precautions in wireless sensor network.

International Journal of Pharmacy & Technology, 8(3), 15408-15424.

127.

Sumangali K., (2016). Security in sensor networks and necessity for self destruction. International Journal

of Pharmacy & Technology, 8(3), 15566-15575.

128.

Rathi R., (2016). Hybridization of soft computing technique with Apriori for Association rule mining.

International Journal of Pharmacy & Technology, 8(3), 15820-15827.

129.

Kumaresan P., Prabukumar M., Yokesh Babu Sundaresan, (2016). An Adaptable web based light weight

framework for remote HVAC system using programmable thermostat. International Journal of

Pharmacy & Technology, 8(3), 16456-16466.

130.

Mohankumar P., Prasanna S., Gunasekaran G., (2016). Intelligence inference user satisfactory refinement

for E-Applications. International Journal of Pharmacy & Technology, 8(3), 15917-15931.

131.

Sudheer Karnam, Thippa Reddy G., Lakshmanna Kuruva, Rajesh Kaluri, Srinivas Koppu, (2016).

Dynamically improved weighted Apriori algorithm in Market analysis. International Journal

of Pharmacy & Technology, 8(3), 15658-15668.

132.

Siddharth Samal, Pradeep Reddy Ch., Bharath Bhushan S., (2016). Implementing a modified power

aware routing protocol using AODV protocol in MANET. International Journal of Pharmacy &

Technology, 8(3), 15600-15610.

133.

Vijayan R., (2016). An application for web navigation using speech engine for blind people.

International Journal of Pharmacy & Technology, 8(3), 15805-15819.

134.

Sudha M., (2016). Disease diagnosis using association rule mining based knowledge inference system.

International Journal of Pharmacy & Technology, 8(3), 16369-16379.

135.

Santhi K., Saravanan R., (2016). Facilitate refined keywords search over encrypted data on cloud.

International Journal of Pharmacy & Technology, 8(3), 15552-15557.

136.

Sudheer K., Thippa Reddy G., Lakshmanna K., (2016). An Android App to reduce battery power

consumption in smart phones. International Journal of Pharmacy & Technology, 8(3), 16164-16171.

137.

Vanitha M., (2016). Mutual Authentication using shared secret key generation. International Journal

of Pharmacy & Technology, 8(3), 16399-16411.

138.

Santhi K., Deepa M., Lawanya Shri M., Benjula Anbu Malar B., (2016). Efficient searching with multiple

keyword over encrypted cloud data by blind storage. International Journal of Pharmacy &

Technology, 8(3), 15704-15711.

139.

Prabhu J., Thanapal P., Vijay Anand R., (2016). Home Intruder Detection System. International

Journal of Pharmacy & Technology, 8(3), 15640-15650.

140.

Kumaresan P., Subha S., (2016). A Low cost multi-functional robot prototype for Intelligent services.

International Journal of Pharmacy & Technology, 8(3), 15370-15381.

141.

Suganya P., (2016). An approach for selection of replica nodes to support QOS requirement of

applications in VANET.

International Journal of Pharmacy & Technology, 8(3), 15789-15795.

142. 1

Nivash J P., Dhinesh Babu L D., (2016). An optimal IOT enabled data processing approach for effective

detection of remote air pollution. International Journal of Pharmacy & Technology, 8(3), 15496-15509.

143. 1.

Senthilkumaran U., Manikandan N., Senthilkumar M., (2016). Role of data mining on pharmaceutical

industry – a survey. International Journal of Pharmacy & Technology, 8(3), 16100-16106.

144. 1.

Kamalakannan J., Rajasekhara Babu, (2016). Segmentation techniques on Mammograms to detect breast abnormality:

A survey. International Journal of Pharmacy & Technology, 8(3), 16089-16099.

145. 1

Vanmathi C., Prabu S., (2016). Steganography: A Comparative study, analysis of key issues and current trends.

International Journal of Pharmacy & Technology, 8(3), 4696-4715.

146. 1.

Deepa Mani., Anand Mahendran, (2016). DDOS detection and mitigation for managed security of cloud resources.

International Journal of Pharmacy & Technology, 8(3), 15455-15470.

147. 1

Meenatchi S., Prabu S., (2016). A cluster based load balancing technique for increasing the wireless sensor network life time.

International Journal of Pharmacy & Technology, 8(3), 4716-4727.

148.

Pounambal M., Nithyadharshini P S., (2016). Distributed channel allocation in smart grid networks

using Particle Swarm Optimization.

International Journal of Pharmacy & Technology, 8(3), 18547-18558.

149.

Ranjith D., Balajee J., Kumar C., (2016). In premises of cloud computing and models.

International Journal of Pharmacy

& Technology, 8(3), 4685-4695.

150.

Reddy, G. T., & Khare, N. (2017). An Efficient System for Heart Disease Prediction Using Hybrid OFBAT

with Rule-Based Fuzzy Logic Model. Journal of Circuits, Systems and Computers, 26(04), 1750061.

151.

Paramasivan, S. K., & Lopez, D. (2016). Forecasting of wind speed using feature selection and neural networks.

International Journal of Renewable Energy Research (IJRER), 6(3), 833-837.

152.

Thakare, V. R., & Singh, K. J. (2016). A Study of Security and Privacy Issues at Service Models of Cloud Computing.

Indian Journal of Science and Technology, 9(38).

153.

Uma K., (2016). Ambient Air prominence information analysis collision/population. Journal of Chemical and

Pharmaceutical Sciences, 9(4), 2566-2569.

154.

Uma. K., (2016). Efficient finding of item sets in knowledge representation using RHUI extraction.

Journal of Chemical and Pharmaceutical Sciences, 9(4), 2599-2601.

155.

Chithapuram, C. U., Cherukuri, A. K., Jeppu, Y. (2016). Aerial vehicle guidance based on passive

machine learning technique.

International Journal of Intelligent Computing and Cybernetics, 9(3), 255-273.

156.

Praveen Kumar Reddy M., Rajasekhara Babu M., (2016). Improving performance of program

by finding good optimal

sequences using sequence selection approach. ARPN Journal of Engineering and Applied Sciences,

11(17), 10563-10570.

157.

Nithya, S., & Jayakumar, C. (2016). Automatic Firewall Rule Generator for Network Intrusion

Detection System based on

Multiple Minimum Support. Indian Journal of Science and Technology, 9(41).

158.

Krishnan, S. N., & Srinivasan, P. (2016). A QOS Parameter based Solution for Black hole

Denial of Service Attack in Wireless

Sensor Networks. Indian Journal of Science and Technology, 9(38).

159.

Rajesh Kaluri, Kuruva Lakshmanna, Thippa Reddy, Sudheer Karnam, Srinivas Koppu., (2016).

A Comparative study on selecting

and ranking the test cases in software testing. ARPN Journal of Engineering and

Applied Sciences, 11(1), 754-757.

160.

Kamalakannan, J., & Babu, R. M. (2016). Early detection of breast cancer using GLCM

feature extraction in Mammograms.

IIOAB JOURNAL, 7(5), 170-179.

161.

Ahamed, B., & Ramkumar, T. (2016). Data Integration-Challenges, Techniques and Future

Directions: A Comprehensive Study.

Indian Journal of Science and Technology, 9(44).

162.

Nagaraja, G., & Ch, P. R. (2016). A Reliable Group Key Management Framework Using

Fuzzy Logic for MANETs.

International Journal of Intelligent Engineering and Systems, 9(4), 107-115.

163.

Kaluri, R., & Reddy, P. (2016). Sign Gesture Recognition Using Modified Region Growing

Algorithm and Adaptive

Genetic Fuzzy Classifier. Int J Intell Eng Syst, 9, 225-233.

164.

Nagaraja, G., & Ch, P. R. (2016). Mitigate Lying and On-Off Attacks on Trust Based Group Key

Management Frameworks in MANETs.

International Journal of Intelligent Engineering and Systems, 9(4), 215-224.

165.

Parimala, M., & Lopez, D. Spatio-Temporal Modelling of Frequent Human Mobility Pattern to

Analyse the Dynamics of Epidemic Disease.

International Journal of Intelligent Engineering & Systems, 9(4), 167-178.

166.

Bhushan, S. B., & CH, P. R. A QoS Aware Cloud Service Composition Algorithm for Geo-Distributed Multi Cloud Domain.

International Journal of Intelligent Engineering & Systems, 9(4), 147-156.

167.

Lakshmanna, K., & Khare, N. (2016). FDSMO: frequent DNA sequence mining using FBSB and optimization.

International Journal of Intelligent Engineering & Systems, 9(4), 157-166.

168.

LawanyaShri, M., Balusamy, B., & Subha, S. (2016). Threshold-Based Workload Control for an Under-Utilized Virtual Machine

in Cloud Computing. International Journal of Intelligent Engineering & Systems, 9(4), 234-241.

169.

Anusha, K., & Sathiyamoorthy, E. (2016). A decision tree-based rule formation with combined PSO-GA algorithm for intrusion

detection system. International Journal of Internet Technology and Secured Transactions, 6(3), 186-202.

170.

Rajganesh, N., & Ramkumar, T. (2016). A Review on Broker Based Cloud Service Model. CIT. Journal of Computing and

Information Technology, 24(3), 283-292.

171.

Aarthy, S. L., & Prabu, S. (2016). A computerized approach on breast cancer detection and classification.

IIOAB JOURNAL, 7(5), 157-169.

172.

P J Kumar, Suganya P., (2016). Variable Replica allocation in VANET using node failure probability.

International Journal of Pharmacy & Technology, 8(4), 25990-25994.

173.

Sankar S., Srinivasan P., (2016). Internet of Things (IOT): A survey of empowering technologies, research opportunities and applications.

International Journal of Pharmacy & Technology, 8(4), 26117-26141.

174.

Srinivasan P., Nagamuthu Krishnan S.S., (2016). A recent survey on trust models for wireless sensor networks.

International Journal of Pharmacy & Technology, 8(4), 26163-26168.

175.

Vijaya C., Srinivasan P., (2016). A survey on resource scheduling in cloud computing.

International Journal of Pharmacy & Technology, 8(4), 26142-26162.

176.

Padmapriya, S., Kirubakaran, E., & Elango, N. M. (2016). Medical Image Classification using Hybrid classifier

by Extending the Attributes. Indian Journal of Science and Technology, 9(6).

177.

Uma, K., & Bangalore Morarji, A. R. Comparative Analysis of Current Engineering Education in Majority Countries.

Journal of Chemical and Pharmaceutical Sciences, 10(1), 293-296.

178.

Navaneethan C., Meenatchi S., Kumar P J., Suganya P., (2016). Comparison of RSA and MD5 algorithm.

International Journal of Pharmacy & Technology, 8(4), 26609-26615.

179.

Kumar P J., Suganya P., Navaneethan C., Meenatchi S., (2016). BigData social media analysis using R and Hadoop.

International Journal of Pharmacy & Technology, 8(4), 26616-16620.

180.

Divya Udayan J., HyungSeok Kim, (2016). Constrained Procedural Modeling of Real Buildings from single façade layout.

International Journal of Computer Vision and Signal Processing, 6(1), 33-46.

181.

Udayan, J. D. (2016). An Analysis of Reconstruction Algorithms Applied to 3D Building Modeling.

Indian Journal of Science and Technology, 9(33).

182.

Iyapparaja M., (2016). Coupling and Cohesion metrics based measurement of software reusable component strength.

International Journal of Pharmacy & Technology, 8(4), 21515-21526.

183.

Kumaran, U., & Khare, N. (2016). A Review on Privacy Preserving Data Mining using Secure Multiparty Computation.

Indian Journal of Science and Technology, 9(48).

184.

Ravi, C., & Khare, N. (2016). BGFS: Design and Development of Brain Genetic Fuzzy System for Data Classification.

Journal of Intelligent Systems.

185.

Ravi, C., & Khare, N. (2016). Review of Fuzzy Rule Based Classification systems. Research Journal of Pharmacy

and Technology, 9(8), 1299-1302.

186.

Deepa, N., & Ravi, C. (2016). Dimension Reduction Using Principal Component Analysis for Pharmaceutical

Domain. Research Journal of Pharmacy and Technology, 9(8), 1169-1173.

187.

Kaluri, R., & Reddy, C. P. (2016). A framework for sign gesture recognition using improved genetic algorithm and

adaptive filter. Cogent Engineering, 3(1), 1251730.

188.

Deepa, N., & Ganesan, K. (2016). A Brief Survey of Decision Making Methods and its Applications in Various

Domains. Research Journal of Pharmacy and Technology, 9(8), 1079-1082.

189.

Deepa, N., & Ganesan, K. (2016). Aqua Site Classification Using Neural Network Models. AGRIS on-line Papers

in Economics and Informatics, 8(4), 51.

190.

Deepika S., Ushadevi G., (2016). Performance analysis of topology based Ad-hoc wireless routing protocols using

Qualnet. International Journal of Pharmacy & Technology, 8(4), 25527-25533.

191.

Raman, I. (2016). Certain height-balanced subtrees of hypercubes. International Journal of Computer Mathematics:

Computer Systems Theory, 1(1), 32-41.

192.

Kuppusamy, L., Raman, I., & Krithivasan, K. (2016). On succinct description of certain context-free languages by

ins-del and matrix ins-del systems. International Journal of Foundations of Computer Science, 27(7), 775-786.

193.

Bhattacharya, S. (2016). A review of the application of automation technologies in healthcare domain. Research

Journal of Pharmacy and Technology, 9(12), 2343-2348.

194.

Singh, B., Bhattacharya, S., Chowdhary, C. L., & Jat, D. S. A review on internet of things and its applications in

healthcare. Journal of Chemical and Pharmaceutical Sciences. 10(1), 447-452.

195.

Srinivasa Gupta N., Valarmathi B., (2016). Opinion mining using intuitive scoring approach. International Journal

of Pharmacy & Technology, 8(4), 21527-21546.

196.

Sivashankari R., Valarmathi B., (2016). A Literature survey on entity extraction techniques in Bio-medical datasets.

International Journal of Pharmacy & Technology, 8(4), 5055-5066.

197.

Raghavan, R., & Singh, K. J. (2016). Necessity of different patterns of fingerprint and its applications: A study.

International Journal of Applied Engineering Research, 11(8), 5787-5790.

198.

Brindha, K., & Jeyanthi, N. (2016). DOVC: Data Obfuscation Visual Cryptography to Protect Cloud Storage.

International Journal of Soft Computing, 11(6), 374-381.

199.

Sundaresan, Y. B., & Kumaresan, P. (2016). A Comparative Analysis of Low Cost Solutions for Quiz Controller

and Classroom Access Control Systems. Research Journal of Pharmacy and Technology, 9(9), 1357-1362.

200.

Sundaresan, Y. B., Kumaresan, P., & Prabu, A. S. (2016). Anamolized Based Security for Private Information

Attacks on Social Network. International Journal of Applied Engineering Research, 11(13), 7914-7919.

201.

Ramya, G. (2016). Survey on various Classes of Picture Languages. International Journal of Applied Engineering

Research, 11(8), 5376-5381.

202.

Geraldine Bessie Amali D., Dinakaran M., (2016). Solution of the non linear least squares problem using a new gradient

based genetic algorithm, ARPN Journal of Engineering and Applied Sciences, 11(21), 12876-12882.

203.

Priya, R. S., Prabu, S., & Dharun, V. S. (2016). F-SIFT and FUZZY-RVM based efficient multi-temporal image

segmentation approach for remote sensing applications. Automatic Control and Computer Sciences, 50(3), 151-164.

204.

Senthilkumar M., Ilango P., (2016). Big data optimization for social networking tweet. International Journal

of Soft Computing, 11(5), 305-311.

205.

Rani, B. S. (2016). A Novice’s Perception of Partial Homomorphic Encryption Schemes. Indian Journal of

Science and Technology, 9(37).

206.

Pandiyan, S., & Perumal, V. (2016). A Survey on Various Problems and Techniques for Optimizing Energy

Efficiency in Cloud Architecture. Walailak Journal of Science and Technology (WJST), 14(10), 749-758.

207.

Sanjeevi, P., Balamurugan, G., & Viswanathan, P. (2016). The improved DROP security based on hard AI problem

in cloud. International Journal of Internet Protocol Technology, 9(4), 207-217.

208.

Sumathi, D., Velmurugan, T., Nandakumar, S., & Renugadevi, S. (2016). Dynamic Weight Assignment based

Vertical Handoff Algorithm for Load Optimization. Indian Journal of Science and Technology, 9(37).

209.

Ramaiah, M., & Ray, B. K. (2016). An iterative point elimination technique to retain significant vertices on

digital planar curves. International Journal of Computational Vision and Robotics, 6(4), 354-368.

210.

Shini, S. N. (2016). A survey on population based meta-heuristic techniques. International Journal of Chemical

and Pharmaceutical Analysis, 4(1), 7.

211.

Vanitha, M. (2016). Survey on Secured Password Authentication for IOT. Advances in Systems Science and

Applications, 16(3), 21-32.

212.

Thandeeswaran, R., & Durai, M. S. (2016). DPCA: Dual Phase Cloud Infrastructure Authentication.

International Journal of Communication Networks and Information Security, 8(3), 197.

213.

Pounambal, M. (2016). Survey on channel allocation techniques for Wireless Mesh Network to reduce

contention with Energy Requirement. Indian Journal of Science and Technology, 9(32).

214.

Gopal, D. G., & Saravanan, R. (2016). Selfish node detection based on evidence by trust authority and

selfish replica allocation in DANET. International Journal of Information and Communication Technology, 9(4), 473-491.

215.

Seetha, H., Murty, M. N., & Saravanan, R. (2016). Classification by majority voting in feature partitions.

International Journal of Information and Decision Sciences, 8(2), 109-124.

216.

Nirmala, M., Vidyavathi, M., Nivash, J. P., & Kumar, C. P.(2016). Scalable cloud computing based

healthcare application. International Journal of Pharmacy & Technology, 8(4), 25891-25901.

217.

Nirmala M., Pavan Kumar C S., Ansu Miriam Varghese, Neethu Santhosh. (2016). Text Encryption and

Decryption strategy using matrix operations. International Journal of Pharmacy & Technology, 8(4), 25910-25917.

218.

Thathera, H., Shashi, H., & Rajput, D. S. (2016). Green Computing: An Earth Friendly System,

International Journal of Pharmacy and Technology, 8(4):25540 – 25550.

219.

Gupta, S., AkashKataria, S. R., & Rajput, D. S. (2016). Information security issues in big data: solution

using ppdm (privacy preserving data mining), International Journal of Pharmacy & Technology, 8(4): 25551 – 25568.

220.

C. Ranichandra and B.K. Tripathy, 2016. A Study on Non Java Options for Mapreduce Programming with Hadoop.

Asian Journal of Information Technology, 15(16): 2999-3003.

221.

Nithya S., Asha Jerlin M., Jayakumar C. (2016). A Survey of software defined network. International

Journal of Pharmacy & Technology, 8(4), 25944-25958.

222.

Asha Jerlin, M., Nithya S., Coker Oswald, Jayakumar C., (2016). Layer two firewall in software defined network.

International Journal of Pharmacy & Technology, 8(4), 25365-25372.

223.

Asha Jerlin M., Jayakumar C., Prabhu J., (2016).EFE:Efficient feature extraction algorithm for dynamic

malware analysis in windows executables using API call sequence. International Journal of Pharmacy & Technology,

8(4), 25373-25383.

224.

Asha Jerlin M., Nithya S., Jayakumar C., Robin Rohit. (2016). A case study on advanced evasion techniques.

International Journal of Pharmacy & Technology, 8(4), 26599-26608.

225.

Alagiri I., (2016). Multipath life time prediction of node-to-node communication using multipoint relays

in OLSR protocol for mobile adhoc networks. International Journal of Pharmacy & Technology, 8(4), 26584-26598.

226.

Devendiran S., Manivannan K., Arun tom Mathew, Rajeswari C., (2016). Vibration signal based fault

diagnosis of gears using ensemble empirical mode decomposition and linguistic hedges neural fuzzy classifier with

selected features.

Journal of Chemical and Pharmaceutical Sciences, Special Issue 3, 47-57.

227.

Singh, B. (2016). Nurse’s attitude towards computerization in private hospitals of Tamil Nadu, India.

Research Journal of Pharmacy and Technology, 9(12), 2205-2210.

228.

Charanya, R., Aramudhan, M., & Saravananaguru, R. K. (2016). A Review on Access Control Issues in EHealth

Application in Cloud Computing. Indian Journal of Science and Technology, 9(42).

229.

Dharmendra Singh Rajput, Ramjeevan Singh Thakur, Ghanshyam Singh Thakur, (2016). A Computational model for

knowledge extraction in uncertain textual data using karnaugh map technique.

International Journal of Computing Science and Mathematics, 7(2).

230.

Ikram, S. T., & Cherukuri, A. K. (2016). Improving accuracy of intrusion detection model using PCA and optimized

SVM.

Journal of computing and information technology, 24(2), 133-148.

231.

Thaseen, S., & Kumar, C. A. (2016). Intrusion Detection Model using PCA and Ensemble of Classifiers.

Advances in Systems Science and Applications, 16(2), 15-38.

232.

Ramalingam, S. P., & Mouli, P. C. (2016). Two-level dimensionality reduced local directional pattern for

face recognition. International Journal of Biometrics, 8(1), 52-64.

233.

Priya V., Subha S., Balamurugan B., (2016). Quality-of-service in cloud computing: A Survey.

International Journal of Pharmacy & Technology, 8(4), 25742-25753.

234.

Singh, P. K., & Kumar, C. A. (2016). Analysis of composed fuzzy contexts through projection.

International Journal of Data Analysis Techniques and Strategies, 8(3), 206-219.

235.

Dinakaran M., Belgacem F.B.M. (2016). An experimental study to prevent packet hiding over wireless

networks using AONTS and swarm intelligent algorithm. International Journal of Pharmacy & Technology, 8(4),

25596-25605.

236.

Geraldine Bessie Amali D., Dinakaran M., (2016). A review of heuristic global optimization based

artificial neural network training approaches. International Journal of Pharmacy & Technology, 8(4), 21670-21679.

237.

Jayanthi, M. Prabadevi B., (2016). Multi-keyword ranked search over encrypted data supporting

synonym query. The IIOAB Journal, 7(1), 1.

238.

Susmita Subhadarshini Panda, Saravanan R., (2016). A secure approach to Spatial Image Steganography.

International Journal of Pharmacy & Technology, 8(2), 13384-13400.

239.

Harish H S., Vijayan R., (2016). A Secured and Reliable routing in opportunistic network in MANET

using Trust management scheme based on behaviour feedback. International Journal of Pharmacy &

Technology, 8(2), 12514-12522.

240.

Nagendramani P., Vijayan R., (2016). An analysis on the performance of various replica allocation

algorithms in cloud using Matlab. International Journal of Pharmacy & Technology, 8(2), 3892-3902.

241.

Hemavathi E., Srinivasa Perumal R., (2016). An approach for automatic vehicle plate recognition in

unconstrained environment. International Journal of Pharmacy & Technology, 8(2), 4013-4025.

242.

Ajay Mummadisetti, Rajeshwar Reddy Kadari, Rajeev Sushmanth Dammu, Durai Raj Vincent P M., (2016).

An effective approach of RSA & impact of wieners attack: Survey. International Journal of Pharmacy &

Technology, 8(2), 13093-13099

243.

Gopika D., Kumar P J., (2016). An innovative approach for user validation system using keylog and Sudoku

algorithm.

International Journal of Pharmacy & Technology, 8(2), 11732-11739.

244.

Ashutosh Sharma, Vijayan R., (2016). Correlative study of Video compression techniques – H.264/AVC.

International Journal of Pharmacy & Technology, 8(2), 12638-12646.

245.

Kaushik Roy, Brindha K., Sudha Senthil Kumar, (2016). Optimizing the executing time of compiler optimization

using code segmentation technique. International Journal of Pharmacy & Technology, 8(2), 12537-12551.

246.

Pavithra S., Lawanya Shri M., (2016). Privacy Preserving the Electronic Health Record using Encryption Protocol

in Cloud Computing. International Journal of Pharmacy & Technology, 8(2), 13261-13268.

247.

Sathiyamoorthy E., Jagadeesh G., Vaibhav Mahajan, (2016). Home Automation system over mobile network.

International Journal of Pharmacy & Technology, 8(3), 16352-16362.

248.

E. Vijayan, N.C. SenthilKumar, Siddhant Agnihotry, Mehaboob Subuhani, (2016). Effective Clustering in

Big Data for efficient knowledge discovery using parallel K-means and enhanced K-means algorithm.

International Journal of Pharmacy & Technology, 8(3), 18646-18652.

249.

Salman Ahmed G., (2016). A Framework for classification of medical data using Bijective soft set.

International Journal of Pharmacy & Technology, 8(3), 16559-16568.

250.

Vijayan E., Senthil Kumar N C., Navneet Shukla, Rudra Prasad Dwivedi, (2016). Architecture of parallel

database to make future database processing high. International Journal of Pharmacy & Technology, 8(3),

18640-18645.

251.

Navaneethan C., Ramkesh, (2016). Advanced Rail Fence Cipher Algorithm. International Journal

of Pharmacy & Technology, 8(3), 16539-16545.

252.

Akshay Gaikwad, Pradeep Reddy Ch., Bharath Bhushan S., (2016). A Keyed Hash message authentication

code technique for secure communication in VANETs. International Journal of Pharmacy & Technology, 8(3),

15620-15632.

253.

Vijayan E., SenthilKumar K., Shalini A.M., Suganya N., (2016). Image Segmentation and classification.

International Journal of Pharmacy & Technology, 8(3), 18325-18334.

254.

Thandeeswaran R., Ankita Vinod Mandekar, Jeyanthi N., (2016). Securing service set identifier of wireless

network. International Journal of Pharmaccy & Technology, 8(3), 16605-16610.

255.

Jidhesh R, Indusree J R, Sumathy S., (2016). Survey on congestion aware and adaptive routing protocols

in mobile ad hoc networks. International Journal of Pharmacy & Technology, 8(3), 16521-16538.

256.

Yuvan Shankar R K., Ramaprabha K P., Jayanthi R., (2016). Discovery against node isolation attack on

MANET and its node removal. International Journal of Pharmacy & Technology, 8(3), 16391-16398.

257.

Priya V., Sindhupaarkavi V., (2016). Convolution based Image Enhancement in unique finger impression.

International Journal of Pharmacy & Technology, 8(3), 15611-15619.

258.

Rajan Slathia, Jeyanthi N., (2016). Internet of Things in mobile health care (IOT-m Health). International

Journal of Pharmacy & Technology, 8(3), 15901-15916.

259.

Vijayan E., S., Hemalatha., S., Shweta Shaw, Alokananda Ghoshal, (2016). A new approach for collision free,

energy efficient, hybrid routing algorithm with the use of progressive adaptive concept.

International Journal of Pharmacy & Technology, 8(3), 18604-18610.

260.

Shakthi D.S., Prabadevi B., (2016). An approach to detect selfish and malicious node in Adhoc – MANETs.

International Journal of Pharmacy & Technology, 8(3), 16107-16117.

261.

Vijayan E., Senthilkumar K., Prernakumari, Sourabh Tolani, Prasenjeet Bhadra, (2016).

Convergence from SQL, NoSQL to NewSQL. International Journal of Pharmacy & Technology, 8(3), 18351-18355.

262.

Akshay Narayan Hegde, Vinay Kumar E., Vijayan R., (2016). Self-Routing: A Novel approach for

context based trust evaluation and malicious node detection in MANET. International Journal of Pharmacy &

Technology, 8(3), 15589-15599.

263.

Vijayan E., Senthil kumar K., Aishwarya Singh, Yasmeen Khatoon, (2016). Approach on big data using Hybrid cloud.

International Journal of Pharmacy & Technology, 8(3), 18344-18350.

264.

Shynu P.G., Lakshmipriya S., Pavithra J., (2016). A Novel Decentralised scheme for identity preserved access

control in cloud.

International Journal of Pharmacy & Technology, 8(3), 18141-18148.

265.

Sathya Sankaran, Sneha Ambhore, P.M. Durai Raj Vincent, (2016). Modified advanced encryption standard

with additional row transformation.

International Journal of Pharmacy & Technology, 8(3), 16436-16440.

266.

Koteswara Rao E., Vijayan R., (2016). Context based access optimizing system for Android mobile devices.

International Journal of Pharmacy & Technology, 8(3), 19071-19079.

267.

Manivannan S.S., Dhanashree P., Chandrasekaran C., (2016). Transport Plane [TP] simulator in

E-Utran LTE for Control Plane (CP).

International Journal of Pharmacy & Technology, 8(3), 16242-16253.

268.

Himanshu Dewangan, Angulakshmi M., Nagarajan I., (2016). Multiprocessing optimization –

parallel quick sort using OpenMp.

International Journal of Pharmacy & Technology, 8(3), 15633-15639.

269.

Harsha Sarah Thomas, Nancy Victor, (2016). An approach for Incremental frequent pattern mining

using modified Apriori Algorithm.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(6), 1049-1055.

270.

Uma, K., Radhakrishnan, P., & Vinoth, R. (2016). Compression of Compound Images using Fuzzy

Clustering Technique.

Indian Journal of Science and Technology, 9(S1).

271.

Uma, K., Vignesh, B., & Reynold, L. R. (2016). Encoding of Multifaceted Images using Pattern Matching Techniques.

Indian Journal of Science and Technology, 9(S1).

272.

Uma, K., Akram, K. W., & Vignesh, R. (2016). A Novel Method for Segmentation of Compound Images

using the Improved Fuzzy Clustering Technique.

Indian Journal of Science and Technology, 9(S1).

273.

Uma, K., Geetha, P., & Kannan, A. (2016). A novel segmentation of scanned compound images using fuzzy logic.

Journal of Medical Imaging and Health Informatics, 6(3), 763-768.

274.

Uma, K., & Kavitha, E. (2016). Comparison of Various Fingerprint Analysis Techniques.

Indian Journal of Science and Technology, 9(S1).

275.

Uma, K., & Reddy, G. R. (2016). Predicting Analysis of Data Mining Extraction Technique in

Secondary Education.

Indian Journal of Science and Technology, 9(S1).

276.

Uma, K., Pallavi, A. R., & Srilatha, S. (2016). Comparision of Blur Detection and Segmentation Techniques.

Indian Journal of Science and Technology, 9(S1).

277.

Aniket Sen, Prasun Jaiswal, Vikram, Prabadevi B. (2016). Improved K-Means clustering algorithm –

working with labelled datasets.

International Journal of Pharmacy & Technology, 8(4), 27091-27096.

278.

Mohamed Fahad M., Simama Hassan Mottur, Prasanna M., Mohammed Fazeel K., (2016). Prediction of

Life cycle models for software.

International Journal of Pharmacy & Technology, 8(4), 25763-25778.

279.

Girish Paul, Abhishek Chandan, Prasanna M., Abhishek Yadav, (2016). Voice based mail system for blind.

International Journal of Pharmacy & Technology, 8(4), 25754-25762.

280.

Shivam Kapil, Ashwini Kumar, Rishav Bansal, Nancy Victor, (2016). Social Network Forensics.

International Journal of Pharmacy & Technology, 8(4), 25843-25849.

281.

Ashish Gupta, Nancy Victor. (2016). Machine unlearning – An approach to make machine learning algorithms

forget data and authenticates ML level security. International Journal of Pharmacy & Technology, 8(4), 25807-25818.

282.

Ashish Gupta, Nancy Victor (2016). Real Time analysis of mobile GPS data. International Journal of Pharmacy &

Technology, 8(4), 25827-25834.

283.

Lokesh Sharma, Nancy Victor (2016). A Technique for classifying massive dataset using parallel ID3 approach.

International Journal of Pharmacy & Technology, 8(4), 25819-25826.

284.

Beryl Joylin A., Aswathi T., Nancy Victor, (2016). Sentiment analysis based on word-emoticon clusters.

International Journal of Pharmacy & Technology, 8(4), 25288-25296.

285.

Beryl Joylin A., Aswathi T., Suma P., Nancy Victor, (2016). Sentiment analysis on “Ebola” outbreak using twitter data.

International Journal of Pharmacy & Technology, 8(4), 25835-25842.

286.

Kumaran, U., Khare, N., & Suraj, A. S. (2016). Privacy preserving in data mining technical: A review. Research

Journal of Pharmacy and Technology, 9(11), 2023-2026.

287.

Sharathbabu B., Ayesha Banu S., Naveen Kumar S., Deepika S., (2016). Denoising ultrasound scan image from

speckle noise. International Journal of Pharmacy & Technology, 8(4), 26306-26311.

288.

Thanikaiselvan, V., Shastri, S., Ahmad, S., & Subashanthini, S. (2016). A New Pixel Value Based Steganography

Method for Data Security. Indian Journal of Science and Technology, 9(37).

289.

Kanugo, S., & Mekala, A. M. (2016). Particle Swarm Optimization based Edge Detection Algorithms for Computer

Tomography Images. Indian Journal of Science and Technology, 9(37).

290.

Shah, R., Subramaniam, S., Dasarathan, L., & Babu, D. (2016). Mitigating Malicious Attacks Using Trust Based

Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks. CIT. Journal of Computing and Information

Technology, 24(3), 237-252.

291.

Shubham D., Mithil P., Sumathy S., (2016). Fair resource allocation schemes for resource constrained cloud

computing environment. International Journal of Pharmacy & Technology, 8(4), 26260-26268.

292.

Shashank Joseph, Calvin Mugauri, Chunduru Anilkumar, Sumathy S., (2016). Access Control using attribute based

encryption in cloud computing: A survey. International Journal of Pharmacy & Technology, 8(4), 26282-26291.

293.

Meesala Shobha Rani, Sumathy S., (2016). Analysis of KNN, C5.0 and one class SVM for intrusion detection

system. International Journal of Pharmacy & Technology, 8(4), 26251-26259.

294.

Lawanya Shri M., Benjula Anbu Malar M B., Santhi K., Deepa M., Feslin Anish Mon., (2016). Threshold-based

virtual machine allocation in cloud environment. International Journal of Pharmacy & Technology, 8(4), 21547-21559.

295.

Nirmala M., Anshumati Gaikwad, Nittin Choudhary, Swati Bathla, (2016). A study on improving the

cloud security by virtualization. International Journal of Pharmacy & Technology, 8(4), 25885-25890.

296.

Nirmala M., Sharon Moses, Ankisetty Ramya, Ghanta Krishna Chaitanya., (2016). Managing and

Mitigating risks in Pharmaceutical supply chain management systems. International Journal of Pharmacy &

Technology, 8(4), 25864-25875.

297.

Nirmala M., Preethi E., Spoorti S Doddamani, Sharon Moses J, Chitturi Satya Pavan Kumar, (2016).

An approach to ensuring security in cloud-based social networks. International Journal of Pharmacy &

Technology, 8(4), 25918-25926.

298.

Tanu Maheshwari, Nirmala M., Dhinesh Babu L.D., Sharon Moses J., (2016). Extension of Rough set

K-Means using parallel mapreduce algorithm. International Journal of Pharmacy & Technology, 8(4), 25876-25884.

299.

Malge, A., Muthamil Selvan, T. (2016). A hybrid cloud approach for secure authorized deduplication.

International Journal of Pharmacy and Technology, 8(4), 25262-25272

300.

Hemanth, R.B., Vijayan, R. (2016). An enhanced ford-fulkerson algorithm to determine max-flow in large

mesh network using hadoop, International Journal of Pharmacy and Technology, 8(4), 25210-25220

301.

Das, S.K., Patil, M.D., Sumathy, S. (2016). Review On Neural Network Based Approaches For Intrusion

Detection System. International Journal of Pharmacy and Technology, 8(4), 26269-26281

302.

Ananya, Dutta, A., Sandhu, P.S., Thandeeswaran, R. (2016). A graph based message encryption algorithm.

International Journal of Pharmacy and Technology, 8(4), 26339-26345

303.

Benjula anbu Malar, M.B., Lawanya Shri, M., Deepa, M., Santhi, K., Mon, F.A. , (2016)Efficient system for

finding solution to recover bugs in software projects, International Journal of Pharmacy and Technology, 8(4), 21571-21579

304.

Khandelwal, R., Ellappan, V., Ajay, Hamsadhvani, A. (2016). Comparative study of algorithms to solve travelling

salesman problem. International Journal of Pharmacy and Technology,8(4), 25624-25631

305.

Kumar, P.J., Ellappan, V., Badala, P. (2016). Image duplication detection. International Journal of Pharmacy

and Technology, 8(4), 25632-25639

306.

Ellappan, V., Upadhayay, D., Yadav, R., Vandana (2016). Hand gesture recognition for physically disabled people.

International Journal of Pharmacy and Technology, 8(4), 25640-25647

307.

Dubey, A.K., Ellappan, V., Paul, R., Chopra, V. (2016). Comparative analysis of backtracking and genetic

algorithm in n queen’s problem. International Journal of Pharmacy and Technology, 8(4), pp. 25618-25623

308.

Aswini S., Kavya R S., Senthil kumaran U., (2016). Application of Internet of things and cloud computing for

health care – A survey. International Journal of Pharmacy & Technology, 8(4), 22009-22017.

309.

Aarthi B., Saranya R., Vaishnavi M., Senthil kumaran U., (2016). Agriculture facilitation using cloud computing

– survey. International Journal of Pharmacy & Technology, 8(4), 22028-22035.

310.

KV. Krishna, KV. Ganesh, Ashwini S., Senthil Kumaran U., (2016). A Survey on security methods in public id system.

International Journal of Pharmacy & Technology, 8(4), 21915-21922

311.

Suhasini K., Yamuna M., Senthil kumaran U., (2016). A review on various event management techniques.

International Journal of Pharmacy & Technology, 8(4), 5142-5149.

312.

Shreyas Kadu, Saryu Chugh, Nidhiben Bhatt, Nadesh R.K. (2016). Superintending of cloudlets in versatile

Ad-hoc ambience utilizing Qualnet – A review on performance analysis of routing mechanisms. International Journal

of Pharma and Bio sciences; Special issue SP02 “Healthcare Technology and management” 260-264.

313.

Keerthana A., Abirami B., Selva Kumar P., Rajaprabha M N., (2016). Dry eye monitors in computers & Mobiles –

Via Webcams & Front CAMs. International Journal of Pharmacy & Technology, 8(4), 26006-26012.

314.

Aman Shrivastav, Bharat Nalwaya, Sudish Kumar, Rajaprabha M N., (2016), Improvement on initial seed

selection for K-means algorithm.

International Journal of Pharmacy & Technology, 8(4), 26000-26005.

315.

Sunil Sigar, Senthil Kumar N., (2016). Effective processing of question generation from text. International

Journal of Pharmacy & Technology, 8(4), 25974-25980.

316.

Akshit Bhandari, Lavish Chhatwani, Shivali Chauhan, Senthil Kumar N., (2016).

An effective load balancing approach for handling big data.

International Journal of Pharmacy & Technology, 8(4), 25967-25973.

317.

Ayushi Jain, Saumya Bajpai, Shivali Jain, Uma Maheswari G., Jasmine Norman. (2016).

Providing and detecting steganographic content communication security.

International Journal of Pharmacy & Technology, 8(4), 26370-26375.

318.

Saurav K. Shaw, Mudit Jain, Jitesh Shaw, Durai Raj Vincent P M.,(2016).

A proposed design for secure hash algorithm-2 (SHA-2) using 640 bits.

International Journal of Pharmacy & Technology, 8(4), 26515-26523.

319.

Sudhir G., Lokesh S., Sathish Kumar K., Malathy E. (2016). Sharing file over cloud with privacy key generation.

International Journal of Pharmacy & Technology, 8(4), 25691-25698.

320.

Arjun Biyani, Ramya G., (2016). Recommendation engine for web products.

International Journal of Pharmacy & Technology, 8(4), 26019-26025.

321.

Prerna Kumari, Prasenjeet Bhadra, Ramya G., (2016). Study on performance issues in mobile application.

International Journal of Pharmacy & Technology, 8(4), 26292-26305.

322.

Shashi H., Honey Thathera, Ramya G., (2016). The Safeguarding concerns for mobile applications.

International Journal of Pharmacy & Technology, 8(4), 26032-26038.

323.

Himanshu Ewangan, Ramya G., (2016). Cross-platform mobile application development using Apache Cordova.

International Journal of Pharmacy & Technology, 8(4), 26026-26031.

324.

Nitish Chawla, Ramya G., (2016). Lookout Android Application. International Journal of

Pharmacy & Technology, 8(4), 26013-26018.

325.

Aditya Shivhare,Saurabh Kumar Pradhan, Manivannan S.S,(2016). Survey on Issues and Challenges in

biometric based authentication, International Journal of Pharmacy and Technology,4(8),26188-26192.

326.

E.Ragavan., C.Hariharan,N.Aravindraj, S.S.Manivannan., (2016). Real Time Water Quality Monitoring System,

International Journal of Pharmacy and Technology, 8(4), 26199-26205

327.

Ashwani Gupta, Nitin Katiyar, Brijendra Singh, Sweta Bhattacharya, (2016). Comparitive study on big data

architectures proposed for smart cities context, International Journal of Pharmacy and Technology,8(4), 25440-25451

328.

Yoginder Singh, Sweta Bhattacharya, Brijendra Singh, (2016). IoT: Framework for Smart City.

International Journal of Pharmacy and Technology, 8(4), 25432-25439.

329.

Pinaki Bhattacharjee, Sweta Bhattacharya, Govern Scholar Assessment Apparatus Employing Perusal Of Statistics,

International Journal of Pharmacy and Technology,8(4), 26312-26322

330.

Raju Kumar, Vijayan Ellappan, Kumar P.J, (2016), A Survey On Face Detection And Recognition Techniques

In Different Application Domain, International Journal of Pharmacy & Technology, 8(4), 25606 – 25610.

331.

Payal Nemade, Aarti Sharma, Eklendra Jadam, C.L.Chowdhary (2016), Survey On Grid Clustering Approach

With Intuitionistic Fuzzy Histogram, International Journal of Pharmacy & Technology, 8(4), 25475 – 25482.

332.

S. Kausal, V.K. Shukla, Eklendra Jadam, C.L.Chowdhary (2016), Learning Work On Online Educational Data

With Bi-Directional Mapping, International Journal of Pharmacy & Technology, 8(4), 25511 – 25520.

333.

Payal Nemade, Aarti Sharma, C.L.Chowdhary (2016), Study On Level Set Segmentation Based Classification

Using Mammograms, International Journal of Pharmacy & Technology, 8(4), 25483 – 25490.

334.

Gitanjali, J.,Abdul Khanadar, Bhanupriya Sharma, Shambhavi Srivastava (2016). Data mining from smart card

data using data clustering. International Journal of Applied Engineering Research, 11(1), 347-352.

335.

Hemalatha S., Giridharan L., (2016). A Steganographic Technique based region level sparse representation for

high density data hiding, International Journal of Pharmacy & Technology, 8(2), 12940-12949.

336.

Ajay, V. K., Desai, R., Gawannavar, M., & Nadesh, R. K. (2006). HGD: a rescue system for an alive human

gesture detection in disasters management-an experimental study. ARPN Journal of Engineering and

Applied Sciences, 11(11), 6826-6831.

337.

Hemalatha S., Santhosh Kumar S., (2016). Image Forgery Detection using Key-point Extraction and Segmentation.

International Journal of Pharmacy & Technology, 8(2), 13219-13229.

338.

Hemalatha S., Prasanna G., (2016). Robust Remote Authentication of Video Object through Steganographic mechanism.

International Journal of Pharmacy & Technology, 8(2), 12691-12700.

339.

Thanapal P, Muhammad Faizan M, (2016). Parental control for android smart phones. International Journal of

Pharmacy & Technology, 8(3), 16581-16589.

340.

Bharat Khatavkar, Nadesh R.K., (2016). A Comparative study and performance evaluations for using reactive

and hybrid routing approaches in intra and inter communication in VANET. International Journal of

Pharmacy & Technology, 8(3), 17776-17783.

341.

Priya V., Divya Vandana S., (2016). Chennai Rains Sentiment – An analysis of opinion about youngsters reflected

in tweets using Hadoop. International Journal of Pharmacy & Technology, 8(3), 16172-16180.

342.

Nadesh R.K., Akshaya Narayan Hegde, Vinay Kumar E., (2016). PANAS: A Personal Area Network for an

effective monitoring of an event in a pharmacy institute – An Empirical Study. International Journal of Pharmacy &

Technology, 8(3), 15932-15938.

343.

Priya V., Anupama Bhimnath, Sanjay M., (2016). Movement and motion modelling visitors of shopping mall.

International Journal of Pharmacy & Technology, 8(3), 16230-16241.

344.

Vijayan E., Senthilkumar N.C., Nirmal Kumar J., Mandakini Rastogi, Himika I., (2016). Cipher and Decipher of Image.

International Journal of Pharmacy & Technology, 8(3), 18653-18663.

345.

Vijayan E., Senthil kumar K., Aishwarya Singh, Yasmeen Khatoon, (2016). Approach on big data using Hybrid cloud.

International Journal of Pharmacy & Technology, 8(3), 18344-18350.

346.

Shynu P.G., Lakshmipriya S., Pavithra J., (2016). A Novel Decentralised scheme for identity preserved access control

in cloud. International Journal of Pharmacy & Technology, 8(3), 18141-18148.

347.

Baby C., Thippa Reddy G., (2016). Heart Disease prediction using Rule based Fuzzy Logic. International Journal of

Pharmacy & Technology, 8(3), 15471-15479.

348.

Nadesh, R. K., Arivuselvan, K., & Pathanjali, S. (2016). A Quantitative Review on Introducing the Election Process

with Cloud Based Electronic Voting and Measuring the Performance using Map Reduce. Indian Journal of Science

and Technology, 9(39).

349.

Bhavani S., Malathy E., Dorothy S., (2016). Prevailing parameters by Lease using Ant Colony Optimization.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(6), 1211-1219.

350.

Hardik Pandey, P J Kumar, Suganya P., (2016). Performance analysis of RBG Encryption algorithm.

International Journal of Pharmacy & Technology, 8(4), 25995-25999.

351.

Sundaresan, Y. B., Jaiswal, A. K., & Kumaresan, P. (2016). A Low Cost Prototype for Multiple Access Security System.

International Journal of Applied Engineering Research, 11(13), 7907-7913.

352.

Girish V K, Madhan R, Jagadeesh Gopal (2016). Sensor Detection Of Trains For National Train Enquiry System,

International Journal of Pharmacy & Technology, 8(4), 22182 – 22185.

353.

Suryapal singh, Ashish Singh and Arjun Lamba (2016) , GLCM and Gabor Wavelet Feature Extraction based Brain

Tumour Detection Using Medical Images, International Journal of Pharmacy and Technology, 8(4), 25505-25510.

354.

Ellappa, V., Kamalakannan, J., Babel, H., Dhamarikar, A. (2016). Access control mechanism in cloud. International

Journal of Pharmacy and Technology, 8(4), 25611-25617

355.

Vanmathi, C., Prabu, S. (2016). Steganography: A comparative study,analysis of key issues and current trends.

International Journal of Pharmacy and Technology,8(3), 4696-4715

356.

Vani M.P (2016).Incorporation Of Internet of Things with Cloud Auditing, International Journal of Pharmacy &

Technology, 8(4), 25779-25786

357.

Senthilkumaran U., Balamurugan B., Eswaran G., Mageswari U., (2016). Sentiment analysis of twitter data using

intelligent related word identification. International Journal of Pharmacy & Technology, 8(4), 26393-26401.

358.

Shreelekhya G., Yazhini, Senthilkumaran U., Manikandan N., (2016). Methods for evaluating software

architecture-A Survey. International Journal of Pharmacy & Technology, 8(4), 25720-25733.

359.

Sivaranjini V., Senthilkumaran U., Manikandan N., (2016). Optimizing the location deployment for

emergency meeting scheduling in disaster relief management. International Journal of Pharmacy & Technology, 8(4), 25714-25719.

360.

Deni Avinash A.B., SenthilKumaran U., Manikandan N., (2016). Automated summarization of academic

papers and generation of presentation slides. International Journal of Pharmacy & Technology, 8(4), 25710-25713.

361.

Manikandan N., Senthilkumaran U., Kumar P.J., (2016). Effective use of multiple cores for face recognition

in personal computers. International Journal of Pharmacy & Technology, 8(4), 25734-25741.

362.

Senthilkumar M., Manikandan N., Senthilkumaran U., Samy R., (2016). Weather data analysis using hadoop.

International Journal of Pharmacy & Technology, 8(4), 21827-21834.

363.

Thirumalai C.S., Senthil Kumar M., (2016). Secured e-mail system using base 128 encoding scheme.

International Journal of Pharmacy & Technology, 8(4), 21797-21806.

364.

Thirumalai C.S., Senthil Kumar M., (2016). Spanning tree approach for error detection and correction.

International Journal of Pharmacy & Technology, 8(4), 5009-5020.

365.

Chandrasegar T., Senthilkumar M., Silambarasan R., Westphall, C.B., (2016). Analyzing the strength of Pell’s RSA.

International Journal of Pharmacy & Technology, 8(4), 21869-21874.

366

Uma, K., Ashwini, S., & Kiruthika, S. (2016).Survey on Machine learning algorithms, International Journal

of Computer Science & Wireless Security (IJCSWS), 3(5):225-228.

367

Mishra, Sangeet, Asis Kumar Tripathy, and Pallavi Joshi. (2016).Making a Cloud Data Secure and Effective

for Better Performance of Services. Indonesian Journal of Electrical Engineering and Computer Science. 2(3): 695- 702

368

S. Sinduja, Dharmendra Singh Rajput, (2016). Analysis Of Imbalance Dataset Using Classification Techniques,

International Journal of Advanced Research Trends in Engineering and Technology, 4(19):517 – 522.

369

Rajput, D. S., & Gour, R. (2016). An IoT Framework for healthcare monitoring systems. International Journal

of Computer Science and Information Security, 14(5):451-455.

370

Sruthi, M., & Kavitha, B. R. (2016). A Survey on IoT Platform. International Journal of Scientific Research and

Modern Education.1(1): 468 – 473

371

Chowdhary, C. L., Sai, G. V. K., & Acharjya, D. P. (2016). Decreasing False Assumption for Improved Breast

Cancer Detection. Journal of Science And Arts, 2(35):157-176.

372

K.Santhi., M.Deepa.,M.Lawanya Shri.,M. B. BenjulaAnbu Malar,(2016). A Novel Method for Key

Aggregation On data Sharing in Cloud Storage Environment, International journal of Advanced Research

in Science and Engineering, 5(special issue no:1):142-148.

373

Santra, A. K. (2016). Stochastic Multifacility Location Problem under Triangular Area Constraint with

Euclidean Norm. International Journal on Recent and Innovation Trends in Computing and Communication

(IJRITCC), 4(3):111-116.

374

Mohan Vamsi M., Shantharajah S.P. (2016). Adaptive Neural Fuzzy Interface System for Cloud Computing,

International Journal of Advanced Research in Computer Science and Software Engineering, 6(10):92-96.

375

Sara Archana R, Prabadevi B, (2016).Social Network for Allocating and Sharing Cloud Resources using Trust Relationship.

International Journal of Computer Systems, 3(5): 394 – 396.

376

Deepika A, Prabadevi. (2016). A Decentralized Framework for Cloud Resources Provisioning with Malware

Detection, International journal of Computer Systems, 3(5):388-390.

377

Ananthy E, Prabadevi B, (2016).Gain Factor Trust – A Trust Evaluation Framework in Online Social Networks,

International Journal of Computer Systems, 3(5):391-393.

378

Rajput, D. S., & Khare, N. (2016). Fuzzy soft set decision-making model for social networking sites.

International Journal of Social Network Mining, 2(3): 256-266.

379

Kaavya, S., & Priya, G. L. (2016). Static Shot based Keyframe Extraction for Multimedia Event Detection.

International Journal of Computer Vision and Image Processing (IJCVIP), 6(1): 28-40.

380

Prasanna, M., & Iyapparaja, M. (2016). Optimistic Investigation on Open Source Testing Tools for Testing Applications.

International Research Journal of Engineering and Technology (IRJET), 3(12):633 – 635.

381

Prasanna, M., Iyapparaja, M., Dhenesh V Subramanian, (2016). Certain Investigations on Testing Tools for Regressing

Testing, International Research Journal of Engineering and Technology (IRJET), 3(12):630 – 632.

382

Rama Prabha K.P, Jayanthi R. (2016). Performance Issues of TCP in Wireless Networks and Performance

Enhancement Using TCP Vegas, Global Journal of Engineering Science and Researches, 3(7):72-80.

383

Jagadeesh,G., Ramaprabha,K., MohanVamsi P.M. (2016). Enhancing Software Quality in Web Applications using

Fault Tree Algorithm (FTA). International Journal of Advanced Research in Computer Science and Software

Engineering.6(4):448 – 452

384

Victor, N., Lopez, D., & Abawajy, J. H. (2016). Privacy models for big data: a survey. International Journal of

Big Data Intelligence, 3(1), 61-75.

385

Neelu Khare, Kumaran U,Mohan Vamsi M, (2016). Knowledge Acquisition and Privacy Preserving in Cloud using

Simultaneous Diagonalization Algorithm, International Journal of Advanced Research in Computer

Science and Software Engineering.6(9): 137 – 140.

386

Kaluri, R., & Li, G. (2016). A review on how to do the research in an effective way. International Journal of

Engineering Science Invention Research & Development.2 (9): 633 – 635.

387

Asha Jerlin. M, Jayakumar Sadhasivam, Nithya. S, (2016). Intelligent Interior Mapping using Wall Following

Behaviour, International Journal of Trend in Research and Development.3(6):112-114.

388

Swarna Priya, RM., Aarthy S. L.,Sujatha , R., Srinivas Koppu, Madhusudhana Rao, (2016). Reconstruction of

3D Realistic Models from Multiple Images – A Survey, International Journal of Advanced Research in Electrical,

Electronics and Instrumentation Engineering,5(12):8886 – 8891

389

Asha Joseph, John Singh K (2016). A Survey on Latest Trends and Challenges in Cyber Forensics,

International Journal of Advances in Electronics and Computer Science, Special Issue, 75-78.

390

Kunal Gagneja, K., John Singh, (2016). Quantum Encryption using Lattice on Streaming Video in VLSI.

International Journal of Advances in Electronics and Computer Science, Special Issue, 118-121.

391

M.Prabukumar.L., Agilandeeswari., Srinivas Koppu., Madhusudhana Rao., Geethanajali, S. (2016).

Vehicle License Plate Recognition Based on Concentric Windows and Deep Neural Networks, International J

of Advanced Research in Electrical, Electronics and Instrumentation Engg, 5(12):8950 – 8956

392

Agilandeeswari, L., & Ganesan, K. (2016). False-positive free Hilbert and multi-resolution-based image

watermarking technique using firefly optimisation algorithm. International Journal of Information Privacy,

Security and Integrity, 2(4): 257-280.

393

M P Gopinath, S Prabu, Srinivas Koppu, Madhusudhana Rao, Kamalakannan J. (2016). Automatic Region Growing

Algorithm based on Combined Filtering Technique to Detect Breast Cancer, International J of Advanced Research in

Electrical, Electronics and Instrumentation Engg 5(12):8878 – 8885.

394

S Ramani, P., Swarnalatha, L., Ramanathan., Srinivas Koppu., Madhusudhana Rao. (2016).Symmetric Private Key

Encryption and Decryption based on Matrix, International J of Advanced Research in Electrical, Electronics and

Instrumentation Engg, 5(12):8985 – 8991.

395

Venugopal P., Rajeev Pankaj N., Satheesh Kumar., Srinivas Koppu .,Madhusudhana Rao. (2016). Detection of Enemy

Intervention in Border and Battle Fields Using Smart Dust Technology, International J of Advanced Research in Electrical,

Electronics and Instrumentation Engg, 5(12):8833 – 8843

  
396

Ramya, G., Priya, G., & Mon, F. A. (2016). Isolating Tainted Nodule. Imperial Journal of Interdisciplinary Research,

2(11):1870-1973.

397

Bandaru Venkata Hemanth Kumar., Ramya, G.(2016). Clustered Information Retrieval Using Image Query,

International Journal of Innovative Research in Computer

 and Communication Engineering, 3(6):5503 – 5507.
398

Devi, G. U., Sowmitha, M. K., Jidhesh, R., & Jangir, A.(2016).Improved Eaack For Intrusion Detection System.

International Journal of Research in Engineering and Technology, 5(5): 28 – 33.

399

Prathamesh Vijay Tarare ,AnurajMalav,G., Usha Devi. (2016). Modified Ant Colony System Algorithm For IP-

Traceback Problem, International Journal of Research in Engineering and Technology, 5(5):19-23

400

Judith Nita, M., Rajaprabha. MN. (2016). Implementation of Shared Authority Based Privacy Preserving Authentication

Protocol in Cloud Computing, International Journal of Innovative Research in Computer and Communication

Engineering, 4(4):6780 – 6785.

401

Thenmozhi B., Rajaprabha, MN.(2016). Automatic Averting From Cyberbullying Using Efficient Polarity Count Algorithm,

International Journal of Innovative Research in Computer and Communication Engineering, 4(4): 6834 – 6840.

402

Bimal Kumar Ray, (2016). A technique for piecewise linear approximation of 2D digital curve, International Journal of

Computer Graphics, 7(1):1-16.

403

V. Shanthi., Godithi Ramya Sree., Senthil Kumaran. (2016). Confidential Communication and Secret Data Storing by

Embedding Files–Survey, International Journal of Research in Engineering and Technology, 3(11): 459 – 465.

404

Mangayarkarasi, R.,Vanitha, M.(2016). A Survey of suboptimal polygonal approximation methods, International Journal

of Communication and Computer Technologies, 4(16):4083 – 4090.

405

M. Lawanya Shri., M.B.Benjula Anbumalar., K. Santhi, Deepa. M., (2016).Task Scheduling Based On Efficient

Optimal Algorithm In Cloud Computing Environment, International Journal of Advanced Technology in Engineering

and Science, 4(special issue no:1):306-310.

406

Subha, S. (2006). A Literature Survey of CPU Exclusive Caches, International Journal of Advanced Scientific Technologies,

Engineering and Management, 2(7):9-10.

407

Tamizharasi, G. S., Manjula, R., Monisha, K., & Balamurugan, B. (2016). A Secure and Efficient Framework for Health

Data Management in E-Health Clouds. International Journal of Computer Science and Information Security, 14(9):1078-1085.

408

Vasumathy, M., Thirugnanam, M., & Sumathy, S. (2016). A framework for automatic intrude object identification in

paediatric foreign body aspired radiography images. International Journal of Image Mining, 2(1): 57 – 67.

409

Elavarassi M, Elango N.M, (2016). A Review On Recovering And Examining Computer Forensics Evidences.

Asian Journal of Computer Science Engineering, 1(2):22 – 24.

Beware of VITEEE fake websites

We came to know that some fake websites are misusing our VITEEE name. Kindly be aware of fraud websites. Please visit only https://vit.ac.in for admissions.

Skip to content