Publications

School of Computer Science Engineering and Information Systems (SCORE)

The school has active research group involving in addressing and solving real world problems. The school has good numbers of journal publications and conference papers with high impact factor and H-Index. Our research scholars working on the emerging areas such as: Quantum Computing, Robotics, IOT, Cloud Computing, Big Data, Computer Graphics, Intelligent Systems and Network Architecture.

VIT-Virtusa Centre of Excellence & Data Science

Publications

2025
S. No TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL
1 Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO Padma A., Ramaiah M. Results in Engineering
2 MRI-based automated diagnosis of Alzheimer’s disease using Alzh-Net deep learning model Venkat S., Ghodeswar T., Chavan P., Narayanasamy S.K., Srinivasan K. Biomedical Signal Processing and Control
3 Lanthanum-based metal-organic framework nanorods for removal of dye pollutants with machine language predictions Maridevaru M.C., Konchery A., Anandan S., Thirunavukarasu V., Al Souwaileh A., Wu J.J., Anandan S. Journal of Physics and Chemistry of Solids
4 Congestion avoidance in 6G networks with V Gradient Geocast Routing Protocol Sahoo A., Tripathy A.K. Scientific Reports
5 Comparative analysis of deep learning models for crack detection in buildings Krishnan S.S.R., Karuppan M.K.N., Khadidos A.O., Khadidos A.O., Selvarajan S., Tandon S., Balusamy B. Scientific reports
6 Design of an improved model using federated learning and LSTM autoencoders for secure and transparent blockchain network transactions Vijay Anand R., Magesh G., Alagiri I., Brahmam M.G., Balusamy B., Selvan C.P., Alshahrani H.M., Getahun M., Soufiene B.O. Scientific reports
7 An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare security Maruthupandi J., Sivakumar S., Dhevi B.L., Prasanna S., Priya R.K., Selvarajan S. Scientific reports
8 Energy efficient group priority MAC protocol using hybrid Q-learning honey Venkatachalam I.; john S.A.; Srinivasan J.; Palaniappan S.; Somasundaram S.K. Scientific Reports
9 Predicting age at first calving of dairy breed calves using whale optimization-based ensemble learning framework Shekure T.; Worku H.S.; Mohapatra S.K.; Das T.K. Scientific Reports
10 A novel MAC protocol for power line communication with integrated NFC for smart home applications Haridoss G.; Arun Pandian J.; Sivaranjani K.; Thanga Mariappan L. Scientific Reports
11 A new band selection framework for hyperspectral remote sensing image classification Phaneendra Kumar B.L.N.; Vaddi R.; Manoharan P.; Agilandeeswari L.; Sangeetha V. Scientific Reports
12 Verifiable Private Data Access Control in Consumer Electronics for Smart Cities Sheng X.; Wang C.; Shen J.; Sattamuthu H.; Radhakrishnan N. IEEE Consumer Electronics Magazine
13 FedDL: personalized federated deep learning for enhanced detection and classification of diabetic retinopathy Bhulakshmi D.; Rajput D.S. PeerJ Computer Science
14 Premier Dynamic Bandwidth Management and Tensile Wavelength Selection Ensuring QoS for NG-EPONs Singh P., Kumar P., Patel H., Sindhuben Babulal K., Gayathri A. IEEE Access
15 An Adaptive Intrusion Detection System for Evolving IoT Threats: An Autoencoder-FNN Fusion Shirley J.J., Priya M. IEEE Access
16 Optimal Index Code with Rate 4 over F2 Neelakandan R., Kaliyaperumal G. IEEE Access
17 EMO-TS: An Enhanced Multi-Objective Optimization Algorithm for Energy-Efficient Task Scheduling in Cloud Data Centers Nambi S., Thanapal P. IEEE Access
18 Artificial Flora Algorithm-Based Feature Selection With Support Vector Machine for Cardiovascular Disease Classification Asha M.M., Ramya G. IEEE Access
19 Deep Ensemble Method for Healthcare Asset Mapping Using Geographical Information System and Hyperspectral Images of Tirupati Region Bhargavi P.; Sarath T.; Gopichand G.; Ramesh Babu G.V.; Haritha T.; Krishna A.V. International Journal of Advanced Computer Science and Applications
20 Emerging Trends in Deep Learning for Early Alzheimer’s Disease Diagnosis and Classification: A Comprehensive Review Amuthan S.; Senthilkumar N.C. International Journal of Computational and Experimental Science and Engineering
21 Enhanced Phishing Detection: An Ensemble Stacking Model with DT-RFECV and SMOTE Ramaiah M.; Chandrasekaran V.; Chand V.; Vasudevan A.; Mohamma S.I.; Soon E.E.H.; Shambour Q.; Alshurideh M.T. Applied Mathematics and Information Sciences
22 Development of Consensus Trust-based Mechanism with Expulsion of Malicious Nodes for Permissioned Private Blockchain Networks Kaliappan N.; Chaturvedi S.; Parvathi R.; Anuradha T.; Priya M.S.; Datta S. International Journal of Vehicle Structures and Systems
23 TinyML-Enabled Intelligent Question-Answer Services in IoT Edge Consumer Devices Wu X.; Lin X.; Zhang Z.; Chen C.-M.; Gadekallu T.R.; Kumari S.; Kumar S. IEEE Transactions on Consumer Electronics
24 The emergence of artificial intelligence in autism spectrum disorder research: A review of neuro imaging and behavioral applications K.B. I.D., P.M. D.R.V. Computer Science Review
25 Interrogating nucleotide sequences with AI to understand codon usage patterns Elazar A.; D A S.M.; Madan Babu M. Proceedings of the National Academy of Sciences of the United States of America
26 Harnessing machine learning for academic insight: A study of educational performance in Bhopal, India Onker V.; Singh K.K.; Lamkuche H.S.; Kumar S.; Sharma V.S.; Chowdhary C.L.; Kumar V. Education and Information Technologies
27 A novel aggregated coefficient ranking based feature selection strategy for enhancing the diagnosis of breast cancer classification using machine learning Sreehari E.; Dhinesh Babu L.D. Scientific Reports
28 Enhancing lane detection in autonomous vehicles with multi-armed bandit ensemble learning Pandian J.A.; Thirunavukarasu R.; Mariappan L.T. Scientific Reports
29 Enhancing surface detection: A comprehensive analysis of various YOLO models Deepti Raj G.; Prabadevi B. Heliyon
30 Intrusion Detection and Prevention System (IDPS) Model for IIoT Environments Using Hybridized Framework Srinivasan M.; Senthilkumar N.C. IEEE Access
31 SVFRH: A Growth Stage-Based Compartmental Model for Predicting the Disease Incident in Tomato (Solanum lycopersicum) Shaji A.P.; Hemalatha S. IEEE Access
32 An with effective ensemble classifier for network intrusion detection system Nandhini U.; Santhosh Kumar S.V.N. Peer-to-Peer Networking and Applications
33 Automatic emotion recognition using deep neural network Sujatha R.; Chatterjee J.M.; Pathy B.; Hu Y.-C. Multimedia Tools and Applications
34 Trust-Based Consensus and ABAC for Blockchain Using Deep Learning to Secure Internet of Things Muniswamy A.; Rathi R. Applied Artificial Intelligence
35 Fuzzy Shuffled Frog Leaping Optimization- based enhanced ConvLSTM for Land Use/Land Cover Prediction MohanRajan S.N.; Loganthan A.; Manoharan P. Earth Science Informatics
36 Fpga implementation of an efficient phase shift beamformer for narrow band sub-GHz applications Jeyakumar P.; Sudhakar K.; Thanapal P.; Navaneethan C.; Meenatchi S. Analog Integrated Circuits and Signal Processing
37 Characterizing diverse maize varieties under organic cultivation: phenotypic, yield, and canopy data from VIT Vellore Prakash S.; R S.; B V.; Kumar T.P. Data in Brief
38 Supervised Learning based Chest Disease Prediction with IOT from Xray Images Spoorthi K.N.; Kuppa S.S.; Sajeev S.P.; Khushi K.S.; Ajay K.; Angulakshmi M. International Research Journal of Multidisciplinary Scope
39 Exploring the Adverse Impact of Smartphone Use on Young Individuals’ Self-Esteem: A Structural Equation Modeling Approach based on Five Temperaments Snegha J.; Sudha M. Engineering, Technology and Applied Science Research
40 Innovative AI-Driven Early Skin Disease Detection Skincare.ai?s Impact and Efficacy Krishnan V.S.; Bhatia H.; Khandal H.; Vijayan R. International Research Journal of Multidisciplinary Scope
41 Empirical techniques for effort estimation in designing effective ML models Padmanabha Reddy Y.C.A.; Kosuru S.S.; Sirisalla N.R.; Vivekananda G.N.; Perala V.A. International Journal of Computers and Applications
42 AI-powered Tools for Doctoral Supervision in Higher Education: A Systematic Review Thong C.L.; Atallah Z.; Islam S.; Lim W.; Cherukuri A.K. Journal of Information and Knowledge Management
2024
S. NoTITLE OF PAPERNAME OF THE AUTHOR/SNAME OF JOURNAL
1Multi-objective energy aware task scheduling using Orthogonal Learning Particle Swarm Optimization on cloud environmentNagalakshmi B.; Subramanian S.International Journal of Information Technology (Singapore)
2Meta heuristic approaches for sentiment analysisRani M.S., Subramanian S.Expert Systems
3Experimental investigation and gray relational optimization of engine parameters to improve the output characteristics of an ammonia biodiesel powered dual fuel combustion engineElumalai R., Sumathy S., K R., Akhtar M.N., P V E., Khan S.A., Gupta M.S., Asif M.Case Studies in Thermal Engineering
4Industry 5.0 in Smart Education: Concepts, Applications, Challenges, Opportunities, and Future DirectionsSupriya Y., Bhulakshmi D., Bhattacharya S., Gadekallu T.R., Vyas P., Kaluri R., Sumathy S., Koppu S., Brown D.J., Mahmud M.IEEE Access
5Classification of Diabetic Retinopathy Disease Levels by Extracting Spectral Features Using Wavelet CNNSundar S.; Subramanian S.; Mahmud M.Diagnostics
6An efficient multi-objective task scheduling in edge computing using adaptive honey badger optimisationNagalakshmi B.; Subramanian S.International Journal of Web Engineering and Technology
7Effective lane detection on complex roads with convolutional attention mechanism in autonomous vehiclesMaddiralla V.; Subramanian S.Scientific Reports
8A Review on State-of-Art Blockchain Schemes for Electronic Health Records ManagementJayabalan J., Jeyanthi N.Cybernetics and Information Technologies
9SECURE SUPERVISED LEARNING-BASED SMART HOME AUTHENTICATION FRAMEWORKSudha K.S., Jeyanthi N., Iwendi C.International Journal of Computer Networks and Communications
10SDS-IAM: Secure Data Storage with Identity and Access Management in BlockchainSikarwar S.; Jeyanthi N.; Thandeeswaran R.; McHeick H.International Journal of Performability Engineering
11ROUTING PERFORMANCES IN WIRELESS SENSOR NETWORKS: DETERMINING SHORTEST PATH ALGORITHMS EFFECTIVENESSMin K.T.; Jeyanthi N.International Journal of Computer Networks and Communications
12MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environmentJagadeesh G., Gitanjali J., Vellingiri J., Pounambal M., Sathiyamoorthy E., Iwendi C.Journal of Supercomputing
13Locality-constraint Representation with Minkowski distance metric for an effective Face HallucinationSavitha S., Pounambal M.Journal of Visual Communication and Image Representation
14Federated recurrent-based adaptive battle royale algorithm for privacy-preserving data aggregation in industrial IoT: a signal, image, and video processing perspectiveJagadeesh G., Pounambal M., ArivuSelvan K., Sathiyamoorthy E., Vellingiri J., Madhu Viswanatham V., Iwendi C.Signal, Image and Video Processing
15BlockStream Solutions: Enhancing Cloud Storage Efficiency and Transparency through Blockchain TechnologyKrishna K.R.; Pounambal M.; Singh J.; Surendra G.; Ali S.M.; Reddy B.M.SSRG International Journal of Electrical and Electronics Engineering
16Adapting video-based programming instruction: An empirical study using a decision tree learning modelKumar S.T.S., Thandeeswaran R.Education and Information Technologies
17An improved adaptive personalization model for instructional video-based e-learning environmentsSanal Kumar T.S., Thandeeswaran R.Journal of Computers in Education
18Predictive Analysis of Network based Attacks by Hybrid Machine Learning Algorithms utilizing Bayesian Optimization, Logistic Regression and Random Forest AlgorithmSannigrahi M.; Thandeeswaran R.IEEE Access
19Threat Detection and Mitigation for Tactile Internet Driven Consumer IoT-Healthcare SystemR R., S H., Nagarajan S.M., Devarajan G.G., Omar M., Bashir A.K.IEEE Transactions on Consumer Electronics
20Enhanced QSVM with elitist non-dominated sorting genetic optimisation algorithm for breast cancer diagnosisJose P.; Hariharan S.; Madhivanan V.; Sujaudeen N.; Krisnamoorthy M.; Cherukuri A.K.IET Quantum Communication
21Antecedents of Intention to Use Social Media for Virtual EventsKwek C.L.; Lee M.S.C.; Lee S.P.; Siek H.L.; Keoy K.H.; Cherukuri A.K.Journal of Information and Knowledge Management
22Forward feature selection: empirical analysisKamalov F., Elnaffarr S., Cherukuri A., Jonnalagadda A.Journal of Intelligent Systems and Internet of Things
23Correlation between Vaccination and Child Mortality Rate Using Multivariate Linear Regression ModelRevathi A., Kaladevi R., Vimaladevi M., Hariharan S., Cherukuri A.K., Sujatha R.Journal of Information and Knowledge Management
24Exploring Quantum Computing Paradigm: From Conceptualisation, Initial Adoption to DevelopmentTripathi M., Cherukuri A.K., Bhasin A., Jammalamadaka S.Journal of Information and Knowledge Management
25Comprehensive hybrid regression model for financial forecasting in neutrosophic logicKamalov F., Elnaffar S., Gurrib I., Cherukuri A.International Journal of Neutrosophic Science
26Preventing Illegal Deforestation using Acoustic SurveillanceRajesh M.; Wadhwa T.; Cherukuri A.K.; Kamalov F.; Jonnalagadda A.; Ray S.International Journal of Computer Information Systems and Industrial Management Applications
27Conceptual design and implementation of FIDO2 compatible smart medical card for healthcare information systemSethuraman S.C.; Mitra A.; Ghosh A.; Shaw R.; Cherukuri A.K.; Kamalov F.International Journal of Critical Computer-Based Systems
28Streamlining Micro-Credentials Implementation in Higher Education Institutions: Considerations for Effective Implementation and Policy DevelopmentKeoy K.H.; Koh Y.J.; Iqbal J.; Anjum S.S.; Yeo S.F.; Cherukuri A.K.; Teoh W.Y.; Piut D.A.A.Journal of Information and Knowledge Management
29OntoDSO: an ontological-based dolphin swarm optimization (DSO) approach to perform energy efficient routing in Wireless Sensor Networks (WSNs)Boopathi M., Parikh S., Awasthi A., Malviya A., Nachappa M.N., Mishra A., Shyam G.K., Narula G.S.International Journal of Information Technology (Singapore)
30Experience Replay Optimization via ESMM for Stable Deep Reinforcement LearningOsei R.S., Lopez D.International Journal of Advanced Computer Science and Applications
31Machine Learning-Based Security Enhancement in Heterogeneous Networks Using an Effective Pattern Mining FrameworkSrinivasan M.; Senthilkumar N.C.International Journal of Intelligent Systems and Applications in Engineering
32Class imbalance data handling with optimal deep learning-based intrusion detection in IoT environmentSrinivasan M., Senthilkumar N.C.Soft Computing
33Review on scene graph generation methodsMonesh S.; Senthilkumar N.C.Multiagent and Grid Systems
34Emerging Trends in Deep Learning for Early Alzheimer’s Disease Diagnosis and Classification: A Comprehensive ReviewAmuthan S.; Senthilkumar N.C.International Journal of Computational and Experimental Science and Engineering
35An Emoticon-Based Novel Sarcasm Pattern Detection Strategy to Identify Sarcasm in Microblogging Social NetworksNirmala M.; Gandomi A.H.; Babu M.R.; Babu L.D.D.; Patan R.IEEE Transactions on Computational Social Systems
36Critical Factor Analysis for prediction of Diabetes Mellitus using an Inclusive Feature Selection StrategySreehari E., Babu L.D.D.Applied Artificial Intelligence
37Modeling of Aquila Optimizer with Hybrid ResNet-DenseNet enabled Breast Cancer Classification on Histopathological ImagesMani R.K.C., Kamalakannan J.Journal of Intelligent and Fuzzy Systems
38A Review on Applications of Electroencephalogram: Includes Imagined SpeechSanthakumari S., Kamalakannan J.International Journal of Advanced Computer Science and Applications
39A Bio-Inspired Method for Breast Histopathology Image Classification Using Transfer LearningChandana Mani R.K., Kamalakannan J., Rangaiah Y.P., Anand S.Journal of Artificial Intelligence and Technology
40Extreme Rate Optimal Index CodeNeelakandan R., Kaliyaperumal G.IEEE Access
41Beyond the Current Curve: A Novel Curve Warning System Considering Subsequent Curve Speed LimitsManikandan N.S.; Kaliyaperumal G.IEEE Access
42Medical Image Fusion for Brain Tumor Diagnosis Using Effective Discrete Wavelet Transform MethodsRamaraj V., Swamy M.V.A., Sankar M.K.Journal of Information Systems Engineering and Business Intelligence
43Improving the BERT model for long text sequences in question answering domainRamaraj V., Swamy M.V.A., Prince E.E., Kumar C.International Journal of Advances in Applied Sciences
44An enhanced and hybrid fingerprint minutiae feature extraction method for identifying and authenticating the patient?s noisy fingerprintRaghavan R., John Singh K.International Journal of System Assurance Engineering and Management
45An efficient iterative pseudo point elimination technique to represent the shape of the digital image boundaryRamaiah M.; Ravi V.; Chandrasekaran V.; Mohanraj V.; Mani D.; Maruthamuthu A.Multimedia Tools and Applications
46A COVID-19 Prediction Using a Blockchain Approach Integrated With UV-NET for Urban ManagementThaseen I.S.; Vanitha M.; Deepa M.; Angulakshmi M.; Mahendran A.International Research Journal of Multidisciplinary Scope
47Exploring fetal brain tumor glioblastoma symptom verification with self organizing maps and vulnerability data analysisNatarajan S.K., S J., Mathivanan S.K., Rajadurai H., M.B B.A., Shah M.A.Scientific Reports
48Enhancing heart disease prediction with reinforcement learning and data augmentationR G.; S?K?B S.; Mathivanan S.K.; Rajadurai H.; MB B.A.M.; Mallik S.; Qin H.Systems and Soft Computing
49Adamic?Adar similarity indexed Wald boost data classification for diabetic disease diagnosis with big dataM R.; Srinivasan S.; Mathivanan S.K.; Rajadurai H.; M.B B.A.M.; Mallik S.; Qin H.Systems and Soft Computing
50Prediction of particulate matter PM2.5 using bidirectional gated recurrent unit with feature selectionSubbiah S.S., Paramasivan S.K., Thangavel M.Global Nest Journal
51Advances in Deep Learning Techniques for Short-term Energy Load Forecasting Applications: A ReviewChandrasekaran R.; Paramasivan S.K.Archives of Computational Methods in Engineering
52Solar Power Forecasting in Smart Cities using Deep Learning Approaches: A ReviewSankari S.S.; Kumar P.S.International Research Journal of Multidisciplinary Technovation
53Evaluation of performance enhancement in Ethereum fraud detection using oversampling techniquesRavindranath V., Nallakaruppan M.K., Shri M.L., Balusamy B., Bhattacharyya S.Applied Soft Computing
54Reliable water quality prediction and parametric analysis using explainable AI modelsNallakaruppan M.K., Gangadevi E., Shri M.L., Balusamy B., Bhattacharya S., Selvarajan S.Scientific Reports
55An intelligent deep residual learning framework for tomato plant leaf disease classificationEzhilarasan G., Ranganathan S.R., Mani L.S., Kadry S.International Journal of Electrical and Computer Engineering
56Secure Sharing Architecture of Personal Healthcare Data Using Private Permissioned Blockchain for TelemedicineBharathi Murthy C.V.N.U.; Lawanya Shri M.IEEE Access
57An Explainable AI framework for credit evaluation and analysisNallakaruppan M.K., Balusamy B., Shri M.L., Malathi V., Bhattacharyya S.Applied Soft Computing
58Gradient scaling and segmented SoftMax Regression Federated Learning (GDS-SRFFL): a novel methodology for attack detection in industrial internet of things (IIoT) networksRajasekaran V.A., Indirajithu A., Jayalakshmi P., Nayyar A., Balusamy B.Journal of Supercomputing
59Quantum Channel Optimization: Integrating Quantum-Inspired Machine Learning with Genetic Adaptive StrategiesVijay Anand R.; Magesh G.; Alagiri I.; Brahmam M.G.; Balusamy B.; Benedetto F.IEEE Access
60Exploring Mental Fatigue and Burnout in the Workplace: A Survival Analysis ApproachEswar Reddy R., Santhi K.EAI Endorsed Transactions on Pervasive Health and Technology
61Hardware optimization for effective switching power reduction during data compression in GOLOMB rice codingSakthivel R.; Vijayalakshmi Ch.; Vanitha M.; AboRas K.M.; Abdelfattah W.M.; Ghadi Y.Y.; Reddy Ch.R.PLoS ONE
62Privacy Preserved Reinforcement Learning Model Using Generative AI for Personalized E-LearningMuniyandi A.P., Balusamy B., Dhanaraj R.K., Ellappan V., Murali S., Sathyamoorthy M., Nkenyereye L.IEEE Transactions on Consumer Electronics
63Extended water wave optimization (EWWO) technique: a proposed approach for task scheduling in IoMT and healthcare applicationsBapuram B.; Subramanian M.; Mahendran A.; Ghafir I.; Ellappan V.; Hamada M.Evolutionary Intelligence
64DAIDNet: A Lightweight Domain Aware Architecture for Automated Detection of Network PenetrationsGupta P., Jain A., Ikram S.T., Gadekallu T.R., Srivastava G.IEEE Transactions on Network and Service Management
65An enhanced multimodal fusion deep learning neural network for lung cancer classificationS.K.B S., Mathivanan S.K., Karthikeyan P., Rajadurai H., Shivahare B.D., Mallik S., Qin H.Systems and Soft Computing
66Multimodal Biomedical Image Segmentation using Multi-Dimensional U-Convolutional Neural NetworkSrinivasan S., Durairaju K., Deeba K., Mathivanan S.K., Karthikeyan P., Shah M.A.BMC Medical Imaging
67Predicting academic performance of learners with the three domains of learning data using neuro-fuzzy model and machine learning algorithmsR. P., P. K., A. S.A.Journal of Engineering Research (Kuwait)
68Enhancing personalized learning with explainable AI: A chaotic particle swarm optimization based decision support systemParkavi R., Karthikeyan P., Sheik Abdullah A.Applied Soft Computing
69Enhancing Educational Assessment: Predicting and Visualizing Student Performance using EDA and Machine Learning TechniquesParkavi R., Karthikeyan P., Sujitha S., Abdullah A.S.Journal of Engineering Education Transformations
70Leveraging ANFIS with Adam and PSO optimizers for Parkinson’s diseasePasha A., Ahmed S.T., Painam R.K., Mathivanan S.K., P K., Mallik S., Qin H.Heliyon
71Enhancing cervical cancer detection and robust classification through a fusion of deep learning modelsMathivanan S.K., Francis D., Srinivasan S., Khatavkar V., P K., Shah M.A.Scientific Reports
72Detection of Parkinson disease using multiclass machine learning approachSrinivasan S.; Ramadass P.; Mathivanan S.K.; Panneer Selvam K.; Shivahare B.D.; Shah M.A.Scientific Reports
73Opti-FOG: Optimizing Resource Allocation with Anti-Inspired FOG Node SelectionKarthikeyan P.; Brindha K.IEEE Access
74Advancements in urban scene segmentation using deep learning and generative adversarial networks for accurate satellite image analysisSangeetha S.K.B.; Sivakumar M.; Mathivanan S.K.; Rajadurai H.; Karthikeyan P.; Shah M.A.PLoS ONE
75Efficient breast cancer detection using neural networks and explainable artificial intelligenceMurugan T.K.; Karthikeyan P.; Sekar P.Neural Computing and Applications
76Blockchain Based an Efficient and Secure Privacy Preserved Framework for Smart CitiesPadma A., Ramaiah M.IEEE Access
77Optimal feature selection based on OCS for improved malware detection in IoT networks using an ensemble classifierRamaiah M.; Chandrasekaran V.; Adla P.; Vasudevan A.; Hunitie M.F.A.; Mohammad S.I.S.International Journal of Data and Network Science
78The Role of Blockchain in Transforming Industries Beyond FinanceVanmathi C.; Farouk A.; Alhammad S.M.; Mangayarkarasi R.; Bhattacharya S.; Kasyapa M.S.B.IEEE Access
79Estimation of Sentinel-1 derived soil moisture using modified Dubois modelSettu P.; Ramaiah M.Environment, Development and Sustainability
80Blockchain based solution for secure information sharing in pharma supply chain managementPadma A.; Ramaiah M.Heliyon
81Enhanced Phishing Detection: An Ensemble Stacking Model with DT-RFECV and SMOTERamaiah M.; Chandrasekaran V.; Chand V.; Vasudevan A.; Mohamma S.I.; Soon E.E.H.; Shambour Q.; Alshurideh M.T.Applied Mathematics and Information Sciences
82GLSBIoT: GWO-based enhancement for lightweight scalable blockchain for IoT with trust based consensusPadma A., Ramaiah M.Future Generation Computer Systems
83Modeling, Mapping and Analysis of Floods Using Optical, Lidar and SAR Datasets?a ReviewKubendiran I.; Ramaiah M.Water Resources
84Study and Analysis of Various Smart Vehicle Vulnerable Prevention Using Digital Twin Technology: A Challenging ReviewVishnukumar R.; Ramaiah M.International Journal of Engineering Trends and Technology
85TPEMLB: A novel two-phase energy minimized load balancing scheme for WSN data collection with successive convex approximation using mobile sinkMohan P.; Rajasekaran V.A.; Santhanam P.; Raja K.T.; Jayagopal P.; Sandeep Kumar M.; Mallik S.; Qin H.Ain Shams Engineering Journal
86Efficient improvement of energy detection technique in cognitive radio networks using K-nearest neighbour (KNN) algorithmMusuvathi A.S.S., Archbald J.F., Velmurugan T., Sumathi D., Renuga Devi S., Preetha K.S.Eurasip Journal on Wireless Communications and Networking
87SURVEY ON TECHNICAL ADVANCEMENTS AND RENOVATIONS IN FEDERATED LEARNINGBalaji S., Tulshain S., Modi M., Dalei A., Sumathi D.Malaysian Journal of Computer Science
88ERAM-EE: Efficient resource allocation and management strategies with energy efficiency under fog?internet of things environmentsPeriasamy P., Ujwala R., Srikar K., Durga Sai Y.V., Preetha K.S., Sumathi D., Sayeed M.S.Connection Science
89Intelligent Security System for Preventing DDoS Attacks for 6G Enabled WBSN using Improve Grey Wolf OptimizationMuniyandi A.P.; Balusamy B.; Dhanaraj R.K.; D S.; S N.; S P.K.; Alroobaea R.; Paramasivam A.IEEE Transactions on Consumer Electronics
90Segmentation and classification of brain tumor using Taylor fire hawk optimization enabled deep learning approachRout A.K.; D S.; S N.; Ponnada S.Electromagnetic Biology and Medicine
91A modified generative adversarial networks with Yolov5 for automated forest health diagnosis from aerial imagery and Tabu search algorithmJayagopal P., Purushothaman Janaki K., Mohan P., Kondapaneni U.B., Periyasamy J., Mathivanan S.K., Dalu G.T.Scientific Reports
92A novel methodology for the development of an optimal agricultural crop field using Internet of ThingsManikandan R., Prasanna S., Ashwin M., Sathish Kumar L., Pandiyan S.Computational Intelligence
93Leveraging ensemble learning for stealth assessment model with game-based learning environmentRajendran D., Santhanam P.Soft Computing
94An accuracy analysis of classical and quantum-enhanced K-nearest neighbor algorithm using Canberra distance metricBhaskaran P.; Prasanna S.Knowledge and Information Systems
95Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of ThingsNallakaruppan M.K., Somayaji S.R.K., Fuladi S., Benedetto F., Ulaganathan S.K., Yenduri G.IEEE Access
96Remote Assistance for Bone-Fractured Patients using Deep Learning ModelsKailasanathan N.; Somayaji S.; Baza M.; Srivastava G.; Ulaganathan S.; Yenduri G.; Ravindranath V.; Alsabaan M.Applied Artificial Intelligence
97An enhanced framework for smart automated evaluations of answer scripts using NLP and deep learning methodsG M., R.K N., M M., V S.Multimedia Tools and Applications
98Recommendation system for under graduate students using FSES-TOPSISSelva Rani B., Kumar S.A.International Journal of Electrical Engineering Education
99K-Net-Deep joint segmentation with Taylor driving training optimization based deep learning for brain tumor classification using MRIPrasad V., Vairamuthu S., Selva Rani B.Imaging Science Journal
100Archimedes Fire Hawk Optimization enabled feature selection with deep maxout for network intrusion detectionRani B.S., Vairamuthu S., Subramanian S.Computers and Security
101Fuzzy Swin transformer for Land Use/ Land Cover change detection using LISS-III Satellite dataMohanRajan S.N., Loganathan A., Manoharan P., Alenizi F.A.Earth Science Informatics
102Fine-tuning digital FIR filters with gray wolf optimization for peak performanceR A.; Samiappan S.; Prabukumar M.Scientific reports
103A new band selection framework for hyperspectral remote sensing image classificationPhaneendra Kumar B.L.N.; Vaddi R.; Manoharan P.; Agilandeeswari L.; Sangeetha V.Scientific Reports
104Strategies for dimensionality reduction in hyperspectral remote sensing: A comprehensive overviewVaddi R., Phaneendra Kumar B.L.N., Manoharan P., Agilandeeswari L., Sangeetha V.Egyptian Journal of Remote Sensing and Space Science
105Nonparametric Statistical Feature Scaling Based Quadratic Regressive Convolution Deep Neural Network for Software Fault PredictionSivavelu S., Palanisamy V.Computers, Materials and Continua
106Piecewise Congruence Regressed Indexive Extreme Learning Classifier for Software Fault PredictionSivavelu S.; Palanisamy V.IEEE Access
107Amalgamation of GAN and ResNet methods in accurate detection of Breast Cancer with Histopathological ImagesZion G.D.; Tripathy B.K.International Journal of Advances in Soft Computing and its Applications
108Stage-based colorectal cancer prediction on uncertain dataset using rough computing and LSTM modelsSupriya K.; Anitha A.Scientific Reports
109Secured and Sustainable Supply Chain Management Using Key Escrow Encryption Technique in Blockchain MechanismAnitha A., Priya M., Nallakaruppan M.K., Natesan D., Kushagra Jaiswal C.N., Srivastava H.K.EAI Endorsed Transactions on Internet of Things
110Hybridization of rough set?wrapper method with regularized combinational LSTM for seasonal air quality index predictionManna T., Anitha A.Neural Computing and Applications
111Segmentation quality assessment network-based object detection and optimized CNN with transfer learning for yoga pose classification for health careVallabhaneni N.; Prabhavathy P.Soft Computing
112Detection of Marchiafava Bignami disease using distinct deep learning techniques in medical diagnosticsSatheesh Kumar J., Vinoth Kumar V., Mahesh T.R., Alqahtani M.S., Prabhavathy P., Manikandan K., Guluwadi S.BMC Medical Imaging
113Assessment of land use and land cover change detection and prediction using deep learning techniques for the southwestern coastal region, Goa, IndiaNaik N., Chandrasekaran K., Meenakshi Sundaram V., Panneer P.Environmental Monitoring and Assessment
114Advanced Active Player Tracking System in Handball Videos Using Multi-Deep Sort Algorithm with GAN ApproachPoovaraghan R.J.; Prabhavathy P.International Journal of Advanced Computer Science and Applications
115An Entity Extraction and Categorization Technique on Twitter StreamsNarayanasamy S.K., Chang M.International Journal of Information Technology and Decision Making
116Performance Evaluation of Natural Language Processing Algorithms for Sentiment AnalysisSilviya S.H.A.; Faith S.J.; Seetha R.; Hemalatha M.SN Computer Science
117Secure cluster head selection in wireless sensor networks using fuzzy based generic algorithmDhipa M.; Sampath N.; Seetha R.; Nageswari D.Wireless Networks
118Geospatial approach in modeling linear, areal, and relief morphometric interactions in Dabus river basin ecology for sustainable water resource managementBahiru T.K., Aldosary A.S., Kafy A.-A., Rahman M.T., Nath H., Kalaivani S., Sarker D., Alsulamy S., Khedher K.M., Shohan A.A.A., Ferdous M.N., Elhag M.Groundwater for Sustainable Development
119Biochanin A prevents buccal pouch carcinogenesis by enhancing carcinogen detoxification and antioxidant status in hamstersNivedha J., Ahmad Wadaan M., Gitanjali J., Kaliyamoorthi K., Subashchandrabose O., Carmel Raj T., Lakshmanan V., Ravindran B.Journal of King Saud University – Science
120Exploring cutting-edge advances in green ammonia production and storage technologiesSarangi P.K., Srivastava R.K., Gitanjali J., Sathiyan G., Venkatesan G., Kandasamy S.Fuel
121Augmenting DenseNet: Leveraging Multi-Scale Skip Connections for Effective Early-Layer Information IncorporationSamad S.A.; Gitanjali J.IEEE Access
122Performance investigation on novel combined power generation and refrigeration systemUma Maheswari G., Ganesh N.S., Srinivas T., Reddy B.V.Energy and Environment
123Evaluation on novel Kalina power generation system through exergoenvironmental analysisMaheswari G.U., Ganesh N.S., Srinivas T., Reddy B.V.Case Studies in Thermal Engineering
124GAN with CCSO: generative adversarial network-driven CAViaR competitive swarm optimizer for medical video super resolutionNathiya S.; Sujatha R.Multimedia Tools and Applications
125Colorectal cancer prediction via histopathology segmentation using DC-GAN and VAE-GANSujatha R., Mahalakshmi K., Yoosuf M.S.EAI Endorsed Transactions on Pervasive Health and Technology
126A Framework for Platform-Agnostic Blockchain and IoT Based Insurance SystemGuruprakash J., Tokmakov D., Krithika L.B., Koppu S., Srinivasa Perumal R., Bekyarova-Tokmakova A., Milev M.IEEE Access
127Brain Tumor Classification Using a Pre-Trained Auxiliary Classifying Style-Based Generative Adversarial NetworkKumaar M.A.; Samiayya D.; Rajinikanth V.; Durai Raj Vincent P.M.; Kadry S.International Journal of Interactive Multimedia and Artificial Intelligence
128Prediction of Gait Neurodegenerative Diseases by Variational Mode Decomposition Using Machine Learning AlgorithmsVisvanathan P.; Vincent P.M.D.R.Applied Artificial Intelligence
129Multimodal neural network for enhanced protein stability prediction by integration of contact scores and spatial mapsGladstone Sigamani G.; Vincent P.M.D.R.Results in Engineering
130Personalized cancer vaccine design using AI-powered technologiesKumar A.; Dixit S.; Srinivasan K.; M D.; Vincent P.M.D.R.Frontiers in Immunology
131Blockchain Based Epsilon Greedy and Hadamard Gradient Deep Secured Information Sharing for Pharma Supply ChainAnitha P., Srimathi C.International Journal of System Assurance Engineering and Management
132Millennial-scale microbiome analysis reveals ancient antimicrobial resistance conserved despite modern selection pressuresGomathinayagam S.; Kanagalingam S.; Chandrasekaran S.; Krishnan T.; Kodiveri Muthukaliannan G.Environmental Microbiome
133iLIAC: An approach of identifying dissimilar groups on unstructured numerical image dataset using improved agglomerative clustering techniqueS S.K.; Ahmed S.T.; Fathima A.S.; Mathivanan S.K.; Jayagopal P.; Saif A.; Gupta S.K.; Sinha G.Multimedia Tools and Applications
134A Detailed Review on Enhancing the Security in Internet of Things-Based Smart City Environment Using Machine Learning AlgorithmsMuniswamy A.; Rathi R.IEEE Access
135Adversarial Deep Learning based Dampster?Shafer data fusion model for intelligent transportation systemNagarajan S.M.; Devarajan G.G.; T.V. R.; M. A.J.; Bashir A.K.; Al-Otaibi Y.D.Information Fusion
136Efficiency Improvisation of Large-Scale Knowledge Systems in Feature Determination using Proposed HVGAN ArchitectureNagarajan S.M., Jerlin M.A., Devarajan G.G., Sivakami R., Tiwari R.S.Journal of Information and Knowledge Management
137A lightweight optimized intrusion detection system using machine learning for edge-based IIoT securityTiwari R.S.; Lakshmi D.; Das T.K.; Tripathy A.K.; Li K.-C.Telecommunication Systems
138Electric bus arrival and charging station placement assessment using machine learning techniquesReda H., Mohapatra S.K., Das T.K., Dash S.K.International Journal of Sustainable Engineering
139Predicting age at first calving of dairy breed calves using whale optimization-based ensemble learning frameworkShekure T.; Worku H.S.; Mohapatra S.K.; Das T.K.Scientific Reports
140Deep learning-powered malware detection in cyberspace: a contemporary reviewRedhu A., Choudhary P., Srinivasan K., Das T.K.Frontiers in Physics
141The Metaverse for Cognitive Health: A Paradigm ShiftRamu S.P.; Srivastava G.; Chengoden R.; Victor N.; Maddikunta P.K.R.; Gadekallu T.R.IEEE Consumer Electronics Magazine
142IncepV3Dense: Deep Ensemble based Average Learning Strategy for identification of Micro-nutrient deficiency in banana cropSudhakar M., Swarna Priya R.IEEE Access
143Parkinson’s disease detection and stage classification: quantitative gait evaluation through variational mode decomposition and DCNN architectureE B.; Elumalai V.K.; Sandhiya D.; Swarna Priya R.M.; Shantharajah S.P.Connection Science
144Priority Based Energy Efficient MAC Protocol by Varying Data Rate for Wireless Body Area NetworkSangeetha R., Gandhi U.D.Computer Systems Science and Engineering
145Tomato Leaf Disease Classification Using Deep Learning TechniquesAngulakshmi M.; Ujai B.C.; Bala M.V.V.; Siddharth V.; Appana V.R.S.; Ssathyan S.R.International Research Journal of Multidisciplinary Scope
146PrecisionLymphoNet: Advancing Malignant Lymphoma Diagnosis via Ensemble Transfer Learning with CNNsRajadurai S., Perumal K., Ijaz M.F., Chowdhary C.L.Diagnostics
147Acoustic feature-based emotion recognition and curing using ensemble learning and CNNAnand R.V.; Md A.Q.; Sakthivel G.; Padmavathy T.V.; Mohan S.; Dama?evi?ius R.Applied Soft Computing
148CIA Security for Internet of Vehicles and Blockchain-AI IntegrationHai T., Aksoy M., Iwendi C., Ibeke E., Mohan S.Journal of Grid Computing
149A novel approach for self-driving car in partially observable environment using life long reinforcement learningMd A.Q., Jaiswal D., Mohan S., Innab N., Sulaiman R., Alaoui M.K., Ahmadian A.Sustainable Energy, Grids and Networks
150COVID-19 health analysis and prediction using machine learning algorithms for Mexico and Brazil patientsIwendi C., Huescas C.G.Y., Chakraborty C., Mohan S.Journal of Experimental and Theoretical Artificial Intelligence
151Enabling business sustainability for stock market data using machine learning and deep learning approachesDivyashree S.; Joshua C.J.; Md A.Q.; Mohan S.; Abdullah A.S.; Mohamad U.H.; Innab N.; Ahmadian A.Annals of Operations Research
152Comparative analysis of GAN-based fusion deep neural models for fake face detectionNallakaruppan M.K., Chowdhary C.L., Somayaji S., Chaturvedi H., R S., Rauf H.T., Sharaf M.Mathematical biosciences and engineering : MBE
153A novel QoS prediction model for web services based on an adaptive neuro-fuzzy inference system using COOT optimizationJithendra T., Khan M.Z., Sharief Basha S., Das R., Divya A., Chowdhary C.L., Alahmadi A., Alahmadi A.H.IEEE Access
154FedHealthFog: A federated learning-enabled approach towards healthcare analytics over fog computing platformTripathy S.S., Bebortta S., Chowdhary C.L., Mukherjee T., Kim S., Shafi J., Ijaz M.F.Heliyon
155A Deep Cryptographic Framework for Securing the Healthcare Network from PenetrationSingh A.; Sharma V.S.; Basheer S.; Chowdhary C.L.Sensors
156Hybrid intelligent technique for intrusion detection in cyber physical systems with improved feature setSagar M., Vanmathi C.Journal of Intelligent and Fuzzy Systems
157Segmentation and detection of skin cancer using fuzzy cognitive map and deep Seg NetKumar K.A., Vanmathi C.Soft Computing
158An energy efficient access control for secured intelligent transportation system for 6G networking in VANETPulligilla M.K.; Vanmathi C.Peer-to-Peer Networking and Applications
159A Comprehensive Review on Deep Learning Techniques on Cyber Attacks on Cyber Physical SystemsSagar M.; Vanmathi C.SN Computer Science
160A traffic flow prediction framework based on integrated federated learning and Recurrent Long short-term networksPulligilla M.K.; Vanmathi C.Peer-to-Peer Networking and Applications
161Blockchain integration in healthcare: a comprehensive investigation of use cases, performance issues, and mitigation strategiesKasyapa M.S.B., Vanmathi C.Frontiers in Digital Health
162Hybrid MRMR-PCA BagDT – An Effective Feature Selection Based Ensemble Model for Real-Time Intrusion Detection in IoT EnvironmentJasmine Shirley J.; Priya M.IEEE Access
163Smart IoT-Blockchain Security to secure Sensitive Personal Medical Data using Shuffled Random Starvation Link EncryptionKumari Kala M.; Priya M.IEEE Access
164Embedded Based Quadratic Boost Converter With Sliding Mode Controller for the Integration of Solar Photo-Voltaic Source With MicrogridS C.S., Govindaraj R., Chowdhury S., Singh S., Khan B.IEEE Journal of the Electron Devices Society
165Semantic Web Techniques for Clinical Topic Detection in Health CareRaman R.; Sahayaraj K.A.; Soni M.; Nayak N.R.; Govindaraj R.; Singh N.K.Computer Assisted Methods in Engineering and Science
166A Novel Vertical Axis Wind Turbine to Provide Green Energy for Coastal Area; [Un novedoso aerogenerador de eje vertical para suministrar energ?a verde a las zonas costeras]Sriman B.; Silviya A.; Sampath N.; Mary A.B.; Mani R.V.; Jayalakshmi P.Salud, Ciencia y Tecnologia – Serie de Conferencias
167Smart hydroponic greenhouse enhanced with the application of the internet of thingsSriman B.; Basha H.A.; Sampath N.; Silviya S.H.A.; Mani R.V.; Varadarajan V.HKIE Transactions Hong Kong Institution of Engineers
168Advancements in Machine Learning and Deep Learning Techniques for Crop Yield Prediction: A Comprehensive ReviewRamesh V.; Kumaresan P.Nature Environment and Pollution Technology
169Deep Learning and Transfer Learning in Cardiology: A Review of Cardiovascular Disease Prediction ModelsSunil Kumar G.; Kumaresan P.IEEE Access
170An optimized handwritten polynomial equations solver using an enhanced inception V4 modelSenthilkumar S.; Brindha K.; Chatterjee J.M.; Popat A.; Gupta L.; Verma A.Multimedia Tools and Applications
171Rice Leaf Nutrient Deficiency Classification System Using CAR-Capsule NetworkAmudha M.; Brindha K.IEEE Access
172Effective feature selection based HOBS pruned- ELM model for tomato plant leaf disease classificationAmudha M.; Brindha K.PLoS ONE
173Explainable Soft Attentive EfficientNet for breast cancer classification in histopathological imagesPeta J., Koppu S.Biomedical Signal Processing and Control
174A Multi-objective derived Adaptive TransDeepLabv3 using Electric Fish optimization Algorithm for Aerial Image Semantic SegmentationAnilkumar P.; Tokmakov D.; Venugopal P.; Koppu S.; Mileva N.; Bekyarova-Tokmakova A.IEEE Access
175Semi-Blind watermarking using convolutional attention-based turtle shell matrix for tamper detection and recovery of medical imagesPalani A.; Loganathan A.Expert Systems with Applications
176A novel multi-class land use/land cover classification using deep kernel attention transformer for hyperspectral imagesTejasree G., L A.Earth Science Informatics
177An extensive review of hyperspectral image classification and prediction: techniques and challengesTejasree G., Agilandeeswari L.Multimedia Tools and Applications
178A hyperspectral unmixing model using convolutional vision transformerBhakthan S.M., Loganathan A.Earth Science Informatics
179DeepSecure watermarking: Hybrid Attention on Attention Net and Deep Belief Net based robust video authentication using Quaternion Curvelet Transform domainMali S.D.; Agilandeeswari L.Egyptian Informatics Journal
180Digital image and video watermarking: methodologies, attacks, applications, and future directionsAberna P., Agilandeeswari L.Multimedia Tools and Applications
181Land use/land cover (LULC) classification using deep-LSTM for hyperspectral imagesTejasree G., Agilandeeswari L.Egyptian Journal of Remote Sensing and Space Science
182Optimal Semi-Fragile Watermarking based on Maximum Entropy Random Walk and Swin Transformer for Tamper LocalizationAberna P., Agilandeeswari L.IEEE Access
183A comprehensive review on secure biometric-based continuous authentication and user profilingAyeswarya S.; John Singh K.IEEE Access
184Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculationJohn J.; John Singh K.Journal of Cloud Computing
185FacekeyID: an adaptive weighted sum score-based fusion framework for continuous user authenticationAyeswarya S.; John Singh K.Engineering Research Express
186Trust value evaluation of cloud service providers using fuzzy inference based analytical processJohn J.; John Singh K.Scientific Reports
187Enhancing radiographic image interpretation: WARES-PRS model for knee bone tumour detectionUsuff R.; Kothandapani S.; Rangan R.; Dhatchnamurthy S.Network: Computation in Neural Systems
188Hybridized Clustering Algorithm and Ensemble Learning for Monitoring Paddy Crop Growth AnalysisSathiya Priya R.; Rahamathunnisa U.International Arab Journal of Information Technology
189A Comprehensive Study of Remote Sensing Technology for Agriculture Crop MonitoringSathiya Priya R.; Rahamathunnisa U.Nature Environment and Pollution Technology
190Social and QoS based trust model for secure clustering for wireless body area networkRamaswamy S., Norman J.International Journal of Electrical Engineering Education
191A novel modified switched capacitor multilevel inverter using SARC-DQRLC controlling mechanisms for grid systemsArun Prasad D.; Muralikrishnan G.; Navaneethan C.; Meenatchi S.International Journal of Hydrogen Energy
192Application of Graph Theory for Blockchain TechnologiesJayabalasamy G., Pujol C., Latha Bhaskaran K.Mathematics
193AI and the next medical revolution: deep learning?s uncharted healthcare promiseKrithika L.B.; Vishnu S.; Kotei E.; Gadde A.; Kothamasu G.A.; Nallabantu S.C.; Guruprakash J.Engineering Research Express
194Tangent sine search optimization enabled energy prediction and SWIPT-based power transfer for energy-aware communication in WSNMasilamani A.; Krishnan S.; Singh B.; Chellatamilan T.International Journal of Communication Systems
195Cluster-Based Hybrid Routing Technique for Wireless Sensor NetworksRobinson Y.H.; Valarmathi B.; Srinivasan P.; Karamti H.Wireless Personal Communications
196Prediction of Preliminary Tests for Cervical Cancer using Artificial Intelligence Models; [Przewidywanie wst?pnych test?w na raka szyjki macicy przy u?yciu modeli sztucznej inteligencji)]Mohanraj V.; Senthilkumar J.; Suresh Y.; Valaramathi B.; Sivanantham S.Przeglad Elektrotechniczny
197Remote Sensing for Agriculture in the Era of Industry 5.0-A SurveyVictor N., Maddikunta P.K.R., Mary D.R.K., Murugan R., Chengoden R., Gadekallu T.R., Rakesh N., Zhu Y., Paek J.IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
198An explainable transfer learning framework for multi-classification of lung diseases in chest X-raysPatel A.N., Murugan R., Srivastava G., Maddikunta P.K.R., Yenduri G., Gadekallu T.R., Chengoden R.Alexandria Engineering Journal
199Breast cancer prediction using Shapely and Game theory in Federated Learning environmentSupriya Y.; Chengoden R.IEEE Access
200Fed-CL- an atrial fibrillation prediction system using ECG signals employing federated learning mechanismAlreshidi F.S.; Alsaffar M.; Chengoden R.; Alshammari N.K.Scientific Reports
201XAI for Industry 5.0 -Concepts, Opportunities, Challenges and Future DirectionsGadekallu T.R.; Maddikunta P.K.R.; Boopathy P.; Deepa N.; Chengoden R.; Victor N.; Wang W.; Wang W.; Zhu Y.; Dev K.IEEE Open Journal of the Communications Society
202Deep Incomplete Multi-View Clustering Via Information Bottleneck for Pattern Mining of Data in Extreme-Environment IoTGao J.; Liu M.; Li P.; Laghari A.A.; Javed A.R.; Victor N.; Gadekallu T.R.IEEE Internet of Things Journal
203Vision Transformers, Ensemble Model, and Transfer Learning Leveraging Explainable AI for Brain Tumor Detection and ClassificationHossain S., Chakrabarty A., Gadekallu T.R., Alazab M., Piran M.J.IEEE Journal of Biomedical and Health Informatics
204A Trustable Federated Learning Framework for Rapid Fire Smoke Detection at the Edge in Smart Home EnvironmentsPatel A.N.; Srivastava G.; Maddikunta P.K.R.; Murugan R.; Yenduri G.; Gadekallu T.R.IEEE Internet of Things Journal
205GRTR: Gradient Rebalanced Traffic Sign Recognition for Autonomous VehiclesGuo K.; Wu Z.; Wang W.; Ren S.; Zhou X.; Gadekallu T.R.; Luo E.; Liu C.IEEE Transactions on Automation Science and Engineering
206Development of a double resampling based least-squares particle filter for accurate position estimation of a GPS receiver in Visakhapatnam region of the Indian subcontinentKumar N.; Sirish Kumar P.; Victor N.; Gadekallu T.R.; Mohiddin M.K.; Tiwari S.; Minchula V.K.IEEE Sensors Journal
207A novel framework for detection and prevention of denial of service attacks on autonomous vehicles using fuzzy logicSadaf M., Iqbal Z., Anwar Z., Noor U., Imran M., Gadekallu T.R.Vehicular Communications
208Software Defined Networking Assisted Electric Vehicle Charging: Towards Smart Charge Scheduling and ManagementS A.K.; Prathiba S.B.; Moorthy R.S.; Srivastava G.; Gadekallu T.R.IEEE Transactions on Network Science and Engineering
209Tear film breakup time-based dry eye disease detection using convolutional neural networkVyas A.H., Mehta M.A., Kotecha K., Pandya S., Alazab M., Gadekallu T.R.Neural Computing and Applications
210Water quality level estimation using IoT sensors and probabilistic machine learning modelMahesh T.R.; Khan S.B.; Balajee A.; Almusharraf A.; Gadekallu T.R.; Albalawi E.; Vinoth Kumar V.Hydrology Research
211Improved Transformer-Based Privacy-Preserving Architecture for Intrusion Detection in Secure V2X CommunicationsLai Q., Xiong C., Chen J., Wang W., Chen J., Gadekallu T.R., Cai M., Hu X.IEEE Transactions on Consumer Electronics
212A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research DirectionsAlwis C.D.; Porambage P.; Dev K.; Gadekallu T.R.; Liyanage M.IEEE Communications Surveys and Tutorials
213Sustainable Fog-Assisted Intelligent Monitoring Framework for Consumer Electronics in Industry 5.0 ApplicationsTripathy S.S., Bebortta S., Gadekallu T.R.IEEE Transactions on Consumer Electronics
214AI-powered trustable and explainable fall detection system using transfer learningPatel A.N.; Murugan R.; Maddikunta P.K.R.; Yenduri G.; Jhaveri R.H.; Zhu Y.; Gadekallu T.R.Image and Vision Computing
215InfusedHeart: A Novel Knowledge-Infused Learning Framework for Diagnosis of Cardiovascular EventsPandya S., Gadekallu T.R., Reddy P.K., Wang W., Alazab M.IEEE Transactions on Computational Social Systems
216Incomplete Multiview Clustering via Semidiscrete Optimal Transport for Multimedia Data Mining in IoTGao J., Li P., Laghari A.A., Srivastava G., Gadekallu T.R., Abbas S., Zhang J.ACM Transactions on Multimedia Computing, Communications and Applications
217Finger pinching and imagination classification: A fusion of CNN architectures for IoMT-enabled BCI applicationsVarone G.; Boulila W.; Driss M.; Kumari S.; Khan M.K.; Gadekallu T.R.; Hussain A.Information Fusion
218MMD-MII Model: A Multilayered Analysis and Multimodal Integration Interaction Approach Revolutionizing Music Emotion ClassificationWang J., Sharifi A., Gadekallu T.R., Shankar A.International Journal of Computational Intelligence Systems
219TinyML-Enabled Intelligent Question-Answer Services in IoT Edge Consumer DevicesWu X.; Lin X.; Zhang Z.; Chen C.-M.; Gadekallu T.R.; Kumari S.; Kumar S.IEEE Transactions on Consumer Electronics
220Deep learning for intelligent demand response and smart grids: A comprehensive surveyBoopathy P., Liyanage M., Deepa N., Velavali M., Reddy S., Maddikunta P.K.R., Khare N., Gadekallu T.R., Hwang W.-J., Pham Q.-V.Computer Science Review
221GPT (Generative Pre-trained Transformer) – A Comprehensive Review on Enabling Technologies, Potential Applications, Emerging Challenges, and Future DirectionsYenduri G., Ramalingam M., Chemmalar Selvi G., Supriya Y., Srivastava G., Maddikunta P.K.R., Deepti Raj G., Jhaveri R.H., Prabadevi B., Wang W., Vasilakos A.V., Gadekallu T.R.IEEE Access
222Lightweight Blockchain-Enhanced Mutual Authentication Protocol for UAVsWang W., Han Z., Gadekallu T.R., Raza S., Tanveer J., Su C.IEEE Internet of Things Journal
223ERACMA: Expressive and Revocable Access Control With Multi-Authority for AIoT-Enabled Human Centric Consumer ElectronicsZhuang Y.; Wang C.; Zheng W.; Victor N.; Gadekallu T.R.IEEE Transactions on Consumer Electronics
224Privacy-Enhanced Pneumonia Diagnosis: IoT-Enabled Federated Multi-Party Computation in Industry 5.0Siddique A.A.; Boulila W.; Alshehri M.S.; Ahmed F.; Gadekallu T.R.; Victor N.; Qadri M.T.; Ahmad J.IEEE Transactions on Consumer Electronics
225Aspect Category Detection of Mobile Edge Customer Reviews: A Distributed and Trustworthy Restaurant Recommendation SystemAbbas S.; Boulila W.; Driss M.; Victor N.; Sampedro G.A.; Abisado M.; Gadekallu T.R.IEEE Transactions on Consumer Electronics
226The Amalgamation of Federated Learning and Explainable Artificial Intelligence for the Internet of Medical Things: A ReviewGovardanan C.S.; Murugan R.; Yenduri G.; Gurrammagari D.R.; Bhulakshmi D.; Kandati D.R.; Supriya Y.; Gadekallu T.R.; Rathore R.S.; Jhaveri R.Recent Advances in Computer Science and Communications
227Efficient differential privacy enabled federated learning model for detecting COVID-19 disease using chest X-ray imagesAhmed R.; Maddikunta P.K.R.; Gadekallu T.R.; Alshammari N.K.; Hendaoui F.A.Frontiers in Medicine
228Review on Improved Machine Learning Techniques for Predicting Chronic DiseasesAbirami L., Karthikeyan J.Optical Memory and Neural Networks (Information Optics)
229Blockchain for Edge Computing in Smart Environments: Use Cases, Issues, and ChallengesPrabadevi B.; Deepa N.; Sudhagara Rajan S.; Srivastava G.Journal of Circuits, Systems and Computers
230Consumer Product Recommendation System using Adapted PSO with Federated Learning MethodDevarajan G.G.; Nagarajan S.M.; A D.; T V.; Kaluri R.IEEE Transactions on Consumer Electronics
231An Effective Classification of DDoS Attacks in a Distributed Network by Adopting Hierarchical Machine Learning and Hyperparameters Optimization TechniquesDasari S., Kaluri R.IEEE Access
2322P3FL: A Novel Approach for Privacy Preserving in Financial Sectors Using Flower Federated LearningDasari S.; Kaluri R.CMES – Computer Modeling in Engineering and Sciences
233Reliable-RPL: A Reliability-Aware RPL Protocol Using Trust-Based Blockchain System for Internet of ThingsAguru A.D.; Pandey A.; Erukala S.B.; Bashir A.K.; Zhu Y.; Kaluri R.; Gadekallu T.R.IEEE Transactions on Reliability
234Decision Tree Based Crowd Funding for Kickstarter ProjectsGrover V., Anbarasi A., Fuladi S., Nallakaruppan M.K.EAI Endorsed Transactions on Scalable Information Systems
235Advancing solar energy integration: Unveiling XAI insights for enhanced power system management and sustainable futureNallakaruppan M.K., Shankar N., Bhuvanagiri P.B., Padmanaban S., Bhatia Khan S.Ain Shams Engineering Journal
236Credit Risk Assessment and Financial Decision Support Using Explainable Artificial IntelligenceNallakaruppan M.K.; Chaturvedi H.; Grover V.; Balusamy B.; Jaraut P.; Bahadur J.; Meena V.P.; Hameed I.A.Risks
237Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithmRajyalakshmi V., Lakshmanna K.International Journal of Network Management
238A Novel Early Detection and Prevention of Coronary Heart Disease Framework Using Hybrid Deep Learning Model and Neural Fuzzy Inference SystemRamesh B., Lakshmanna K.IEEE Access
239Bioinformatics and systems biology approaches to identify molecular targets and pathways shared between Schizophrenia and bipolar disorderKhatun M.T.; Rana H.K.; Hossain M.A.; Lakshmanna K.; Rahman M.M.; Parvin A.; Rahman M.H.Informatics in Medicine Unlocked
240A Comprehensive Study of Deep Learning Techniques to Predict Dissimilar Diseases in Diabetes Mellitus Using IoTBalaraju R.; Lakshmanna K.Recent Advances in Computer Science and Communications
241Deep learning infused SIRVD model for COVID-19 prediction: XGBoost-SIRVD-LSTM approachAlkhalefah H.; Preethi D.; Khare N.; Abidi M.H.; Umer U.Frontiers in Medicine
242A Federated Deep Learning Framework for Privacy-Preserving Consumer Electronics RecommendationsWu J.; Zhang J.; Bilal M.; Han F.; Victor N.; Xu X.IEEE Transactions on Consumer Electronics
243An artificial intelligence-based decision support system for early and accurate diagnosis of Parkinson’s DiseaseT.R. M., V. V.K., Bhardwaj R., Khan S.B., Alkhaldi N., Victor N., Verma A.Decision Analytics Journal
244Peanut maturity detection assessment using cross-layer multi-perception neural network based on hyperspectral sensory image feature observationBalasubramaniyan M., Navaneethan C.Journal of Intelligent and Fuzzy Systems
245Deep Learning Framework for Colorectal Cancer Classification using ResNet18 based on Dietary Habits Related to Meat Intake and Cooking MethodsThanga Prasath S.; Navaneethan C.IEEE Access
246Colorectal cancer prognosis based on dietary pattern using synthetic minority oversampling technique with K-nearest neighbors approachPrasath S.T.; Navaneethan C.Scientific Reports
247A comprehensive survey on several fire management approaches in wireless sensor networksRajendran S., Chenniappan N.Bulletin of Electrical Engineering and Informatics
248Systematic analysis of the role of different foods on breast, lung, and prostate cancer incidencePrasath S.T., Navaneethan C.Food Chemistry Advances
249Development of secure and authentic access controlling techniques using the pushback request response (PRR) approach for blockchain healthcare applicationsVenkatesan M., Mani P.Optical and Quantum Electronics
250GROUNDNUT CROP PEST DETECTION AND CLASSIFICATION USING COMPREHENSIVE DEEPLEARNING MODELSVenkatasaichandrakanth P., Iyapparaja M.Suranaree Journal of Science and Technology
251A Comprehensive Approach for Tamil Handwritten Character Recognition with Feature Selection and Ensemble LearningManoj K.; Iyapparaja M.KSII Transactions on Internet and Information Systems
252GNViT- An enhanced image-based groundnut pest classification using Vision Transformer (ViT) modelVenkatasaichandrakanth P., Iyapparaja M.PLoS ONE
253A survey on pest detection and classification in field crops using artificial intelligence techniquesVenkatasaichandrakanth P., Iyapparaja M.International Journal of Intelligent Robotics and Applications
254Systematic approaches to machine learning models for predicting pesticide toxicityAnandhi G., Iyapparaja M.Heliyon
255Photocatalytic degradation of drugs and dyes using a maching learning approachAnandhi G., Iyapparaja M.RSC Advances
256Long-Term Preference Mining with Temporal and Spatial Fusion For Point-of-Interest RecommendationAcharya M., Mohbey K.K., Rajput D.S.IEEE Access
257Human Brain Waves Study using EEG and Deep Learning for Emotion RecognitionPriyadarshani M.; Kumar P.; Babulal K.S.; Rajput D.S.; Patel H.IEEE Access
258SLiTRANet: An EEG-based Automated Diagnosis Framework for Major Depressive Disorder Monitoring using a Novel LGCN and Transformer-based Hybrid Deep Learning ApproachDe S.; Singh A.; Tiwari V.; Patel H.; Vivekananda G.N.; Rajput D.S.IEEE Access
259Privacy-preserving detection and classification of diabetic retinopathy using federated learning with FedDEO optimizationBhulakshmi D.; Rajput D.S.Systems Science and Control Engineering
260FedDL: personalized federated deep learning for enhanced detection and classification of diabetic retinopathyBhulakshmi D.; Rajput D.S.PeerJ Computer Science
261A systematic review on diabetic retinopathy detection and classification based on deep learning techniques using fundus imagesBhulakshmi D.; Rajput D.S.PeerJ Computer Science
262Optimized Fuzzy Logic based Energy-Efficient Geographical Data Routing in Internet of ThingsAravind K., Maddikunta P.K.R.IEEE Access
263An IoMT-based Federated Learning Survey in Smart TransportationKarnam G.V.; Maddikunta P.K.R.Recent Advances in Computer Science and Communications
264Energy-efficient cluster head using modified fuzzy logic with WOA and path selection using enhanced CSO in IoT-enabled smart agriculture systemsChandrasekaran S.K., Rajasekaran V.A.Journal of Supercomputing
265VMMISD: An efficient load balancing model for Virtual Machine Migrations via fused Metaheuristics with Iterative Security Measures and Deep Learning OptimizationsBrahmam M.G., Vijay Anand R.IEEE Access
266Integration of 5G technologies for enhanced performance in optical network communication with channel allocation and reallocationParveen Banu M., Jothilakshmi R., Radha Rammohan S., Vijay Anand R., Anandan P., Aly M.H.Optical and Quantum Electronics
267IMNMAGN: Integrative Multimodal Approach for Enhanced Detection of Neurodegenerative Diseases Using fusion of Multidomain Analysis with Graph NetworksVijay Anand R., Shanmuga Priyan T., Brahmam M.G., Balusamy B., Benedetto F.IEEE Access
268SHQEHFSO: Design of an Efficient Model for Scalable and High QoS Blockchain Using Q Learning and Elephant Herd Fish Swarm OptimizationAnand V.R.; Priyan S.T.; Brahmam M.G.; Balusamy B.; Benedetto F.International Journal of Intelligent Engineering and Systems
269Enhancing Safety for High Ceiling Emergency Light MonitoringJun G.X.; Batumalay M.; Batumalai C.; Prabadevi B.International Journal of Advanced Computer Science and Applications
270YoloTransformer-TransDetect: a hybrid model for steel tube defect detection using YOLO and transformer architecturesG D.R.; B P.International Journal on Interactive Design and Manufacturing
271Classification of Colorectal Cancer using ResNet and EfficientNet ModelsAbhishek; Ranjan A.; Srivastva P.; Prabadevi B.; Rajagopal S.; Soangra R.; Subramaniam S.K.Open Biomedical Engineering Journal
272MoL-YOLOv7: Streamlining Industrial Defect Detection With an Optimized YOLOv7 ApproachDeepti Raj G.; Prabadevi B.IEEE Access
273Hyperspectral image classification using Walsh Hadamard transform- based key band selection and deep convolutional neural networksLakshmi Priya G.G., Chandra Mouli P.V.S.S.R., Domnic S., Chemmalar Selvi G., Cho B.-K.International Journal of Remote Sensing
274Application of Artificial Intelligence for Classification, Segmentation, Early Detection, Early Diagnosis, and Grading of Diabetic Retinopathy from Fundus Retinal Images: A Comprehensive ReviewRajarajeshwari G.; Chemmalar Selvi G.IEEE Access
275Real-time lane detection for autonomous vehicles using YOLOV5 Segmentation ModelSwain S.; Tripathy A.K.International Journal of Sustainable Engineering
276Automatic detection of potholes using VGG-16 pre-trained network and Convolutional Neural NetworkSwain S., Tripathy A.K.Heliyon
277Real-Time HealthCare Recommendation System for Social Media PlatformsMaruthavani E., Shantharajah S.IEEE Access
278An early-stage Alzheimer’s disease detection using various imaging modalities and techniques ? A mini-reviewDeenadayalan T.; Shantharajah S.P.Journal of Integrated Science and Technology
279Improved performance for Alzheimer?s disease earlier detection and diagnosis using deep learning algorithmsDeenadayalan T.; Shantharajah S.P.International Journal of Engineering Systems Modelling and Simulation
280Detection of lanes, obstacles and drivable areas for self-driving cars using multifusion perception metricsKumar A.K., Palanisamy V.Journal of Autonomous Intelligence
281Tuberculosis Detection From Chest X-Ray Image Modalities Based on Transformer and Convolutional Neural NetworkKotei E.; Thirunavukarasu R.IEEE Access
282A Novel Convolutional Neural Network Model for Automatic Speaker Identification from Speech SignalsPandian J.A., Thirunavukarasu R., Kotei E.IEEE Access
283Visual attention condenser model for multiple disease detection from heterogeneous medical image modalitiesKotei E.; Thirunavukarasu R.Multimedia Tools and Applications
284A Comprehensive Review on Advancement in Deep Learning Techniques for Automatic Detection of Tuberculosis from Chest X-ray ImagesKotei E.; Thirunavukarasu R.Archives of Computational Methods in Engineering
285A comprehensive review on transformer network for natural and medical image analysisThirunavukarasu R.; Kotei E.Computer Science Review
286IoT sensor data retrieval and analysis through cloud environment for effective power managementCh S., K U., Yadav R.K., K.V D.S., N.P D., Sharma P.Measurement: Sensors
287Coefficient bounds for starlike functions involving q? Hurwitz-Lerch Zeta operator in conic regionUma K.; Vijaya K.Heliyon
288Multi-objective Meta-heuristic Technique for Energy Efficient Virtual Machine Placement in Cloud Computing Data CentersVijaya C., Srinivasan P.Informatica (Slovenia)
289Hybrid Fuzzy Metaheuristic Technique for Efficient VM Selection and Migration in Cloud Data CentersVijaya C.; Srinivasan P.Informatica (Slovenia)
290Detecting Digital Image Forgeries with Copy-Move and Splicing Image Analysis using Deep Learning TechniquesTimothy D.P.; Santra A.K.International Journal of Advanced Computer Science and Applications
291Unveiling image forgery with cutting-edge techniques-a surveyTimothy D.P.; Santra A.K.Multidisciplinary Reviews
292Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor networkDinesh K.; Santhosh Kumar S.V.N.International Journal of Information Security
293LAPEP?Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc networkJayashree S.; Santhosh Kumar S.V.N.Wireless Networks
294Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networksRajasoundaran S.; Kumar S.V.N.S.; Selvi M.; Thangaramya K.; Arputharaj K.Wireless Networks
295An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networksRajkumar Y.; Kumar S.V.N.S.Wireless Networks
296Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehiclesRajasoundaran S.; Kumar S.V.N.S.; Selvi M.; Kannan A.Peer-to-Peer Networking and Applications
297Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural networkBangali H., Rodrigues P., Pandimurugan V., Rajasoundaran S., Kumar S.V.N.S., Selvi M., Kannan A.Wireless Networks
298GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networksDinesh K., Svn S.K.Peer-to-Peer Networking and Applications
299A comprehensive survey on communication techniques for the realization of intelligent transportation systems in IoT based smart citiesRajkumar Y., Santhosh Kumar S.V.N.Peer-to-Peer Networking and Applications
300A lightweight privacy preserving distributed certificate-less aggregate based mutual authentication scheme for vehicular adhoc networksRajkumar Y., Kumar S.V.N.S.Peer-to-Peer Networking and Applications
301An energy efficient Swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoTShanmugapriya R., SVN S.K.Peer-to-Peer Networking and Applications
302An efficient group signature based certificate less verification scheme for vehicular ad-hoc networkJayashree S., Kumar S.V.N.S.Wireless Networks
303Chaos quantum optimization-based layered diagnosis framework for faulty sensor node diagnosis and classification in wireless sensor networksBabu N., Santhosh Kumar S.V.N.International Journal of Communication Systems
304HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networksDinesh K.; Santhosh Kumar S.V.N.Peer-to-Peer Networking and Applications
305PFCAS?Paring free certificate less aggregate scheme for ensuring efficient authentication in vehicular Ad-hoc networksJayashree S.; Santhosh Kumar S.V.N.Peer-to-Peer Networking and Applications
306SCIDP?Secure cloud-integrated data dissemination protocol for efficient reprogramming in internet of thingsShanmugapriya R.; Santhosh Kumar S.V.N.Cluster Computing
307Enriched energy optimized LEACH protocol for efficient data transmission in wireless sensor networkRajaram V.; Pandimurugan V.; Rajasoundaran S.; Rodrigues P.; Kumar S.V.N.S.; Selvi M.; Loganathan V.Wireless Networks
308A fuzzy based chicken swarm optimization algorithm for efficient fault node detection in Wireless Sensor NetworksNagarajan B.; Svn S.K.; Selvi M.; Thangaramya K.Scientific reports
309An improved Harris Hawks optimizer based feature selection technique with effective two-staged classifier for network intrusion detection systemNandhini U.; SVN S.K.Peer-to-Peer Networking and Applications
310Data location integration with stable routing: Stable and optimal data transmission in wireless sensor networksGayathri A., Ruby D., Manikandan N., Gopalakrishnan T., Anusha K., Narayanasamy P.Transactions on Emerging Telecommunications Technologies
311Optimum design of planar quasi-Yagi antenna for wearable Internet of Things (IoT) applicationsDass R.; Thirumoorthy G.; Ananthakrishnan G.; Kannan A.; Rajendran S.; Narayanan M.; Arputharaj K.Microwave and Optical Technology Letters
312Enhancing cryptographic robustness through error-correcting codes derived from network graphsAnanthakrishnan G.; Ghanimi H.M.A.; Pushpa P.; Rao T.K.R.K.; Vedaraj M.; Sengan S.; Dadheech P.Journal of Discrete Mathematical Sciences and Cryptography
313Deciphering Market Dynamics: A Data Science and Machine Learning Approach Using Chaos Theory for Trend PredictionPrabhakar K., Manjula V., Punitha P., Dudekula K.V., Ravi Teja P.International Journal of Intelligent Systems and Applications in Engineering
314An Innovation development of deep-sea bacterial monitoring and classification based on artificial intelligence microbiological modelVidhyalakshmi M., Manjula V., Mickle Aancy H., Beulah Viji Christiana M., Jogendra Kumar M., Nirmala P., Almoallim H.S., Ali Alharbi S., Raghavan S.S.Automatika
315An EDGE based end-2-end system architecture for retail storesSundaresan V.A., Chandrapragasam T., Rajaganesh T.N., Vimal P., Vadivelu M.International Journal of Information Technology (Singapore)
316Digital evolution: Investigating the dynamic interactions of learners with social mediaPradeepa M., Kumaraperumal S., Kasat K., Phaneendra Maguluri L., Salma Shajahan U., Gaikwad S.M.Entertainment Computing
317E-commerce review sentiment score prediction considering misspelled words: a deep learning approachJain S., Roy P.K.Electronic Commerce Research
318A study of learning models for COVID-19 disease predictionJain S., Roy P.K.Journal of Ambient Intelligence and Humanized Computing
319Normalized hellinger feature selection and soft margin boosting classification for water quality predictionKaruppannan K., Jayagopal V.Expert Systems
320A hybrid machine learning approach for enhanced anomaly detection in drinking water qualityKalaivanan K., Vellingiri J.International Journal of Environmental Studies
321Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solutionVellingiri J.; Vedhavathy T.R.; Senthil Pandi S.; Bala Subramanian C.Peer-to-Peer Networking and Applications
322A Grey Wolf Optimized- Stacked Ensemble Approach for Nitrate Contamination Prediction in Cauvery DeltaKalaivanan K.; Vellingiri J.Economic and Environmental Geology
323AO-SVM: a machine learning model for predicting water quality in the cauvery riverVellingiri J.; Kalaivanan K.; Shanmugaiah K.; Shobana Bai F.J.J.Environmental Research Communications
324Lightweight railroad semantic segmentation network and distance estimation for railroad Unmanned aerial vehicle imagesRampriya R.S.; Nathan S.; Suganya R.; Prathiba S.B.; Perumal P.S.; Wang W.Engineering Applications of Artificial Intelligence
325Dynamic perspectives on biodiversity quantification: beyond conventional metricsBollarapu M.J.; Kuchibhotla S.; Kvsn R.; Patel H.PeerJ
326Demystifying Defects: Federated Learning and Explainable AI for Semiconductor Fault DetectionPatel T.; Murugan R.; Yenduri G.; Jhaveri R.H.; Snoussi H.; Gaber T.IEEE Access
327Amalgamation of Transfer Learning and Explainable AI for Internet of Medical ThingsMurugan R.; Paliwal M.; Patibandla R.S.M.L.; Shah P.; Balaga T.R.; Gurrammagari D.R.; Singaravelu P.; Yenduri G.; Jhaveri R.Recent Advances in Computer Science and Communications
328Fault Detection and Semantic Segmentation on Railway Track Using Deep Fusion ModelRampriya R.S.; Jenefa A.; Prathiba S.B.; Sabarinathan; Jerart Julus L.; Selvaraj A.K.; Rodrigues J.J.P.C.IEEE Access
329Hand gesture classification framework leveraging the entropy features from sEMG signals and VMD augmented multi-class SVMT. P.; Elumalai V.K.; E. B.Expert Systems with Applications
330A surface electromyography based hand gesture recognition framework leveraging variational mode decomposition technique and deep learning classifierPrabhavathy T., Elumalai V.K., Balaji E., Sandhiya D.Engineering Applications of Artificial Intelligence
331Gesture recognition framework for upper-limb prosthetics using entropy features from electromyographic signals and a Gaussian kernel SVM classifierPrabhavathy T.; Elumalai V.K.; Balaji E.Applied Soft Computing
332Smart COVIDNet: designing an IoT-based COVID-19 disease prediction framework using attentive and adaptive-derived ensemble deep learningKarthikeyan D., Baskaran P., Somasundaram S.K., Sathya K., Srithar S.Knowledge and Information Systems
333Deep iterative fuzzy pooling in unmanned robotics and autonomous systems for Cyber-Physical systemsRavindra Krishna Chandar V., Baskaran P., Mohanraj G., Karthikeyan D.Journal of Intelligent and Fuzzy Systems
334Optimizing anomaly detection in 3D MRI scans: The role of ConvLSTM in medical image analysisDurairaj A.; Madhan E.S.; Rajkumar M.; Shameem S.Applied Soft Computing
335DeepNNet 15 for the prediction of biological waste to energy conversion and nutrient level detection in treated sewage waterSathish T.; Vijayalakshmi A.; Surakasi R.; Ahalya N.; Rajkumar M.; Saravanan R.; Shangdiar S.; Sithole T.; Amesho K.T.T.Process Safety and Environmental Protection
336Analysis of Computational Methods for Diagnosis of Cervical Cancer ? A ReviewKumar T.S., Rajendran P., Santhiyakumari N., Kumarganesh S., Sundari L.M., Elango S., Shaik M.B., Sagayam K.M., G?unerhan H., Emadifar H.Applied Mathematics and Information Sciences
337FedOPT: federated learning-based heterogeneous resource recommendation and optimization for edge computingAhmed S.T., Vinoth Kumar V., Mahesh T.R., Narasimha Prasad L.V., Velmurugan A.K., Muthukumaran V., Niveditha V.R.Soft Computing
338Hybrid Ant Lion Mutated Ant Colony Optimizer Technique with Particle Swarm Optimization for Leukemia Prediction Using Microarray Gene DataMahesh T.R., Santhakumar D., Balajee A., Shreenidhi H.S., Vinoth Kumar V., Annand J.R.IEEE Access
339Transformative Breast Cancer Diagnosis using CNNs with Optimized ReduceLROnPlateau and Early Stopping EnhancementsMahesh T.R., Thakur A., Gupta M., Sinha D.K., Mishra K.K., Venkatesan V.K., Guluwadi S.International Journal of Computational Intelligence Systems
340Breast Tumor Classification with Enhanced Transfer Learning Features and Selection Using Chaotic Map-Based OptimizationChakravarthy S., Nagarajan B., Kumar V.V., Mahesh T.R., Sivakami R., Annand J.R.International Journal of Computational Intelligence Systems
341AN ELIXIR FOR BLOCKCHAIN SCALABILITY WITH CHANNEL BASED CLUSTERED SHARDINGKumar V.V., Padmavathi U., Ranjith C.P., Balaji J., Kumar C.N.S.V.Scalable Computing
342Enhancing accessibility for improved diagnosis with modified EfficientNetV2-S and cyclic learning rate strategy in women with disabilities and breast cancerAl Moteri M., Mahesh T.R., Thakur A., Vinoth Kumar V., Khan S.B., Alojail M.Frontiers in Medicine
343Heterogeneous Workload based Consumer Resource Recommendation Model for Smart Cities: eHealth Edge-Cloud Connectivity Using Federated Split LearningAhmed S.T., V V.K., Jeong J.IEEE Transactions on Consumer Electronics
344Data-Driven Intelligent Condition Adaptation of Feature Extraction for Bearing Fault Detection Using Deep Responsible Active LearningMahesh T.R., Chandrasekaran S., Ram V.A., Kumar V.V., Vivek V., Guluwadi S.IEEE Access
345Augmented Intelligence Based COVID-19 Diagnostics and Deep Feature Categorization Based on Federated LearningAhmed S.T., Venkatesan V.K., T R M., S R., Venkatesan M.IEEE Transactions on Emerging Topics in Computational Intelligence
346Secure malicious node detection in flying ad-hoc networks using enhanced AODV algorithmChandrasekar V., Shanmugavalli V., Mahesh T.R., Shashikumar R., Borah N., Kumar V.V., Guluwadi S.Scientific Reports
347Deep transfer learning with fuzzy ensemble approach for the early detection of breast cancerSannasi Chakravarthy S.R., Bharanidharan N., Vinoth Kumar V., Mahesh T.R., Alqahtani M.S., Guluwadi S.BMC Medical Imaging
348Mapping of soil suitability for medicinal plants using machine learning methodsRoopashree S., Anitha J., Challa S., Mahesh T.R., Venkatesan V.K., Guluwadi S.Scientific Reports
349Improved energy efficiency using adaptive ant colony distributed intelligent based clustering in wireless sensor networksSharada K.A., Mahesh T.R., chandrasekaran S., Shashikumar R., Kumar V.V., Annand J.R.Scientific Reports
350Realization and Prediction of IoT-based Dynamic Social Interactions for the Future RecommendationsKaladevi A.C., Kumar V.V., Velmurugan A.K., Gunasekaran K., Swapna B., Kumar V.D.Ad-Hoc and Sensor Wireless Networks
351Local Entropy Based Remora Optimization and Sparse Autoencoders for Cancer Diagnosis through Microarray Gene Expression AnalysisBharanidharan N., Sannasi Chakravarthy S., Venkatesan V.K., Abbas M., Mahesh T.R., Mohan E., Venkatesan K.IEEE Access
352High-Performance Technique for Item Recommendation in Social Networks using Multiview ClusteringAnbazhagu U.V., Niveditha V.R., Bhat C.R., Mahesh T.R., Vinoth Kumar V., Swapna B.International Journal of Computers, Communications and Control
353Hybrid HAN-CNN with aspect term extraction for sentiment analysis using product reviewKalaivaani P.C.D.; Sathyarajasekaran K.; Krishnamoorthy N.; Kumaravel T.Computational Intelligence
354An integrated energy storage framework with significant energy management and absorption mechanism for machine learning assisted electric vehicle applicationValarmathi K., Seetha J., Krishnamoorthy N.V., Hema M., Ramkumar G.Sustainable Computing: Informatics and Systems
355Efficient Heart Disease Classification Through Stacked Ensemble with Optimized Firefly Feature SelectionNatarajan K.; Vinoth Kumar V.; Mahesh T.R.; Abbas M.; Kathamuthu N.; Mohan E.; Annand J.R.International Journal of Computational Intelligence Systems
356A novel method for the detection and classification of multiple diseases using transfer learning-based deep learning techniques with improved performanceNatarajan K.; Muthusamy S.; Sha M.S.; Sadasivuni K.K.; Sekaran S.; Charles Gnanakkan C.A.R.; A.Elngar A.Neural Computing and Applications
357Redefining Urban Traffic Dynamics with TCN-FL Driven Traffic Prediction and Control StrategiesKarthick Raghunath K.M.; Rohith Bhat C.; Vinoth Kumar V.; Velmurugan A.K.; Mahesh T.R.; Manikandan K.; Krishnamoorthy N.IEEE Access
358Flamingo Jelly Fish search optimization-based routing with deep-learning enabled energy prediction in WSN data communicationSubramanian D., Subramaniam S., Natarajan K., Thangavel K.Network: Computation in Neural Systems
359Hybrid optimization assisted transmit antenna selection for massive MIMO technologySingh C.; Raja P.C.K.Multimedia Tools and Applications
360Review of Data Bias in Healthcare ApplicationsParate A.P.; Iyer A.A.; Gupta K.; Porwal H.; Kishoreraja P.C.; Sivakumar R.; Soangra R.International journal of online and biomedical engineering
361Leveraging 5G and cloud computing for outlier detection in IoT environments: A KNN approachSahaaya Arul Mary S.A.; Anwar Basha H.; Mohanraj G.; Kiruthikaa R.; Saranya N.Internet Technology Letters
362Intelligent Recognition of Multimodal Human Activities for Personal HealthcareSannasi Chakravarthy S.R.; Bharanidharan N.; Vinoth Kumar V.; Mahesh T.R.; Khan S.B.; Almusharraf A.; Albalawi E.IEEE Access
363Multi-class Breast Cancer Classification Using CNN Features HybridizationChakravarthy S.; Bharanidharan N.; Khan S.B.; Kumar V.V.; Mahesh T.R.; Almusharraf A.; Albalawi E.International Journal of Computational Intelligence Systems
364Adaptive Mish activation and ranger optimizer-based SEA-ResNet50 model with explainable AI for multiclass classification of COVID-19 chest X-ray imagesSannasi Chakravarthy S.R.; Bharanidharan N.; Vinothini C.; Vinoth Kumar V.; Mahesh T.R.; Guluwadi S.BMC Medical Imaging
365Spatial Attention Integrated EfficientNet Architecture for Breast Cancer Classification with Explainable AIChakravarthy S.; Nagarajan B.; Khan S.B.; Venkatesan V.K.; Ramakrishna M.T.; Al Musharraf A.; Aurungzeb K.Computers, Materials and Continua
366DQN Approach for Adaptive Self-Healing of VNFs in Cloud-Native NetworkArulappan A., Mahanti A., Passi K., Srinivasan T., Naha R., Raja G.IEEE Access
367Large Language Models and Sentiment Analysis in Financial Markets: A Review, Datasets and Case StudyLiu C.; Arulappan A.; Naha R.; Mahanti A.; Kamruzzaman J.; Ra I.IEEE Access
368Terahertz Square Core Photonic Crystal Fiber Sensor: Revolutionizing Efficient Blood Cell Detection Through Refractive Index Sensing Based on Surface-Enhanced Spectroscopic PropertiesKundu D., Hossain M.S., L T.M., Sahoo S., Karthikeyan S., Ramkumar G., Gopalan A., Prakash P., Ferdous A.H.M.I., Hossain S., Rashed A.N.Z.Plasmonics
369Enhanced channel prediction in large-scale 5G MIMO-OFDM systems using pyramidal dilation attention convolutional neural networkRathish C.R., Manojkumar B., Thanga Mariappan L., Ashok P., Arun Kumar U., Balan K.Internet Technology Letters
370Investigation of agricultural waste and ZrB2 nanoparticles with reinforcement in aluminum alloy matrixRathish C.R.; Parthasarathy P.; Gopinath S.; Thanga Mariappan L.; Ashok P.; Arun Kumar U.Measurement: Sensors
371A novel MAC protocol for power line communication with integrated NFC for smart home applicationsHaridoss G.; Arun Pandian J.; Sivaranjani K.; Thanga Mariappan L.Scientific Reports
372Energy efficient group priority MAC protocol using hybrid Q-learning honey Badger Algorithm (QL-HBA) for IoT NetworksVenkatachalam I.; john S.A.; Srinivasan J.; Palaniappan S.; Somasundaram S.K.Scientific Reports
373Bayesian decision model based reliable route formation in internet of thingsKumar M.J., Mishra S., Reddy E.G., Rajmohan M., Murugan S., Vignesh N.A.Indonesian Journal of Electrical Engineering and Computer Science
374Attention-based Feature Fusion with External Attention Transformers for Breast Cancer Histopathology AnalysisVanitha K.; Manimaran A.; Chokkanathan K.; Anitha K.; Mahesh T.R.; Vinoth Kumar V.; Vivekananda G.N.IEEE Access
375Evaluating Water Quality through Macroinvertebrate Diversity and Physicochemical Parameters in the Thamirabarani River BasinKasinathan P.; Jayachandran J.; Chitra R.J.; Egambaram M.; Manivel S.; Palraj K.Global Nest Journal
376GenreNet: A Deep Based Approach for Music Genre ClassificationBala Ganesh N.; Bhuvaneswari M.S.; Bhagavathi Sankar K.; Ganesh P.SN Computer Science
2023
SL. NO.TITLE OF PAPERNAME OF THE AUTHOR/SNAME OF JOURNAL
1RetU-Net: An Enhanced U-Net Architecture for Retinal Lesion SegmentationSundar S.; Sumathy S.International Journal on Artificial Intelligence Tools
2Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applicationsSudha K.S.; Jeyanthi N.Peer-to-Peer Networking and Applications
3EDocDeDup: Electronic Document Data Deduplication Towards Storage OptimizationKhaing M.M.; Jeyanthi N.International Journal of Performability Engineering
4Optimizing rice plant disease detection with crossover boosted artificial hummingbird algorithm based AX-RetinaNetSankareshwaran S.P.; Jayaraman G.; Muthukumar P.; Krishnan A.S.Environmental Monitoring and Assessment
5Hierarchical localization algorithm for sustainable ocean health in large-scale underwater wireless sensor networksAhmad T.; Li X.J.; Cherukuri A.K.; Kim K.-I.Sustainable Computing: Informatics and Systems
6VitaDNet: A Deep Learning-Based Approach for Vitamin-D Deficiency PredictionKasyap V.L.V.S.K.B.; Sumathi D.; Reddy M.S.J.; Bhagavan V.S.; Cherukuri A.K.Journal of Information and Knowledge Management
7A Study of the Corporate Design Packaging of Malaysia’s Processed FoodSiek H.L., Liew Y.M., Keoy K.H., Cherukuri A.K.Journal of Information and Knowledge Management
8A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution CentreCherukuri A.K.; Sannuthi S.; Elagandula N.; Gadamsetty R.; Singh N.; Jain A.; Sumaiya Thaseen I.; Priya V.; Jonnalagadda A.; Kamalov F.Cybernetics and Information Technologies
9An Approach for Privacy Preservation Assisted Secure Cloud ComputationSwathi V., Vani M.P.Informatica (Slovenia)
10XDLX: A Memory-Efficient Solution for Backtracking Applications in Big Data Environment using XOR-based Dancing LinksVaralakshmi M.; Peer Mohideen P.U.; Thilagavathi M.; Lopez D.International Journal on Recent and Innovation Trends in Computing and Communication
11Global Hunger Index: A multistage coefficient estimation analysis using machine learning techniques for a hunger free societySreehari E.; Dhinesh Babu L.D.Journal of Cleaner Production
12Computer-aided diagnosis using white shark optimizer with attention-based deep learning for breast cancer classificationChandana Mani R.K.; Kamalakannan J.Journal of Intelligent and Fuzzy Systems
13Technique for breast cancer classification using semi-supervised deep convolutional neural networks with transfer learning modelsMani R.K.C., Kamalakannan J.Current Science
14ERNet: Enhanced ResNet for classification of breast histopathological imagesMani R.K.C., Kamalakannan J.Electronic Letters on Computer Vision and Image Analysis
15Ad hoc-obstacle avoidance-based navigation system using Deep Reinforcement Learning for self-driving vehiclesManikandan N.; Kaliyaperumal G.; Wang Y.IEEE Access
16Hardware and Software Design for Mobile Robot s Navigation over On-road and Off-road Curvature PathsManikandan N.S.; Kaliyaperumal G.IEEE Access
17Energy-aware automatic video annotation tool for autonomous vehicleManikandan N.S.; Ganesan K.International Journal of Computational Vision and Robotics
18Energy-aware vehicle/pedestrian detection and close movement alert at nighttime in dense slow traffic on Indian urban roads using a depth cameraManikandan N.S.; Ganesan K.International Journal of Computational Vision and Robotics
19Public Social Distance Monitoring System Using Object Detection YOLO Deep Learning AlgorithmVijayan R.; Mareeswari V.; Pople V.SN Computer Science
20Deep Learning Perspectives to Detecting Intrusions in Wireless Sensor NetworksAbhale A.B.; Jayaram Reddy A.International Journal of Intelligent Systems and Applications in Engineering
21Enhancing intrusion detection recursive feature elimination with resampling in WSNAbhale A.B.; Avulapalli J.R.International Journal of System Assurance Engineering and Management
22An Efficient Intrusion Detection System to Combat Cyber Threats using a Deep Neural Network ModelRamaiah M., Vanmathi C., Khan M.Z., Vanitha M., Deepa M.Journal of ICT Research and Applications
23A Survey on Deep Learning Based Crop Yield PredictionArchana S.; Senthil Kumar P.Nature Environment and Pollution Technology
24CPS in block chain smart city application based on distributed ledger based decentralized techniqueHemalatha T.; Sangeetha K.; Sasi Kala Rani K.; Kanimozhi K.V.; Lawanyashri M.; Santhi K.; Deepalakshmi R.Measurement: Sensors
25CPS in block chain smart city application based on distributed ledger based decentralized techniqueHemalatha T.; Sangeetha K.; Sasi Kala Rani K.; Kanimozhi K.V.; Lawanyashri M.; Santhi K.; Deepalakshmi R.Measurement: Sensors
26Parallelisation of machine learning models for credit card fraud detectionBanu J.S.; Thaseen Ikram S.; Mohanraj V.; Sanapala K.; Katina P.F.International Journal of System of Systems Engineering
27An Efficient Intrusion Detection System to Combat Cyber Threats using a Deep Neural Network ModelRamaiah M., Vanmathi C., Khan M.Z., Vanitha M., Deepa M.Journal of ICT Research and Applications
28Comprehensive performance assessment of Multi-neural ensemble model for mortality prediction in ICUFathima Begum M.; Narayan S.IEEE Access
29Blindness detection in diabetic retinopathy using Bayesian variant-based connected component algorithm in Keras and TensorFlowBabu S.A.; Murali S.; Vijayan E.; Anand M.; Ramanathan L.Scientific and Technical Journal of Information Technologies, Mechanics and Optics
30Sliding principal component and dynamic reward reinforcement learning based IIoT attack detectionEllappan V., Mahendran A., Subramanian M., Jotheeswaran J., Khadidos A.O., Khadidos A.O., Selvarajan S.Scientific Reports
31A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution CentreCherukuri A.K.; Sannuthi S.; Elagandula N.; Gadamsetty R.; Singh N.; Jain A.; Sumaiya Thaseen I.; Priya V.; Jonnalagadda A.; Kamalov F.Cybernetics and Information Technologies
32A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution CentreCherukuri A.K.; Sannuthi S.; Elagandula N.; Gadamsetty R.; Singh N.; Jain A.; Sumaiya Thaseen I.; Priya V.; Jonnalagadda A.; Kamalov F.Cybernetics and Information Technologies
33An Efficient Intrusion Detection System to Combat Cyber Threats using a Deep Neural Network ModelRamaiah M., Vanmathi C., Khan M.Z., Vanitha M., Deepa M.Journal of ICT Research and Applications
34Integration of artificial intelligence in software development process for implementing a secure healthcare system – a reviewAsha N.; Krishnan S.R.; Gitanjali J.International Journal of Medical Engineering and Informatics
35Effect of Urbanization Through Land Coverage ClassificationSangeetha S.K.B.; Kushwah V.S.; Sumangali K.; Sangeetha R.; Raja K.T.; Mathivanan S.K.Radio Science
36Optimizing rice plant disease detection with crossover boosted artificial hummingbird algorithm based AX-RetinaNetSankareshwaran S.P.; Jayaraman G.; Muthukumar P.; Krishnan A.S.Environmental Monitoring and Assessment
37Image-based Mangifera Indica Leaf Disease Detection using Transfer Learning for Deep Learning MethodsDhawan K., Perumal R.S., Nadesh R.K.Electronic Letters on Computer Vision and Image Analysis
38Exponential Chimp Optimization Algorithm based Deep Neuro-Fuzzy Network with MapReduce framework for fake news detection in big data analyticsKanchanamala P.; Selva Rani B.; Vairamuthu S.International Journal of Adaptive Control and Signal Processing
39A New Approach to Neutrosophic Soft Sets and their Application in Decision MakingMohanty R.K., Tripathy B.K.Neutrosophic Sets and Systems
40Pattern Prediction on Uncertain Big Datasets using Combined Light GBM and LSTM ModelDivya Zion G., Tripathy B.K.International Journal of Advances in Soft Computing and its Applications
41Multi-Level Security in Healthcare by Integrating Lattice-Based Access Control and Blockchain- Based Smart Contracts SystemHaritha T.; Anitha A.IEEE Access
42XDLX: A Memory-Efficient Solution for Backtracking Applications in Big Data Environment using XOR-based Dancing LinksVaralakshmi M.; Peer Mohideen P.U.; Thilagavathi M.; Lopez D.International Journal on Recent and Innovation Trends in Computing and Communication
43Traffic and fragmentation aware algorithm for routing and spectrum assignment in Elastic Optical Network (EON)Selva Kumar S.; Kalaivani S.; Siddique Ibrahim S.P.; Swathi G.Optical Fiber Technology
44Effect of Urbanization Through Land Coverage ClassificationSangeetha S.K.B.; Kushwah V.S.; Sumangali K.; Sangeetha R.; Raja K.T.; Mathivanan S.K.Radio Science
45Spatio-temporal analysis of land use/land cover change detection in small regions using self-supervised lightweight deep learningNaik N.; Chandrasekaran K.; Meenakshi Sundaram V.; Panneer P.Stochastic Environmental Research and Risk Assessment
46Temporal convolutional network based rice crop yield prediction using multispectral satellite dataMohan A.; Venkatesan M.; Prabhavathy P.; Jayakrishnan A.Infrared Physics and Technology
47DEEP YOLOv8-BASED HANDBALL DETECTION SYSTEM WITH TRANSFER LEARNING APPROACHPoovaraghan R.J., Prabhavathy P.Journal of Theoretical and Applied Information Technology
48Segmentation quality assessment network-based object detection and optimized CNN with transfer learning for yoga pose classification for health careVallabhaneni N.; Prabhavathy P.Soft Computing
49Ensemble Text Summarization Model for COVID-19-Associated DatasetsChellatamilan T., Narayanasamy S.K., Garg L., Srinivasan K., Islam S.M.N.International Journal of Intelligent Systems
50IDISense: IOT-based Dam Water Disaster Sensing and Prevention SystemBraveen M.; Anusha K.; Jerlin M.A.; Seetha R.; Sampath N.IEEE Sensors Journal
51Traffic and fragmentation aware algorithm for routing and spectrum assignment in Elastic Optical Network (EON)Selva Kumar S.; Kalaivani S.; Siddique Ibrahim S.P.; Swathi G.Optical Fiber Technology
52Integration of artificial intelligence in software development process for implementing a secure healthcare system – a reviewAsha N.; Krishnan S.R.; Gitanjali J.International Journal of Medical Engineering and Informatics
53Optimizing rice plant disease detection with crossover boosted artificial hummingbird algorithm based AX-RetinaNetSankareshwaran S.P.; Jayaraman G.; Muthukumar P.; Krishnan A.S.Environmental Monitoring and Assessment
54Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodologyHenge S.K.; Jayaraman G.; Sreedevi M.; Rajakumar R.; Rashid M.; Alshamrani S.S.; Alnfiai M.M.; Alghamdi A.S.Networks and Heterogeneous Media
55SCMA: Exploring Dual-Module Attention With Multi-Scale Kernels for Effective Feature ExtractionSamad S.A., Gitanjali J.IEEE Access
56Assessment of novel Kalina power system through exergoenvironmental perspectiveGanesh N.S.; Maheswari G.U.; Srinivas T.; Reddy B.V.Journal of Thermal Analysis and Calorimetry
57Public Social Distance Monitoring System Using Object Detection YOLO Deep Learning AlgorithmVijayan R.; Mareeswari V.; Pople V.SN Computer Science
58Implementing deep-learning techniques for accurate fruit disease identificationSujatha R.; Mahalakshmi K.; Chatterjee J.M.Plant Pathology
59Fog-Based Smart Cardiovascular Disease Prediction System Powered by Modified Gated Recurrent UnitNancy A.A.; Ravindran D.; Vincent D.R.; Srinivasan K.; Chang C.-Y.Diagnostics
60An Efficient CSPK-FCM Explainable Artificial Intelligence Model on COVID-19 Data to Predict the Emotion Using Topic ModelingPriya C., Durai Raj Vincent P.M.Journal of Advances in Information Technology
61An active learning machine technique based prediction of cardiovascular heart disease from UCI-repository databaseSrinivasan S.; Gunasekaran S.; Mathivanan S.K.; M. B B.A.M.; Jayagopal P.; Dalu G.T.Scientific Reports
62A Deep Learning Approach to Detect Microsleep Using Various Forms of EEG SignalSangeetha S.K.B.; Mathivanan S.K.; Muthukumaran V.; Pughazendi N.; Jayagopal P.; Uddin M.S.Mathematical Problems in Engineering
63Prescreening and Triage of COVID-19 Patients Through Chest X-Ray Images Using Deep Learning ModelRajendran S., Panneerselvam R.K., Kumar P.J., Rajasekaran V.A., Suganya P., Mathivanan S.K., Jayagopal P.Big Data
64Breast Cancer Classification Using Synthesized Deep Learning Model with Metaheuristic Optimization AlgorithmThirumalaisamy S.; Thangavilou K.; Rajadurai H.; Saidani O.; Alturki N.; Mathivanan S.K.; Jayagopal P.; Gochhait S.Diagnostics
65Detection for melanoma skin cancer through ACCF, BPPF, and CLF techniques with machine learning approachKavitha P., Ayyappan G., Jayagopal P., Mathivanan S.K., Mallik S., Al-Rasheed A., Alqahtani M.S., Soufiene B.O.BMC Bioinformatics
66Detection and classification of brain tumor using hybrid deep learning modelsBabu Vimala B., Srinivasan S., Mathivanan S.K., Mahalakshmi, Jayagopal P., Dalu G.T.Scientific Reports
67Detection and classification of adult epilepsy using hybrid deep learning approachSrinivasan S.; Dayalane S.; Mathivanan S.; Rajadurai H.; Jayagopal P.; Dalu G.T.Scientific Reports
68A Block-Based Feature Selection Method for Classification of Web PagesAbdullah A.; Sandeep Kumar M.; Prabhu J.; Balusamy B.International Journal of Intelligent Systems and Applications in Engineering
69Deep learning models for predicting the position of the head on an X-ray image for Cephalometric analysisPrasanna K.; Jyothi C.B.; Mathivanan S.K.; Jayagopal P.; Saif A.; Samuel D.J.Intelligent Data Analysis
70Classifying distinct emotions from parents of ASD child using EEG source data by combining Bernoulli Laplace Prior and graph neural networksArulDass S.D.; Jayagopal P.Neural Computing and Applications
71Prescreening and Triage of COVID-19 Patients Through Chest X-Ray Images Using Deep Learning ModelRajendran S., Panneerselvam R.K., Kumar P.J., Rajasekaran V.A., Suganya P., Mathivanan S.K., Jayagopal P.Big Data
72A mutual certificate-based data privacy scheme for ubiquitous and sustainable computing system usersDamodhar T.S.B.; Anandan P.; Nalini C.; Jerlin M.A.; Victor A.; Anusha K.; Jothilakshmi R.Sustainable Energy Technologies and Assessments
73Cloud-Based Quad Deep Ensemble Framework for the Detection of COVID-19 Omicron and Delta VariantsTiwari R.S., Dandabani L., Das T.K., Khan S.B., Basheer S., Alqahtani M.S.Diagnostics
74Enhancing Diagnostic Decision-Making: Ensemble Learning Techniques for Reliable Stress Level ClassificationAnand R.V., Md A.Q., Urooj S., Mohan S., Alawad M.A., C A.Diagnostics
75Analysis of Deep Learning Methods for Healthcare Sector-Medical Imaging Disease DetectionSahu H., Kashyap R., Bhatia S., Dewangan B.K., Alkhaldi N.A., Babu S.A., Mohan S.Contemporary Mathematics (Singapore)
76Novel framework based on ensemble classification and secure feature extraction for COVID-19 critical health predictionPriyadarshini R.; Quadir Md A.; Mohan S.; Alghamdi A.; Alrizq M.; Mohamad U.H.; Ahmadian A.Engineering Applications of Artificial Intelligence
77A Cluster-Based Energy-Efficient Secure Optimal Path-Routing Protocol for Wireless Body-Area Sensor NetworksDass R.; Narayanan M.; Ananthakrishnan G.; Kathirvel Murugan T.; Nallakaruppan M.K.; Somayaji S.R.K.; Arputharaj K.; Khan S.B.; Almusharraf A.Sensors
78Unlocking the Potential of Digital Twins: A Comprehensive Review of Concepts, Frameworks, and Industrial ApplicationsManickam S., Yarlagadda L., Gopalan S.P., Chowdhary C.L.IEEE Access
79Digital Twin: Exploring the Intersection of Virtual and Physical WorldsMenon D.; Anand B.; Chowdhary C.L.IEEE Access
80FedEHR: A Federated Learning Approach towards the Prediction of Heart Diseases in IoT-Based Electronic Health RecordsBebortta S.; Tripathy S.S.; Basheer S.; Chowdhary C.L.Diagnostics
81GEMM, a Genetic Engineering-based Mutual Model for Resource Allocation of Grid ComputingSharma S.K.; Chaurasia A.; Sharma V.S.; Chowdhary C.L.; Basheer S.IEEE Access
82An Astute Automaton Model for Objects Extraction Using Outer Totality Cellular Automata (OTCA)Sharma S.K.; Sharma V.S.; Basheer S.; Chaurasia A.; Chowdhary C.L.IEEE Access
83From Fake Reviews to Fake News: A Novel Pandemic Model of Misinformation in Digital NetworksGovindankutty S.; Gopalan S.P.Journal of Theoretical and Applied Electronic Commerce Research
84Modeling Rumor Spread and Influencer Impact on Social NetworksGovindankutty S.; Padinjappurathu Gopalan S.IEEE Access
85Unlocking the Potential of Digital Twins: A Comprehensive Review of Concepts, Frameworks, and Industrial ApplicationsManickam S., Yarlagadda L., Gopalan S.P., Chowdhary C.L.IEEE Access
86An Efficient Intrusion Detection System to Combat Cyber Threats using a Deep Neural Network ModelRamaiah M., Vanmathi C., Khan M.Z., Vanitha M., Deepa M.Journal of ICT Research and Applications
87Embedded Based Quadratic Boost Converter With Sliding Mode Controller for the Integration of Solar Photo-Voltaic Source With MicrogridS C.S., Govindaraj R., Chowdhury S., Singh S., Khan B.IEEE Journal of the Electron Devices Society
88IDISense: IOT-based Dam Water Disaster Sensing and Prevention SystemBraveen M.; Anusha K.; Jerlin M.A.; Seetha R.; Sampath N.IEEE Sensors Journal
89A comprehensive review on trust management approaches in fog computingKarthikeyan P., Brindha K.Journal of Intelligent and Fuzzy Systems
90Blind nonlinear unmixing using nonnegative matrix factorization based bi-objective autoencoderBhakthan S.M.; Loganathan A.; Bansal A.Indonesian Journal of Electrical Engineering and Computer Science
91Multi-image Feature Map-Based Watermarking Techniques Using TransformerPalani A.; Loganathan A.International Journal of Electrical and Electronics Research
92Intelligent Abstractive Text Summarization using Hybrid Word2Vec and Swin Transformer for Long DocumentsMishra G.; Sethi N.; Agilandeeswari L.; Hu Y.-C.International Journal of Computer Information Systems and Industrial Management Applications
93Vision Transformer-Based Watermark Generation for Authentication and Tamper Detection Using Schur Decomposition and Hybrid TransformsAberna P.; Agilandeeswari L.; Bansal A.International Journal of Computer Information Systems and Industrial Management Applications
94Non-redundant shift-invariant complex wavelet transform and fractional gorilla troops optimization-based deep convolutional neural network for video watermarkingMali S.D.; Agilandeeswari L.Journal of King Saud University – Computer and Information Sciences
95Paradigm Shift Towards Federated Learning for COVID-19 Detection: A SurveyKrithika L.B.Iraqi Journal of Science
96A Multi-Round Zero Knowledge Proof Algorithm for Secure IoT and Blockchain EnvironmentsRani D.C.; Janakiraman S.G.; Chandra K.S.; Thangavel E.P.; Kothamasu G.A.; Bhaskaran K.L.; Jayabalasamy G.International Journal of Safety and Security Engineering
97Hybrid Deep Learning Algorithms for Dog Breed Identification – A Comparative AnalysisValarmathi B.; Srinivasa Gupta N.; Prakash G.; Hemadri Reddy R.; Saravanan S.; Shanmugasundaram P.IEEE Access
98Federated Learning for the Healthcare Metaverse: Concepts, Applications, Challenges, and Future DirectionsBashir A.K.; Victor N.; Bhattacharya S.; Huynh-The T.; Chengoden R.; Yenduri G.; Maddikunta P.K.R.; Pham Q.; Gadekallu T.R.; Liyanage M.IEEE Internet of Things Journal
99A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision SystemsRamalingam M.; Selvi G.C.; Victor N.; Chengoden R.; Bhattacharya S.; Maddikunta P.K.R.; Lee D.; Piran M.J.; Khare N.; Yenduri G.; Gadekallu T.R.IEEE Access
100A multidomain bio-inspired feature extraction and selection model for diabetic retinopathy severity classification: an ensemble learning approachUppamma P.; Bhattacharya S.Scientific Reports
101A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision SystemsRamalingam M.; Selvi G.C.; Victor N.; Chengoden R.; Bhattacharya S.; Maddikunta P.K.R.; Lee D.; Piran M.J.; Khare N.; Yenduri G.; Gadekallu T.R.IEEE Access
102Federated Learning for the Healthcare Metaverse: Concepts, Applications, Challenges, and Future DirectionsBashir A.K.; Victor N.; Bhattacharya S.; Huynh-The T.; Chengoden R.; Yenduri G.; Maddikunta P.K.R.; Pham Q.; Gadekallu T.R.; Liyanage M.IEEE Internet of Things Journal
103Artificial intelligence and blockchain technology for secure smart grid and power distribution Automation: A State-of-the-Art ReviewAyub Khan A., Ali Laghari A., Rashid M., Li H., Rehman Javed A., Reddy Gadekallu T.Sustainable Energy Technologies and Assessments
104A Generalizable Deep Neural Network Method for Detecting Attacks in Industrial Cyber-Physical SystemsSakhnini J.; Karimipour H.; Dehghantanha A.; Yazdinejad A.; Gadekallu T.R.; Victor N.; Islam A.IEEE Systems Journal
105Plant and Salamander Inspired Network Attack Detection and Data Recovery ModelSharma R.K.; Issac B.; Xin Q.; Gadekallu T.R.; Nath K.Sensors
106FLPK-BiSeNet: Federated Learning Based on Priori Knowledge and Bilateral Segmentation Network for Image Edge ExtractionTeng L.; Qiao Y.; Shafiq M.; Srivastava G.; Javed A.R.; Gadekallu T.R.; Yin S.IEEE Transactions on Network and Service Management
107A Survey on Soft Computing Techniques for Federated Learning- Applications, Challenges and Future DirectionsSupriya Y.; Gadekallu T.R.Journal of Data and Information Quality
108Novel residual hybrid machine learning for solar activity prediction in smart citiesAbdulkadir R.A.; Hasan M.K.; Islam S.; Gadekallu T.R.; Pandey B.; Safie N.; Syv j rvi M.; Nasor M.Earth Science Informatics
109A Secure Architectural Model Using Blockchain and Estimated Trust Mechanism in Electronic ConsumersKumar A., Rathee G., Kerrache C.A., Bilal M., Gadekallu T.R.IEEE Transactions on Consumer Electronics
110From Assistive Technologies to Metaverse – Technologies in Inclusive Higher Education for Students with Specific Learning Difficulties: A ReviewYenduri G.; Kaluri R.; Rajput D.S.; Lakshmanna K.; Gadekallu T.R.; Mahmud M.; Brown D.J.IEEE Access
111Landslide Hazard Zonation Mapping using MCDM Techniques A study over Kodagu District, KarnatakaSreedevi N.; Karthikeyan J.Disaster Advances
112Digital twin based Healthcare System (DTHS) for Earlier Parkinson Disease Identification and Diagnosis using Optimized Fuzzy based k-Nearest Neighbor Classifier ModelAbirami L.; Karthikeyan J.IEEE Access
113An efficient and secure compression technique for data protection using burrows-wheeler transform algorithmBegum M.B.; Deepa N.; Uddin M.; Kaluri R.; Abdelhaq M.; Alsaqour R.Heliyon
114Customer churning analysis using machine learning algorithmsPrabadevi B.; Shalini R.; Kavitha B.R.International Journal of Intelligent Networks
115An efficient and secure compression technique for data protection using burrows-wheeler transform algorithmBegum M.B.; Deepa N.; Uddin M.; Kaluri R.; Abdelhaq M.; Alsaqour R.Heliyon
116From Assistive Technologies to Metaverse – Technologies in Inclusive Higher Education for Students with Specific Learning Difficulties: A ReviewYenduri G.; Kaluri R.; Rajput D.S.; Lakshmanna K.; Gadekallu T.R.; Mahmud M.; Brown D.J.IEEE Access
117A Cluster-Based Energy-Efficient Secure Optimal Path-Routing Protocol for Wireless Body-Area Sensor NetworksDass R.; Narayanan M.; Ananthakrishnan G.; Kathirvel Murugan T.; Nallakaruppan M.K.; Somayaji S.R.K.; Arputharaj K.; Khan S.B.; Almusharraf A.Sensors
118Reliable and Efficient Model for Water Quality Prediction and ForecastingAbdullah A., Chaturvedi H., Fuladi S., Ravuri N.J., Natesan D., Nallakaruppan M.K.International Journal of Advanced Computer Science and Applications
119From Assistive Technologies to Metaverse – Technologies in Inclusive Higher Education for Students with Specific Learning Difficulties: A ReviewYenduri G.; Kaluri R.; Rajput D.S.; Lakshmanna K.; Gadekallu T.R.; Mahmud M.; Brown D.J.IEEE Access
120Multi Head Deep Neural Network Prediction Methodology for High-Risk Cardiovascular Disease on Diabetes MellitusRamesh B.; Lakshmanna K.CMES – Computer Modeling in Engineering and Sciences
121Intelligent Face Recognition based Multi-Location Linked IoT based Car Parking SystemRajyalakshmi V.; Lakshmanna K.IEEE Access
122A lightweight energy consumption ensemble-based botnet detection model for IoT/6G networksZhou J.; Hai T.; Jawawi D.N.A.; Wang D.; Lakshmanna K.; Maddikunta P.K.R.; Iwendi M.Sustainable Energy Technologies and Assessments
123TKAGFL: A Federated Communication Framework under Data HeterogeneityPei J.; Yu Z.; Li J.; Jan M.A.; Lakshmanna K.IEEE Transactions on Network Science and Engineering
124A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision SystemsRamalingam M.; Selvi G.C.; Victor N.; Chengoden R.; Bhattacharya S.; Maddikunta P.K.R.; Lee D.; Piran M.J.; Khare N.; Yenduri G.; Gadekallu T.R.IEEE Access
125A Generalizable Deep Neural Network Method for Detecting Attacks in Industrial Cyber-Physical SystemsSakhnini J.; Karimipour H.; Dehghantanha A.; Yazdinejad A.; Gadekallu T.R.; Victor N.; Islam A.IEEE Systems Journal
126A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision SystemsRamalingam M.; Selvi G.C.; Victor N.; Chengoden R.; Bhattacharya S.; Maddikunta P.K.R.; Lee D.; Piran M.J.; Khare N.; Yenduri G.; Gadekallu T.R.IEEE Access
127Federated Learning for the Healthcare Metaverse: Concepts, Applications, Challenges, and Future DirectionsBashir A.K.; Victor N.; Bhattacharya S.; Huynh-The T.; Chengoden R.; Yenduri G.; Maddikunta P.K.R.; Pham Q.; Gadekallu T.R.; Liyanage M.IEEE Internet of Things Journal
128An Optimal Topic Centric Crawler for Acquiring Bio-medical Themes Utilizing Gaussian Support Vector RegressionRajiv S., Navaneethan C.SN Computer Science
129Component-Based Test Case Generation and Prioritization Using an Improved Genetic AlgorithmPriya T.; Prasanna M.International Journal of Cooperative Information Systems
130Review on Pest Detection and Classification in Agricultural Environments Using Image-Based Deep Learning Models and Its ChallengesVenkatasaichandrakanth P., Iyapparaja M.Optical Memory and Neural Networks (Information Optics)
131From Assistive Technologies to Metaverse – Technologies in Inclusive Higher Education for Students with Specific Learning Difficulties: A ReviewYenduri G.; Kaluri R.; Rajput D.S.; Lakshmanna K.; Gadekallu T.R.; Mahmud M.; Brown D.J.IEEE Access
132A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision SystemsRamalingam M.; Selvi G.C.; Victor N.; Chengoden R.; Bhattacharya S.; Maddikunta P.K.R.; Lee D.; Piran M.J.; Khare N.; Yenduri G.; Gadekallu T.R.IEEE Access
133An Adaptive DeepLabv3+ for Semantic Segmentation of Aerial Images Using Improved Golden Eagle Optimization AlgorithmAnilkumar P.; Venugopal P.; Maddikunta P.K.R.; Gadekallu T.R.; Al-Rasheed A.; Abbas M.; Soufiene B.O.IEEE Access
134Moth Flame Optimization based ensemble classification for intrusion detection in intelligent transport system for smart citiesGadekallu T.R.; Kumar N.; Baker T.; Natarajan D.; Boopathy P.; Maddikunta P.K.R.Microprocessors and Microsystems
135Federated Learning for the Healthcare Metaverse: Concepts, Applications, Challenges, and Future DirectionsBashir A.K.; Victor N.; Bhattacharya S.; Huynh-The T.; Chengoden R.; Yenduri G.; Maddikunta P.K.R.; Pham Q.; Gadekallu T.R.; Liyanage M.IEEE Internet of Things Journal
136A lightweight energy consumption ensemble-based botnet detection model for IoT/6G networksZhou J.; Hai T.; Jawawi D.N.A.; Wang D.; Lakshmanna K.; Maddikunta P.K.R.; Iwendi M.Sustainable Energy Technologies and Assessments
137Prescreening and Triage of COVID-19 Patients Through Chest X-Ray Images Using Deep Learning ModelRajendran S., Panneerselvam R.K., Kumar P.J., Rajasekaran V.A., Suganya P., Mathivanan S.K., Jayagopal P.Big Data
138A Review of Energy-Efficient Secured Routing Algorithm for IoT-Enabled Smart Agricultural Systemskumar C.S.; Anand R.V.Journal of Biosystems Engineering
139ICSMPC: Design of an Iterative-Learning Contextual Side Chaining Model for Improving Security of Priority-Aware Cloud ResourcesBrahmam M.G.; Vijay Anand R.Journal of Grid Computing
140Customer churning analysis using machine learning algorithmsPrabadevi B.; Shalini R.; Kavitha B.R.International Journal of Intelligent Networks
141Moth Flame Optimization based ensemble classification for intrusion detection in intelligent transport system for smart citiesGadekallu T.R.; Kumar N.; Baker T.; Natarajan D.; Boopathy P.; Maddikunta P.K.R.Microprocessors and Microsystems
142Steel Strip Quality Assurance With YOLOV7-CSF: A Coordinate Attention and SIoU Fusion ApproachRaj G.D., Prabadevi B.IEEE Access
143Monitoring and Recognition of Heart Health using Heartbeat Classification with Deep Learning and IoTArulkumar V.; Vinod D.; Devipriya A.; Selvi C.G.; Surendran S.; Arif M.Journal of Machine and Computing
144A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision SystemsRamalingam M.; Selvi G.C.; Victor N.; Chengoden R.; Bhattacharya S.; Maddikunta P.K.R.; Lee D.; Piran M.J.; Khare N.; Yenduri G.; Gadekallu T.R.IEEE Access
145A Thermo-Structural Analysis of Die-Sinking Electrical Discharge Machining (EDM) of a Haynes-25 Super Alloy Using Deep-Learning-Based MethodologiesAneesh T., Mohanty C.P., Tripathy A.K., Chauhan A.S., Gupta M., Annamalai A.R.Journal of Manufacturing and Materials Processing
146Prescreening and Triage of COVID-19 Patients Through Chest X-Ray Images Using Deep Learning ModelRajendran S., Panneerselvam R.K., Kumar P.J., Rajasekaran V.A., Suganya P., Mathivanan S.K., Jayagopal P.Big Data
147NOVEL TECHNIQUE OF HEALTHCARE RECORD INDEXING AND RECOMMENDATION BASED ON TRENDING QUERIES IN SOCIAL MEDIAElankannan M., Periyasamy S.S.Computing and Informatics
148An Efficient Comparative Analysis of CNN-based Image Classification in the Jupyter Tool Using Multi-Stage TechniquesJanarthanan S.; Ganesh Kumar T.; Uma K.; Arvindhan M.; Anandhan K.; Ramesh Kumar C.International Journal on Recent and Innovation Trends in Computing and Communication
149Deep Convolutional Attention based Bidirectional Recurrent Neural Network for Measuring Correlated Colour Temperature from RGB ImagesMane S.S.; Santra A.K.International Journal on Recent and Innovation Trends in Computing and Communication
150Guided Co-operative Waderhunt Neural Network for Measuring the Temperature of Visible Heat SourceMane S.S., Santra A.K.International Journal of Intelligent Engineering and Systems
151A comprehensive survey on fuzzy-based intelligent intrusion detection system for internet of thingsNandhini U.; Kumar S.V.N.S.International Journal of Information and Computer Security
152A comprehensive survey on effective key management schemes for secured authentication in vehicular ad hoc networkJayashree S., Santhosh Kumar S.V.N.International Journal of Information and Computer Security
153A Multi-channel Convolutional Neural Network for Multilabel Sentiment Classification Using Abilify Oral User ReviewsTrueman T.E.; Jayaraman A.K.; Jasmine S.; Ananthakrishnan G.; Narayanasamy P.Informatica (Slovenia)
154A Cluster-Based Energy-Efficient Secure Optimal Path-Routing Protocol for Wireless Body-Area Sensor NetworksDass R.; Narayanan M.; Ananthakrishnan G.; Kathirvel Murugan T.; Nallakaruppan M.K.; Somayaji S.R.K.; Arputharaj K.; Khan S.B.; Almusharraf A.Sensors
155LaneScanNET: A deep-learning approach for simultaneous detection of obstacle-lane states for autonomous driving systemsShunmuga Perumal P.; Wang Y.; Sujasree M.; Tulshain S.; Bhutani S.; Suriyah M.K.; Kumar Raju V.U.Expert Systems with Applications
156An Optimal Topic Centric Crawler for Acquiring Bio-medical Themes Utilizing Gaussian Support Vector RegressionRajiv S., Navaneethan C.SN Computer Science
157A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision SystemsRamalingam M.; Selvi G.C.; Victor N.; Chengoden R.; Bhattacharya S.; Maddikunta P.K.R.; Lee D.; Piran M.J.; Khare N.; Yenduri G.; Gadekallu T.R.IEEE Access
158Safeguard confidential web information from malicious browser extension using Encryption and Isolation techniquesMarimuthu M.; Mohanraj G.; Karthikeyan D.; Vidyabharathi D.Journal of Intelligent and Fuzzy Systems
159ENHANCING RICE YIELDS IN RED SOIL THROUGH AZOTOBACTER CULTIVATIONKanna G.V.; Vijayalakshmi A.; Jothilakshmi R.; Kumar M.J.; Sumathi J.; Rajkumar M.; Koshariya A.K.Oxidation Communications
160Maximizing network efficiency by optimizing channel allocation in wireless body area networks using machine learning techniquesRao V.C.S.; Shanmathi M.; Rajkumar M.; Haleem S.L.A.; Amirthalingam V.; Vanathi A.Internet Technology Letters
161Empowering autonomous indoor navigation with informed machine learning techniquesUganya G.; Bremnavas I.; Prashanth K.V.; Rajkumar M.; Lalitha R.V.S.; Singh C.Computers and Electrical Engineering
162Cluster-Based Protocol for Prioritized Message Communication in VANETSaha S.; Kumar V.V.; Niveditha V.R.; Kannan V.A.; Gunasekaran K.; Venkatesan K.IEEE Access
163Efficient Assamese Word Recognition for Societal Empowerment: A Comparative Feature-Based Analysis.Borah N.; Baruah U.; Mahesh T.; Vinoth Kumar V.; Ramya Dorai D.; Annad J.R.IEEE Access
164The stratified K-folds cross-validation and class-balancing methods with high-performance ensemble classifiers for breast cancer classificationT R M.; V V.K.; V D.K.; Geman O.; Margala M.; Guduri M.Healthcare Analytics
165Ensemble of Homogenous and Heterogeneous Classifiers using K-Fold Cross Validation with Reduced EntropyVenkatarathinam R.; Sivakami R.; Christodoss P.R.; Mahesh T.R.; Mohan E.; Kumar V.V.International Journal on Recent and Innovation Trends in Computing and Communication
166Ensemble Federated Learning Approach for Diagnostics of Multi-Order Lung CancerSubashchandrabose U.; John R.; Anbazhagu U.V.; Venkatesan V.K.; Thyluru Ramakrishna M.Diagnostics
167Multiclass Paddy Disease Detection Using Filter-Based Feature Transformation TechniqueBharanidharan N.; Sannasi Chakravarthy S.R.; Rajaguru H.; Vinoth Kumar V.; Mahesh T.R.; Guluwadi S.IEEE Access
168Analysis and Attack Detection in GSM Mobile Network With an Intelligent Jammer Using ANFIS ClassifierSivaprakash S.; Anbazhagu U.V.; Perumal I.; Vinoth Kumar V.; Mahesh T.R.; Guluwadi S.IEEE Access
169A Deep Learning Framework with an Intermediate Layer Using the Swarm Intelligence Optimizer for Diagnosing Oral Squamous Cell CarcinomaNagarajan B., Chakravarthy S., Venkatesan V.K., Ramakrishna M.T., Khan S.B., Basheer S., Albalawi E.Diagnostics
170Cancer Diagnosis through Contour Visualization of Gene Expression Leveraging Deep Learning TechniquesVenkatesan V.K., Kuppusamy Murugesan K.R., Chandrasekaran K.A., Thyluru Ramakrishna M., Khan S.B., Almusharraf A., Albuali A.Diagnostics
171Prediction of Water Quality using SoftMax-ELM optimized using Adaptive Crow-Search AlgorithmSannasi Chakravarthy S.R., Bharanidharan N., Venkatesan V.K., Abbas M., Rajaguru H., Mahesh T.R., Venkatesan K.IEEE Access
172Optimizing Heterogeneity in IoT Infra Using Federated Learning and Blockchain-based Security StrategiesMuthukumaran V., Sivakami R., Venkatesan V.K., Balajee J., Mahesh T.R., Mohan E., Swapna B.International Journal of Computers, Communications and Control
173Trustworthy Artificial Intelligence and Automatic Morse Code Based Communication Recognition with Eye TrackingMedichalam K., Vijayarajan V., Kumar V.V., Iyer I.M., Vanukuri Y.K., Prasath V.B.S., Swapna B.Journal of Mobile Multimedia
174Crop Information Retrieval Framework Based on LDW-Ontology and SNM-BERT TechniquesEzhilarasi K.; Hussain D.M.; Sowmiya M.; Krishnamoorthy N.Information Technology and Control
175Image Processing Using Feature-Based Segmentation Techniques for the Analysis of Medical ImagesRanjith C.P., Natarajan K., Madhuri S., Ramakrishna M.T., Bhat C.R., Venkatesan V.K.Engineering Proceedings
176Multiple Disease Detection using Machine Learning TechniquesAcharya D.; Eashwer K.; Kumar S.; Sivakumar R.; Kishoreraja P.C.; Srinivasagan R.International journal of online and biomedical engineering
177Safeguard confidential web information from malicious browser extension using Encryption and Isolation techniquesMarimuthu M.; Mohanraj G.; Karthikeyan D.; Vidyabharathi D.Journal of Intelligent and Fuzzy Systems
178Improving Data Processing Speed on Large Datasets in a Hadoop Multi-node Cluster using Enhanced Apriori AlgorithmSundarakumar M.R.; Sharma R.; Fathima S.K.; Gokul Rajan V.; Dhayanithi J.; Marimuthu M.; Mohanraj G.; Sharma A.; Johny Renoald A.Journal of Intelligent and Fuzzy Systems
179Multiclass Paddy Disease Detection Using Filter-Based Feature Transformation TechniqueBharanidharan N.; Sannasi Chakravarthy S.R.; Rajaguru H.; Vinoth Kumar V.; Mahesh T.R.; Guluwadi S.IEEE Access
180A Deep Learning Framework with an Intermediate Layer Using the Swarm Intelligence Optimizer for Diagnosing Oral Squamous Cell CarcinomaNagarajan B., Chakravarthy S., Venkatesan V.K., Ramakrishna M.T., Khan S.B., Basheer S., Albalawi E.Diagnostics
181Prediction of Water Quality using SoftMax-ELM optimized using Adaptive Crow-Search AlgorithmSannasi Chakravarthy S.R., Bharanidharan N., Venkatesan V.K., Abbas M., Rajaguru H., Mahesh T.R., Venkatesan K.IEEE Access
182ZTMP: Zero Touch Management Provisioning Algorithm for the On-boarding of Cloud-native Virtual Network FunctionsArulappan A.; Raja G.; Bashir A.K.; Mahanti A.; Omar M.Mobile Networks and Applications
183Performance analysis of smart optimization antenna for wireless networksAbraham J.; Suriyan K.; Jackson B.; Natarajan M.; Lakshmanaperumal T.M.International Journal of Electrical and Computer Engineering
184A Novel Energy Efficient Multi-Dimensional Virtual Machines Allocation and Migration at the Cloud Data CenterSharma N.K.; Bojjagani S.; Reddy Y.C.A.P.; Vivekanandan M.; Srinivasan J.; Maurya A.K.IEEE Access
185Retracing-efficient IoT model for identifying the skin-related tags using automatic lumen detectionVivekananda G.N.; Almufti S.M.; Suresh C.; Samsudeen S.; Devarajan M.V.; Srikanth R.; Jayashree S.Intelligent Data Analysis
186Next generation WDM-radio over fiber passive optical network: deep neural network based performance analysisLawrence J.J.; Shanmuganathan V.; Manoharan R.; Ramachandran S.; Aly M.H.; Chakrabarti P.Optical and Quantum Electronics
187Machine learning in photosynthesis: Prospects on sustainable crop developmentVarghese R.; Cherukuri A.K.; Doddrell N.H.; Doss C.G.P.; Simkin A.J.; Ramamoorthy S.Plant Science
188A critical review of machine-learning for multi-omics marine metabolite datasetsManochkumar J.; Cherukuri A.K.; Kumar R.S.; Almansour A.I.; Ramamoorthy S.; Efferth T.Computers in Biology and Medicine
189Internet of things in Healthcare: a conventional literature reviewSingh B.; Lopez D.; Ramadan R.Health and Technology
190A Review of Deep Transfer Learning Strategy for Energy ForecastingSankari S.S., Kumar P.S.Nature Environment and Pollution Technology
191Exploring Huntington s Disease Diagnosis via Artificial Intelligence Models: A Comprehensive ReviewGanesh S., Chithambaram T., Krishnan N.R., Vincent D.R., Kaliappan J., Srinivasan K.Diagnostics
192Advancing genome editing with artificial intelligence: opportunities, challenges, and future directionsDixit S., Kumar A., Srinivasan K., Vincent P.M.D.R., Ramu Krishnan N.Frontiers in Bioengineering and Biotechnology
193A Review on the Use of Modern Computational Methods in Alzheimer s Disease-Detection and PredictionDe A.; Mishra T.K.; Saraf S.; Tripathy B.; Reddy S.S.Current Alzheimer Research
194Exploring Huntington s Disease Diagnosis via Artificial Intelligence Models: A Comprehensive ReviewGanesh S., Chithambaram T., Krishnan N.R., Vincent D.R., Kaliappan J., Srinivasan K.Diagnostics
195Advancing genome editing with artificial intelligence: opportunities, challenges, and future directionsDixit S., Kumar A., Srinivasan K., Vincent P.M.D.R., Ramu Krishnan N.Frontiers in Bioengineering and Biotechnology
196Computer Vision Based Machine Learning and Deep Learning Approaches for Identification of Nutrient Deficiency in Crops: A SurveySudhakar M.; Swarna Priya R.M.Nature Environment and Pollution Technology
197Internet of things in Healthcare: a conventional literature reviewSingh B.; Lopez D.; Ramadan R.Health and Technology
198Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and DefensesMuhammad Z.; Anwar Z.; Javed A.R.; Saleem B.; Abbas S.; Gadekallu T.R.Technologies
199Artificial Intelligence for Cognitive Health Assessment: State-of-the-Art, Open Challenges and Future DirectionsJaved A.R.; Saadia A.; Mughal H.; Gadekallu T.R.; Rizwan M.; Maddikunta P.K.R.; Mahmud M.; Liyanage M.; Hussain A.Cognitive Computation
200Strength of Deep Learning-based Solutions to Secure Healthcare IoT: A Critical ReviewMathew A.T.; Mani P.Open Biomedical Engineering Journal
201Artificial Intelligence for Cognitive Health Assessment: State-of-the-Art, Open Challenges and Future DirectionsJaved A.R.; Saadia A.; Mughal H.; Gadekallu T.R.; Rizwan M.; Maddikunta P.K.R.; Mahmud M.; Liyanage M.; Hussain A.Cognitive Computation
202Amalgamation of Blockchain with resource-constrained IoT devices for healthcare applications State of art, challenges and future directionsHegde P.; Maddikunta P.K.R.International Journal of Cognitive Computing in Engineering
203On routing algorithms in the internet of vehicles: a surveySahoo A.; Kumar Tripathy A.Connection Science
204Strength of Deep Learning-based Solutions to Secure Healthcare IoT: A Critical ReviewMathew A.T.; Mani P.Open Biomedical Engineering Journal
2022
SL. NO.TITLE OF PAPERNAME OF THE AUTHOR/SNAME OF JOURNAL
1Blockchain for Internet of Underwater Things: State-of-the-Art, Applications, Challenges, and Future DirectionsBhattacharya S., Victor N., Chengoden R., Ramalingam M., Selvi G.C., Maddikunta P.K.R., Donta P.K., Dustdar S., Jhaveri R.H., Gadekallu T.R.Sustainability (Switzerland)
2Security Framework for Internet of Things based Software Defined Networks using BlockchainRani S., Babbar H., Srivastava G., Gadekallu T.R., Dhiman G.IEEE Internet of Things Journal
3Blockchain-Based Two-Stage Federated Learning With Non-IID Data in IoMT SystemLian Z., Zeng Q., Wang W., Gadekallu T.R., Su C.IEEE Transactions on Computational Social Systems
4Automatic 3D Facial Landmark-Based Deformation Transfer on Facial Variants for Blendshape GenerationIngale A.K., Leema A.A., kim H.S., Udayan J.D.Arabian Journal for Science and Engineering
5Multi-tier block truncation coding model using genetic auto encoders for gray scale imagesRajasoundaran S., Santhosh Kumar S.V.N., Selvi M., Ganapathy S., Kannan A.Multimedia Tools and Applications
6Two-phase classification: ANN and A-SVM classifiers on motor imagery BCIMary Judith A., Baghavathi Priya S., Mahendran R.K., Gadekallu T.R., Ambati L.S.Asian Journal of Control
7Polygonal approximation for digital image boundary using firefly algorithmRaja K.T., Ray B.K.Journal of Electronic Imaging
8Modelling of different On-Chip inductors for radio frequency integrated circuitsMuneeswaran D., Subramani J., Pandi T., Chenniappan N., Shanmugam M.Comptes Rendus de L’Academie Bulgare des Sciences
9Web Hazard Identification and Detection Using Deep Learning – A Comparative StudySivanantham S., Krishnamoorthy V., Karthikeyan D., Sakthivel M., Mohanraj V., Akshaya V.Journal of Pharmaceutical Negative Results
10Categorical Data Clustering Using Harmony Search Algorithm for Healthcare DatasetsSharma A., Kumar P., Babulal K.S., Obaid A.J., Patel H.International Journal of E-Health and Medical Communications
11Ensuring prompt cloud service provider based on service level agreement using fuzzy logics and decision support systemKarthikeyan P., Sathiyamoorthy E.International Journal of Intelligent Enterprise
12Information security protection for eHealth records using temporal hash signatureCharanya R., Saravanaguru R.A.K., Aramudhan M.International Journal of Intelligent Enterprise
13Secure Communication Model for Dynamic Task Offloading in Multi-Cloud EnvironmentUsharani C., Krishna P.V., Akki P., Saritha V., Gitanjali J.International Journal on Recent and Innovation Trends in Computing and Communication
14ILAT (Software as a Service): Interactive Learning Application Tool for Autism Screening and Assessment in children with Autism Spectrum DisorderArivuselvan K., Nadesh R.K., Perumal R.S.International Journal on Recent and Innovation Trends in Computing and Communication
15Edge Computing and Blockchain in Smart Agriculture SystemsPrasad Ch.G.V.N., Mallareddy A., Pounambal M., Velayutham V.International Journal on Recent and Innovation Trends in Computing and Communication
16Mixed Game-Based AoI Optimization for Combating COVID-19 With AI BotsYang Y., Wang W., Yin Z., Xu R., Zhou X., Kumar N., Alazab M., Gadekallu T.R.IEEE Journal on Selected Areas in Communications
17Covert communication for cooperative NOMA with two phases detectionPeng H., Tian Z., Li X., Wang W., Nauryzbayev G., Rabie K., Gadekallu T.R.Alexandria Engineering Journal
18Spatiotemporal Assessment of Satellite Image Time Series for Land Cover Classification Using Deep Learning Techniques: A Case Study of Reunion Island, FranceNavnath N.N., Chandrasekaran K., Stateczny A., Sundaram V.M., Panneer P.Remote Sensing
19Skin lesion classification of dermoscopic images using machine learning and convolutional neural networkShetty B., Fernandes R., Rodrigues A.P., Chengoden R., Bhattacharya S., Lakshmanna K.Scientific Reports
20Conceptualising a channel-based overlapping CNN tower architecture for COVID-19 identification from CT-scan imagesTiwari R.S., D L., Das T.K., Srinivasan K., Chang C.-Y.Scientific Reports
21Smart Water Resource Management Using Artificial Intelligence A ReviewKrishnan S.R., Nallakaruppan M.K., Chengoden R., Koppu S., Iyapparaja M., Sadhasivam J., Sethuraman S.Sustainability (Switzerland)
22A Study of the Impacts of Air Pollution on the Agricultural Community and Yield Crops (Indian Context)Pandya S., Gadekallu T.R., Maddikunta P.K.R., Sharma R.Sustainability (Switzerland)
23Dingo Optimization Based Cluster Based Routing in Internet of ThingsAravind K., Maddikunta P.K.R.Sensors
24Security in IoT Mesh Networks based on Trust SimilarityKavitha A., Reddy V.B., Singh N., Gunjan V.K., Lakshmanna K., Khan A.A., Wechtaisong C.IEEE Access
25Energy Efficient End Device Aware Solution Through SDN in Edge-Cloud PlatformPatra S.S., Govindaraj R., Chowdhury S., Shah M.A., Patro R., Rout S.IEEE Access
26Survey on the Applications of Blockchain in AgricultureL.B K.Agriculture (Switzerland)
27Incorporation of Energy Efficient Computational Strategies for Clustering and Routing in Heterogeneous Networks of Smart CityVenkatesan V.K., Izonin I., Periyasamy J., Indirajithu A., Batyuk A., Ramakrishna M.T.Energies
28Framework for Handling Rare Word Problems in Neural Machine Translation System Using Multi-Word ExpressionsGarg K.D., Shekhar S., Kumar A., Goyal V., Sharma B., Chengoden R., Srivastava G.Applied Sciences (Switzerland)
29Simulating crop yield estimation and prediction through geospatial data for specific regional analysisMathivanan S.K., Jayagopal P.Earth Science Informatics
30Distributed-Ledger-Based Blockchain Technology for Reliable Electronic Voting System with Statistical AnalysisCh R., Kumari D J., Gadekallu T.R., Iwendi C.Electronics (Switzerland)
31Detection and Classification of Tomato Crop Disease Using Convolutional Neural NetworkSakkarvarthi G., Sathianesan G.W., Murugan V.S., Reddy A.J., Jayagopal P., Elsisi M.Electronics (Switzerland)
32A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature OptimizationGautam S., Henry A., Zuhair M., Rashid M., Javed A.R., Maddikunta P.K.R.Electronics (Switzerland)
33DocCompare: An Approach to Prevent the Problem of Character Injection in Document Similarity AlgorithmNamburu A., Surendran A., Balaji S.V., Mohan S., Iwendi C.Mathematics
34Optimized face-emotion learning using convolutional neural network and binary whale optimizationMuthamilselvan T., Brindha K., Senthilkumar S., Saransh, Chatterjee J.M., Hu Y.-C.Multimedia Tools and Applications
35Terahertz Micro-Strip Patch Antenna Design and Modelling for 6G Mobile CommunicationJeyakumar P., Anandpushparaj J., Thanapal P., Meenatchi S., Dhamodaran M.Journal of Electrical Engineering and Technology
36The Effectual Spectrum Defragmentation Algorithm with Holding Time Sensitivity in Elastic Optical Network (EON)Selva Kumar S., Kamalakannan J., Seetha R., Asha N., Raja K.T., Sree Dharinya S., Sucharitha M., Kalaivani S.International Journal of Optics
37A Hybrid Deep Learning Based Assist System for Detection and Classification of Breast Cancer from Mammogram ImagesNarayanan L., Krishnan S., Robinson H.International Arab Journal of Information Technology
38Heterogeneous sensor data fusion acquisition model for medical applicationsDhanke J., Pradeepa M., Karthik R., Rampur V., Poonguzhali I., Chittapragada H.Measurement: Sensors
39Survival Study on Different Water Quality Prediction Methods Using Machine LearningKalaivanan K., Vellingiri J.Nature Environment and Pollution Technology
40A High Secured Steganalysis Using QVDHC ModelAkki P., Gitanjali J., Iwendi C., Sumathy S., Waheed A.International Journal on Recent and Innovation Trends in Computing and Communication
41Modelling microscale impacts assessment of urban expansion on seasonal surface urban heat island intensity using neural network algorithmsSaha M., Kafy A.-A., Bakshi A., Faisal A.-A., Almulhim A.I., Rahaman Z.A., Al Rakib A., Fattah M.A., Akter K.S., Rahman M.T., Zhang M., Rathi R.Energy and Buildings
42Principal component analysis on face recognition using artificial firefirefly swarm optimization algorithmAsha N., Syed Fiaz A.S., Jayashree J., Vijayashree J., Indumathi J.Advances in Engineering Software
43Digital Twins for Healthcare 4.0 – Recent Advances, Architecture, and Open ChallengesAlazab M., Khan L.U., Koppu S., Ramu S.P., M I., Boobalan P., Baker T., Maddikunta P.K.R., Gadekallu T.R., Aljuhani A.IEEE Consumer Electronics Magazine
44Curve-Aware Model Predictive Control (C-MPC) Trajectory Tracking for Automated Guided Vehicle (AGV) over On-Road, In-Door, and Agricultural-LandManikandan S., Kaliyaperumal G., Hakak S., Gadekallu T.R.Sustainability (Switzerland)
45Rice plant disease classification using dilated convolutional neural network with global average poolingSenthil Pandi S., Senthilselvi A., Gitanjali J., ArivuSelvan K., Gopal J., Vellingiri J.Ecological Modelling
46Analysis on the Bus Arrival Time Prediction Model for Human-Centric Services Using Data Mining TechniquesShanthi N., Sathishkumar V.E., Upendra Babu K., Karthikeyan P., Rajendran S., Allayear S.M.Computational Intelligence and Neuroscience
47Design and Analysis of Multilayered Neural Network-Based Intrusion Detection System in the Internet of Things NetworkSangeetha S.K.B., Mani P., Maheshwari V., Jayagopal P., Sandeep Kumar M., Allayear S.M.Computational Intelligence and Neuroscience
48An Efficient Signal Processing Algorithm for Detecting Abnormalities in EEG SignalSyamsundararao T., Selvarani A., Rathi R., ViniContrast Media and Molecular Imaging
49Computational and Mathematical Methods in Medicine Glioma Brain Tumor Detection and Classification Using Convolutional Neural NetworkSaravanan S., Kumar V.V., Sarveshwaran V., Indirajithu A., Elangovan D., Allayear S.M.Computational and Mathematical Methods in Medicine
50A High-Capacity Reversible Data-Hiding Scheme for Medical Image Transmission Using Modified Elias Gamma EncodingManikandan V.M., Murthy K.S.R., Siddineni B., Victor N., Maddikunta P.K.R., Hakak S.Electronics (Switzerland)
51Optimal resource scheduling algorithm for cell boundaries users in heterogenous 5G networksGatti R., Arjun Kumar G.B., Sunil Kumar K.N.,Palle S., Gadekallu T.R.Physical Communication
52Influences of Aqueous Nanofluid Emulsion on Diesel Engine Performance, Combustion, and Emission: IoT (Emission Monitoring System)Venkatesh B., Babu J.C., Mathivanan S.K., Jayagopal P., Prasanna S.,Uddin M.S.Advances in Materials Science and Engineering
53Deep Learning Based Load Forecasting with Decomposition and Feature Selection TechniquesSubbiah S.S., Kumar S.P.Journal of Scientific and Industrial Research
54Identifying peanut maturity based on Hyper Spectral Invariant Scaled Feature Selection using Adaptive Dense Net Recurrent Neural NetworkM B., C N.Measurement: Sensors
55An overview of internet engineering task force mobility management protocols: approaches and its challengesMahenthiran P., Muruganadam D.International Journal of Electrical and Computer Engineering
56Cardiac disease detection using cuckoo search enabled deep belief networkP N., Narayan S.Intelligent Systems with Applications
57Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart AgricultureChaganti R., Varadarajan V., Gorantla V.S.,Gadekallu T.R., Ravi V.Future Internet
58Design of resource matching model of intelligent education system based on machine learningXiang C.-Z., Fu N.-X., Gadekallu T.R.EAI Endorsed Transactions on Scalable Information Systems
59Towards computational solutions for precision medicine based big data healthcare system using deep learning models: A reviewThirunavukarasu R., C G.P.D., R G., Gopikrishnan M., Palanisamy V.Computers in Biology and Medicine
60Tear film breakup time-based dry eye disease detection using convolutional neural networkVyas A.H., Mehta M.A., Kotecha K., Pandya S., Alazab M., Gadekallu T.R.Neural Computing and Applications
61Federated Learning for intrusion detection system: Concepts, challenges and future directionsAgrawal S., Sarkar S., Aouedi O., Yenduri G., Piamrat K., Alazab M., Bhattacharya S., Maddikunta P.K.R., Gadekallu T.R.Computer Communications
62A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer DiagnosisRehman M.U., Shafique A., Ghadi Y.Y., Boulila W., Jan S.U., Gadekallu T.R., Driss M., Ahmad J.IEEE Transactions on Network Science and Engineering
63Optimization driven model and segmentation network for skin cancer detectionAnup Kumar K., Vanmathi C.Computers and Electrical Engineering
64ECDSA-Based Water Bodies Prediction from Satellite Images with UNetCh A., Ch R., Gadamsetty S., Iwendi C., Gadekallu T.R.,Water (Switzerland)
65Green-Tech CAV: Next Generation Computing for Traffic Sign and Obstacle Detection in Connected and Autonomous VehiclesKumar V.D.A., Raghuraman M., Kumar A., Rashid M., Hakak S., Reddy M.P.K.IEEE Transactions on Green Communications and Networking
666G Driven Fast Computational Networking Framework for Healthcare ApplicationsSrinivasu P.N., Ijaz M.F., Shafi J., Wozniak M., Sujatha R.IEEE Access
67Privacy Preserving Attribute-Focused Anonymization Scheme for Healthcare Data PublishingOnesimu J.A., Karthikeyan J., Eunice J., Pomplun M., Dang H.IEEE Access
68Dynamic resource provisioning and secured file sharing using virtualization in cloud azurePerumal K., Mohan S., Frnda J., Divakarachari P.B.Journal of Cloud Computing
69A Web-Based Model to Predict a Neurological Disorder Using ANNAlmazroi A.A., Alamin H., Sujatha R., Jhanjhi N.Z.Healthcare (Switzerland)
70Addressing Binary Classification over Class Imbalanced Clinical Datasets Using Computationally Intelligent TechniquesKumar V., Lalotra G.S., Sasikala P., Rajput D.S., Kaluri R., Lakshmanna K., Shorfuzzaman M., Alsufyani A., Uddin M.Healthcare (Switzerland)
71Multiconvolutional Transfer Learning for 3D Brain Tumor Magnetic Resonance ImagesSangeetha S.K.B., Muthukumaran V., Deeba K., Rajadurai H., Maheshwari V., Dalu G.T.Computational Intelligence and Neuroscience
72Investigation of Applying Machine Learning and Hyperparameter Tuned Deep Learning Approaches for Arrhythmia Detection in ECG ImagesShanmugavadivel K., Sathishkumar V.E., Kumar M.S., Maheshwari V., Prabhu J., Allayear S.M.Computational and mathematical methods in medicine
73Analysis on COVID-19 Infection Spread Rate during Relief Schemes Using Graph Theory and Deep LearningPalanivinayagam A., Panneerselvam R.K., Kumar P.J., Rajadurai H., Maheshwari V., Allayear S.M.Computational and Mathematical Methods in Medicine
74IoT-Cloud-Based Smart Healthcare Monitoring System for Heart Disease Prediction via Deep LearningNancy A.A., Ravindran D., Raj Vincent P.M.D., Srinivasan K., Gutierrez Reina D.Electronics (Switzerland)
75Genetic Clustered Federated Learning for COVID-19 DetectionKandati D.R., Gadekallu T.R.Electronics (Switzerland)
76Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification ApproachSelvaraj N.P., Paulraj S., Ramadass P., Kaluri R., Shorfuzzaman M., Alsufyani A., Uddin M.Electronics (Switzerland)
77SWIN transformer based contrastive self- supervised learning for animal detection and classificationAgilandeeswari L., Meena S.D.Multimedia Tools and Applications
78Improved COVID-19 detection with chest x- ray images using deep learningGupta V., Jain N., Sachdeva J., Gupta M., Mohan S., Bajuri M.Y., Ahmadian A.Multimedia Tools and Applications
79Utilizing satellite and UAV data for crop yield prediction and monitoring through deep learningMathivanan S.K., Jayagopal P.Acta Geophysica
80Traffic flow prediction in inland waterways of Assam region using uncertain spatiotemporal correlative featuresMuthukumaran V., Natarajan R., Kaladevi A.C., Magesh G., Babu S.Acta Geophysica
81Comprehensive analysis on sensor node fault management schemes in wireless sensor networksBabu N., Santhosh Kumar S.V.N.International Journal of Communication Systems
82Edge computing network resource allocation based on virtual network embeddingZhan K., Chen N., Santhosh Kumar S.V.N., Kibalya G., Zhang P., Zhang H.International Journal of Communication Systems
83An Enhanced Triadic Color Scheme for Content-Based Image RetrievalSangeetha S.K.B., Mathivanan S.K., Pandi T., Arivu Selvan K., Jayagopal P., Teshite Dalu G.Mathematical Problems in Engineering
84G-Sep: A Deep Learning Algorithm for Detection of Long-Term Sepsis Using Bidirectional Gated Recurrent UnitRajmohan R., Kumar T.A., Julie E.G., Robinson Y.H., Vimal S., Kadry S., Crespo R.G.International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
85A narrative review of medical image processing by deep learning models: Origin to COVID-19Mareeswari V., Vijayan R., Sathiyamoorthy E., Ephzibah E.P.International Journal of Advanced Technology and Engineering Exploration
86Evaluation of Dietary Habits in Relation to Covid-19 Mortality Rate Using Machine Learning TechniquesSujatha R., Chatterjee J.M., Thorunitha S.S., Nadhiya S.Journal of System and Management Sciences
87A Deep Multimodal Adversarial Cycle- Consistent Network for Smart Enterprise SystemLi P., Laghari A.A., Rashid M., Gao J., Gadekallu T.R., Javed A.R., Yin S.IEEE Transactions on Industrial Informatics
88Energy efficient fault tolerance techniques in green cloud computing: A systematic survey and taxonomyBharany S., Badotra S., Sharma S., Rani S., Alazab M., Jhaveri R.H., Reddy Gadekallu T.Sustainable Energy Technologies and Assessments
89Color contour texture based peanut classification using deep spread spectral features classification model for assortment identificationBalasubramaniyan M., Navaneethan C.Sustainable Energy Technologies and Assessments
90Incentive techniques for the Internet of Things: A surveyMaddikunta P.K.R., Pham Q.-V., Nguyen D.C., Huynh-The T., Aouedi O., Yenduri G., Bhattacharya S., Gadekallu T.R.Journal of Network and Computer Applications
91A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environmentKhan A.A., Laghari A.A., Gadekallu T.R., Shaikh Z.A., Javed A.R., Rashid M., Estrela V.V., Mikhaylov A.Computers and Electrical Engineering
92A new blockchain and fog computing model for blood pressure medical sensor data storageMani V., Ghonge M.M., Chaitanya N.K., Pal O., Sharma M., Mohan S., Ahmadian A.Computers and Electrical Engineering
93An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare SystemsPadinjappurathu Gopalan S., Chowdhary C.L., Iwendi C., Farid M.A., Ramasamy L.K.Sensors (Basel, Switzerland)
94Relevant-Based Feature Ranking (RBFR) Method for Text Classification Based on Machine Learning AlgorithmJasti V.D.P., Kumar G.K., Kumar M.S., Maheshwari V., Jayagopal P., Pant B., Karthick A., Muhibbullah M.Journal of Nanomaterials
95Multi-objective multi-verse optimizer based unsupervised band selection for hyperspectral image classificationSawant S.S., Prabukumar M., Loganathan A., Alenizi F.A., Ingaleshwar S.International Journal of Remote Sensing
96Implementation of Combined Machine Learning with the Big Data Model in IoMT Systems for the Prediction of Network Resource Consumption and Improving the Data DeliverySugadev M., Rayen S.J., Harirajkumar J., Rathi R., Anitha G., Ramesh S., Ramaswamy K.Computational Intelligence and Neuroscience
97An Empirical Analysis of an Optimized Pretrained Deep Learning Model for COVID-19 DiagnosisSangeetha S.K.B., Kumar M.S., Deeba K., Rajadurai H., Maheshwari V., Dalu G.T.Computational and Mathematical Methods in Medicine
98Weather-based maize yield forecast in Saudi Arabia using statistical analysis and machine learningJayagopal P., Muthukumaran V., Koti M.S., Kumar S.S., Rajendran S., Mathivanan S.K.Acta Geophysica
99Comprehensive survey on data dissemination protocols for efficient reprogramming in Internet of ThingsShanmugapriya R., Santhosh Kumar S.V.N.Concurrency and Computation: Practice and Experience
100Feature Learning-Based Generative Adversarial Network Data Augmentation for Class-Based Few-Shot LearningSubedi B., Sathishkumar V.E., Maheshwari V., Kumar M.S., Jayagopal P., Allayear S.M.Mathematical Problems in Engineering
101Recent Advancements in Privacy-aware Protocols of Source Location Privacy in Wireless Sensor Networks: a SurveyRoy P.K., Tripathy A.K., Singh S.K., Li K.-C.Computer Science and Information Systems
102COVID-19 Classification Using Medical Image Synthesis by Generative Adversarial NetworksNandhini Abirami R., Durai Raj Vincent P.M., Rajinikanth V., Kadry S.International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
103Ensemble of Artificial Intelligence Techniques for Bacterial Antimicrobial Resistance (AMR) Estimation Using Topic Modeling and Similarity MeasureChakriswaran P., Vincent D.R., Kadry S.International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
104Design of telemedicine information query system based on wireless sensor networkQian G., Gadekallu T.R.EAI Endorsed Transactions on Pervasive Health and Technology
105An Empirical Study to Demonstrate that EdDSA can be used as a Performance Improvement Alternative to ECDSA in Blockchain and IoTGuruprakash J., Koppu S.Informatica (Slovenia)
106Impact of Real-Time Information for Travellers: A Systematic ReviewAkhla A.A.N., Ling T.C., Shibghatullah A.S., Mon C.S., Cherukuri A.K., Yen C.L., Yi L.C.Journal of Information and Knowledge Management
107An Investigation on the Impact of Technological Enablement on the Success of Entrepreneurial Adoption among Higher Education Students: A Comparative StudyKeoy K.H., Thong C.L., Cherukuri A.K., Koh Y.J., Chit S.M., Lee L., Genaro J., Kwek C.L.Journal of Information and Knowledge Management
108Guest Editorial: Security and Privacy Issues in Industry 4.0 ApplicationsAlazab M., Gadekallu T.R., Su C.IEEE Transactions on Industrial Informatics
109Assessing the impacts of vegetation cover loss on surface temperature, urban heat island and carbon emission in Penang city, MalaysiaRahaman Z.A., Kafy A.-A., Saha M., Rahim A.A., Almulhim A.I., Rahaman S.N., Fattah M.A., Rahman M.T., S K., Faisal A.-A., Al Rakib A.Building and Environment
110A survey on COVID-19 impact in the healthcare domain: worldwide market implementation, applications, security and privacy issues, challenges and future prospectsShakeel T., Habib S., Boulila W., Koubaa A., Javed A.R., Rizwan M., Gadekallu T.R., Sufiyan M.Complex and Intelligent Systems
111Cloud-based email phishing attack using machine and deep learning algorithmButt U.A., Amin R., Aldabbas H., Mohan S., Alouffi B., Ahmadian A.Complex and Intelligent Systems
112Health Informatics: Engaging Modern Healthcare Units: A Brief OverviewYogesh M.J., Karthikeyan J.Frontiers in Public Health
113Medicine Drug Name Detection Based Object Recognition Using Augmented RealityRupa C., Srivastava G., Ganji B., Tatiparthi S.P., Maddala K., Koppu S., Chun-Wei Lin J.Frontiers in Public Health
114A Sequential Machine Learning-cum- Attention Mechanism for Effective Segmentation of Brain TumorAli T.M., Nawaz A., Ur Rehman A., Ahmad R.Z., Javed A.R., Gadekallu T.R., Chen C.-L., Wu C.-M.Frontiers in Oncology
115Early Prediction of Lung Cancers Using Deep Saliency Capsule and Pre-Trained Deep Learning FrameworksRamana K., Kumar M.R., Sreenivasulu K., Gadekallu T.R., Bhatia S., Agarwal P., Idrees S.M.Frontiers in Oncology
116Fusion of Federated Learning and Industrial Internet of Things: A surveyBoobalan P., Ramu S.P., Pham Q.-V., Dev K., Pandya S., Maddikunta P.K.R., Gadekallu T.R., Huynh-The T.Computer Networks
117IoT enabled HELMET to safeguard the health of mine workersSingh N., Gunjan V.K., Chaudhary G., Kaluri R., Victor N., Lakshmanna K.Computer Communications
118Healthcare Data Security Using Lightweight Protocol for Cyber Physical SystemRoy P.K., Singh A., Desai J.V., Singh S.K.IEEE Transactions on Network Science and Engineering
119Collision avoidance approaches for autonomous mobile robots to tackle the problem of pedestrians roaming on campus roadManikandan N.S., Kaliyaperumal G.Pattern Recognition Letters
120Ultra Super Fast Authentication Protocol for Electric Vehicle Charging Using Extended Chaotic MapsWang W., Han Z., Alazab M., Gadekallu T.R., Zhou X., Su C.IEEE Transactions on Industry Applications
121Improved Metaheuristic-Driven Energy- Aware Cluster-Based Routing Scheme for IoT-Assisted Wireless Sensor NetworksLakshmanna K., Subramani N., Alotaibi Y., Alghamdi S., Khalafand O.I., Nanda A.K.Sustainability (Switzerland)
122Integration of Blockchain Technology and Federated Learning in Vehicular (IoT) Networks: A Comprehensive SurveyJaved A.R., Hassan M.A., Shahzad F., Ahmed W., Singh S., Baker T., Gadekallu T.R.Sensors
123IoT-Based Intelligent System for Internal Crack Detection in Building BlocksBabu J.C., Kumar M.S., Jayagopal P.,Journal of Nanomaterials
124Capability and Robustness of Novel Hybridized Artificial Intelligence Technique for Sediment Yield Modeling in Godavari River, IndiaYadav A., Joshi D., Kumar V., Mohapatra H., Iwendi C., Gadekallu T.R.Water (Switzerland)
125E-commerce review sentiment score prediction considering misspelled words: a deep learning approachJain S., Roy P.K.Electronic Commerce Research
126A Modified Deep Learning Framework for Arrhythmia Disease Analysis in Medical Imaging Using Electrocardiogram SignalAnbarasi A., Ravi T., Manjula V.S., Brindha J., Saranya S., Ramkumar G., Rathi R.BioMed Research International
127Prediction Performance of Deep Learning for Colon Cancer Survival Prediction on SEER DataGupta S., Kalaivani S., Rajasundaram A., Ameta G.K., Oleiwi A.K., Dugbakie B.N.BioMed Research International
128A Transfer Learning Approach with a Convolutional Neural Network for the Classification of Lung CarcinomaHumayun M., Sujatha R., Almuayqil S.N., Jhanjhi N.Z.Healthcare (Switzerland)
129Harris Hawk Optimization: A Survey onVariants and ApplicationsTripathy B.K., Reddy Maddikunta P.K., Pham Q.-V., Gadekallu T.R., Dev K., Pandya S., Elhalawany B.M.Computational Intelligence and Neuroscience
130Barnacles Mating Optimizer with Deep Transfer Learning Enabled Biomedical Malaria Parasite Detection and ClassificationDutta A.K., Mageswari R.U., Gayathri A., Dallfin Bruxella J.M., Ishak M.K., Mostafa S.M., Hamam H.Computational Intelligence and Neuroscience
131Cancer Detection and Prediction Using Genetic AlgorithmsBhandari A., Tripathy B.K., Jawad K., Bhatia S., Rahmani M.K.I., Mashat A.Computational Intelligence and Neuroscience
132Deep Learning-Based Privacy-Preserving Data Transmission Scheme for Clustered IIoT EnvironmentLakshmanna K., Kavitha R., Geetha B.T., Nanda A.K., Radhakrishnan A., Kohar R.Computational Intelligence and Neuroscience
133PCA-Based Incremental Extreme Learning Machine (PCA-IELM) for COVID-19 Patient Diagnosis Using Chest X-Ray ImagesKumar V., Biswas S., Rajput D.S., Patel H., Tiwari B.Computational Intelligence and Neuroscience
134Novel Vision Transformer Based Bi-LSTM Model for LU/LC Prediction Javadi Hills, IndiaMohanrajan S.N., Loganathan A.Applied Sciences (Switzerland)
135Automated sarcasm detection and classification using hyperparameter tuned deep learning model for social networksVinoth D., Prabhavathy P.Expert Systems
136Diagnosing Breast Cancer Based on the Adaptive Neuro-Fuzzy Inference SystemChidambaram S., Ganesh S.S., Karthick A., Jayagopal P., Balachander B., Manoharan S.Computational and Mathematical Methods in Medicine
137Diagnosis of Brain Tumor Using Light Weight Deep Learning Model with Fine- Tuning ApproachShelatkar T., Urvashi D., Shorfuzzaman M., Alsufyani A., Lakshmanna K.Computational and Mathematical Methods in Medicine
138A Review on Deep Learning Techniques for IoT DataLakshmanna K., Kaluri R., Gundluru N., Alzamil Z.S., Rajput D.S., Khan A.A., Haq M.A., Alhussen A.Electronics (Switzerland)
139An effective deep learning model for grading abnormalities in retinal fundus images using variational auto-encodersSundar S., Sumathy S.International Journal of Imaging Systems and Technology
140IoT Based Smart Assist System to Monitor Entertainment Spots Occupancy and COVID 19 Screening During the PandemicNarayanan K.L., Krishnan R.S., Robinson Y.H.Wireless Personal Communications
141Tumor Detection on Microarray Data Using Grey Wolf Optimization with Gain InformationSree Devi K.D., Karthikeyan P., Moorthy U., Deeba K., Maheshwari V., Allayear S.M.Mathematical Problems in Engineering
142Bio-Inspired PSO for Improving Neural Based Diabetes Prediction SystemKhan M.Z., Mangayarkarasi R., Vanmathi C., Angulakshmi M.Journal of ICT Standardization
143Fault-Based Test Case Prioritization of Regression Testing Using Genetic AlgorithmPriya T., Prasanna M.International Journal of e-Collaboration
144Secure voting system for electionsEl-Gburi J., Srivastava G., Mohan S.International Journal of Computer Aided Engineering and Technology
145Mobile Collaborative Secrecy Performance Prediction for Artificial IoT NetworksXu L., Zhou X., Li X., Jhaveri R.H., Gadekallu T.R., Ding Y.IEEE Transactions on Industrial Informatics
146Water optimization technique for precision irrigation system using IoT and machine learningMaria Manuel Vianny D., John A., Kumar Mohan S., Sarlan A., Adimoolam, Ahmadian A.Sustainable Energy Technologies and Assessments
147Humidity sensor based on fibre bragg grating for predicting microbial induced corrosionRaju B., Kumar R., Senthilkumar M., Sulaiman R., Kama N., Dhanalakshmi S.Sustainable Energy Technologies and Assessments
148Authorship identification using ensemble learningAbbasi A., Javed A.R., Iqbal F., Jalil Z., Gadekallu T.R., Kryvinska N.Scientific Reports
149AACF – Accessible Application-Centric Framework for the Internet of Things Backhauled Smart City ApplicationsCui Y., Song X., Liu J., Chen K., Shi G., Zhou J., Gs T.IEEE Transactions on Network Science and Engineering
150A Novel Technique to Detect and Track Multiple Objects in Dynamic Video Surveillance SystemsAdimoolam M., Mohan S., John A., Srivastava G.International Journal of Interactive Multimedia and Artificial Intelligence
151Evaluating the Impact of Summer Drought on Vegetation Growth Using Space-Based Solar-Induced Chlorophyll Fluorescence Across Extensive Spatial MeasuresPandiyan S., Govindjee G., Meenatchi S., Prasanna S., Gunasekaran G., Guo Y.Big Data
152OTP-ER: an ordered transmission paradigm for effective routing in IoT based wireless sensor networksJothi Kumar C., Deeban Chakravarthy V., Ramana K., Maddikunta P.K.R., Xin Q., Surya Narayana G.Optical and Quantum Electronics
153Comparative analysis of FSO, OFC and diffused channel links in photonics using artificial intelligence based S-band, C- band and L-band of the attenuation metricsKarpagarajesh G., Santhana Krishnan R., Harold Robinson Y., Vimal S., Thamizharasan S., Subbulakshmi P., Kaliappan M.Optical and Quantum Electronics
154Lower Back Pain Classification using Parameter TuningLenka S., Victor N.Research Journal of Pharmacy and Technology
155Past, present and future of gene feature selection for breast cancer classification – a surveyChowdhary C.L., Khare N., Patel H., Koppu S., Kaluri R., Rajput D.S.International Journal of Engineering Systems Modelling and Simulation
156Predicting Microscale Land Use/Land Cover Changes Using Cellular Automata Algorithm on the Northwest Coast of Peninsular MalaysiaRahaman Z.A., Kafy A.-A., Faisal A.-A., Al Rakib A., Jahir D.M.A., Fattah M.A., Kalaivani S., Rathi R., Mallik S., Rahman M.T.Earth Systems and Environment
157Cyberbullying detection: an ensemble learning approachRoy P.K., Singh A., Tripathy A.K., Das T.K.International Journal of Computational Science and Engineering
158An enhanced and hybrid fingerprint minutiae feature extraction method for identifying and authenticating the patient s noisy fingerprintRaghavan R., John Singh K.International Journal of System Assurance Engineering and Management
159A Privacy-Enhanced Retrieval Technology for the Cloud-Assisted Internet of ThingsWang T., Yang Q., Shen X., Gadekallu T.R., Wang W., Dev K.IEEE Transactions on Industrial Informatics
160Data Freshness Optimization Under CAA in the UAV-Aided MECN: A Potential Game PerspectiveWang W., Srivastava G., Lin J.C., Yang Y., Alazab M., Gadekallu T.R.IEEE Transactions on Intelligent Transportation Systems
161A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networksLiyanage M., Pham Q.-V., Dev K., Bhattacharya S., Maddikunta P.K.R., Gadekallu T.R., Yenduri G.Journal of Network and Computer Applications
162Secure routing for LEO satellite network survivabilityLi H., Shi D., Wang W., Liao D., Gadekallu T.R., Yu K.Computer Networks
163Heart rate and blood pressure measurement based on photoplethysmogram signal using fast Fourier transformSharma A., Tanwar R.S., Singh Y., Sharma A., Daudra S., Singal G., Gadekallu T.R., Pancholi S.Computers and Electrical Engineering
164Covid-19 fake news sentiment analysisIwendi C., Mohan S., khan S., Ibeke E., Ahmadian A., Ciano T.Computers and Electrical Engineering
165XGBRS Framework Integrated with Word2Vec Sentiment Analysis for Augmented Drug RecommendationPaliwal S., Mishra A.K., Mishra R.K., Nawaz N., Senthilkumar M.Computers, Materials and Continua
166Imbalanced Classification in Diabetics Using Ensembled Machine LearningKumar M.S., Khan M.Z., Rajendran S., Noor A., Dass A.S., Prabhu J.Computers, Materials and Continua
167A novel unsupervised ensemble framework using concept-based linguistic methods and machine learning for twitter sentiment analysisBibi M., Abbasi W.A., Aziz W., Khalil S., Uddin M., Iwendi C., Gadekallu T.R.Pattern Recognition Letters
168Bio-Imaging-Based Machine Learning Algorithm for Breast Cancer DetectionSafdar S., Rizwan M., Gadekallu T.R., Javed A.R., Rahmani M.K.I., Jawad K., Bhatia S.Diagnostics
169Hypertuned Deep Convolutional Neural Network for Sign Language RecognitionMannan A., Abbasi A., Javed A.R., Ahsan A., Gadekallu T.R., Xin Q.Computational Intelligence and Neuroscience
170Performance Evaluation of Seis Tutor Using Cognitive Intelligence-Based “kirkpatrick Model”Singh N., Gunjan V.K., Kadiyala R., Xin Q., Gadekallu T.R.Computational Intelligence and Neuroscience
171Diagnosis of Retinal Diseases Based on Bayesian Optimization Deep Learning Network Using Optical Coherence Tomography ImagesSubramanian M., Kumar M.S., Sathishkumar V.E., Prabhu J., Karthick A., Ganesh S.S., Meem M.A.Computational Intelligence and Neuroscience
172Real-Time Twitter Spam Detection and Sentiment Analysis using Machine Learning and Deep Learning TechniquesRodrigues A.P., Fernandes R., Aakash A., Abhishek B., Shetty A., Atul K., Lakshmanna K., Shafi R.M.Computational Intelligence and Neuroscience
173Multimodal Medical Image Fusion of Positron Emission Tomography and Magnetic Resonance Imaging Using Generative Adversarial NetworksNandhini Abirami R., Durai Raj Vincent P.M., Srinivasan K., Manic K.S., Chang C.-Y.Behavioural Neurology
174Multiobjectives for Optimal Geographic Routing in IoT Health Care SystemAravind K., Maddikunta P.K.R.Complexity
175Perimeter Degree Technique for the Reduction of Routing Congestion during Placement in Physical Design of VLSI CircuitsLakshmanna K., Shaik F., Gunjan V.K., Singh N., Kumar G., Shafi R.M.Complexity
176Pansharpening scheme using spatial detail injection based convolutional neural networksSaxena N., Saxena G., Khare N., Rahman M.H.IET Image Processing
177COVID-19 health analysis and prediction using machine learning algorithms for Mexico and Brazil patientsIwendi C., Huescas C.G.Y., Chakraborty C., Mohan S.Journal of Experimental and Theoretical Artificial Intelligence
178Incentive Mechanisms for Smart Grid: State of the Art, Challenges, Open Issues, Future DirectionsBhattacharya S., Chengoden R., Srivastava G., Alazab M., Javed A.R., Victor N., Maddikunta P.K.R., Gadekallu T.R.Big Data and Cognitive Computing
179A Study on Diverse Methods and Performance Measures in Sentiment AnalysisRani M.S., Sumathy S.Recent Patents on Engineering
180Test Case Generation for Arduino Programming Instructions using Functional Block DiagramsPadmanabhan M.Trends in Sciences
181Non-invasive Detection of Parkinson s Disease Using Deep LearningChowdhary C.L., Srivatsan R.International Journal of Image, Graphics and Signal Processing
182Tiling algorithm with line-based transform for rapid ship detection and wake feature extraction in ALOS-2 SAR sensor dataSelvaraj D., Krishnamurthy E., Sasikumar D., Sivankutty L., Kaliyaperumal G.International Journal of Applied Science and Engineering
183A review on smart city – IoT and deep learning algorithms, challengesRajyalakshmi V., Lakshmanna K.International Journal of Engineering Systems Modelling and Simulation
184An adaptive neuro-fuzzy inference for blockchain-based smart job recommendation systemEphzibah E.P., Sujatha R., Chatterjee J.M.International Journal of Information and Decision Sciences
185Henry MaxNet: tversky index based feature selection and competitive swarm henry gas solubility optimization integrated Deep Maxout network for intrusion detection in IoTBoopathi M.International Journal of Intelligent Robotics and Applications
186Smart Agricultural Decision Support Systems for Predicting Soil Nutrition Value Using IoT and Ridge RegressionSudha M.K., Manorama M., Aditi T.Agris On-line Papers in Economics and Informatics
187Towards reliable electronic exam networksEl-Gburi J., Srivastava G., Mohan S.International Journal of Computer Aided Engineering and Technology
188Evolution of Industry and Blockchain Era: Monitoring Price Hike and Corruption using BIoT for Smart Government and Industry 4.0Hasan M.K., Akhtaruzzaman M., Kabir S.R., Gadekallu T.R., Islam S., Magalingam P., Hassan R., Alazab M., Alazab M.A.IEEE Transactions on Industrial Informatics
189Catalysis of neural activation functions: Adaptive feed-forward training for big data applicationsSarkar S., Agrawal S., Baker T., Maddikunta P.K.R., Gadekallu T.R.Applied Intelligence
190A Multistage Heterogeneous Stacking Ensemble Model for Augmented Infant Cry ClassificationJoshi V.R., Srinivasan K., Vincent P.M.D.R., Rajinikanth V., Chang C.-Y.Frontiers in Public Health
191Computational techniques for the automated detection of mycobacterium tuberculosis from digitized sputum smear microscopic images: A systematic reviewKotei E., Thirunavukarasu R.Progress in Biophysics and Molecular Biology
192Resource Search Method of Mobile Intelligent Education System Based on Distributed Hash TableShen Y.-B., Gadekallu T.R.Mobile Networks and Applications
193CONTROL-CORE: A Framework for Simulation and Design of Closed- Loop Peripheral Neuromodulation Control SystemsKathiravelu P., Arnold M., Fleischer J., Yao Y., Awasthi S., Goel A.K., Branen A., Sarikhani P., Kumar G., Kothare M., Mahmoudi B.IEEE Access
194A new lightweight conditional privacy preserving authentication and key agreement protocol in social internet of things for vehicle to smart grid networksAgilandeeswari L., Paliwal S., Chandrakar A., Prabukumar M.Multimedia Tools and Applications
195A supervised learning-based approach for focused web crawling for IoMT using global co-occurrence matrixRajiv S., Navaneethan C.Expert Systems
196Identifying region specific seasonal crop for leaf borne diseases by utilizing deep learning techniquesJayagopal P., Rajendran S., Mathivanan S.K., Sathish Kumar S.D., Raja K.T., Paneerselvam S.Acta Geophysica
197A Deep Convolutional Neural Network Based Approach for Effective Neonatal Cry ClassificationAshwini K., Durai Raj Vincent P.M.Recent Advances in Computer Science and Communications
198Similarity Learning-Based Supervised Discrete Hash Signature Scheme for authentication of smart home scenarioSudha K.S., Jeyanthi N.International Journal of Information Technology (Singapore)
199Industry 5.0: A survey on enabling technologies and potential applicationsMaddikunta P.K.R., Pham Q.-V., B P., Deepa N., Dev K., Gadekallu T.R., Ruby R., Liyanage M.Journal of Industrial Information Integration
200EPPDA: An Efficient Privacy- Preserving Data Aggregation Federated Learning SchemeSong J., Wang W., Gadekallu T.R., Cao J., Liu Y.IEEE Transactions on Network Science and Engineering
201Hand gesture recognition based on a Harris Hawks optimized Convolution Neural NetworkGadekallu T.R., Srivastava G., Liyanage M., M. I., Chowdhary C.L., Koppu S., Maddikunta P.K.R.Computers and Electrical Engineering
202Risk monitoring strategy for confidentiality of healthcare informationRizwan M., Shabbir A., Javed A.R., Srivastava G., Gadekallu T.R., Shabir M., Hassan M.A.Computers and Electrical Engineering
203Detection of tyre defectsusingweighted quality-based convolutional neural networkRajeswari M., Julie E.G., Robinson Y.H., Joseph E., Arun A.S., Sebastian E., Kumar R., Long H.V., Son L.H.Soft Computing
204Banana Plant Disease Classification Using Hybrid Convolutional Neural NetworkNarayanan K.L., Krishnan R.S., Robinson Y.H., Julie E.G., Vimal S., Saravanan V., Kaliappan M.Computational Intelligence and Neuroscience
205Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature ReviewMajid M., Habib S., Javed A.R., Rizwan M., Srivastava G., Gadekallu T.R., Lin J.C.-W.Sensors
206Privacy Preserving Multi-Party Key Exchange Protocol for Wireless Mesh NetworksRoy A.K., Nath K., Srivastava G., Gadekallu T.R., Lin J.C.-W.Sensors
207CAPSO: Chaos Adaptive Particle Swarm Optimization AlgorithmDuan Y., Chen N., Chang L., Ni Y., Santhosh Kumar S.V.N., Zhang P.IEEE Access
208Situation-aware BDI Reasoning to Detect Early Symptoms of Covid 19 using SmartwatchSaleem K., Saleem M., Zeeshan R., Javed A.R., Alazab M., Gadekallu T.R., Suleman A.IEEE Sensors Journal
209Hash-Based Deep Learning Approach for Remote Sensing Satellite Imagery DetectionGadamsetty S., Ch R., Ch A., Iwendi C., Gadekallu T.R.Water (Switzerland)
210A neural network aided attuned scheme for gun detection in video surveillance imagesManikandan V.P., Rahamathunnisa U.Image and Vision Computing
211An Intrusion Detection and Prevention Protocol for Internet of Things Based Wireless Sensor NetworksKrishnan R., Krishnan R.S., Robinson Y.H., Julie E.G., Long H.V., Sangeetha A., Subramanian M., Kumar R.Wireless Personal Communications
212Hybrid Energy-based Secured clustering technique for Wireless Sensor NetworksSaveetha P., Robinson Y.H., Shanmuganathan V., Kadry S., Nam Y.Journal of Internet Technology
213Analysis of breast cancer prediction and visualisation using machine learning modelsMagesh G., Swarnalatha P.International Journal of Cloud Computing
214Big data in healthcare made simple to save people’s livesAnand R.V., Meenakshisundaram I., Jothikumar R., Chaitanya P.K.International Journal of Cloud Computing
215InfusedHeart: A Novel Knowledge- Infused Learning Framework for Diagnosis of Cardiovascular EventsPandya S., Gadekallu T.R., Reddy P.K., Wang W., Alazab M.IEEE Transactions on Computational Social Systems
216Transfer learning approach in deep neural networks for uterine fibroid detectionSundar S., Sumathy S.International Journal of Computational Science and Engineering
217A Novel Model Based on Window-Pass Preferences for Data-Emergency-Aware Scheduling in Computer NetworksJemmali M., Denden M., Boulila W., Jhaveri R.H., Srivastava G., Gadekallu T.R.IEEE Transactions on Industrial Informatics
218A survey on blockchain for big data: Approaches, opportunities, and future directionsDeepa N., Pham Q.-V., Nguyen D.C., Bhattacharya S., Prabadevi B., Gadekallu T.R., Maddikunta P.K.R., Fang F., Pathirana P.N.Future Generation Computer Systems
219Location Recommendation Based on Mobility Graph With Individual and Group InfluencesPan X., Cai X., Song K., Baker T., Gadekallu T.R., Yuan X.IEEE Transactions on Intelligent Transportation Systems
220An Empirical Model to Predict the Diabetic Positive Using Stacked Ensemble ApproachSivashankari R., Sudha M., Hasan M.K., Saeed R.A., Alsuhibany S.A., Abdel-Khalek S.Frontiers in Public Health
221Geo Spatial Based Real Time Monitoring on Eutrophic Evaluation of Porunai River Basin for Pollution Risk AssessmentGopikumar S., Banu J.R., Harold Robinson Y., Raja S., Vimal S., Pelusi D., Kaliappan M.European Journal of Remote Sensing
222FL-PMI: Federated Learning-Based Person Movement Identification through Wearable Devices in Smart Healthcare SystemsArikumar K.S., Prathiba S.B., Alazab M., Gadekallu T.R., Pandya S., Khan J.M., Moorthy R.S.Sensors
223A Joint Resource Allocation, Security with Efficient Task Scheduling in Cloud Computing Using Hybrid Machine Learning TechniquesBal P.K., Mohapatra S.K., Das T.K., Srinivasan K., Hu Y.-C.Sensors
224Construction of Sports Safety Information Mining Platform Based on Multimedia Data Sharing TechnologyCao X.-Z., Gadekallu T.R.Mobile Networks and Applications
225Sentiment analysis for user reviews using Bi-LSTM self-attention based CNN modelBhuvaneshwari P., Rao A.N., Robinson Y.H., Thippeswamy M.N.Multimedia Tools and Applications
226A neuro-fuzzy based healthcare framework for disease analysis and predictionNagarajan R., Thirunavukarasu R.Multimedia Tools and Applications
227Crop Classification for Agricultural Applications in Hyperspectral Remote Sensing ImagesAgilandeeswari L., Prabukumar M., Radhesyam V., Phaneendra K.L.N.B., Farhan A.Applied Sciences (Switzerland)
228An intelligent machine learning-based sarcasm detection and classification model on social networksVinoth D., Prabhavathy P.Journal of Supercomputing
229Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifierIkram S.T., Priya V., Anbarasu B., Cheng X., Ghalib M.R., Shankar A.Journal of Supercomputing
230A Contemporary Review on Utilizing Semantic Web Technologies inNarayanasamy S.K., Srinivasan K., Hu Y.-C.,Electronics (Switzerland)
231An empirical intrusion detection system based on XGBoost and bidirectional long- short term model for 5G and other telecommunication technologiesKarthikraja C., Senthilkumar J., Hariharan R., Usha Devi G., Suresh Y., Mohanraj V.Computational Intelligence
232COVID-19 Detection Based on Lung Ct Scan Using Deep Learning TechniquesKogilavani S.V., Prabhu J., Sandhiya R., Kumar M.S., Subramaniam U., Karthick A., Muhibbullah M., Imam S.B.S.Computational and Mathematical Methods in Medicine
233Hybrid Fuzzy AHP and Fuzzy TOPSIS Decision Model for Aquaculture Species SelectionPadma T., Shantharajah S.P., Ramadoss P.International Journal of Information Technology and Decision Making
234Multilevel controller-assisted intrinsically modified ant colony optimization heuristic- based load-balancing model for mega cloud infrastructuresGovardhan P., Srinivasan P.International Journal of Communication Systems
235Attention Aware Deep Learning Model for Wireless Capsule Endoscopy Lesion Classification and LocalizationMuruganantham P., Balakrishnan S.M.Journal of Medical and Biological Engineering
236Cooperative and feedback based authentic routing protocol for energy efficient IoT systemsGayathri A., Prabu A.V., Rajasoundaran S., Routray S., Narayanasamy P., Kumar N., Qi Y.Concurrency and Computation: Practice and Experience
237Deep Convolutional Nets Learning Classification for Artistic Style TransferDinesh Kumar R., Golden Julie E., Harold Robinson Y., Vimal S., Dhiman G., Veerasamy M.Scientific Programming
238Developing an optimal MapReduce function for wireless sensor networks in a secure wayVedhanayagam P.International Journal of Computer Aided Engineering and Technology
239Certificateless Aggregated Signcryption Scheme for Cloud-Fog Centric Industry 4.0Dohare I., Singh K., Ahmadian A., Mohan S., Reddy M P.K.IEEE Transactions on Industrial Informatics
240Federated learning enabled digital twins for smart cities: Concepts, recent advances, and future directionsRamu S.P., Boopalan P., Pham Q.-V., Maddikunta P.K.R., Huynh-The T., Alazab M., Nguyen T.T., Gadekallu T.R.Sustainable Cities and Society
241Exergoeconomic Analysis of a Novel Zeotropic Mixture Power SystemGanesh N.S., Maheswari G.U., Srinivas T., Reddy B.V.International Journal of Precision Engineering and Manufacturing – Green Technology
242Evaluation of drought using satellite solar-induced chlorophyll fluorescence during crop development stage over Xinjiang, ChinaPandiyan S., Navaneethan C., Vijayan R., Gunasekaran G., Khan K.Y., Guo Y.Measurement: Journal of the International Measurement Confederation
243Efficient resource allocation in fog computing using QTCS modelIyapparaja M., Alshammari N.K., Kumar M.S., Krishnan S.S.R., Chowdhary C.L.Computers, Materials and Continua
244A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep LearningAkshay Kumaar M., Samiayya D., Vincent P.M.D.R., Srinivasan K., Chang C.-Y., Ganesh H.Frontiers in Public Health
245Detecting COVID-19-Related Fake News Using Feature ExtractionKhan S., Hakak S., Deepa N., Prabadevi B., Dev K., Trelova S.Frontiers in Public Health
246A Comprehensive Survey on Computer Forensics: State-of-the-art,Tools, Techniques, Challenges, and Future DirectionsJaved A.R., Ahmed W., Alazab M., Jalil Z.,Kifayat K., Gadekallu T.R.IEEE Access
247Prediction of heart abnormalities using deep learning model and wearabledevices in smart health homesShafi J., Obaidat M.S., Krishna P.V., Sadoun B., Pounambal M., Gitanjali J.Multimedia Tools and Applications
248Predicting attributes based movie success through ensemble machine learningGupta V., Jain N., Garg H., Jhunthra S., Mohan S., Omar A.H., Ahmadian A.Multimedia Tools and Applications
249DOA tracking for seamless connectivity in beamformed IoT- based dronesBalamurugan N.M., Mohan S., Adimoolam M., John A., reddy G T.,Wang W.Computer Standards and Interfaces
250Stealth assessment strategy in distributed systems using optimal deep learning with game based learningRajendran D., Prasanna S.Journal of Supercomputing
251Forecasting COVID-19: Vector Autoregression-Based ModelRajab K., Kamalov F., Cherukuri A.K.Arabian Journal for Science and Engineering
252Self-organizing Maps and Bayesian Regularized Neural Network for Analyzing Gasoline and Diesel Price DriftsSujatha R., Chatterjee J.M., Priyadarshini I., Hassanien A.E., Mousa A.A.A., Alghamdi S.M.International Journal of Computational Intelligence Systems
253Heart failure patient survival analysis with multi kernel support vector machineSujatha R., Chatterjee J.M., Jhanjhi N.Z., Tabbakh T.A., Almusaylim Z.A.Intelligent Automation and Soft Computing
254Prediction of suitable candidates for covid-19 vaccinationSujatha R., Venkata Siva Krishna B., Chatterjee J.M., Naidu P.R., Jhanjhi N.Z., Charita C., Mariya E.N., Baz M.Intelligent Automation and Soft Computing
255Cnn based driver drowsiness detection system using emotion analysisVarun Chand H., Karthikeyan J.Intelligent Automation and Soft Computing
256Energy Optimization for Green Communication in IoT Using Harris Hawks OptimizationDev K., Maddikunta P.K.R., Gadekallu T.R., Bhattacharya S., Hegde P., Singh S.IEEE Transactions on Green Communications and Networking
257An analysis on polygonal approximation techniques for digital image boundaryRaja K.T., Ray B.K.Journal of Mobile Multimedia
258Genetic algorithm-conditional mutual information maximization based feature selection for bot attack classification in iot devicesKavitha G., Elango N.M.Journal of Mobile Multimedia
259Temporal Weighted Averaging for Asynchronous Federated Intrusion Detection SystemsAgrawal S., Chowdhuri A., Sarkar S., Selvanambi R., Gadekallu T.R.Computational Intelligence and Neuroscience
260Toward an Autonomous Incubation System for Monitoring Premature InfantsAlqaheri H., Sujatha R., Chatterjee J.M., Shooriya S., Kumar S.A., Satish N.Studies in Informatics and Control
261Wavelet enabled ranking and clustering-based band selection and three-dimensional spatial feature extraction for hyperspectral remote sensing image classificationManoharan P., Vaddi R.Journal of Applied Remote Sensing
262Clinical Decision Support System for Detection of Dengue: A Case Comparison Using AHP and Fuzzy AHPMohapatro A., Mahendran S.K., Das T.K.Journal of Cases on Information Technology
263An IoT and artificial intelligence-based patient care system focused on COVID-19 pandemicGoar V.K., Yadav N.S., Chowdhary C.L., Kumaresan P., Mittal M.International Journal of Networking and Virtual Organisations
264A comprehensive survey on aspect- based sentiment analysisYadav K., Kumar N., Maddikunta P.K.R., Gadekallu T.R.International Journal of Engineering Systems Modelling and Simulation
2021
SL. NO.TITLE OF PAPERNAME OF THE AUTHOR/SNAME OF JOURNAL
1Review on implementation of IoT for environmental condition monitoring in the agriculture sectorArun Kumar K., Karthikeyan J.Journal of Ambient Intelligence and Humanized Computing
2Improving the Classification of Alzheimer’s Disease Using Hybrid Gene Selection Pipeline and Deep LearningMahendran N., Vincent P.M.D.R., Srinivasan K., Chang C.-Y.Frontiers in Genetics
3Low-Light Image Enhancement Based on Generative Adversarial NetworkNandhini Abirami R., Durai Raj Vincent P.M.Frontiers in Genetics
4A deep learning framework with an embedded-based feature selection approach for the early detection of the Alzheimer’s diseaseMahendran N., P M D.R.V.Computers in Biology and Medicine
5Fault-Resilience for Bandwidth Management in Industrial Software- Defined NetworksJhaveri R.H., Ramani S.V., Srivastava G., Gadekallu T.R., Aggarwal V.IEEE Transactions on Network Science and Engineering
6Ontology-Enabled Emotional Sentiment Analysis on COVID-19 Pandemic-Related Twitter StreamsNarayanasamy S.K.,Srinivasan K., Mian Qaisar S., Chang C.-Y.Frontiers in Public Health
7Genetic CFL: Hyperparameter Optimization in Clustered Federated LearningAgrawal S., Sarkar S., Alazab M., Maddikunta P.K.R., Gadekallu T.R., Pham Q.-V.Computational Intelligence and Neuroscience
8Deep learning-based transfer learning for classification of skin cancerJain S., Singhania U., Tripathy B., Nasr E.A., Aboudaif M.K., Kamrani A.K.Sensors
9The smart pill sticker: Introducing a smart pill management system based on touch- point technologyKataria G., Dhyani K., Patel D., Srinivasan K., Malwade S., Syed Abdul S.Health Informatics Journal
10A hybrid learning approach for the stage- wise classification and prediction of COVID-19 X-ray imagesAdimoolam M., Govindharaju K., John A., Mohan S., Ahmadian A., Ciano T.Expert Systems
11Dynamic Private Modulus Based Password Conditional Privacy Preserving Authentication and Key-Agreement Protocol for VANETPaliwal S., Cherukuri A.K., Gao X.-Z.Wireless Personal Communications
12Exploring Internet Meme Activity during COVID-19 Lockdown Using Artificial Intelligence TechniquesPriyadarshini I., Chatterjee J.M., Sujatha R., Jhanjhi N., Karime A., Masud M.Applied Artificial Intelligence
13Optimal Feature Selection and Hybrid Classification for Autism Detection in Young ChildrenGuruvammal S.,Chellatamilan T., Deborah L.J.Computer Journal
14ResMem-Net: memory based deep CNN for image memorability estimationPraveen A., Noorwali A., Samiayya D., Khan M.Z., Durai R.V.P.M., Bashir A.K., Alagupandi V.PeerJ Computer Science
15Computational trust evaluation algorithm for cloud models using fuzzy logic approachThakare V.R., John S.K.International Journal of Ad Hoc and Ubiquitous Computing
16Lion plus firefly algorithm for ternary- based anomaly detection in semantic graphs in smart citiesReddy M.S.K., Rajput D.S.International Journal of Ad Hoc and Ubiquitous Computing
17Recent advances in blockchain technology: A survey on applications and challengesHakak S., Khan W.Z., Gilkar G.A., Assiri B., Alazab M., Bhattacharya S., Reddy G.T.International Journal of Ad Hoc and Ubiquitous Computing
18A hybrid threat model for system-centric and attack-centric for effective security design in SDLCViswanathan G., Prabhu P.J.Web Intelligence
19A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)Swapna Sudha K., Jeyanthi N.Cybernetics and Information Technologies
20A systematic analysis of identity based encryption (IBE)Karrothu A., Norman J.International Journal of Knowledge-Based and Intelligent Engineering Systems
21A Three-Tier Authentication Scheme for Kerberized Hadoop EnvironmentHena M., Jeyanthi N.Cybernetics and Information Technologies
22Anomaly Detection Using XGBoost Ensemble of Deep Neural Network ModelsIkram S.T., Cherukuri A.K., Poorva B., Ushasree P.S., Zhang Y., Liu X., Li G.Cybernetics and Information Technologies
23Detection and localisation of cars in indoor parking through UWB radar-based sensing systemRajendran S., Mathivanan S.K., Somanathan M.S., Geetha M., Jayagopal P., Venkatasen M., Mani P., Christopher J.International Journal of Ultra Wideband Communications and Systems
24Isolated word-based spoken dialogue system using odia phonesSwain B.K., Mohanty S., Chowdhary C.L.Recent Advances in Computer Science and Communications
25Remote monitoring of indoor/outdoor movement in epidemiological situations utilising UWB transceiversRajendran S., Jayagopal P., Mathivanan S.K., Prasanna S., Manivannan S.S., Kumar P.J.,Venkatasen M., Mani P.International Journal of Ultra Wideband Communications and Systems
26High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystemJayabalasamy G., Koppu S.Journal of King Saud University – Computer and Information Sciences
27Adaptive practical Byzantine fault tolerance consensus algorithm in permission blockchain networkNavaroj G.I., Julie E.G., Robinson Y.H.International Journal of Web and Grid Services
28Socioeconomic impact due to COVID-19: An empirical assessmentGupta V., Santosh K.C., Arora R., Ciano T., Kalid K.S., Mohan S.Information Processing and Management
29Recent advances in evolving computing paradigms: Cloud, edge, and fog technologiesAngel N.A., Ravindran D., Vincent P.M.D.R., Srinivasan K., Hu Y.-C.Sensors
305G Data Offloading Using Fuzzification with Grasshopper Optimization TechniqueBalaji V.R., Kalavathi T., Vellingiri J., Rajkumar N., Padhy V.P.Computer Systems Science and Engineering
31Blockchain and PUF-based Lightweight Authentication Protocol for Wireless Medical Sensor NetworksWang W., Qiu C., Yin Z., Srivastava G., Gadekallu T.R., Alsolami F., Su C.IEEE Internet of Things Journal
32Reinforced resource management in vehicular fog computing using deep beacon power control protocolKumar T.A., Rajmohan R., Julie E.G., Robinson Y.H., Vimal S., Kadry S.International Journal of Web and Grid Services
33A peer-to-peer blockchain based interconnected power systemAhmed M.M., Hasan M.K., Shafiq M., Qays M.O., Gadekallu T.R., Nebhen J., Islam S.Energy Reports
34Context-sensitive lexicon for imbalanced text sentiment classification using bidirectional LSTMPavan Kumar M.R., Jayagopal P.Journal of Intelligent Manufacturing
35Cascading 1D-Convnet Bidirectional Long Short Term Memory Network with Modified COCOB Optimizer: A Novel Approach for Protein Secondary Structure PredictionSonsare P.M., C G.Chaos, Solitons and Fractals
36Secure-Enhanced Federated Learning for AI-Empowered Electric Vehicle Energy PredictionWang W., Fida M.H., Lian Z., Yin Z., Pham Q., Gadekallu T.R., Dev K., Su C.IEEE Consumer Electronics Magazine
37Improved whale optimization based band selection for hyperspectral remote sensing image classificationManoharan P., Boggavarapu P.K.L.N.Infrared Physics and Technology
38Enhanced Border and Hole Detection for Energy Utilization in Wireless Sensor NetworksRobinson Y.H., Lawrence T.S., Julie E.G., Kumar R., Thong P.H., Son L.H.Arabian Journal for Science and Engineering
39SmartPharma: Blockchain Enabled Internet of Things for Smart Pharmaceutical Traceability SystemKavitha Margret M., Golden Julie E., Harold Robinson Y., Vijayanandh D., Vimal S., Kadry S., El- Sherbeeny A.M., El- Meligy M.A.IETE Journal of Research
40Big data integration enhancement based on attributes conditional dependency and similarity index methodKolisetty V.V., Rajput D.S.Mathematical Biosciences and Engineering
41A Two-stage Text Feature Selection Algorithm for Improving Text ClassificationAshokkumar P., Siva Shankar G., Srivastava G., Maddikunta P.K.R., Gadekallu T.R.ACM Transactions on Asian and Low- Resource Language Information Processing
42TAMIZHI: Historical Tamil-Brahmi Script Recognition Using CNN and MobileNetDhivya S., Usha Devi G.ACM Transactions on Asian and Low- Resource Language Information Processing
43Study on Automated Approach to Recognize Characters for Handwritten and Historical DocumentDhivya S., Usha Devi G.ACM Transactions on Asian and Low- Resource Language Information Processing
44Image and signal processing in the underwater environmentReddy P.C.S., Pradeepa M., Venkatakiran S., Walia R., Saravanan M., Pillai V.J.Journal of Nuclear Energy Science and Power Generation Technology
45Fundamentals, present and future perspectives of speech enhancementDas, N., Chakraborty, S., Chaki, J., Padhy, N., Dey, N.International Journal of Speech Technology
46Pattern analysis based acoustic signal processing: a survey of the state-of-artChaki, J.International Journal of Speech Technology
47B Smart Technologies in Engineering Applications of Cyber Physical System in Healthcare: Sensing, Imaging, Computing and NetworkingDukiya, R., Perumal, K.Recent Advances in Computer Science and Communications
48Federated Learning for Cybersecurity: Concepts, Challenges and Future DirectionsAlazab M., R M S.P., M P., Reddy P., Gadekallu T.R., Pham Q.IEEE Transactions on Industrial Informatics
49Blockchain for Edge of Things: Applications, Opportunities, and ChallengesGadekallu T.R., Pham Q., Nguyen D.C., Maddikunta P.K.R., Deepa N., B P., Pathirana P.N., Zhao J., Hwang W.IEEE Internet of Things Journal
50Distributed authentication framework for Hadoop based bigdata environmentHena M., Jeyanthi N.Journal of Ambient Intelligence and Humanized Computing
51FogQSYM: An Industry 4.0 Analytical Model for Fog ApplicationsIyapparaja M., Kumar M.S., Krishnan S.S.R.,Chowdhary C.L., Yoon B., Singh S., Cho G.H.Computers, Materials and Continua
52SCB-HC-ECC’Based Privacy Safeguard Protocol for Secure Cloud Storage of Smart Card’Based Health Care SystemSenthilkumar S., Brindha K., Kryvinska N., Bhattacharya S., Reddy Bojja G.Frontiers in Public Health
53An intelligent tutoring system for new student model using fuzzy soft set-based hybrid optimization algorithmChandrasekhar U., Khare N.Soft Computing
54Interoperable permissioned-blockchain with sustainable performancePunathumkandi S., Sundaram V.M., Panneer P.Sustainability (Switzerland)
55Evaluation of risk causing factors for the incidence of neck and shoulder pain in adolescents using fuzzy analytic hierarchy processPadma T., Shantharajah S.P.International Journal of Information and Decision Sciences
56A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directionsJaved A.R., Jalil Z., Zehra W., Gadekallu T.R., Suh D.Y., Piran M.J.Engineering Applications of Artificial Intelligence
57A new fuzzy adaptive algorithm to classify imbalanced dataPatel H., Rajput D.S., Stan O.P., Miclea L.C.Computers, Materials and Continua
58Multi-class imbalanced image classification using conditioned GANsPavan Kumar M.R., Jayagopal P.International Journal of Multimedia Information Retrieval
59Automatic hate speech detection in english-odia code mixed social media data using machine learning techniquesMohapatra S.K., Prasad S., Bebarta D.K., Das T.K., Srinivasan K., Hu Y.- C.Applied Sciences (Switzerland)
60FBDR-Fuzzy Based DDoS Attack Detection and Recovery Mechanism for Wireless Sensor NetworksPajila P.J.B., Julie E.G., Robinson Y.H.Wireless Personal Communications
61Feature based opinion analysis on social media tweets with association rule mining and multi-objective evolutionary algorithmsMeesala S.R., Subramanian S.Concurrency and Computation: Practice and Experience
62A survey on challenges in transforming No-SQL Data to SQL data and storing in cloud storage based on user requirementShantharajah S.P., Maruthavani E.International Journal of Performability Engineering
63Effectiveness of contact tracing using KNN for COVID-19Venkatasen M., Mathivanan S.K., Mani P., Jayagopal P., Thanapal P., Somanathan M.S., Upendra Babu K., Elangovan D.Journal of Mobile Multimedia
64Protein classification using machine learning and statistical techniquesGupta C.L.P., Bihari A., Tripathi S.Recent Advances in Computer Science and Communications
65ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNsKhan T., Singh K., Hasan M.H., Ahmad K., Reddy G.T., Mohan S., Ahmadian A.Future Generation Computer Systems
66PPSF: A Privacy-Preserving and Secure Framework using Blockchain-based Machine-Learning for IoT-driven Smart CitiesKumar P., Kumar R., Srivastava G., Gupta G.P., Tripathi R., Gadekallu T.R., Xiong N.IEEE Transactions on Network Science and Engineering
67AACFAccessible Application-Centric Framework for the Internet of Things Backhauled Smart City ApplicationsCui Y., Song X., Liu J., Chen K., Shi G., Zhou J., Tamizharasi G.IEEE Transactions on Network Science and Engineering
68Data-centric routing and caching approach for mobile and social sensing applicationsShynu P.G., Al-Turjman F.Computers and Electrical Engineering
69Identify glomeruli in human kidney tissue images using a deep learning approachShubham S., Jain N., Gupta V., Mohan S., Ariffin M.M., Ahmadian A.Soft Computing
70Security in Next Generation Mobile Payment Systems: A Comprehensive SurveyAhmed W., Rasool A., Javed A.R., Kumar N., Gadekallu T.R., Jalil Z.,Kryvinska N.IEEE Access
71Security Enhanced Sentence Similarity Computing Model Based on Convolutional Neural NetworkSun Q., Huang X., Kibalya G., Kumar N., Kumar S.V.N.S., Zhang P., Xie D.IEEE Access
72Delineation of field boundary from multispectral satellite images through U-Net segmentation and template matchingM S.K., Jayagopal P.Ecological Informatics
73Fuzzy Guided Autonomous Nursing Robot through Wireless Beacon NetworkNarayanan K.L., Krishnan R.S., Son L.H., Tung N.T., Julie E.G., Robinson Y.H., Kumar R., Gerogiannis V.C.Multimedia Tools and Applications
74Machine learning based volatile block chain construction for secure routing in decentralized military sensor networksRajasoundaran S., Kumar S.V.N.S., Selvi M., Ganapathy S., Rakesh R., Kannan A.Wireless Networks
75A hadoop based framework integrating machine learning classifiers for anomaly detection in the internet of thingsThaseen I.S., Mohanraj V., Ramachandran S., Sanapala K., Yeo S.-S.Electronics (Switzerland)
76Hybrid Inception v3 XGBoost Model for Acute Lymphoblastic Leukemia ClassificationRamaneswaran S., Srinivasan K., Vincent P.M.D.R., Chang C.-Y.Computational and Mathematical Methods in Medicine
77Expert system for stable power generation prediction in microbial fuel cellSrinivasan K., Garg L., Chen B.-Y., Alaboudi A.A., Jhanjhi N.Z., Chang C.-T., Prabadevi B., Deepa N.Intelligent Automation and Soft Computing
78A Review on Deep Learning Architecture and Methods for MRI Brain Tumour SegmentationAngulakshmi M., Deepa M.Current medical imaging
79Literature review on software testing techniques and test suite reduction frameworks/toolsAsha N., Mani P.International Journal of Advanced Intelligence Paradigms
80Multilevel thresholding based follicle detection and classification of polycystic ovary syndrome from the ultrasound images using machine learningGopalakrishnan C., Iyapparaja M.International Journal of Systems Assurance Engineering and Management
81Improving the accuracy of item recommendations by combining collaborative and content-based recommendations: A hybrid approachParasuraman D., Elumalai S.International Journal of Advanced Intelligence Paradigms
82Fuzzy based feature engineering architecture for sentiment analysis of medical discussion over online social networksPavan Kumar C.S., Dhinesh Babu L.D.Journal of Intelligent and Fuzzy Systems
83Machine learning based deep job exploration and secure transactions in virtual private cloud systemsRajasoundaran S., Prabu A.V., Routray S., Kumar S.V.N.S., Malla P.P., Maloji S., Mukherjee A., Ghosh U.Computers and Security
84Deep neural networks based approach for battery life predictionBhattacharya S., Maddikunta P.K.R., Meenakshisundaram I., Gadekallu T.R., Sharma S., Alkahtani M., Abidi M.H.Computers, Materials and Continua
85Investigation of digital video broadcasting application employing the modulation formats like QAM and PSK using OWC, FSO, and LOS-FSO channelsKarpagarajesh G., Santhana Krishnan R., Harold Robinson Y., Vimal S., Kadry S., Nam Y.Alexandria Engineering Journal
86An intelligent hybrid system for forecasting stock and forex trading signals using optimized recurrent flann and case-based reasoningBebarta D.K., Das T.K., Chowdhary C.L., Gao X.- Z.International Journal of Computational Intelligence Systems
87Storage and Proximity Management for Centralized Personal Health Records Using an IPFS-based Optimization AlgorithmMubashar A., Asghar K., Javed A.R., Rizwan M., Srivastava G., Gadekallu T.R., Wang D., Shabbir M.Journal of Circuits, Systems and Computers
88Industrial-IoT-hardware security- improvement using plan load optimization method in cloudBasheer S., Gopu M., Mathew R.M., Bivi M.A., Prabu M.International Journal of Systems Assurance Engineering and Management
89Language dialect based speech emotion recognition through deep learning techniquesRajendran S., Mathivanan S.K., Jayagopal P., Venkatasen M., Pandi T., Sorakaya Somanathan M., Thangaval M., Mani P.International Journal of Speech Technology
90Design and development of ternary-based anomaly detection in semantic graphs using metaheuristic algorithmReddy M.S.K., Rajput D.S.International Journal of Digital Crime and Forensics
91GraphCrypto: Next generation data security approach towards sustainable smart city buildingMishra A.K., Puthal D., Tripathy A.K.Sustainable Cities and Society
92Classification and categorization of COVID-19 outbreak in PakistanAyoub A., Mahboob K., Javed A.R., Rizwan M., Gadekallu T.R., Abidi M.H., Alkahtani M.Computers, Materials and Continua
93Deep Learning Assisted Neonatal Cry Classification via Support Vector Machine ModelsAshwini K., Vincent P.M.D.R., Srinivasan K., Chang C.-Y.Frontiers in Public Health
94Scalable algorithm for generation of attribute implication base using FPgrowth and sparkChunduri R.K., Cherukuri A.K.Soft Computing
95Cloud- and IoT-based deep learning technique-incorporated secured health monitoring system for dead diseasesMalarvizhi Kumar P., Hong C.S., Chandra Babu G., Selvaraj J., Gandhi U.DSoft Computing
96A review on h-index and its alternative indicesBihari A., Tripathi S., Deepak AJournal of Information Science
97Sparse Bayesian learning based channel estimation in FBMC/OQAM industrial IoT networksWang H., Li X., Jhaveri R.H., Gadekallu T.R., Zhu M., Ahanger T.A., Khowaja S.A.Computer Communications
98Machine learning prediction models for chronic kidney disease using national health insurance claim data in TaiwanKrishnamurthy S., Kapeleshh K.S., Dovgan E., Lu’trek M., Gradi’ek Pileti’ B., Srinivasan K., Li Y.-C., Gradi’ek A., Syed-Abdul S.Healthcare (Switzerland)
99Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networksSanthosh Kumar S.V.N., Palanichamy Y., Selvi M., Ganapathy S., Kannan A., Perumal S.P.Wireless Networks
100Hybrid Cache Management in Ad Hoc NetworksKrishnan C.G., Robinson Y.H., Julie E.G., Bamini A.M.A., Kumar R., Thong P.H., Son L.HWireless Personal Communications
101Detection of Diabetic Retinopathy Using a Fusion of Textural and Ridgelet Features of Retinal Images and Sequential Minimal Optimization ClassifierRamasamy L.K., Padinjappurathu S.G., Kadry S., Dama’evi’ius RPeerJ Computer Science
102An approach to merge domain ontologies using granular computingPriya M., Aswani Kumar C.Granular Computing
103A hybrid feature selection model based on improved squirrel search algorithm and rank aggregation using fuzzy techniques for biomedical data classificationNagarajan G., Dhinesh Babu L.D.Network Modeling Analysis in Health Informatics and Bioinformatics
104Naive Bayes and deep learning model for wireless intrusion detection systemsRajadurai H., Gandhi U.D.International Journal of Engineering Systems Modelling and Simulation
105A Review on Various Applications of Reputation Based Trust ManagementGovindaraj R., Govindaraj P., Chowdhury S., Kim D., Tran D.-T., Le A.N.International Journal of Interactive Mobile Technologies
106Rating Prediction Method for ItemBased collaborative Filtering Recommender Systems Using Formal Concept AnalysisChemmalar Selvi G., Lakshmi Priya G.G.EAI Endorsed Transactions on Energy Web
107Early tumor diagnosis in brain MR images via deep convolutional neural network modelDas T.K., Roy P.K., Uddin M., Srinivasan K., Chang C.-Y., Syed-Abdul S.Computers, Materials and Continua
108Performance comparison of deep cnn models for detecting driver’s distractionSrinivasan K., Garg L., Datta D., Alaboudi A.A., Jhanjhi N.Z., Agarwal R., Thomas A.G.Computers, Materials and Continua
109Machine translation using deep learning for universal networking language based on their structureAli M.N.Y., Rahman M.L., Chaki J., Dey N., Santosh K.C.International Journal of Machine Learning and Cybernetics
110Multi-criteria-based approach for job scheduling in industry 4.0 in smart cities using fuzzy logicKumar P.M., Babu G.C., Selvaraj A., Raza M., Luhach A.K., Díaz V.GSoft Computing
111Iterative weighted EM and iterative weighted EM’-index for scientific assessment of scholarsBihari A., Tripathi S., Deepak A.Scientometrics
112Deep CNN and Deep GAN in Computational Visual PerceptionDriven Image AnalysisNandhini Abirami R., Durai Raj Vincent P.M., Srinivasan K., Tariq U., Chang C.-Y.Complexity
113Performance Assessment of Certain Machine Learning Models for Predicting the Major Depressive Disorder among IT Professionals during Pandemic timesVincent P.M.D.R., Mahendran N., Nebhen J., Deepa N., Srinivasan K., Hu Y.-C.Computational Intelligence and Neuroscience
114Shadow detection from images using fuzzy logic and PCPerturNetChaki J.IET Image Processing
115Dispersed dummy selection approach for location-based services to preempt user-profilingManju A.B., Sumathy S.Concurrency Computation
116Identity preserving multi-pose facial expression recognition using fine tuned VGG on the latent space vector of generative adversarial networkAbirami R.N., Vincent P.M.D.RMathematical Biosciences and Engineering
117A Spectrum Defragmentation Algorithm Using Jellyfish Optimization Technique in Elastic Optical Network (EON)Selvakumar S., Manivannan S.S.Wireless Personal Communications
118Sentiment Analysis on Twitter Data by Using Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM)Gandhi U.D., Malarvizhi Kumar P., Chandra Babu G., Karthick G.Wireless Personal Communications
119Eeccrn: Energy enhancement with css approach using q-learning and coalition game modelling in crnShanmuganathan V., Kalaivani L., Kadry S., Suresh A., Harold Robinson Y., Lim SInformation Technology and Control
120IoT based smart health monitoring with CNN using edge computingVimal S., Harold Robinson Y., Kadry S., Long H.V., Nam Y.Journal of Internet Technology
121A study of computational trust models in cloud securityThakare V.R., Singh J.KInternational Journal of Grid and High Performance Computing
122Public Key Encryption with Equality Test for Industrial Internet of Things Based on Near-RingMuthukumaran V., Manimozhi I., Sundar P.P.V., Karthikeyan T., Gopu M.International Journal of e-Collaboration
123PPHE-automatic detection of sensitive attributes in a privacy preserved Hadoop environment using data mining techniquesUmapathy K., Khare NInternational Journal of Computer Aided Engineering and Technology
124K-means clustering-based radio neutron star pulsar emission mechanismShrimali S., Pandey A., Chowdhary C.LRecent Advances in Computer Science and Communications
125An analytical hierarchical processbased weighted assessment of factors contributing precipitationVaishnavi B., Karthikeyan J., Yarrakula K.International Journal of Intelligent Enterprise
126Cloud based extensible business management suite and data predictionsDukiya R., Perumal K.Recent Advances in Computer Science and Communications
127An efficient attribute reduction and fuzzy logic classifier for heart disease and diabetes predictionGadekallu T.R., Gao X.-Z.Recent Advances in Computer Science and Communications
128A Machine Learning Way to Classify Autism Spectrum DisorderSujatha R., Aarthy S.L., Chatterjee J.M., Alaboudi A., Jhanjhi N.ZInternational Journal of Emerging Technologies in Learning
129Fuzzy deep learning-based crop yield prediction model for sustainable agronomical frameworksElavarasan D., Durai Raj Vincent P.MNeural Computing and Applications
130Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary modelMovassagh A.A., Alzubi J.A., Gheisari M., Rahimi M., Mohan S., Abbasi A.A., Nabipour N.Journal of Ambient Intelligence and Humanized Computing
131Providing diagnosis on diabetes using cloud computing environment to the people living in rural areas of IndiaRajput D.S., Basha S.M., Xin Q., Gadekallu T.R., Kaluri R., Lakshmanna K., Maddikunta P.K.R.Journal of Ambient Intelligence and Humanized Computing
132Whale optimization-based band selection technique for hyperspectral image classificationPhaneendra Kumar B.L.N., Manoharan P.International Journal of Remote Sensing
133Identifying and classifying plant disease using resilient LF-CNNB.V. G., G. U.D.Ecological Informatics
134A method of progression detection for glaucoma using K-means and the GLCM algorithm toward smart medical predictionVimal S., Robinson Y.H., Kaliappan M., Vijayalakshmi K., Seo SJournal of Supercomputing
135An approach to forecast impact of Covid-19 using supervised machine learning modelMohan S., John A., Abugabah A., Adimoolam M., Kumar Singh S., kashif Bashir A., Sanzogni L.Software – Practice and Experience
136Performance assessment of supervised classifiers for designing intrusion detection systems: A comprehensive review and recommendations for future researchPanigrahi R., Borah S., Bhoi A.K., Ijaz M.F.,Pramanik M., Jhaveri R.H., Chowdhary C.L.Mathematics
137A Threat Categorization of Risk-Based approach for analyzing Security Threats early phase in SDLCViswanathan G., Jayagopal PArabian Journal for Science and Engineering
138Band selection strategies for hyperspectral image classification based on machine learning and artificial intelligent techniques ‘SurveySawant S.S., Manoharan P., Loganathan A.Arabian Journal of Geosciences
139Development of Fuzzy Enabled Coverage Hole Detection Algorithm in Wireless Sensor NetworksRobinson Y.H., Lawrence T.S., Julie E.G., Vimal S.Wireless Personal Communications
140Enhanced Energy Proficient Encoding Algorithm for Reducing Medium Time in Wireless NetworksRobinson Y.H., Julie E.G., Jacob I.J., Lawrence T.S., Saravanan V., Darney P.EWireless Personal Communications
141Inherent Security-aware Resource Utilizing Methodology for Cloud EnvironmentsGopala Krishnan C., Golden Julie E., Harold Robinson Y.Wireless Personal Communications
142ANFIS PD Plus I Control On Simscape Model of Nonlinear Physical SystemUmamaheswari K., Prabhakar G., Viji K., Thanapal P.Control Engineering and Applied Informatics
143A new venture to image encryption using combined chaotic system and integer wavelet transformsSubashanthini S., Pounambal M.International Journal of Cloud Computing
144A study and analysis of forecasts in resource allocation using ARIMA in cloud environmentRajalakshmi L., Sathiyamoorthy ETurkish Journal of Computer and Mathematics Education
145An intelligent network intrusion detection system using particle swarm optimization (PSO) and deep network networks (DNN)Preethi D., Khare N.International Journal of Swarm Intelligence Research
146Classification of cricket videos using finite state machinesEllappan V., Rajkumar R.International Journal of Information Technology and Management
147Deep learning based recurrent neural networks to enhance the performance of wind energy forecasting: A reviewParamasivan S.K.Revue d’Intelligence Artificielle
148Landslide Hazard Zonation Mapping using Power Method based AHP for Saklespur, IndiaSreedevi N., Karthikeyan J.ndian Journal of Ecology
149Some algorithms under non-parametric framework versus an unsupervised approachRay B.K.Computer Science Review
150Quantum-inspired ensemble approach to multi-attributed and multi-agent decision-makingM.S. I., Cherukuri A.K.Applied Soft Computing
151CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network using CNN and Attention-based GRURehman A., Ur Rehman S., Khan M., Alazab M., G T.R.IEEE Transactions on Network Science and Engineering
152COVID19: Forecasting Air Quality Index and Particulate Matter (PM2.5)Mangayarkarasi R., Vanmathi C., Khan M.Z., Noorwali A., Jain R., Agarwal P.Computers, Materials and Continua
153Deep Learning-Based Hookworm Detection in Wireless Capsule Endoscopic Image Using AdaBoostLakshminarayanan K., Muthukumaran N., Robinson Y.H.,Computers, Materials and Continua
154Performance assessment of a novel power generation systemGanesh N.S., Maheswari G.U., Srinivas T., Reddy B.V.IET Renewable Power Generation
155Blockchain-based Secure Healthcare Application for Diabetic-Cardio Disease Prediction in Fog ComputingShynu P.G., Menon V.G., Kumar R., Kadry S., Nam Y.IEEE Access
156A Bayesian regularized neural network for analyzing bitcoin trendsSujatha R., Mareeswari V., Chatterjee J.M., Mousa A.A.A., Hassanien A.E.IEEE Access
157BCD-WERT: a novel approach for breast cancer detection using whale optimization based efficient features and extremely randomized tree algorithmAbbas S., Jalil Z., Javed A.R., Batool I., Khan M.Z., Noorwali A., Gadekallu T.R., Akbar A.PeerJ Computer Science
158Deep Neural Network to Predict Answer Votes on Community Question Answering SitesRoy P.K.Neural Processing Letters
159Smart Animal Detection and Counting Framework for Monitoring Livestock in an Autonomous Unmanned Ground Vehicle Using Restricted Supervised Learning and Image FusionMeena S.D., Agilandeeswari L.Neural Processing Letters
160Spam review detection using self attention based CNN and bi-directional LSTMBhuvaneshwari P., Rao A.N., Robinson Y.H.Multimedia Tools and Applications
161A secured distributed detection system based on IPFS and blockchain for industrial image and video data securityKumar R., Tripathi R., Marchang N., Srivastava G., Gadekallu T.R., Xiong N.N.Journal of Parallel and Distributed Computing
162Integrated Ranking Algorithm for Efficient Decision MakingDeepa N., Prabadevi B., Srivastava G.International Journal of Information Technology and Decision Making
163An effective data mining techniques based optimal paddy yield cultivation: a rational approachVinoth B., Elango N.M.Paddy and Water Environment
1643-Dimensional Manifold and Machine Learning Based Localization Algorithm for Wireless Sensor NetworksRobinson Y.H., Vimal S., Julie E.G., Lakshmi Narayanan K., Rho S.Wireless Personal Communications
165Machine Learning Based Detection and a Novel EC-BRTT Algorithm Based Prevention of DoS Attacks in Wireless Sensor NetworksLakshmi Narayanan K., Santhana Krishnan R., Golden Julie E., Harold Robinson Y., Shanmuganathan V.Wireless Personal Communications
166Ternary-based feature level extraction for anomaly detection in semantic graphs: an optimal feature selection basisReddy M.S.K., Rajput D.S.Sadhana – Academy Proceedings in Engineering Sciences
167Remote health patient monitoring system for early detection of heart diseaseBabu G.C., Shantharajah S.P.International Journal of Grid and High Performance Computing
168DARE-SEP: A Hybrid Approach of Distance Aware Residual Energy-Efficient SEP for WSNNaeem A., Javed A.R., Rizwan M., Abbas S., Lin J.C., Gadekallu T.R.IEEE Transactions on Green Communications
169Heart disease prediction system using ensemble of machine learning algorithmsRajendran N.A., Vincent D.R.Recent Patents on Engineering
170Hybrid approach for semantic similarity calculation between Tamil wordsKaruppaiah D., Durai Raj Vincent P.M.International Journal of Innovative Computing and Applications
171LIS4: Lesk Inspired Sense Specific Semantic Similarity using WordNetKandasamy S., Cherukuri A.K.Journal of Information and Knowledge Management
172Data mining of paddy cultivation patterns and water resource management in late samba season of TamilnaduVinoth B., Elango N.M.SSRG International Journal of Engineering Trends and Technology
173A fine-tuned feature descriptor for pedestrian action recognition in autonomous vehiclesUshapreethi P., Priya G.G.L.International Journal of Vehicle Information and Communication Systems
174Robustness for authentication of the human using face, Ear, and Gait multimodal biometric systemSingh L.K., Khanna M., Thawkar S., Gopal J.International Journal of Information System Modeling and Design
175Adoption of E-Learning during Lockdown in IndiaMathivanan S.K., Jayagopal P., Ahmed S., Manivannan S.S., Kumar P.J., Raja K.T., Dharinya S.S., Prasad R.G.International Journal of Systems Assurance Engineering and Management
176Real-time 3D reconstruction techniques applied in dynamic scenes: A systematic literature reviewIngale A.K., J. D.U.Computer Science Review
177Regularized deep clustering approach for effective categorization of maize diseasesGokulnath B.V., Gandhi U.D.Journal of Ambient Intelligence and Humanized Computing
178Optimal 5G network slicing using machine learning and deep learning conceptsAbidi M.H., Alkhalefah H., Moiduddin K., Alazab M., Mohammed M.K., Ameen W., Gadekallu T.R.Computer Standards and Interfaces
179Field-programmable gate arrays in a low power vision systemSuresh P., Saravanakumar U., Iwendi C., Mohan S., Srivastava G.Computers and Electrical Engineering
180Recognition of food type and calorie estimation using neural networkKumar R.D., Julie E.G., Robinson Y.H., Vimal S., Seo S.Journal of Supercomputing
181An intrusion detection system using optimized deep neural network architectureRamaiah M., Chandrasekaran V., Ravi V., Kumar N.Transactions on Emerging Telecommunications Technologies
182Roughsets-based approach for predicting battery life in iotKaluri R., Rajput D.S., Xin Q., Lakshmanna K., Bhattacharya S., Gadekallu T.R., Maddikunta P.K.R.Intelligent Automation and Soft Computing
183Tyre inspection through multi-state convolutional neural networksSivamani C., Rajeswari M., Julie E.G., Robinson Y.H., Shanmuganathan V., Kadry S., Nam Y.Intelligent Automation and Soft Computing
184An Effective Traceback Network Attack Procedure for Source Address VerificationBalraj S., Leelasankar K., Ayyanar A., Yesudhas H.R., Kumar R., Long H.V., Hoang Son L.Wireless Personal Communications
185Enhanced QoS Through Optimized Architecture for Video Streaming Applications in Heterogeneous NetworksDuraimurugan S., Avudaiammal R., Vincent P.M.D.R.Wireless Personal Communications
186Image retrieval using intensity gradients and texture chromatic pattern: Satellite images retrievalJacob I.J., Paulraj B., Darney P.E., Long H.V., Tuan T.M., Yesudhas H.R., Shanmuganathan V., Eanoch G.J.International Journal of Data Warehousing and Mining
187Human action recognition in videos using convolution long short-term memory network with spatio-temporal networksSarabu A., Santra A.K.Emerging Science Journal
188A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniquesSingh G., Khare N.International Journal of Computers and Applications
189A hybrid approach towards content-based image retrieval for colored images using enhanced first type of pessimistic covering based lower approximation multi-granular rough setsR R., K J.S.Evolutionary Intelligence
190Trust-aware routing framework for internet of thingsSankar S., Somula R., Lakshmana Kumar R., Srinivasan P., Amala Jayanthi M.International Journal of Knowledge and Systems Science
191E-farming management system using data mining techniquesKaviarasan S., Vanitha M.International Journal of Intelligent Unmanned Systems
192An efficient privacy-preserving deep learning scheme for medical image analysisAndrew Onesimu J., Karthikeyan J.Journal of Information Technology Management
193Machine Learning Assisted Information Management Scheme in Service Concentrated IoTManogaran G., Alazab M., Saravanan V., Rawal B.S., Shakeel P.M., Sundarasekar R., Nagarajan S.M., Kadry S.N., Montenegro-Marin C.E.IEEE Transactions on Industrial Informatics
194An ensemble machine learning approach through effective feature extraction to classify fake newsHakak S., Alazab M., Khan S., Gadekallu T.R., Maddikunta P.K.R., Khan W.Z.Future Generation Computer Systems
195Novel framework of GIS based automated monitoring process on environmental biodegradability and risk analysis using Internet of ThingsGopikumar S., Banu J.R., Robinson Y.H., Shanmuganathan V., Kadry S., Rho S.Environmental Research
196A reinforced random forest model for enhanced crop yield prediction by integrating agrarian parametersElavarasan D., Vincent P.M.D.R.Journal of Ambient Intelligence and Humanized Computing
197Analysis and evaluation of the regional air quality index forecasting based on web-text sentiment analysis methodGao K., Anandhan P., Kumar R.Environmental Impact Assessment Review
198Prediction modelling of COVID using machine learning methods from B-cell datasetJain N., Jhunthra S., Garg H., Gupta V., Mohan S., Ahmadian A., Salahshour S., Ferrara M.Results in Physics
199An Emotion Care Model using Multimodal Textual Analysis on COVID-19Gupta V., Jain N., Katariya P., Kumar A., Mohan S., Ahmadian A., Ferrara M.Chaos, Solitons and Fractals
200A social immunity based approach to suppress rumors in online social networksSrinivasan S., L D D.B.International Journal of Machine Learning and Cybernetics
201Secrecy Outage Probability of Relay Selection Based Cooperative NOMA for IoT NetworksLi H., Chen Y., Zhu M., Sun J., Do D.-T., Menon V.G., P. G. S.IEEE Access
202Multi-objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart citiesAlazab M., Lakshmanna K., G T.R., Pham Q.-V., Reddy Maddikunta P.K.Sustainable Energy Technologies and Assessments
203Accessing Covid19 epidemic outbreak in Tamilnadu and the impact of lockdown through epidemiological models and dynamic systemsRajendran S., Jayagopal P.Measurement: Journal of the International Measurement Confederation
204Keyword weight optimization using gradient strategies in event focused web crawlingRajiv S., Navaneethan C.Pattern Recognition Letters
205SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial VehiclesKumar R., Kumar P., Tripathi R., Gupta G.P., Gadekallu T.R., Srivastava G.Computer Networks
206Unmanned Aerial Vehicles in Smart Agriculture: Applications, Requirements, and ChallengesMaddikunta P.K.R., Hakak S., Alazab M., Bhattacharya S., Gadekallu T.R., Khan W.Z., Pham Q.IEEE Sensors Journal
207Adaptive beam formation and channel allocation using substance near multicast protocol and CS-iEHOVelusamy Y., Manickam R., Chinnaswamy S., Eanoch G.J., Yesudhas H.R., Kumar R., Long H.V.Soft Computing
208Sustainable task scheduling strategy in cloudletsMukherjee D., Nandy S., Mohan S., Al-Otaibi Y.D., Alnumay W.S.Sustainable Computing: Informatics and Systems
209EMMM: Energy-efficient mobility management model for context-aware transactions over mobile communicationYadav A.K., Singh K., Ahmadian A., Mohan S., Hussain Shah S.B., Alnumay W.S.Sustainable Computing: Informatics and Systems
210Energy-efficient cluster head selection through relay approach for WSNRathore P.S., Chatterjee J.M., Kumar A., Sujatha R.Journal of Supercomputing
211Exploration of sentiment analysis and legitimate artistry for opinion miningKumar R.S., Saviour Devaraj A.F., Rajeswari M., Julie E.G., Robinson Y.H., Shanmuganathan V.Multimedia Tools and Applications
212Learning automata and reservation based secure smart parking system: Methodology and simulation analysisWaheed A., Krishna P.V., J G., Sadoun B., Obaidat M.Simulation Modelling Practice and Theory
213A bio-inspired defensive rumor confinement strategy in online social networksSrinivasan S., Dhinesh B.L.D.Journal of Organizational and End User Computing
214Longitudinal strain waves propagating in an infinitely long cylindrical rod composed of generally incompressible materials and its Jacobi elliptic function solutionsSilambarasan R., Baskonus H.M., Vijay Anand R., Dinakaran M., Balusamy B., Gao W.Mathematics and Computers in Simulation
215Performance of deep learning vs machine learning in plant leaf disease detectionSujatha R., Chatterjee J.M., Jhanjhi N.Z., Brohi S.N.Microprocessors and Microsystems
216Route manipulation aware Software-Defined Networks for effective routing in SDN controlled MANET by Disney Routing ProtocolJ M., S P., P J., V M., B S.K., P S.Microprocessors and Microsystems
217A pragmatic approach to understand hebbian cell assemblyCherukuri A.K., Shivhare R., Abraham A., Li J., Jonnalagadda A.International Journal of Cognitive Informatics and Natural Intelligence
218Word sense disambiguation in Tamil using indo-wordnet and cross-language semantic similarityKaruppaiah D., Durai Raj Vincent P.M.International Journal of Intelligent Enterprise
219Topological properties of multigranular rough sets on intuitionistic fuzzy approximation spacesReddy A.J., Tripathy B.K.International Journal of Intelligent Enterprise
220A new dominant point detection technique for polygonal approximation of digital planar closed curvesKalaivani S., Ray B.K.International Journal of Intelligent Enterprise
221Finding location of fake and phantom source for source location privacy in wireless sensor networkRimjhim, Roy P.K., Singh J.P.International Journal of Communication Networks and Distributed Systems
222Efficient learning from two-class categorical imbalanced healthcare dataMathews L., Seetha H.International Journal of Healthcare Information Systems and Informatics
223Palmprint Recognition Using Hessian Matrix and Two-Component Partition MethodChaki J., Dey N.International Journal of Digital Crime and Forensics
224Design and Evaluation of Wi-Fi Offloading Mechanism in Heterogeneous NetworksVinoth Kumar V., Ramamoorthy S., Dhilip Kumar V., Prabu M., Balajee J.M.International Journal of e-Collaboration
225Robust attack detection approach for iiot using ensemble classifierPriya V., Thaseen I.S., Gadekallu T.R., Aboudaif M.K., Nasr E.A.Computers, Materials and Continua
226Distinct two-stream convolutional networks for human action recognition in videos using segment-based temporal modelingSarabu A., Santra A.K.Data
227Face Analysis Using Row and Correlation Based Local Directional PatternPerumal S.R., Mouli C.P.V.S.S.R.Electronic Letters on Computer Vision and Image Analysis
2020
SL.
NO.
TITLE OF PAPERNAME OF THE AUTHOR/SNAME OF JOURNAL
1Deep learning to filter SMS SpamRoy P.K., Singh J.P., Banerjee S.Future Generation Computer Systems
2An efficient XGBoost–DNN-based classification model for network intrusion detection systemDevan P., Khare N.Neural Computing and Applications
3Quantum Aspects of High Dimensional Conceptual Space: a Model for Achieving ConsciousnessIshwarya M.S., Kumar C.A.Cognitive Computation
4Hybrid context enriched deep learning model for fine-grained sentiment analysis in textual and visual semiotic modality social dataKumar A., Srinivasan K., Cheng W.-H., Zomaya A.Y.Information Processing and Management
5A novel automata and neural network based fault diagnosis system for PLC controlled manufacturing systemsGhosh A., Wang G.-N., Lee J.Computers and Industrial Engineering
6SVM-enabled intelligent genetic algorithmic model for realizing efficient universal feature selection in breast cyst image acquired via ultrasound sensing systemsChang C.-Y., Srinivasan K., Chen M.-C., Chen S.-J.Sensors (Switzerland)
7Predicting drug responsiveness with deep learning from the effects on gene expression of Obsessive–Compulsive Disorder affected casesSekaran K., Sudha M.Computer Communications
8Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOTVimal S., Khari M., Dey N., Crespo R.G., Harold Robinson Y.Computer Communications
9LNR-PP: Leaf Node Count and RSSI Based Parent Prediction Scheme to Support QoS in Presence of Mobility in 6LoWPANSuganya P., C.H. P.R.Computer Communications
10An efficient public key secure scheme for cloud and IoT securityThirumalai C., Mohan S., Srivastava G.Computer Communications
11Periodic waves of the non dissipative double dispersive micro strain wave in the micro structured solidsGao W., Silambarasan R., Baskonus H.M., Anand R.V., Rezazadeh H.Physica A: Statistical Mechanics and its Applications
12AVRM: adaptive void recovery mechanism to reduce void nodes in wireless sensor networksAyyasamy A., Julie E.G., Robinson Y.H., Balaji S., Kumar R., Son L.H., Thong P.H., Priyadarshini I.Peer-to-Peer Networking and Applications
13A hybrid meta-heuristic approach for optimization of routing and spectrum assignment in Elastic Optical Network (EON)Selvakumar S., Manivannan S.S.Enterprise Information Systems
14Bio-inspired dual cluster heads optimized routing algorithm for wireless sensor networksVisu P., Praba T.S., Sivakumar N., Srinivasan R., Sethukarasi T.Journal of Ambient Intelligence and Humanized Computing
15Quality assessment of tire shearography images via ensemble hybrid faster region-based convnetsChang C.-Y., Srinivasan K., Wang W.-C.,
Ganapathy G.P., Vincent D.R., Deepa N.
Electronics (Switzerland)
16An algorithmic approach to rank the disambiguous entities in Twitter streams for effective semantic search operationsSenthil Kumar N., Dinakaran M.Sadhana – Academy Proceedings in Engineering Sciences
17A neuro-fuzzy approach to detect rumors in online social networksSrinivasan S., Dhinesh Babu L.D.International Journal of Web Services Research
18Genetic algorithm influenced top-n recommender system to alleviate new user cold start problemMoses S.J., Babu D.L.D.International Journal of Swarm Intelligence Research
19Analysing thalamus and its sub nuclei in MRI brain image to distinguish schizophrenia subjects using back propagation neural networkArivuSelvan K., Sathiya Moorthy E.International Journal of Internet Technology and Secured Transactions
20Fundamentals, present and future perspectives of speech enhancementDas N., Chakraborty S., Chaki J., Padhy N., Dey N.International Journal of Speech Technology
21Predicting bipolar disorder and schizophrenia based on non- overlapping genetic phenotypes using deep neural networkKarthik S., Sudha M.Evolutionary Intelligence
22Learnability of interestingness with semantic similarity and reasoning in the knowledge base of decision support systemsRajendran S., Prabhu J.International Journal of Web Portals
23Effective feature selection using hybrid Ga-EHO for classifying big data siotIyapparaja M., Deva Arul S.International Journal of Web Portals
24Optimal feature selection through a cluster-based DT learning (CDTL) in heart disease predictionMagesh G., Swarnalatha P.Evolutionary Intelligence
25Bi-level user authentication for enriching legitimates and eradicating duplicates in cloud infrastructureThandeeswaran R., Saleem Durai M.A.International Journal of Computer Aided Engineering and Technology
26A framework for ranking hospitals based on customer perception using rough set and soft set techniquesMohapatro A., Mahendran S.K., Das T.K.International Journal of Healthcare Information Systems and Informatics
27Survey on IoT security and challenges of IoT forensicsJoseph A., John Singh K.Test Engineering and Management
28Anaphora and coreference resolution: A reviewSukthanker R., Poria S., Cambria E., Thirunavukarasu R.Information Fusion
29Fuzzy Logic based Smart Irrigation System using Internet of ThingsKrishnan R.S., Julie E.G., Robinson Y.H., Raja S., Kumar R., Thong P.H., Son L.H.Journal of Cleaner Production
30Unsupervised band selection based on weighted information entropy and 3D discrete cosine transform for hyperspectral image classificationSawant S.S., Manoharan P.International Journal of Remote Sensing
31Ultrasonic sensors-assisted corrosion studies on surface coated AlSi9Cu3 alloy die castingsHu Y.-C., Selvaraj S.K., Subramanian M., Srinivasan K., Narayanan S.Coatings
32Early detection of diabetic retinopathy using pca-firefly based deep learning modelGadekallu T.R., Khare N., Bhattacharya S., Singh S., Maddikunta P.K.R., Ra I.-H., Alazab M.Electronics (Switzerland)
33A novel PCA-firefly based XGBoost classification model for intrusion detection in networks using GPUBhattacharya S., Siva Ramakrishnan S., Praveen Kumar Reddy M., Kaluri R., Singh S., Thippa Reddy G., Alazab M., Tariq U.Electronics (Switzerland)
34Improving quality-of-service in fog computing through efficient resource allocationMani S.K., Meenakshisundaram I.Computational Intelligence
35Deep learning techniques for traffic flow prediction in intelligent transportation system: A surveyGeorge S., Santra A.K.Test Engineering and Management
36Evolving dictionary based sentiment scoring framework for patient authored textKumar C.S.P., Babu L.D.D.Evolutionary Intelligence
37Enhancing blockchain performance using parallel merkle root and parallel proof of workThilagavathi M., Lopez D.Journal of Advanced Research in Dynamical and Control Systems
38Pattern analysis based acoustic signal processing: a survey of the state-of-artChaki J.International Journal of Speech Technology
39SMSS: Does social, mobile, spatial and sensor data have high impact on big data analyticsGovardanan C.S., Gnanapandithan L.P.G.International Journal of Intelligent Enterprise
40An efficient crop identification using deep learningAgila N., Senthil Kumar P.International Journal of Scientific and Technology Research
41An Efficient Technique for Three- Dimensional Image Visualization through Two-Dimensional Images for Medical DataGunasekaran G., Venkatesan M.Journal of Intelligent Systems
42A New Representation of Intuitionistic Fuzzy Systems and Their Applications in Critical Decision MakingSon L.H., Ngan R.T., Ali M., Fujita H., Abdel- Basset M., Giang N.L., Manogaran G., Priyan
M.K.
IEEE Intelligent Systems
43Realizing a Stacking Generalization Model to Improve the Prediction Accuracy of Major Depressive Disorder in AdultsMahendran N., Durai Raj Vincent P.M., Srinivasan K., Sharma V., Jayakody
D.K.
IEEE Access
44A new integrated approach based on the iterative super-resolution algorithm and expectation maximization for face hallucinationLakshminarayanan K., Krishnan R.S., Julie E.G., Robinson Y.H., Kumar R., Son L.H., Hung T.X.,
Samui P., Thi Ngo P.T., Bui D.T.
Applied Sciences (Switzerland)
45A two-fold fusion fuzzy framework to restore non-uniform illuminated blurred imageChaki J.Optik
46An efficient hybrid fuzzy‐clustering driven 3D‐ modeling of magnetic resonance imagery for enhanced brain tumor diagnosisKanniappan S., Samiayya D., Durai Raj Vincent P.M., Srinivasan K., Jayakody D.N.K., Reina D.G., Inoue A.Electronics (Switzerland)
47An improved long short-term memory networks with Takagi-Sugeno fuzzy for traffic speed prediction considering abnormal traffic situationGeorge S., Santra A.K.Computational Intelligence
48A novel methodology for the development of an optimal
agricultural crop field using Internet of Things
Manikandan R., Prasanna S., Ashwin M., Sathish Kumar L., Pandiyan S.Computational Intelligence
49Earlier detection of rumors in online social networks using certainty-factor- based convolutional neural networksSanthoshkumar S., Dhinesh Babu L.D.Social Network Analysis and Mining
50Exploring breast cancer classification of histopathology images from computer vision and image processing algorithms to deep learningChowdhary C.L., Shynu P.G., Gurani V.K.International Journal of Advanced Science and Technology
51A review on the significance of machine learning for data analysis in big dataKolisetty V.V., Rajput D.S.Jordanian Journal of
Computers and Information Technology
52Exploring digital signal processing concepts using on-line graphical DSP simulatorSasi G., Thanapal P., Arvind Shriram R.K.,
Balaji V.S., Elamaran V.
International Journal of Advanced Science and
Technology
53Social internet of things using big data analytics and security aspects – a reviewDeva Arul S., Iyapparaja M.Electronic Government
54Classification of heart disease using cluster based DT learningMohan S., Thirumalai C., Rababah A.Journal of Computer Science
55Optimal feature extraction and classification-oriented medical insurance prediction model: machineChowdhury S., Mayilvahanan P., Govindaraj R.International Journal of
Computers and Applications
56An improved trusted on-demand multicast routing with qos for wireless networksGopal J., Vellingiri J., Gitanjali J., Arivuselvan K., Sudhakar S.International Journal of Advanced Trends in Computer Science and Engineering
57Low power area efficient adaptive FIR filter for hearing aids using distributed arithmetic architecturePraveen Sundar P.V., Ranjith D., Karthikeyan T., Vinoth Kumar V., Jeyakumar B.International Journal of Speech Technology
58A Systematic Review on Clone Node Detection in Static Wireless Sensor NetworksNuman M., Subhan F., Khan W.Z., Hakak S., Haider S., Reddy G.T., Jolfaei A., Alazab M.IEEE Access
59Analysis of Dimensionality Reduction Techniques on Big DataReddy G.T., Reddy M.P.K., Lakshmanna K., Kaluri R., RajputIEEE Access
60A deep neural networks based model for uninterrupted marine environment monitoringG. T.R., R.M. S.P., Parimala M., Chowdhary C.L., M. P.K.R., Hakak S., Khan W.Z.Computer Communications
61Hyperspectral band selection based on metaheuristic optimization approachSawant S., Manoharan P.Infrared Physics and Technology
62Hyperspectral image classification using CNN with spectral and spatial features integrationVaddi R., Manoharan P.Infrared Physics and Technology
63A novel user interaction middleware component system for ubiquitous soft computing environment by using fuzzy agent computing systemVasanthi R., Jayavadivel R., Prasadh K., Vellingiri J., Akilarasu G., Sudhakar S., Balasubramaniam P.M.Journal of Ambient Intelligence and Humanized Computing
64Load balancing of energy cloud using wind driven and firefly algorithms in internet of everythingR.M S.P., Bhattacharya S., Maddikunta P.K.R., Somayaji S.R.K., Lakshmanna K., Kaluri R., Hussien A., Gadekallu T.R.Journal of Parallel and Distributed Computing
65A review on classification of imbalanced data for wireless sensor networksPatel H., Singh Rajput D., Thippa Reddy G.,
Iwendi C., Kashif Bashir A., Jo O.
International Journal of Distributed Sensor Networks
66An Effective Congestion Control Scheme for MANET with Relative Traffic Link Matrix RoutingKrishnamoorthy D., Vaiyapuri P., Ayyanar A., Harold Robinson Y., Kumar R., Long H.V., Son L.H.Arabian Journal for Science and Engineering
67Attention Mechanism with Gated Recurrent Unit Using Convolutional Neural Network for Aspect Level Opinion MiningRani M.S., Subramanian S.Arabian Journal for Science and Engineering
68A quantum approach in LiFi security using quantum key distributionVinoth Kumar V., Karthikeyan T., Praveen Sundar P.V., Magesh G., Balajee J.M.International Journal of Advanced Science and Technology
6928 GHZ printed antenna for 5G communication with improved gain
using array
Kavitha M., Dinesh Kumar T., Gayathri A., Koushick V.International Journal of Scientific and
Technology Research
70A survey on workload prediction models in cloud based on spot instances for proactive auto scaling strategySecaran R.Y., Sathiyamoorthy E.Journal of Critical Reviews
71An approach for facial recognition using deep learningGopal J., Menon S.R., Vellingiri J., Arivuselvan K., Kamalakannan J.Journal of Advanced Research in Dynamical and Control Systems
72Dimensionality reduction of fuzzy soft sets using fpso algorithmChandrasekhar U., Khare N.International Journal of Advanced Science
73Dynamic thresholding based ancient character recognition using enhanced convolution neural networkBalasubramanie P., Vellingiriraj E.K., Logesh Babu R., Dinakaran M.International Journal of Advanced Science and Technology
74Event recognition and classification in sports video using HMMEllappan V., Rajkumar R.International Journal of Computer Aided Engineering and Technology
75Probabilistic approach for channel selection in centralized cognitive
scheme utilizing invasive weed optimization
Sumathi D., Manivannan S.S.International Journal of Advanced Trends in
Computer Science and Engineering
76Tricky information applicable answer interest optimization by intellect methodsMohankumar P., Vijayan R., Mareeswari V.International Journal of Scientific and Technology Research
77A stacked ensemble learning model for intrusion detection in wireless networkRajadurai H., Gandhi U.D.Neural Computing and Applications
78Crop Yield Prediction Using Deep Reinforcement Learning Model for
Sustainable Agrarian Applications
Elavarasan D., Durairaj Vincent P.M.IEEE Access
79A Multidirectional LSTM Model for Predicting the Stability of a Smart GridAlazab M., Khan S., Krishnan S.S.R., Pham Q.-V., Reddy M.P.K., Gadekallu T.R.IEEE Access
80Review of Health Prognostics and Condition Monitoring of Electronic ComponentsBhargava C., Sharma P.K., Senthilkumar M., Padmanaban S., Ramachandaramurthy V.K., Leonowicz Z., Blaabjerg F., Mitolo M.IEEE Access
81KeySplitWatermark: Zero Watermarking Algorithm for Software Protection against Cyber-AttacksIwendi C., Jalil Z., Javed A.R., Thippa Reddy G., Kaluri R., Srivastava G., Jo O.IEEE Access
82Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSNThangaramya K., Kulothungan K., Indira Gandhi S., Selvi M., Santhosh Kumar S.V.N., Arputharaj K.Soft Computing
83Green communication in IoT networks using a hybrid optimization algorithmMaddikunta P.K.R., Gadekallu T.R., Kaluri R., Srivastava G., Parizi R.M., Khan M.S.Computer Communications
84Deep neural networks to predict diabetic retinopathyGadekallu T.R., Khare N., Bhattacharya S., Singh S., Maddikunta P.K.R., Srivastava G.Journal of Ambient Intelligence and Humanized Computing
85Cost optimization of secure routing with untrusted devices in software defined networkingYazdinejad A., Parizi R.M., Dehghantanha A., Srivastava G., Mohan S., Rababah A.M.Journal of Parallel and Distributed Computing
86SMO-DNN: Spider monkey optimization and deep neural network
hybrid classifier model for intrusion detection
Khare N., Devan P., Chowdhary C.L.,
Bhattacharya S., Singh G., Singh S., Yoon B.
Electronics (Switzerland)
87Realizing an integrated multistage support vector machine model for augmented recognition of unipolar depressionSrinivasan K., Mahendran N., Vincent D.R., Chang C.-Y., Syed-Abdul S.Electronics (Switzerland)
88Precision agriculture and farming using Internet of Things based on wireless sensor networkSanjeevi P., Prasanna S., Siva Kumar B., Gunasekaran G., Alagiri I., Vijay Anand R.Transactions on Emerging Telecommunications
Technologies
89Realizing the resolution enhancement of tube-to-tube plate friction welding microstructure images via hybrid sparsity model for improved weld interface defects diagnosisSrinivasan K., Deepa N., Durai Raj Vincent P.M., Senthil Kumaran S.Journal of Internet Technology
90A novel solution for economizing water by a mix of technologies with a low cost approachRajalakshmi N.R., Baskar M., Jayalakshmi P., Thiagarajan R., Mohan I.International Journal of Advanced Science and Technology
91Hybrid optimization algorithm for providing big data classificationMargret M.K., Devi S.S., Goldenjulie E., Vijayanandh D., Robinson Y.H.International Journal of Advanced Science and Technology
92Privacy preserving sensitive data publishing using (k,n,m) anonymity approachVictor N., Lopez D.Journal of Communications Software and Systems
93Flood inundation mapping of lower Godavari river basin using remote
sensing and GIS
Vaishnavi B., Yarrakula K., Karthikeyan J.Indian Journal of Ecology
94Automated road safety surveillance system using hybrid cnn-lstm approachBabitha D., Ismail M., Chowdhury S., Govindaraj R., Prakash K.B.International Journal of Advanced Trends in Computer Science and Engineering
95Skeleton-based STIP feature and discriminant sparse coding for human action recognitionUshapreethi P., Lakshmi Priya G.G.International Journal of Intelligent Unmanned
Systems
96Transfer learning techniques for emotion classification on visual features of images in the deep learning networkTamil Priya D., Divya Udayan J.International Journal of Speech Technology
97A hybrid model collaborative movie recommendation system using K- means clustering with ant colony optimisationSandeep Kumar M., Prabhu J.International Journal of Internet Technology and Secured Transactions
98Energy aware task scheduling using hybrid firefly – GA in big dataSenthilkumar M., Ilango P.International Journal of Advanced Intelligence Paradigms
99Biometric based multi-authority inner product encryption for electronic health recordExceline C.E., Norman J.EAI Endorsed Transactions on Pervasive Health and Technology
100Outfit selection recommendation system using classification techniquesGupta N.S., Thanishvi D.S., Valarmathi B.International Journal on Emerging Technologies
101Evolution of privacy preservation models in location-based servicesManju A.B., Subramanian S.Advances in Science, Technology and
Engineering Systems
102SDPBDVC: Secure data processing on big data using visual cryptographyBrindha K., Jeyanthi N.International Journal of Services, Technology and Management
103Word based language model using long short term memory for disabilitiesGuruvammal S., Chellatamilan T., Deborah L.J.International Journal of Psychosocial Rehabilitation
104Crime prediction using machine learning and testing with classification modelsKavithakumari K.S., Uma K., Rameshkumar C., Bashakhaja M.International Journal of Psychosocial Rehabilitation
105Machinelearning and deep learning techniques in diagnosing alzheimers disease-a reviewSudha B., Srinivasan K.International Journal of Advanced Science and Technology
106Adaptive filtering and artificial intelligence methods on fetal ECG extractionPradeepa M., Kumaraperumal S.Journal of Critical Reviews
107A Centralized Cluster-Based Hierarchical Approach for Green Communication in a Smart Healthcare SystemYang G., Jan M.A., Menon V.G., Shynu P.G., Aimal M.M., Alshehri M.D.IEEE Access
108An Adaptive and Flexible Brain Energized Full Body Exoskeleton with IoT Edge for Assisting the Paralyzed PatientsJacob S., Alagirisamy M., Menon V.G., Kumar B.M., Jhanjhi N.Z., Ponnusamy V., Shynu P.G., Balasubramanian V.IEEE Access
109ITFDS: Channel-aware integrated time and frequency-based downlink LTE scheduling in MANETTuan L.M., Son L.H., Long H.V., Priya L.R., Soundar K.R., Robinson Y.H., Kumar R.Sensors (Switzerland)
110Survey on Land Use/Land Cover (LU/LC) change analysis in remote sensing and GIS environment: Techniques and ChallengesMohanRajan S.N., Loganathan A., Manoharan P.Environmental Science and Pollution Research
111A machine learning forecasting model for COVID-19 pandemic in IndiaSujath R., Chatterjee J.M., Hassanien A.E.Stochastic Environmental Research and Risk Assessment
112An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architectureSwarna Priya R.M., Maddikunta P.K.R., Parimala M., Koppu S., Gadekallu T.R., Chowdhary C.L., Alazab M.Computer Communications
113Computational system to classify Cyber Crime offenses using machine learningCh R., Gadekallu T.R., Abidi M.H., Al-Ahmari A.Sustainability (Switzerland)
114A New Supervised Clustering Framework Using Multi Discriminative Parts and Expectation–Maximization Approach for a Fine-Grained Animal Breed Classification (SC-MPEM)Sundaram D.M., Loganathan A.Neural Processing Letters
115An AI-based intelligent system for healthcare analysis using Ridge- Adaline Stochastic Gradient Descent ClassifierDeepa N., Prabadevi B., Maddikunta P.K., Gadekallu T.R., Baker T., Khan M.A., Tariq U.Journal of Supercomputing
116Predicting autism spectrum disorder from associative genetic markers of phenotypic groups using machine learningSekaran K., Sudha M.Journal of Ambient Intelligence and Humanized Computing
117Blended multi-modal deep convnet features for diabetic retinopathy severity predictionBodapati J.D., Veeranjaneyulu N., Shareef S.N., Hakak S., Bilal M., Maddikunta P.K.R., Jo O.Electronics (Switzerland)
118Internet of Green Things with autonomous wireless wheel robots against green houses and farmsRam C.R.S., Ravimaran S., Krishnan R.S., Julie E.G., Robinson Y.H., Kumar R., Son L.H., Thong P.H., Thanh N.Q., Ismail M.International Journal of Distributed Sensor Networks
119An integrated intrusion detection system using correlation-based
attribute selection and artificial neural network
Sumaiya Thaseen I., Saira Banu J., Lavanya
K., Rukunuddin Ghalib M., Abhishek K.
Transactions on Emerging
Telecommunications Technologies
120A distributed collaborative trust service recommender system for secure cloud computingBenjula Anbu Malar M.B., Prabhu J.Transactions on Emerging Telecommunications
Technologies
121An empirical model in intrusion detection systems using principal component analysis and deep learning modelsRajadurai H., Gandhi U.D.Computational Intelligence
122Extraction of qualitative behavior rules for industrial processes from reduced concept latticeDias S.M., Zárate L.E.,Song M.A.J., Vieira N.J., Kumar C.A.Intelligent Data Analysis
123Enhanced adaptive distributed energy- efficient clustering (EADEEC) for wireless sensor networksPoluru R.K., Praveen Kumar Reddy M., Basha
S.M., Patan R., Kallam S.
Recent Advances in Computer Science and Communications
124Preserving learnability and intelligibility at the point of care with assimilation of different speech recognition techniquesRajendran S., Jayagopal P.International Journal of Speech Technology
125Intrusion detection in software defined networking using snort and mirroringSampath N., Sadhasivam J., Jayavel S., Chindarmony N.S., Sharma S.SSRG International Journal of Engineering Trends and Technology
126Chest X-ray investigation: A convolutional neural network approachDas T.K., Lal Chowdhary C., Gao X.Z.Journal of Biomimetics, Biomaterials and Biomedical Engineering
127Gaussian hybrid fuzzy clustering and radial basis neural network for automatic brain tumor classification in MRI imagesSathish P., Elango N.M.Evolutionary Intelligence
128Prediction of user interest fluctuation using fuzzy neural networks in web
search
N C S., Ch P.R.International Journal of Intelligent Unmanned
Systems
129A comparative study on transformation of UML/OCL to other specificationsThangaraj J., Ulaganathan S.Recent Advances in Computer Science and
Communications
130A weighted assignment approach using recommendation routing for
congestion control in wireless sensor networks-WEAR
Somayaji S.R.K., Thangavelu A.K.Recent Advances in Computer Science and Communications
131Comprehensive data analysis and prediction on IPL using machine
learning algorithms
Amala Kaviya V.S., Mishra A.S., Valarmathi
B.
International Journal on Emerging Technologies
132Survey of genetic algorithm approach in machine learningSadhasivam J., Jayavel S., Rathore A.SSRG International Journal of Engineering
Trends and Technology
133Decision-making in cognitive paradoxes with contextuality and quantum formalismM.S I., Cherukuri A.K.Applied Soft Computing Journal
134Graph based feature extraction and hybrid classification approach for facial expression recognitionKrithika L.B., Priya G.G.L.Journal of Ambient Intelligence and Humanized Computing
135Invariant Features-Based Fuzzy Inference System for Animal Detection and Recognition Using Thermal ImagesMeena D., Agilandeeswari L.International Journal of Fuzzy Systems
136Performance Prediction and Interpretation of a Refuse Plastic Fuel Fired BoilerShaha A.P., Singamsetti M.S., Tripathy B.K., Srivastava G., Bilal M., Nkenyereye L.IEEE Access
137ECMCRR-MPDNL for Cellular Network Traffic Prediction with Big DataDommaraju V.S., Nathani K., Tariq U., Al-Turjman F., Kallam S., Reddy M P.K., Patan R.IEEE Access
138Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networksKrishnan R.S., Julie E.G., Robinson Y.H., Kumar R.,Thong P.H., Son L.H.Computers and Security
139Failure assessment of pressure vessels made of plain carbon steel by using modified inherent flaw model in DL based industry optimization intelligent processingJoemax Agu M., Gopikumar S., Vimal S., Harold Robinson Y.Measurement: Journal of the International Measurement Confederation
140An efficient segmentation and classification system in medical images using intuitionist possibilistic fuzzy C-mean clustering and fuzzy SVM algorithmChowdhary C.L., Mittal M., Kumaresan P., Pattanaik P.A., Marszalek Z.Sensors (Switzerland)
141Intelligent animal detection system using sparse multi discriminative-neural network (SMD-NN) to mitigate animal-vehicle collisionMeena S.D., Loganathan A.Environmental Science and Pollution Research
142Multilayer Convolutional Neural Network to Filter Low Quality Content from QuoraRoy P.K.Neural Processing Letters
143Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignmentXu X., Han M., Nagarajan S.M., Anandhan P.Computer Communications
144Deep learning disease prediction model for use with intelligent robotsKoppu S., Maddikunta P.K.R., Srivastava G.Computers and Electrical Engineering
145Energy efficiency maximization algorithm for underwater Mobile sensor networksPasupathi S., Vimal S., Harold-Robinson Y., Khari M., Verdú E., Crespo R.G.Earth Science Informatics
146Hyperspectral image classification using fuzzy-embedded hyperbolic sigmoid nonlinear principal component and weighted least squares approachPhaneendra Kumar B.L.N., Prabukumar M.Journal of Applied Remote Sensing
147FSSCaps-DetCountNet: Fuzzy soft sets and CapsNet-based detection and counting network for monitoring animals from aerial imagesSundaram D.M., Loganathan A.Journal of Applied Remote Sensing
148Traffic Prediction Using Multifaceted Techniques: A SurveyGeorge S., Santra A.K.Wireless Personal Communications
149Affective emotion classification using feature vector of image based on visual conceptsPriya D.T., Udayan J.D.International Journal of Electrical Engineering
Education
150A novel smart meal planner website with online store and dietician consultancy-for this modern era-from the human-computer interaction practitioners’ perspectiveVellingiri J., Suraj A., Gopal J., Gitanjali J.International Journal of Advanced Trends in
Computer Science and Engineering
151Channel-based encrypted binary arithmetic coding in wireless sensor networksSubramanian B., Yesudhas H.R., Enoch G.J.Ingenierie des Systemes d’Information
152Social economic impact of COVID-19 outbreak in IndiaM S.K., V M., J P., M P., P J., P S., M.B B.A.M., Jothikumar R.International Journal of Pervasive Computing and Communications
153Enhanced resemblance measures for integration in image-rich information networksJothikumar R., Kumar T.R., Jayalakshmi P., Baskar M., Thiagarajan R., Mohan I.Journal of Critical Reviews
154Impact of multimedia competencies of faculties on the effectiveness of engineering lecturesUshapreethi P.Journal of Critical Reviews
155Survey of various algorithms used in twitter for sentiment analysisSadhasivam J.,Kalivaradhan R.B., Jayavel S.SSRG International Journal of Engineering Trends and Technology
156Machine learning and artificial intelligence based Diabetes Mellitus detection and self- management: A systematic reviewChaki J., Thillai Ganesh S., Cidham S.K., Ananda Theertan S.Journal of King Saud University – Computer and Information Sciences
157Mechanism of the effect of traditional Chinese medicine fumigation on blood lactic acid in exercise bodyGang R., Nagarajan S.M., Anandhan P.Journal of Ambient Intelligence and Humanized Computing
158EC-ElGamal and Genetic Algorithm-Based Enhancement for Lightweight Scalable Blockchain in IoT DomainGuruprakash J., Koppu S.IEEE Access
159Latency Evaluation of SDFGs on Heterogeneous Processors Using Timed AutomataRajadurai S., Alazab M., Kumar N., Gadekallu T.R.IEEE Access
160Fuzzy Inspired Deep Belief Network for the Traffic Flow Prediction in Intelligent Transportation System Using Flow Strength IndicatorsGeorge S., Santra A.K.Big data
161N-Sanitization: A semantic privacy- preserving framework for unstructured medical datasetsIwendi C., Moqurrab S.A., Anjum A., Khan S., Mohan S., Srivastava G.Computer Communications
162Application of active remote sensing in confirmation rights and identification of mortgage supply-demand subjects of rural land in Guangdong ProvinceHu S., Fu Z., Jackson Samuel R.D., Anandhan P.European Journal of Remote Sensing
163Energy-aware grid-based data aggregation scheme in routing protocol for agricultural internet of thingsSankar S., Srinivasan P., Luhach A.K., Somula R., Chilamkurti N.Sustainable Computing: Informatics and Systems
164A novel predicate based access control scheme for cloud environment using open stack swift storageAnilkumar C., Subramanian S.Peer-to-Peer Networking and Applications
165Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusionsPreethi D., Khare N.Peer-to-Peer Networking and Applications
166A novel grid and place neuron’s computational modeling to learn spatial semantics of an environmentShrivastava R., Kumar P., Tripathi S., Tiwari V., Rajput D.S., Gadekallu T.R., Suthar B., Singh S., Ra I.-H.Applied Sciences (Switzerland)
167Suspicious activity detection using deep learning in secure assisted living IoT environmentsVallathan G., John A., Thirumalai C., Mohan S.K., Srivastava G., Lin J.C.-W.Journal of Supercomputing
168Tree-based convolutional neural networks for object classification in segmented satellite imagesRobinson Y.H., Vimal S., Khari M., Hernández F.C.L., Crespo R.G.International Journal of High Performance Computing Applications
169Multispectral and hyperspectral images based land use / land cover change prediction analysis: an extensive reviewNavin M.S., Agilandeeswari L.Multimedia Tools and Applications
170Deep learning based genome analysis and NGS-RNA LL identification with a novel hybrid modelRamamurthy M., Krishnamurthi I., Vimal S., Robinson Y.H.BioSystems
171Stochastic approach for channel selection in cognitive radio networks using optimization techniquesSumathi D., Manivannan S.S.Telecommunication Systems
172Forest data visualization and land mapping using support vector machines and decision treesRadhakrishnan S., Lakshminarayanan A.S., Chatterjee J.M., Hemanth D.J.Earth Science Informatics
173Fragmented handwritten digit recognition using grading scheme and fuzzy rulesChaki J., Dey N.Sadhana – Academy Proceedings in
Engineering Sciences
174EM- and EM’-index Sequence: Construction and Application in Scientific Assessment of ScholarsBihari A., Tripathi S., Deepak A., Kumar P.Measurement
175A survey on plant disease prediction using machine learning and deep learning techniquesGokulnath B.V., Usha Devi G.Inteligencia Artificial
176ACO-based enhanced energy-efficient intelligent routing protocol for MANETJayalakshmi P., Saravanan R.International Journal of Grid and Utility
Computing
177An efficient computational model for assessing the stability characteristics of electro-active natural bio-resourcesJhawar D., Sharma P., Sharma A., Srinivasan K., Chen B.-Y.Recent Advances in Computer Science and Communications
178A framework for multimedia event classification with convoluted texture featureKanagaraj K., Lakshmi Priya G.G.Recent Advances in Computer Science and Communications
179Irrigation control system-data gathering in WSN using IOTKumar K.A., Jayaraman K.International Journal of Communication Systems
180A study on data de-duplication schemes in cloud storageKumar P.M., Usha Devi G., Basheer S., Parthasarathy P.International Journal of Grid and Utility Computing
181An enhanced two factor authentication for e-healthcare systemLikitha S., Saravanan R.International Journal of Internet Manufacturing
and Services
182Comprehensive review on land use/land cover change classification in remote sensingNavin M.S., Agilandeeswari L.Journal of Spectral Imaging
183PMCAR: proactive mobility and congestion aware route prediction mechanism in IoMT for delay sensitive medical applications to ensure reliability in COVID-19 pandemic situationPandi S., Ch P.R.International Journal of Pervasive Computing and Communications
184IoT role in prevention of COVID-19 and health care workforces behavioural intention in India – an empirical examinationR V.A., J P., P J K., SS M., Rajendran S., Kumar K.R., S S., Jothikumar R.International Journal of Pervasive Computing and Communications
185Learning models for concept extraction from images with drug labels for a unified knowledge base utilizing NLP and IoT tasksRajendran S., Prabhu J.International Journal of Information Technology and Web Engineering
186Performance evaluation of transactions in blockchain based on workload using queueing modelSanthi K., Lawanya Shri M.Journal of Green Engineering
187Fast hash-based high secure hiding technique for digital data securityShrimali S., Kumar A., John Singh K.Electronic Government
188Hybrid coherent encryption scheme for multimedia big data management using cryptographic encryption methodsStephen Dass A., Prabhu J.International Journal of Grid and Utility Computing
189Defining theoretical foundations to unified metamodel for model
reusability
Thangaraj J., Ulaganathan S.Recent Advances in Computer Science and
Communications
190Boosted-DEPICT: an effective maize disease categorization framework using deep clusteringGokulnath B.V., Usha Devi G.Neural Computing and Applications
191R-CNN and wavelet feature extraction for hand gesture recognition with EMG signalsShanmuganathan V., Yesudhas H.R., Khan M.S., Khari M., Gandomi A.H.Neural Computing and Applications
192A heuristic angular clustering framework for secured statistical data aggregation in sensor networksKrishnasamy L., Dhanaraj R.K., Gopal D.G., Gadekallu T.R., Aboudaif M.K., Nasr E.A.Sensors (Switzerland)
193Analytical study of hybrid techniques for image encryption and decryptionChowdhary C.L., Patel P.V., Kathrotia K.J., Attique M., Kumaresan P., Ijaz M.F.Sensors (Switzerland)
194Improved diver communication system by combining optical and electromagnetic trackersKataria A., Ghosh S., Karar V., Gupta T., Srinivasan K., Hu Y.-C.Sensors (Switzerland)
195Prevention of Hello Flood Attack in IoT using combination of Deep Learning with Improved Rider Optimization AlgorithmAditya Sai Srinivas T., Manivannan S.S.Computer Communications
196Penetration testing framework for smart contract BlockchainBhardwaj A., Shah S.B.H., Shankar A., Alazab M., Kumar M., Gadekallu T.R.Peer-to-Peer Networking and Applications
197COVID-19 patient health prediction using boosted random forest algorithmIwendi C., Bashir A.K., Peshkar A., Sujatha R., Chatterjee J.M., Pasupuleti S., Mishra R., Pillai S., Jo O.Frontiers in Public Health
198A new framework for hyperspectral image classification using Gabor embedded patch based convolution neural networkBoggavarapu L.N.P.K., Manoharan P.Infrared Physics and Technology
199CNN based hyperspectral image classification using unsupervised band selection and structure-preserving spatial featuresVaddi R., Manoharan P.Infrared Physics and Technology
200A hybrid optimization approach for hyperspectral band selection based on wind driven optimization and modified cuckoo search optimizationSawant S., Manoharan P.Multimedia Tools and Applications
201A hybrid CFS filter and RF-RFE wrapper-based feature extraction
for enhanced agricultural crop yield prediction modeling
Elavarasan D., Durai Raj Vincent P.M.,
Srinivasan K., Chang C.- Y.
Agriculture (Switzerland)
202Integrating encryption techniques for secure data storage in the cloudSeth B., Dalal S., Jaglan V., Le D.-N., Mohan S.,
Srivastava G.
Transactions on Emerging Telecommunications
Technologies
203Person identification with aerial imaginary using SegNet based semantic segmentationManickam R., Kumar Rajan S., Subramanian C., Xavi A., Eanoch G.J., Yesudhas H.R.Earth Science Informatics
204HEALTH of THINGS MODEL for CLASSIFYING HUMAN HEART SOUND SIGNALS USING CO- OCCURRENCE MATRIX and SPECTROGRAMArora V., Ng E.Y.-K., Leekha R.S., Verma K., Gupta T., Srinivasan K.Journal of Mechanics in Medicine and Biology
205A comparative study about workload prediction from one time forecast with cyclic forecasts using ARIMA model for cloud environmentYuvha Secaran R., Sathiyamoorthy E.EAI Endorsed Transactions on Energy Web
206A modified cuckoo search algorithm based in this issue: Spectral preprocessing to compensate for packaging film / using neural nets to invert the prosail canopy model optimal band subset selection approach for hyperspectral image classificationSawant S.S., Prabukumar M., Samiappan S.Journal of Spectral Imaging
207A novel method for deduplication of information storage managing in cloud computingSanthi K., Lawanya Shri M., Gangadevi E., Meenatchi S., Navaneethan C.International Journal of Psychosocial Rehabilitation
208A secure and privacy-preserving approach to protect user data across cloud based online social networksKhare N., Kumaran U.International Journal of Grid and High Performance Computing
209A survey of band selection techniques for hyperspectral image
classification
Sawant S.S., Prabukumar M.Journal of Spectral Imaging
210An adaptive service monitoring system in a cloud computing environmentSathiyamoorthy E., Karthikeyan P.International Journal of Grid and High Performance Computing
211Exquisite Analysis of Popular Machine Learning–Based Phishing Detection Techniques for Cyber SystemsDas M., Saraswathi S., Panda R., Mishra A.K., Tripathy A.K.Journal of Applied Security Research
212Innovative shopping through mobile using Google’s arcoreSathish Kumar P., Chandra Prakash S., Ajith Kumar K., Shri M.L., Santhi K., Mon F.A.International Journal of Psychosocial Rehabilitation
213Monitoring and analysis of the recovery rate of Covid-19 positive cases to prevent dangerous stage using IoT and sensorsKumar K.R., Iyapparaja M., Niveditha V.R., Magesh S., Magesh G., Marappan S.International Journal of Pervasive Computing and Communications
214Secure virtual machine migration technique using blockchainLawanya Shri M., Santhi K., Gangadevi E., Meenatchi S., Navaneethan C.International Journal of Psychosocial Rehabilitation
215Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attackAnbu Malar M.B.B., J P.International Journal of Pervasive Computing and Communications
216Service-Oriented Broker for Effective Provisioning of Cloud Services – a SurveyNagarajan R., Thirunavukarasu R.International Journal of Computing and Digital
Systems
217A novel optimal feature selection technique for medical data classification using ANOVA based whale optimizationMoorthy U., Gandhi U.D.Journal of Ambient Intelligence and Humanized Computing
218Thermoeconomic investigation on advanced Kalina power generation systemUma Maheswari G., Shankar Ganesh N.,
Srinivas T., Reddy B.V.
Energy Reports
219Optimization of routing-based clustering approaches in wireless
sensor network: Review and open research issues
Manuel A.J., Deverajan G.G., Patan R., Gandomi A.H.Electronics (Switzerland)
220Antlion re-sampling based deep neural network model for classification of imbalanced multimodal stroke datasetThippa Reddy G., Bhattacharya S., Maddikunta P.K.R., Hakak S., Khan W.Z., Bashir A.K., Jolfaei A., Tariq U.Multimedia Tools and Applications
221Compression based clustering technique for enhancing accuracy in web scale videosPillai K.G.R., Radhakrishnan K., Ramakrishnan D., Yesudhas H.R., Eanoch G.J., Kumar R., Long
H.V., Son L.H.
Multimedia Tools and Applications
222A new 3D convolutional neural network (3D-CNN) framework for
multimedia event detection
Kanagaraj K., Priya G.G.L.Signal, Image and Video Processing
223An intelligent ensemble of long-short- term memory with genetic algorithm for network anomaly identificationThaseen I.S., Chitturi A.K., Al-Turjman F., Shankar A., Ghalib M.R., Abhishek K.Transactions on Emerging Telecommunications
Technologies
224Hybrid optimization routing management for autonomous underwater vehicle in the internet of underwater thingsRobinson Y.H., Vimal S., Julie E.G., Khari M., Expósito-Izquierdo C., Martínez J.Earth Science Informatics
225High-performance implementation of a two-bit geohash coding technique for nearest neighbor searchVaralakshmi M., Kesarkar A.P., Lopez D.Concurrency Computation
226Auto encoder based dimensionality reduction and classification using convolutional neural networks for hyperspectral imagesRamamurthy M., Robinson Y.H., Vimal S., Suresh A.Microprocessors and Microsystems
227A novel approach for merging ontologies using formal concept analysisPriya M., Kumar C.A.International Journal of Cloud Computing
228A queuing theory model for e-health cloud applicationsKumar M.S., Raja M.I.International Journal of Internet Technology and
Secured Transactions
229An approach to feature selection in intrusion detection systems using machine learning algorithmsKavitha G., Elango N.M.International Journal of e-Collaboration
230An early prevention method for node failure in wireless sensor networksKrishnan S.S.R., Thangavelu A.International Journal of Internet Technology and
Secured Transactions
231An effective prediction model for online course dropout rateNarayanasamy S.K., Elçi A.International Journal of Distance Education
Technologies
232Automated intelligent public lighting systemSenthilkumar S., Brindha K., Jena A.International Journal of Internet Technology and
Secured Transactions
233Chronological and exponential-based Lion optimisation for optimal resource allocation in cloudDevagnanam J., Elango N.M.International Journal of Grid and Utility
Computing
234Coverless VoIP steganography using hash and hashDeepikaa S., Saravanan R.Cybernetics and Information Technologies
235Data storage security in the cloud environment using the honey pot
system
Malar B.A., Prabhu J.International Journal of e-Collaboration
236Efficient clustering of water distribution network using affinity propagationSomisetti V.S.S., Palla S.H.Ingenierie des Systemes d’Information
237EFS-LSTM (Ensemble-based feature selection with LSTM) classifier for intrusion detection systemPreethi D., Khare N.International Journal of e-Collaboration
238Enhancing the mobility support in internet of thingsSankar S., Srinivasan P.International Journal of Fuzzy System
Applications
239Generative adversarial networks: a survey on applications and challengesPavan Kumar M.R., Jayagopal P.International Journal of Multimedia Information
Retrieval
240Hybrid machine learning model for healthcare monitoring systemsNallakaruppan M.K., Kumaran U.S.International Journal of Internet Technology and
Secured Transactions
241Hybrid swarm intelligence for feature selection on IoT-based infrastructureNallakaruppan M.K., Kumaran U.S.International Journal of Cloud Computing
242Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor NetworkAshwini B. Abhale, Manivannan S.S.Optical Memory and Neural Networks (Information Optics)
243Survey of methodologies for quantifying software reliabilityViswanathan G., Prabhu J.International Journal of Internet Technology and
Secured Transactions
244A method of landfill leachate management using internet of things for sustainable smart city developmentGopikumar S., Raja S., Robinson Y.H., Shanmuganathan V., Chang H., Rho S.Sustainable Cities and Society
245Deep learning and medical image processing for coronavirus (COVID-19) pandemic: A surveyBhattacharya S., Reddy Maddikunta P.K., Pham Q.-V., Gadekallu T.R., Krishnan S S.R., Chowdhary C.L., Alazab M., Jalil Piran M.Sustainable Cities and Society
246Forecasting of the SARS-CoV-2 epidemic in India using SIR model, flatten curve and herd immunityVenkatasen M., Mathivanan S.K., Jayagopal P., Mani P., Rajendran S., Subramaniam U.S., Ramalingam A.C., Rajasekaran V.A., Indirajithu A., Sorakaya Somanathan M.Journal of Ambient Intelligence and Humanized Computing
247A physical memristor based Muthuswamy–Chua–Ginoux systemGinoux J.-M., Muthuswamy B., Meucci R., Euzzor S., Di Garbo A., Ganesan K.Scientific Reports
248Multiclass model for agriculture development using multivariate statistical methodDeepa N., Khan M.Z., Prabadevi B., Vincent
D.R.P.M., Maddikunta P.K.R., Gadekallu T.R.
IEEE Access
249Pilot decontamination using asynchronous fractional pilot
scheduling in massive MIMO systems
Zahoor M.I., Dou Z., Shah S.B.H., Khan I.U.,
Ayub S., Gadekallu T.R.
Sensors (Switzerland)
250A secure data deduplication system for integrated cloud-edge networksShynu P.G., Nadesh R.K., Menon V.G., Venu P., Abbasi M., Khosravi M.R.Journal of Cloud Computing
251Predictive model for battery life in IoT networksMaddikunta P.K.R., Srivastava G., GadekalluIET Intelligent Transport Systems
252Security and privacy of UAV data using blockchain technologyCh R., Srivastava G., Reddy Gadekallu T., Maddikunta P.K.R., Bhattacharya S.Journal of Information Security and Applications
253Detection of the triple riding and speed violation on two-wheelers using deep learning algorithmsMallela N.C., Volety R., R S.P., R. K N.Multimedia Tools and Applications
254Biometric template security using DNA codec based transformationJacob I.J., Betty P., Darney P.E., Raja S., Robinson Y.H., Julie E.G.Multimedia Tools and Applications
255Medical information retrieval systems for e-Health care records using fuzzy based machine learning modelL A.J.P., Sengan S., G K K., J V., Gopal J.,
Velayutham P., V S.
Microprocessors and Microsystems
256Modelling Spatial Drivers for LU/LC Change Prediction Using Hybrid Machine Learning Methods in Javadi Hills, Tamil Nadu, IndiaMohanRajan S.N., Loganathan A.Journal of the Indian Society of Remote Sensing
257Social and QoS based trust model for secure clustering for wireless body area networkRamaswamy S., Norman J.International Journal of Electrical Engineering
Education
258Constrained multifacility location problems – A reviewSantra A.K.International Journal of Industrial Engineering : Theory Applications and Practice
259Defensive modeling of fake news through online social networksShrivastava G., Kumar P., Ojha R.P., Srivastava P.K., Mohan S., Srivastava G.IEEE Transactions on Computational Social Systems
260Heart sound interference cancellation from lung sound using dynamic neighbourhood learning-particle swarm optimiser based optimal recursive least square algorithmMekala A.M., Chandrasekaran S.International Journal of Biomedical Engineering and Technology
261Energy-aware multipath routing protocol for internet of things using
network coding techniques
Sankar S., Srinivasan P., Ramasubbareddy S.,
Balamurugan B.
International Journal of Grid and Utility
Computing
262Intelligent prediction approach for diabetic retinopathy using deep learning based convolutional neural networks algorithm by means of retina photographsThomas G.A.S., Robinson Y.H., Julie E.G., Shanmuganathan V., Rho S., Nam Y.Computers, Materials and Continua
263Machine Learning Based Computational Gene Selection Models: A Survey, Performance Evaluation, Open Issues, and Future Research
Directions
Mahendran N., Durai Raj Vincent P.M., Srinivasan K., Chang C.-Y.Frontiers in Genetics
264Reinforced XGBoost machine learning model for sustainable intelligent agrarian applicationsElavarasan D., Vincent D.R.Journal of Intelligent and Fuzzy Systems
265Context-aware resource management and alternative pricing model to improve enterprise cloud adoptionBalaji M., Ch A.K.Concurrency Computation
266Adaptive Decentralized Tracking Control for Nonlinear Large-Scale SystemsChandran K., Zhang W., Murugesan R.,
Prasanna S., Baseera A., Pandiyan S.
International Journal of Uncertainty, Fuzziness
and Knowlege-Based Systems
267Pattern Mining Approaches Used in Social Media DataChaki J., Dey N., Panigrahi B.K., Shi F., Fong S.J., Sherratt R.S.International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
268Multi-modal prediction of breast cancer using particle swarm optimization with non-dominating sortingVijayalakshmi S., John A., Sunder R., Mohan S., Bhattacharya S., Kaluri R., Feng G., Tariq U.International Journal of Distributed Sensor Networks
269A unique data identification system for wireless sensor networks based on enhanced arithmetic codingSubramanian B., Yesudhas H.R., Eanoch G.J.Ingenierie des Systemes d’Information
270Web application for traffic monitoring and guidanceSujatha R., Teja A., Naveen P., Chatterjee J.M., Aarthy S.L., Hassanien A.E.Journal of System and Management Sciences
271A comparative study on delay-tolerant network routing protocolsAngulakshmi M., Deepa M., Vanitha M., Mangayarkarasi R., Nagarajan I.International Journal of Intelligent Unmanned Systems
272Computational approach for character identification and retrieval of grantha inscriptionDhivya S., Usha Devi G., Deepanjali S., Tom R.J., Kumar S.International Journal of Advanced Trends in Computer Science and Engineering
2019
SL.NOTITLE OF PAPERNAME OF THE AUTHOR/SNAME OF JOURNALISBN/ISSN NUMBER
1IoT based fall detection and ambient assisted system for the elderlyChandra I., Sivakumar N., Gokulnath C.B., Parthasarathy P.Cluster Computing1386-7857
2Periodicity Mining, “a Time Inference over High Utility Item set mining” – A studyArunkumar M.S, Suresh P, Gunavathi C, Preethi SInternational Journal of Recent Technology and Engineering2277-3878
3Real time sentiment analysis of e-commerce websites using machine learning algorithmsSudheer K., Valarmathi B.International Journal of Mechanical Engineering and Technology0976-6340
4Analyzing Gene Expression Data By Using Crfm-Covering Rough Set Fuzzy C-Medoids Clustering Approach Journal of Web Engineering1540-9589
5Comparative study on dimensionality reduction for disease diagnosis using fuzzy classifierR.Sujatha , E.P.Ephzibah, Sree Dharinya , G. Uma Maheswari, V.Mareeswari, Vamsi PamidimarriInternational Journal of Engineering & Technology2227-524X
6ANALYSING EFFECTIVE METHODOLOGIES USED FOR TEXT CLUSTERING USING WEIGHTED ALGORITHMSS.Sree DharinyaARPN Journal of Engineering and Applied Sciences1819-6608
7Analysis and comparison of routing attacks and preventive measures in IoT environmentAditya Sai Srinivas T., Manivannan S.S.Journal of Advanced Research in Dynamical and Control Systems1943-023X
8Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithmSrinivas Koppu,Madhu Viswanatham VankadaraEvolutionary Intelligence1864-5909
9High Utility Infrequent Itemset Mining Using a Customized Ant Colony AlgorithmM.S. Arunkumar, P.Suresh, C.GunavathiInternational Journal of Parallel Programming0885-7458
10Integration of fuzzy DEMATEL and FMCDM approach for evaluating knowledge transfer effectiveness with reference to GSD project outcomeGopal J., Sangaiah A.K., Basu A., Gao X.Z.International Journal of Machine Learning and Cybernetics1868-8071
11Adaptive mechanism for distributed query processing and data loading using the RDF data in the cloudRanichandra Dharmaraj C., Tripathy B.International Journal of Communication Systems1074-5351
12Investigation on different clustering techniques in wireless sensor networksMeenatchi S., Prabu S.International Journal of Advanced Intelligence Paradigms1755-0386
13Analysis of performance measures to improve the quality of service in cloud based e-government web portalPriya V., Subha S., Balamurugan B.Electronic Government1740-7494
14an overview of web socket: the future real time communicationDr.M.P.vani bhumjiInternational journal of engineering and technology2395-0056
15Adaptive cruise control and cooperative cruise control in real life traffic situationRavikumar C.V., Venugopal P., Jagannadha Naidu K., Satheesh Kumar S., Koppu S.International Journal of Mechanical Engineering and Technology0976-6340
16Encrypted image-based data hiding technique using elliptic curve ElGamal cryptographyJayanthi R., John Singh K.International Journal of Reasoning-based Intelligent Systems1755-0556
17A Fuzzy Linguistic Approach-Based Non-malicious Noise Detection Algorithm for Recommendation SystemSharon Moses J., Dhinesh Babu L.D.International Journal of Fuzzy Systems1562-2479
18A case study on partial homomorphic encryption: Breast cancer diagnosisSushmetha N., Vairamuthu S., Selvarani B.International Journal of Pure and Applied Mathematics1311-8080
19Optimization of QoS parameters using scheduling techniques in heterogeneous networkChandra I., Prabha K.H., Sivakumar N.Personal and Ubiquitous Computing1617-4909
20DTCF: Deadline task consolidation first for energy minimisation in cloud data centresSanjeevi P., Viswanathan P.International Journal of Networking and Virtual Organisations1470-9503
21A fuzzy-based decision-making broker for effective identification and selection of cloud infrastructure servicesNagarajan R., Thirunavukarasu R.Soft Computing1432-7643
22A case study on commending user in social media based on user information and rating of product in interface forumsDeepa M., Santhi K., Lawnyashri M., Malar M.B.B.A., Priya G., Mon F.A.International Journal of Civil Engineering and Technology0976-6308
23Density Based Traffic Management Using IoTM Pounambal K LalithaInternational Journal of Pure and Applied Mathematics1314-3395
24Coagulation attacks over networked UAVs: concept, challenges, and research aspectsVishal Sharma., Dushantha Nalin K. Jayakody., Kathiravan Srinivasan., Ravinder KumarInternational Journal of Engineering & Technology2227-524X
25Energy-efficient border intrusion detection using pipeline monitoring systemJeevitha K., Manivannan S.S.Journal of Advanced Research in Dynamical and Control Systems1943-023X
26Optimized approach for data sharing in WRN using NS2 simulationShalini R., Manivannan S.S.Journal of Advanced Research in Dynamical and Control Systems1943-023X
27Dimensionality reduced local directional number pattern for face recognitionSrinivasa perumal ramalingam., Chandra mouli paturu venkata subbu sita ramaJournal of Ambient Intelligence and Humanized Computing1868-5137
28Hybrid rough fuzzy soft classifier based multi-class classification model for agriculture crop selectionDeepa N., Ganesan K.Soft Computing1432-7643
29Machine learning based approach for pothole detectionKarmel A., Adhithiyan M., Senthil Kumar P.International Journal of Civil Engineering and Technology0976-6308
30Heart disease classification system using optimised fuzzy rule based algorithmReddy G.T., Khare N.International Journal of Biomedical Engineering and Technology1752-6418
31Optimized feature extraction for precise sign gesture recognition using Self-Improved Genetic AlgorithmKaluri R., Reddy C.H.P.International Journal of Engineering and Technology Innovation2223-5329
32Concept Lattice Simplification in Formal Concept Analysis Using Attribute ClusteringK. S., Ch. A.K.Journal of Ambient Intelligence and Humanized Computing1868-5137
33Stock Prediction Using Machine-Learning AlgorithmsJayavel, Senthil Rathore, Arpit Sadhasivam, JayakumarInternational Journal of Engineering and Advanced Technology22498958
34Agent Based Hybrid Routing Protocol for Vehicular Ad Hoc NetworksDr. P.S.Nithyadharshini1 , Dr. SanthiyaKumari2 and * Dr. M.Pounambal3International Journal of Pure and Applied Mathematics1314-3395
35An empirical study on peer-to-peer sharing of resources in mobile cloud environmentNadesh R.K., Aramudhan M.International Journal of Electrical and Computer Engineering2088-8708
36A survey of block chain technology for digitization in indiaManikandan N., Vijayakumar K., Anusha K.International Journal of Civil Engineering and Technology0976-6308
37Software Effort Estimation TechniquesE J Sai Pavan Chowdary R CharanyaInternational Journal for Research in Applied Science & Engineering Technology (IJRASET)23219653
38TSCBA-A Mitigation System for ARP Cache Poisoning AttacksPrabadevi, B; Jeyanthi, N;Cybernetics and Information Technologies1311-9702
39Analytical Model for Sybil Attack Phases in Internet of ThingsMishra A.K., Tripathy A.K., Puthal D., Yang L.T.IEEE Internet of Things Journal2327-4662
40A walk-through: complete survey on blood pressure monitoring devices and applicationsJeyanthi, N; Thandeeswaran, R; Gokulnath, BV;Biomedical Research0970-938X
41Haloop approach for concept generation in formal concept analysisChunduri R.K., Cherukuri A.K.Journal of Information and Knowledge Management0219-6492
42A cloud broker framework for infrastructure service discovery using semantic networkNagarajan R., Thirunavukarasu R., Shanmugam S.International Journal of Intelligent Engineering and Systems2185-310X
43A framework to mitigate ARP sniffing attacks by cache poisoningPrabadevi B., Jeyanthi N.International Journal of Advanced Intelligence Paradigms1755-0386
44Recommendation systems: A beginner’s perspectiveSelva Rani B., Ananda Kumar S.International Journal of Pure and Applied Mathematics1311-8080
45Region-specific multi-attribute white mass estimation-based mammogram classificationPadmavathy T.V., Vimalkumar M.N., Sivakumar N.Personal and Ubiquitous Computing1617-4909
46Intrusion detection model using feature extraction and LPBoost techniqueThaseen I.S., Kumar Ch.A.International Journal of Internet Technology and Secured Transactions1748-569X
47Detection of Intrusion by Stochastic Gradient Descent and K-means ClusteringSuraj Saha., Riya Shaji., Abhijeet Giri., John Singh. KResearch article
48A framework for prediction using rough set and real coded genetic algorithmRathi R., Acharjya D.P.Arabian journal of science and engineering2193-567X
49Decision support systems – An overviewRahamathunnisa U., Chellappa B.International Journal of Mechanical Engineering and Technology0976-6340
50An automated detection of human disease using supervised learning methodManivannan S.S., Lakshmi S.K.Journal of Advanced Research in Dynamical and Control Systems1943-023X
51TRAM-based VM handover with dynamic scheduling for improved QoS of cloud environmentNadesh R.K., Aramudhan M.International Journal of Internet Technology and Secured Transactions1748-569X
52A Fuzzy-Based Intelligent Cloud Broker with MapReduce Framework to Evaluate the Trust Level of Cloud Services Using Customer FeedbackNagarajan R., Thirunavukarasu R., Shanmugam S.International Journal of Fuzzy Systems1562-2479
53Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computingShynu P.G., Singh K.J.International Journal of Embedded Systems1741-1068
54Energy-Aware task scheduling using hybrid Firefly-BAT (FFABAT) in Big dataSenthilkumar M.Cybernetics and Information Technologies1311-9702
55Intelligent intrusion detection system using temporal analysis and type-2 fuzzy neural classificationRama Prabha K.P., Jeyanthi N.International Journal of Internet Technology and Secured Transactions1748-569X
56Arranging job flow on hadoopNavaneethan C., Meenatchi S., Iyapparaja M., Thanapal P.Journal of Advanced Research in Dynamical and Control Systems1943-023X
57Maching language prediction algorithm for crypto currencyPrasanna M., Iyapparaja M., Thanapal P., Navaneethan C., Meenatchi S.Journal of Advanced Research in Dynamical and Control Systems1943-023X
58The sequence way of performance analysis for device to device communicationMeenatchi S., Navaneethan C., Iyapparaja M., Thanapal P., Suganya P.Journal of Advanced Research in Dynamical and Control Systems1943-023X
59Case study on big data inspection in pharmaceutical servicesIyapparaja M., Prasanna M., Thanapal P., Meenatchi S., Navaneethan C.Journal of Advanced Research in Dynamical and Control Systems1943-023X
60BMAQR: Balanced multi attribute QoS aware replication in HDFSKumar P.J., Ilango P.International Journal of Internet Technology and Secured Transactions1748-569X
61Angle Based Energy and Power Efficient Node Detection Routing Protocol for MANETJayalakshmi Periyasamy., R. Saravanan.Recent Patents on Computer Science1874-4796
62Vehicular Cloud for Smart Driving Using Internet of ThingsVijayarangam S., Megalai J., Krishnan S., Nagarajan S., Devi M.R., Lokesh S.Journal of Medical Systems0148-5598
63Visualizing trade-off between performance and energy in parallel computationsMaheswari G.U., Subha S.Journal of Computational and Theoretical Nanoscience1546-1955
64Walsh Hadamard kernel-based texture feature for multimodal MRI brain tumour segmentationAngulakshmi M., Lakshmi Priya G.G.International Journal of Imaging Systems and Technology0899-9457
65Multi-Layer Cluster Based Energy Aware Routing Protocol for Internet of ThingsSankar, S.; Srinivasan, P.Cybernetics and Information Technologies1311-9702
66An intelligent neuro-genetic framework for effective intrusion detectionRama Prabha K.P., Jeyanthi N.International Journal of Reasoning-based Intelligent Systems1755-0556
67An improved carry save adder designS SubhaInternational Journal of Advanced Science and Research2455-4227
68A novel recommender system based on FFT with machine learning for predicting and identifying heart diseasesNarayan S., Sathiyamoorthy E.Neural Computing and Applications0941-0643
69Calorie Measurement Predicting the Nutrient Content of Food using image AnalysisThamarai, Nivetha, P.M. Durai Raj Vincent, S.S. ManivannanResearch Journal of Pharmacy and Technology0974-3618
70Internet of Things Based Digital Lock SystemS Sankar., P SrinivasanJournal of Computational and Theoretical Nanoscience1546-1955
71The significance of holographic data storage in cost effective and faster data transfer ratesBhavani S., Chhabra S.International Journal of Civil Engineering and Technology0976-6308
72Region-based colour image spatial fusion steganographic systemPV Krishna., P ViswanathanInternational Journal of Multimedia Intelligence and Security2042-3462
73Link stable routing with minimal delay nodes for MANETsP Jayalakshmi., R SaravananInternational Journal of Social and Humanistic Computing1752-6124
74Providing privacy and dimensional search on longitudinal data using safe computing: A case studyDeepa M., Santhi K., Lawnya Shri M., Benjula Anbu Malar M.B., Priya G., Mon F.A.International Journal of Civil Engineering and Technology0976-6308
75Fuzzy Logic Based Energy Aware Routing Protocol for Internet of ThingsS.Sankar., P.SrinivasanInternational Journal Intelligent Systems and Applications2074-904X
76A reference model for testing internet of things based applicationsJacob P.M., Mani P.Journal of Engineering Science and Technology1823-4690
77A review on graph-based semi-supervised learning methods for hyperspectral image classificationSawant S.S., Prabukumar M.Egyptian Journal of Remote Sensing and Space Science1110-9823
78Quantum aspects of high dimensional formal representation of conceptual spacesM S Ishwarya., Aswani Kumar CherukuriArtificial Intelligence1694-0814
79Ant colony optimization algorithm with Internet of Vehicles for intelligent traffic control systemKumar P.M., Devi G U., Manogaran G., Sundarasekar R., Chilamkurti N., Varatharajan R.Computer Networks1389-1286
80Software architecture pattern selection model for internet of things based systemsJacob P.M., Mani P.IET Software1751-8806
81Secure wireless communication and surveillance systemSwarnalatha P., Anandakumar S., Vairamuthu S., Priya S.R.M., Sathyaraj R.International Journal of Civil Engineering and Technology0976-6308
82Self service softwareVijay Anand R., Prabhu J., Jayalakshmi P.Journal of Advanced Research in Dynamical and Control Systems1943-023X
83Semantic filtering and event extraction of twitter streams through RDF and SPARQLKumar N.S., Dinakaran M.International Journal of Computer Information Systems and Industrial Management Applications2150-7988
84Smart green resource conservation approach for smart IoT cloudShanmugam G.S., Shantharajah S.P., Sriman Narayana Iyengar N.C.Journal of Computational and Theoretical Nanoscience1546-1955
85Smart home-control and monitoring system for power and security managementGami M., Brindha K., Sudha S., Thandeeswaran R., Priya M.International Journal of Civil Engineering and Technology0976-6308
86Secure big data storage using training dataset filtering-K nearest neighbour classification with elliptic curve cryptographyEzhilarsan E., Dinakaran M.Journal of Computational and Theoretical Nanoscience1546-1955
87Scalable formal concept analysis algorithms for large datasets using SparkChunduri R.K., Cherukuri A.K.Journal of Ambient Intelligence and Humanized Computing1868-5137
88An improved tumour identification with Gabor Wavelet segmentationChowdhary C.L., Das T.K., Gurani V., Ranjan A.Research Journal of Pharmacy and Technology0974-3618
89An efficient implementation of mobile Raspberry Pi Hadoop clusters for Robust and Augmented computing performanceSrinivasan K., Chang C.-Y., Huang C.-H., Chang M.-H., Sharma A., Ankur A.Journal of Information Processing Systems1976-913X
90Three-dimensional discrete cosine transform-based feature extraction for hyperspectral image classificationPrabukumar M., Sawant S., Samiappan S., Agilandeeswari L.Journal of Applied Remote Sensing1931-3195
91Spam review detection on e-commerce sitesNandhini G., Muthamilselvan T., Alagiri I., Thanapal P.International Journal of Civil Engineering and Technology0976-6308
92Survey on data analytics techniques in healthcare using IOT platformBabu G.C., Shantharajah S.P.International Journal of Reasoning-based Intelligent Systems1755-0556
93Role based access control design using three-way formal concept analysisSubramanian C.M., Cherukuri A.K., Chelliah C.International Journal of Machine Learning and Cybernetics1868-8071
94Removing leaf petioles and auto locating apex-base points using straight line interpolation and bisectionVisu P., Sivakumar N., Kumaresan P., Yokesh Babu S., Ramesh P.S.Multimedia Tools and Applications1380-7501
95Query expansion using named entity disambiguation for a question-answering systemKandasamy S., Cherukuri A.K.Concurrency Computation1532-0626
96Public key cryptography using sphere and spheroidJohn Singh K., Gagneja K.International Journal of Communication Networks and Distributed Systems1754-3916
97A new Quantum Tunneling Particle Swarm Optimization algorithm for training feedforward neural networksGeraldine Bessie Amali D., Dinakaran M.International Journal of Intelligent Systems and Applications2074-904X
98Providing cyber security using machine learning for social networksSheba Pari N., Chandrababu M., Senthil Kumar K.Indian Journal of Public Health Research and Development0976-0245
99Smart home observing and control security system: A case studySanthi K., Deepa M., Shri M.L., Malar M.B.B.A., Priya G., Mon F.A.International Journal of Civil Engineering and Technology0976-6308
100Evaluating the performance of supervised classification models: Decision tree and Naïve Bayes Using KNIMEBasha S.M., Rajput D.S., Poluru R.K., Bharath Bhushan S., Basha S.A.K.International Journal of Engineering and Technology(UAE)2227-524X
101Lattice based Conceptual Spaces to Explore Cognitive Functionalities for Prosthetic ArmMS Ishwarya., Aswani Kumar CherukuriArtificial Intelligence1694-0814
102On the positioning likelihood of UAVs in 5G networksSharma V., Jayakody D.N.K., Srinivasan K.Physical Communication1874-4907
103Curvelet transform based feature extraction and selection for multimedia event classificationKanagaraj K., Priya G.G.L.Journal of King Saud University – Computer and Information Sciences1319-1578
104Online social networking services and spam detection approaches in opinion mining – A reviewRani M.S., Sumathy S.International Journal of Web Based Communities1477-8394
105Design and implementation of energy efficient reconfigurable networks (WORN-DEAR) for BAN in IOT environment (BIOT)Kumaresan P., Prabukumar M.International Journal of Reasoning-based Intelligent Systems1755-0556
106Diagnosing sudden and gradual drifts in business processThanapal P., Meenatchi S., Navaneethan C., Iyapparaja M., Prasanna M.Journal of Advanced Research in Dynamical and Control Systems1943-023X
107Public key encryption for SAFE transfer of one time passwordThirumalai C., Budugutta S.International Journal of Pure and Applied Mathematics1311-8080
108Cluster-based EA-PATM protocol for energy consumption in hierarchical WSNsMeenatchi S., Prabu S.International Journal of Reasoning-based Intelligent Systems1755-0556
109Online compilers for android using mobile cloud computingVijayan R., Mareeswari V., Gunesekaran G., Balasubramanian V., Senthil Kumar R.International Journal of Civil Engineering and Technology0976-6308
110Parsing based sarcasm detection from literal language in tweetsBasha S.M., Rajput D.S.Recent Patents on Computer Science2213-2759
111Predicting dispersion of radionuclides through parallel approachUma Maheswari, G., Subha, SProProgress in Industrial Ecology, An International Journal1476-8917
112Future of Storage TechnologiesBhavani S, Charanya R, Mahadevan R, Malathy E, Priya MInternational Journal of Civil Engineering and Technology (IJCIET)0976-6308
113Octagonal picture languagesGovindaraj R., Mahendran A.International Journal of Reasoning-based Intelligent Systems1755-0556
114Nano drive: Privacy preserving decentralized storageSeetha R., Malisetty N.International Journal of Mechanical Engineering and Technology0976-6340
115MAFONN-EP: A Minimal Angular Feature Oriented Neural Network based Emotion Prediction system in image processingKrithika L.B., Lakshmi Priya G.G.Journal of King Saud University – Computer and Information Sciences1319-1578
116IoT based smart garbage collector for smart citiesRajaprabha M.N., Jayalakshmi P., Anand R.V., Asha N.International Journal of Civil Engineering and Technology0976-6308
117A survey: energy-efficient sensor and VM selection approaches in green computing for X-IoT applicationsMekala M.S., Viswanathan P.International Journal of Computers and Applications1206-212X
118Forecasting yield by integrating agrarian factors and machine learning models A surveyDhivya Elavarasan, Durai Raj Vincent, Vishal Sharma, Albert Y. Zomaya, Kathiravan SrinivasanComputers and Electronics in Agriculture0168-1699
119Proficient information method for inconsistency detection in multiple data sourcesBazeer Ahamed B., Ramkumar T.International Journal of Artificial Intelligence0974-0635
120Properties of multigranular rough sets on fuzzy approximation spaces and their application to rainfall predictionTripathy B.K., Bhambhani U.International Journal of Intelligent Systems and Applications2074-904X
121Machine Learning and Deep Learning Methods in Heart Disease (HD) ResearchKusuma S, Divya Udayan JInternational Journal of Pure and Applied Mathematics0972-9828
122Integrated Intrusion Detection Model Using Chi-Square Feature Selection and Ensemble of ClassifiersI. Sumaiya Thaseen., Ch. Aswani Kumar., Amir AhmadArabian Journal for Science and Engineering1319-8025
123A scaled-down neural conversational model for chatbotsMathur S., Lopez D.Concurrency Computation1532-0626
124Image anonymization using clustering with pixelizationRia. Elin Thomas., Sharmila K. Banu., B. K. TripathyInternational Journal of Engineering & Technology2227-524X
125Internet of Things based Ambient assisted living for Elderly People Health MonitoringS. Sankar., P. Srinivasan., R. SaravanakumarResearch Journal of Pharmacy and Technology0974-3618
126Energy and Load Aware Routing Protocol for Internet of ThingsS Sankar., P SrinivasanInternational Journal of Advances in Applied Sciences2252-8814
127A study of handwritten characters recognition through neural networks using data mining approachesBothra G., Bhattacharya S., Deepa P.International Journal of Mechanical Engineering and Technology0976-6340
128Comparison of multi-criteria recommendation system for improving accurate predictionSandeepkumar M., Prabhu J.Journal of Advanced Research in Dynamical and Control Systems1943-023X
129A survey, design and analysis of IoT security and QoS challengesKesavan M., Prabhu J.International Journal of Information System Modeling and Design1947-8186
130A review on various sniffing attacks and its mitigation techniquesPrabadevi B., Jeyanthi N.Indonesian Journal of Electrical Engineering and Computer Science2502-4752
131Predicting user behaviour on E-Commerce site using AnnSrinivas A.S., Ramasubbareddy S., Manivannan S.S., Govinda K.International Journal of Engineering and Technology(UAE)2227-524X
132Non-Intrusive Transaction Aware Filtering During Enterprise Application ModernizationRavikumar Ramadoss., N. M. Elango., Satheesh Abimannan., Ching-Hsien HsuJournal of Supercomputing0920-8542
133Privacy-preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computingP.G. Shynu., K. John SinghInternational Journal of Embedded Systems1741-1068
134Band clustering using expectation-maximization algorithm and weighted average fusion-based feature extraction for hyperspectral image classificationPrabukumar M., Shrutika S.Journal of Applied Remote Sensing1931-3195
135Classification of breast abnormality using decision tree based on GLCM features in mammogramsKamalakannan J., Babu M.R.International Journal of Computer Aided Engineering and Technology1757-2657
136An amoeboid approach for identifying optimal citation flow in big scholarly data networkNivash J.P., Dhinesh Babu L.D.International Journal of Communication Systems1074-5351
137PFB+- tree for big data memory management systemSanthi K., Chellatamilan T., Valarmathi B.Indian Journal of Public Health Research and Development0976-0245
138Performing item-based recommendation for mining multi-source big data by considering various weighting parametersThillainayagam V., Kunjithapatham S., Thirunavukarasu R.International Journal of Engineering and Technology(UAE)2227-524X
139A supervised aspect level sentiment model to predict overall sentiment on tweeter documentsBasha S.M., Rajput D.S.International Journal of Metadata, Semantics and Ontologies1744-2621
140A Diabetes Case Management Study in a Rural Setting in IndiaRadhakrishnan, S.Email Author, Rajakumar, C.A., Radhakrishnan, B.Professional Case Management19328087
141Predicting justice delivery time using Machine learningMegha Kanwar ,Prabhavathy.PInternational Journal of Pure and Applied Mathematics1314-3395
142A Cloud Based Natural Hazard Detection and Warning SystemNishanth A, Vanmathi CInternational Journal of Research and Scientific Innovation (IJRSI)2321-2705
143Smart Home Automation in Air Conditioning using Data Mining and Image ProcessingIshaan Arora, Vanmathi C,International Journal of Engineering Trends and Technology (IJETT)2231-5381
144Detecting Streaming of Twitter Spam Using Hybrid MethodSenthil Murugan N., Usha Devi G.Wireless Personal Communications0929-6212
145A complete survey on blood pressure monitoring devices and applicationsThandeeswaran R Jeyanthi N, Gokulnath BVBiomedical Research0970-938X
146Advanced Vehicle Safety and Monitoring System,Akhil Sharma, Vanmathi CInternational Journal of Engineering Science Invention Research & Development2349-6185
147Transportation Service System for Grocery Kart using Genetic AlgorithmDeepank Kartikey, Vanmathi CInternational Journal of Engineering Trends and Technology (IJETT)2231-5381
148Weighing Type Rain Gauge with Weather Monitoring SystemRajkumar R, Vanmathi C,International Journal of Research and Scientific Innovation (IJRSI)2321-2705
149Design and development of exponential lion algorithm for optimal allocation of cluster resources in cloudDevagnanam J., Elango N.M.Cluster Computing1386-7857
150ENCRYPTION AND DECRYPTION OF GRAY SCALE IMAGES USING SCALABLE CODING MECHANISMK.UMAInternational Journal of Mechanical Engineering and Technology (IJMET)0976-6340
151Comparative study on dimensionality reduction for disease diagnosis using fuzzy classifierSujatha, R., Ephzibah, E.P., Dharinya, S., Uma Maheswari, G., Mareeswari, V., Pamidimarri, V.International Journal of Engineering and Technology(UAE)2227524X
152Analyzing Gene Expression Data By Using Crfm-Covering Rough Set Fuzzy C-Medoids Clustering ApproachAvulapalli Jayaram Reddy, B.K TripathyJournal of Web Engineering1540-9589
153WhaleRank: An optimisation based ranking approach for software requirements prioritisationAnand R.V., Dinakaran M.International Journal of Environment and Waste Management1478-9876
154Predictive mathematical model for solving multi-criteria decision-making problemsDeepa N., Ganesan K., Sethuramasamyraja B.Neural Computing and Applications0941-0643
155Performance analysis of pre-cancerous mammographic image enhancement feature using non-subsampled shearlet transformPadmavathy T.V., Vimalkumar M.N., Nagarajan S., Babu G.C., Parthasarathy P.Multimedia Tools and Applications1380-7501
156In-Mapper combiner based MapReduce algorithm for processing of big climate dataManogaran G., Lopez D., Chilamkurti N.Future Generation Computer Systems0167-739X
157An Interval valued fuzzy soft set based optimization algorithm for high yielding seed selectionSooraj T.R., Tripathy B.K.International Journal of Fuzzy System Applications2156-177X
158Design of I-shaped dual C-slotted rectangular microstrip patch antenna (I-DCSRMPA) for breast cancer tumor detectionPadmavathy T.V., Venkatesh P., Bhargava D., Sivakumar N.Cluster Computing1386-7857
159IOT BASED SMART GARBAGE COLLECTOR FOR SMART CITIESM N Rajaprabha, P Jayalakshmi, R Vijay Anand and N AshaInternational Journal of Civil Engineering and Technology (IJCIET)0976-6308
160Energy saving offloading scheme for mobile cloud computing using CloudSimThanapal P., Durai M.A.S.International Journal of Advanced Intelligence Paradigms1755-0386
161Walsh Hadamard kernel‐based texture feature for multimodal MRI brain tumour segmentationM. Angulakshmi, G. G Lakshmi PriyaInternational Journal of Imaging Systems and Technology1098-1098
162Brain tumour segmentation from MRI using superpixels based spectral clusteringAngulakshmi, M., Lakshmi Priya, G.GJournal of King Saud University – Computer and Information Sciences. Elsevier1319-1578
163An intelligent decision support system to prevent and control of dengueLopez D., Manogaran G., Varatharajan R., Abbas K.M.Journal of Ambient Intelligence and Humanized Computing1868-5137
164Experimenting with runtime and energy tradeoffs in high-performance computingG Uma Maheswari, S Subha, Progress in Industrial Ecology12(1-2), pp. 154-1631476-8917
165Resourceful Investigte Encryption Method using Data Hunt in Mobile Cloud ServiceA. S. Syed Navaz , Asha. N , Vanmathi Chandrasekaran , J. JayashreeARPN Journal of Engineering and Applied Sciences1819-6608
166Embarrassingly parallel GPU based matrix inversion algorithm for big climate data assimilationVaralakshmi M., Kesarkar A.P., Lopez D.International Journal of Grid and High Performance Computing1938-0259
167A Review on Utilizing Queuing Models for Improving Performance in CloudM. Sathish Kumar, M. Iyappa RajaJour of Advance Research in Dynamical & Control Systems1943-023X
168RFID BASED AUTOMATED GATE SECURITY SYSTEMAsha. N, A. S. Syed Navaz, J. Jayashree and J. VijayashreeARPN Journal of Engineering and Applied Sciences1819-6608
169Detecting spams in social networks using ML algorithms �€“ a reviewMurugan N.S., Devi G.U.International Journal of Environment and Waste Management1478-9876
170Face Recognition and Detection with New Image Enhancement TechniquesA.S.Syed Navaz and Asha. NJour of Adv Research in Dynamical & Control Systems1943-023X
171Applying Knowledge Based Heuristic Method for Efficient Test AutomationAsha. N and Prasanna ManiJour of Adv Research in Dynamical & Control Systems1943-023X
172Knowledge-based Acceptance Test driven agile Approach for Quality Software DevelopmentAsha. N and Prasanna ManiInternational Journal of Recent Technology and Engineering (IJRTE)2277-3878
173Efficient routing based on core relay intermediate nodes in MANETJayalakshmi P., Saravanan R.Electronic Government1740-7494
174Earthquake analysis: Visualizing seismic data with pythonTulsyan S., Bahl B., Kaya S., Reddy G.T.Lecture Notes in Computational Vision and Biomechanics2212-9391
175A novel approach to perform analysis and prediction on breast cancer dataset using RBasha S.M., Rajput D.S., Iyengar N.C.S.N., Caytiles R.D.International Journal of Grid and Distributed Computing2005-4262
176WIRELESS HEALTH ACQUISITION SYSTEM USING INTERNET OF THINGSDr.K.UmaInternational Journal of Mechanical Engineering and Technology (IJMET)0976-6340
177RESOURCEFUL INVESTIGATE ENCRYPTION METHOD USING DATA HUNT IN MOBILE CLOUD SERVICEA. S. Syed Navaz, Asha. N, Vanmathi Chandrasekaran and J. JayashreeARPN Journal of Engineering and Applied Sciences1819-6608
178Group Decision Making through Interval Valued Intuitionistic Fuzzy Soft SetsBK Tripathy., TR Sooraj., RK Mohanty., A PanigraghiInternational Journal of Fuzzy System Applications2156-177X
179Implementation of moving object detection and categorization from hevc compressed surveillance videoKruthi S., Kamalakannan J.International Journal of Mechanical Engineering and Technology0976-6340
180BGFS: Design and development of brain genetic fuzzy system for data classificationChandrasekar Ravi., Neelu KhareJournal of Intelligent Systems0334-1860
181Neighborhood Rough-Sets-Based Spatial Data AnalyticsSharmila Banu K.., B. K. TripathyEncyclopedia of Information Science and Technology, Fourth Edition
182A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc NetworksRama Prabha K.P., Jeyanthi N.Wireless Personal Communications0929-6212
183Tracking eye center location based on inner product detectorMythiliBoopathi , Nivetha RJournal of International Pharmaceutical Research1674-0440
184Smart City Based on Cloud Computing and IoTMythili BoopathiS. PatiInternational Journal of Civil Engineering and Technology0976-6308
185Comparison of NoSQL Database and Traditional Database-An emphatic analysisM. Sandeep Kumar., Prabhu. JINTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION2549-9610
186A Survey of Big Data Analytics Using Machine Learning Algorithmsusha moorthy., usha devi gandhiHCI Challenges and Privacy Preservation in Big Data Security15225-28636
187Future of storage technologiesBhavani, S., Charanya, R., Mahadevan, R., Malathy, E., Priya, M.International Journal of Civil Engineering and Technology0976-6308
188Robust Face Recognition Using Enhanced Local Binary PatternSrinivasa Perumal R., Nadesh R. K., Senthil Kumar N. CBulletin of Electrical Engineering and Informatics2089-3191
189Optimization of Seed Selection for Higher Product using Interval Valued Hesitant Fuzzy Soft setsBK Tripathy., Sooraj.T.RSongklanakarin Journal of Science and Technology0125-3395
190Experimenting with runtime and energy tradeoffs in high-performance computingUma Maheswari, G., Subha, SProgress in Industrial Ecology1476-8917
191Enhancing security for end users in cloud computing environment using hybrid encryption techniqueNadesh R.K., Srinivasa Perumal R., Shynu P.G., Gaurav Sharma1International Journal of Engineering and Technology0975-4024
192ONLINE COMPILERS FOR ANDROID USING MOBILE CLOUD COMPUTINGVijayan R, Mareeswari V, Gunesekaran G,Balasubramanian V,Senthil Kumar RInternational Journal of Civil Engineering and Technology (IJCIET)0976-6308
193Mapping USE Specifications into Spec#Jagadeeswaran T Senthilkumaran USoftware Technologies: Applications and Foundations0302-9743
194A risk-centric defensive architecture for threat modelling in e-government applicationVenkatasen M., Mani P.Electronic Government1740-7494
195Model Reusability and Multidirectional Transformation using Unified MetamodelJagadeeswaran T, Senthilkumaran UIEEE Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)1854-8419
196Quick fix for obstacles emerging in management recruitment measure using IOT-based candidate selectionNallakaruppan, M.K., Senthil Kumaran, U.Service Oriented Computing and Applications18632386
197Verification of Cloud Based Information Integration Architecture using Colored Petri NetsMurale Narayanan., Aswani Kumar CherukuriInternational Journal of Computer Network and Information Security
198Secure big data storage using training dataset filtering-K nearest neighbour classification with elliptic curve cryptographyEzhilarsan E, Dinakaran MJournal of Computational and Theoretical Nanoscience15461955
199D‐ConvNet: Deep learning model for enhancement of brain MR imagesKathiravan Srinivasan, Vishal Sharma, DNK Jayakody, Durai Raj VincentBasic & Clinical Pharmacology & Toxicology
200Robust design and validation of balanced tournaments via Hamiltonian pathKathiravan Srinivasan, Desh Deepak Pathak Ravinder Kumar, Durai Raj Vincent, Chuan-Yu ChangJournal of Information and Optimization Sciences0252-2667
201Semantic filtering and event extraction of twitter streams through RDF and SPARQLKumar, NS, Dinakaran, MInternational Journal of Computer Information Systems and Industrial Management Applications21507988
202Design and development of microstrip patch antenna with circular and rectangular slot for structural health monitoringPadmavathy T.V., Bhargava D.S., Venkatesh P., Sivakumar N.Personal and Ubiquitous Computing1617-4909
203Propels in compiler construction for versatile figuringEzilarasan, E, Dinakaran, M, Boominathan P, Krishnamoorthy, A, Naresh, KInternational Journal of Internet Technology and Secured Transactions1748569
204An adaptive fault tolerance mechanism in Grid computingNithyadharshini P.S., Pounambal M., Nagaraju D., Saritha V.ARPN Journal of Engineering and Applied Sciences1819-6608
205PSPO: a framework for cost-effective service placement optimisation during enterprise modernisation on hybrid cloudsRavikumar Ramadoss., N.M. Elango., A. Satheesh., Ching-Hsien HsuInternational Journal of Web and Grid Services1741-1106
206A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseasesKumar P.M., Devi Gandhi U.Computers and Electrical Engineering0045-7906
207An optimized feature selection based on genetic approach and support vector machine for heart diseaseGokulnath C.B., Shantharajah S.P.Cluster Computing1386-7857
208An Efficient and Secure Content Contribution and Retrieval content in Online Social Networks using Level-level Security Optimization and Content Visualization AlgorithmKumaran Umapathy., Neelu KhareIndonesian Journal of Electrical Engineering and Computer Science2502-4752
209Performance Analysis of Clustering Algorithm in Data Mining in R LanguageAvulapalli Jayaram Reddy, Balakrushna Tripathy , Seema Nimje,Communications in Computer and Information Science1865-0929
210Load balancing prototype for cost proficient fault tolerant geo-distributed datacentersAnusha, K., Manikandan, N., Nallakaruppan, M.K., Rahamathunnissa, U.Journal of Advanced Research in Dynamical and Control Systems1943-023X
211Application of Soft Set in Game TheoryB. K. Tripathy Sooraj., T. R. Radhakrishna., N. MohantyEncyclopedia of Information Science and Technology, Fourth Edition
212Secure Group Key Sharing Protocols and Cloud SystemVaishali Ravindra Thakar., John Singh KEncyclopedia of Information Science and Technology, Fourth Edition
213Secure data storage in cloud computing to avoiding some cipher text attackGundala Swathi., Gundala SwathiJOURNAL OF INFORMATION and OPTIMIZATION SCIENCES0252-2667
214Optimal Decision Tree Fuzzy Rule-Based Classifier (ODT-FRC) For Heart Disease Prediction Using Improved Cuckoo Search AlgorithmSubhashini Narayan, Jagadeesh GobalInternational Journal of Business Intelligence and Data Mining1743-8187
215Brain tumour segmentation from MRI using superpixels based spectral clusteringAngulakshmi M., Lakshmi Priya G.G.Journal of King Saud University – Computer and Information Sciences1319-1578
216Depth Impurity Pruned Strategies for Extracting High Utility ItemsetsK. Santhi1*, B.Valarmathi2, T.Chellatamilan3International Journal of Engineering & Technology2227-524X
217Software Project Management Risk Management Literature ReviewCHARANYA RInternational Journal for Research in Applied Science & Engineering Technology (IJRASET)
218Student performance dashboard using mining approachSuganya D., Kumar K., Ramesh P.S., Suganthan C.International Journal of Pure and Applied Mathematics1311-8080
219Predicting life time of heart attack patient using improved c4.5 classification algorithmJothikumar R., Susi S., Sivakumar N., Ramesh P.S.Research Journal of Pharmacy and Technology0974-3618
220Scheduling tasks using Bat’s algorithm in cloud simGitanjali J., Sathiyamoorthi E., Mummadisetti A., Dammu R.S., Kadari R.R.International Journal of Pure and Applied Mathematics1311-8080
221Survey on the role of IoT in intelligent transportation systemVarun Chand H., Karthikeyan J.Indonesian Journal of Electrical Engineering and Computer Science2502-4752
222Comparative study on dimensionality reduction for disease diagnosis using fuzzy classifierSujatha R., Ephzibah E.P., Dharinya S., Uma Maheswari G., Mareeswari V., Pamidimarri V.International Journal of Engineering and Technology(UAE)2227-524X
223An empirical machine learning approach to extract and rank multi-word product names using iCIW approachSivashankari R., Valarmathi B.Journal of Engineering Science and Technology1823-4690
224Parallel AES algorithm for performance improvement in data analytics security for IoTManikandan N., Subha S.International Journal of Networking and Virtual Organisations1470-9503
225A Study of Handwritten Characters Recgnition through Neural Networks using Data Mining approachesGaurav Bothra, Sweta Bhattacharya and Deepa P.International Journal of Mechanical Engineering and Technology09766340
226Secure medical data transmission by using collaborative neighbour based method in WBANDevi L., Shantharajah S.P.World Review of Science, Technology and Sustainable Development1741-2242
227, Predicting dispersion of radionuclides through parallel approachG Uma Maheswari, S SubhaProgress in Industrial Ecology 12(1-2), pp. 35-451476-8917
228Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehiclesPriyan M.K., Devi G.U.Cluster Computing1386-7857
229One-Dimension Force Balance System for Hypersonic Vehicle an experimental and Fuzzy Prediction ApproachKalaiarassan G., Krishan., Somanadh M., Thirumalai C., Senthil Kumar M.Materials Today: Proceedings2214-7853
230A SURVEY ON IMPLEMENTATION METHODS AND APPLICATIONS OF SENTIMENTSudheer K and B.ValarmathiInternational Journal of Civil Engineering and Technology (IJCIET)0976-6308
231Stout unidirectional face recognition system in hands of DRBF methodologySudhan M., Dharun V.S., Swarna Priya R.M.International Journal of Pure and Applied Mathematics1311-8080
232Software Project Management Risk Management Literature ReviewCHARANYA RInternational Journal of Innovative Science and Research Technology(IJISRT)
233Secured cloud banking transactions using two-way verification processAnitha A., Varalakhshmi M., Mary Mekala A., Subashanthini., Thilagavathy M.International Journal of Civil Engineering and Technology0976-6308
234A rule based classifcation for vegetable production using rough set and genetic algorithmRathi R., Acharjya D.P.International Journal of Fuzzy System Applications2156-177X
235Modified dimensionality reduced local directional pattern for facial analysisSrinivasa Perumal R, Chandra Mouli P.V.S.S.RJournal of Ambient Intelligence and Humanized Computing1868-5137
236Group and hierarchical key management for secure communications in internet of thingsKarrothu A., Norman J.International Journal of Communication Systems1074-5351
237Dr. Cloud- IOT Based Health Monitoring SystemAditya Shukla, Vanmathi CInternational Journal of Scientific Research in Computer Sciences and Engineering2456-3307
238A survey on applications of internet of things in healthcare domainMugauri P.C., Aravind K., Deshmukh A., Vhansure F., Kavitha B.R.Research Journal of Pharmacy and Technology0974-3618
239Security strategies for cloud identity management – a studyAnilkumar C., Sumathy S.International Journal of Engineering and Technology(UAE)2227-524X
240RST invariant robust video watermarking algorithm using quaternion curvelet transformAgilandeeswari L., Ganesan K.Multimedia Tools and Applications1380-7501
241Robustness of DR-LDP over PCANet for face analysisRamalingam S.P., Chandra Mouli P.V.S.S.R.International Journal of Multimedia Information Retrieval2192-6611
242Calorie measurement: predicting the nutrient content of food using image analysisThamarai., Nivetha., Durai Raj Vincent P.M., Manivannan S.S.Research Journal of Pharmacy and Technology0974-3618
243An efficient method for secure 2D image visualization and transmission through chaotic confusion and pixel diffusionGunasekaran G., Venkatesan M.Pertanika Journal of Science and Technology0128-7680
244Multi-class classification using hybrid soft decision model for agriculture crop selectionDeepa N., Ganesan K.Neural Computing and Applications0941-0643
245Tri-texture feature extraction and region growing-level set segmentation in breast cancer diagnosisAarthy S.L., Prabu S.International Journal of Biomedical Engineering and Technology1752-6418
246Spam filtering and phishing in facebookGitanjali J., Jagadeesh G., Mummadisetti A., Dammu R.S., Kadari R.R.International Journal of Pure and Applied Mathematics1311-8080
247Impact of Gradient ascent and Boosting algorithm in classificationBasha S.M., Rajput D.S., Vandhan V.International Journal of Intelligent Engineering and Systems2185-310X
248Generating various kolam patterns using new kolam picture grammarGovindaraj R., Mahendran A.International Journal of Internet Technology and Secured Transactions1748-569X
249HIoTPOT: Surveillance on IoT Devices against Recent ThreatsGandhi U.D., Kumar P.M., Varatharajan R., Manogaran G., Sundarasekar R., Kadu S.Wireless Personal Communications0929-6212
250Hybrid IT architecture by gene-based cryptomata (HITAGC) for lightweight security servicesThirumalai, C., Viswanathan, P.Service Oriented Computing and Applications1863-2386
251High utility itemset mining using partition utility list structureArunkumar M.S., Suresh P., Gunavathi C.Journal of Computational and Theoretical Nanoscience1546-1955
252A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT)Gopinath, M.P., Arasi, G.S., Kavisankar, L., Sathyaraj, R., Karthi, S., Aarthy, S.L., & Balusamy, B. (2018)Neural Computing and Applications0941-0643
253Secure and Optimized Real-Time System for Internet of Medical Things Using MATuino and ThingSpeak AnalyticsRanjani, J., A. Shanthoshini Selvapriya, and E. VijayanJournal of Testing and Evaluation00903973
254Implementing self adaptiveness in whale optimization for cluster head section in Internet of ThingsReddy M.P.K., Babu M.R.Cluster Computing1386-7857
255Buyagain grocery recommender algorithm for Online shopping of grocery and gourmet foodsMoses S.J., Dhinesh Babu L.D.International Journal of Web Services Research1545-7362
256CONVENTIONAL IMPLEMENTATION OF LFS SYSTEM FOR DEVELOPMENT OF LINUX OPERATING SYSTEMM.Priya J. RajuInternational Journal of Pure and Applied Mathematics13118080
257Health data analytics using scalable logistic regression with stochastic gradient descentManogaran G., Lopez D.International Journal of Advanced Intelligence Paradigms1755-0386
258Feature extraction using LR-PCA hybridization on twitter data and classification accuracy using machine learning algorithmsMurugan N.S., Devi G.U.Cluster Computing1386-7857
259G-L fractional differential operator modified using auto-correlation function: Texture enhancement in imagesHemalatha S & Margret Anouncia SAin Shams Engineering Journal2090-4479
260Predictive Cloud resource management framework for enterprise workloadsBalaji M., Aswani Kumar C., Rao G.S.V.R.K.Journal of King Saud University – Computer and Information Sciences1319-1578
261Advancing knowledge on Regulating and saving of the Animals Health with Sensor and Networks through IoTSubrata Chowdhury, P.Mayilvahanan, Ramya GovindarajJour of Adv Research in Dynamical & Control Systems
262Videocompression techniques: A reviewSingh J.K., Gagneja K., Raghuvanshi U.International Journal of Pure and Applied Mathematics1311-8080
263A Comparative Analysis on Smart Farming Techniques using Internet of Things (IoT)Pramod Mathew Jacob, Prasanna M, Parveen Sultana HHelix2277-3495
264Knowledge-based Acceptance Test driven agile Approach for Quality Software DevelopmentN. Asha, Prasanna ManiInternational Journal of Recent Technology and Engineering2277-3878
265A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting systemManogaran G., Varatharajan R., Lopez D., Kumar P.M., Sundarasekar R., Thota C.Future Generation Computer Systems0167-739X
266A Descriptive Study on Contents Being Generalized in News Apps and Smartphone Users’ Attitude Towards ThemSurendheran KaliyaperumalOmniScience: A Multi-disciplinary Journal2347-9949
267Mining DNA Sequence Patterns with Constraints Using Hybridization of Firefly and Group Search OptimizationLakshmanna K., Khare N.Journal of Intelligent Systems0334-1860
268A Novel Genetic Algorithm for Solving Machine Part Cell Formation Problem considering alternative Process PlansSowmiya N., Valarmathi B., Srinivasa Gupta N., Essaki Muthu P., Rajendran C.Materials Today: Proceedings2214-7853
269Outlet sales analysis using r and various machine learning algorithmsSingh J.K., Gagneja K., Bhushan V.International Journal of Pure and Applied Mathematics1311-8080
270Improved scrum method through staging priority and cyclomatic complexity to enhance software process and qualityVijay Anand R., Dinakaran M.International Journal of Internet Technology and Secured Transactions1748-569X
271Wireless camera network with enhanced SIFT algorithm for human tracking mechanismUsha Devi G., Priyan M.K., Gokulnath C.International Journal of Internet Technology and Secured Transactions1748-569X
272LocPSORank-prediction of ranking of web services using location-based clustering and PSO algorithmMareeswari V., Sathiyamoorthy E.International Journal of Web Services Research1545-7362
273A firefly inspired game dissemination and QoS-based priority pricing strategy for online social network gamesRaj E.D., Dhinesh Babu L.D.International Journal of Bio-Inspired Computation1758-0366
2018
SL.NOTITLE OF PAPERNAME OF THE AUTHOR/SNAME OF JOURNALISBN/ISSN NUMBER
1A Comparative Analysis of Firefly and FuzzyFirefly based Kernelized Hybrid C-Means AlgorithmsB.K. Tripathy, Anmol Agrawal, A. Jayaram Reddy 1I.J. Intelligent Systems and Applications2074-904X
2IoT based machine learning techniques for climate predictive analysisNallakaruppan, M.K., Senthil Kumaran, U.International Journal of Recent Technology and Engineering22773878
3Patients Health Monitoring System Using IOTSudha Senthilkumar, Brindha.K, Charanya R, Abishek KumarIndian Journal of Public Health Research & Development0976-0245
4Fragmented plant leaf recognition: Bag-of-features, fuzzy-color and edge-texture histogram descriptors with multi-layer perceptronChaki J., Dey N., Moraru L., Shi F.Optik0030-4026
5Walsh Hadamard Transform for Simple Linear Iterative Clustering (SLIC)Superpixel based Spectral Clustering of Multimodal MRI Brain Tumour SegmentationM. Angulakshmi, G. G Lakshmi PriyaInnovation and Research in BioMedical engineering- Elesiver1959-0318
6An efficient algorithm for dynamic task offloading using cloudlets in mobile cloud computingShobha Rani, D., Pounambal, M., Saritha, V.International Journal of Communication Systems1099-1131
7A Big Data Recommendation Engine Framework Based on Local Pattern Analytics Strategy for Mining Multi-Sourced Big DataVenkatesan, T., Saravanan, K., Ramkumar, T.Journal of Information and Knowledge Management0219-6492
8CLAY-MIST: IoT-cloud enabled CMM index for smart agriculture monitoring systemMekala M.S., Viswanathan P.Measurement: Journal of the International Measurement Confederation0263-2241
9Sentiment analysis of Amazon products using ensemble machine learning algorithmJayakumar Sadhasivam, Ramesh Babu KalivaradhanInternational Journal of Mathematical, Engineering and Management Sciences2455-7749
10Implementation of Collage Grammar in Kolam Grammar to Generate Kolam Patterns in Picture LanguagesRamya Govindaraj, M.AnandInternational Journal of Innovative Technology and Exploring Engineering (IJITEE)22783075
11Health Machine Sensors Network Controlling and Generating Trust Count in the Servers Platform through IoTSubrata Chowdhury, P. Mayilvahananan, Ramya GovindarajInternational Journal of Recent Technology and Engineering (IJRTE)2277-3878
12A survey on internet of vehicles: Applications, technologies, challenges and opportunitiesPriyan M.K., Usha Devi G.International Journal of Advanced Intelligence Paradigms1755-0386
13Performance analysis of cloud computing using series of queues with Erlang serviceK.Santhi, R.SaravananInternational Journal of Internet Technology and Secured Transactions1748-5703
14Accurate facial ethnicity classification using artificial neural networks trained with galactic swarm optimization algorithmBagchi, C, Geraldine Bessie Amali, D, Dinakaran, MAdvances in Intelligent Systems and Computing21945357
15A novel dyadic multiresolution wavelet image steganography using N-aryC. Vanmathi; S. PrabuInternational Journal of Internet Technology and Secured Transactions1748-5703
16Performance comparison of various feature descriptors in object category detection application using SVM classifierKavitha B R , Ramya G, Priya GInternational Journal of Innovative Technology and Exploring Engineering22783075
17A roadmap towards implementing parallel aspect level sentiment analysisBasha S.M., Rajput D.S.Multimedia Tools and Applications1380-7501
18K-means and hierarchical based clustering in suicide analysisSujatha, R., Sree Dharinya, S., Ephzibah, E.P., Thangam, R.K.International Journal of Engineering and Advanced Technology22498958
19AN ANALYSIS OF SECURITY ISSUES IN CLOUD COMPUTINGM B BENJULA ANBU MALAR J PRABHUInternational Journal of Civil Engineering and Technology (IJCIET)0976-6308
20A Suite of Load Balancing Algorithms and Service Broker Policies for Cloud: A Quantitative Analysis with Different User Grouping Factor in CloudKumar PJ, Suganya P, Komal Malhotra, Payal YadavInternational Journal of Recent Technology and Engineering (IJRTE)2277-3878
21Reduction of Artefacts in JPEG-XR Compressed ImagesKai-Lung Hua, Ho Thi Trang, Kathiravan Srinivasan, Yung-Yao Chen, Chun-Hao Chen, Vishal Sharma, Albert Y ZomayaMDPI Sensors1424-8220
22EFF-FAS: Enhanced Fruit Fly Optimization Based Search and Tracking By Flying Ad Hoc SwarmVishal Sharma, Roberto Sabatini, Subramanian Ramasamy, Kathiravan Srinivasan, Rajesh KumarInternational Journal of Ad Hoc and Ubiquitous Computing (IJAHUC)1743-8225
23A Comprehensive Survey On Various Semantic Based Video/Image Retrieval TechniquesTamil Priya D, Divya Udayan JInternational Journal of Innovative Technology and Exploring Engineering (IJITEE)2278-3075
24Evaluating and Visualizing Influential Node Using Various Measures in Social Network DataG. Kavitha and N. M. Elangojournal of Computational and Theoretical Nanoscience1546-1955
25Distribution of Frequency Words Using Hierarchical Clustering Method in RShakila Basheer1, S. Mariyam Aysha Bivi2, G. Kavitha3 ∗, P. V. Praveen Sundar4, C. Kousalya3, and B. Lokeshwari3Journal of Computational and Theoretical Nanoscience1546-1955
26Analysis and Visualize Text Mining Using Twitter Data in RShakila Basheer1, Rincy Merlin Mathew2, G. Kavitha3 ∗, K. Nivetha3, S. Kalai Selvi3, and R. Sandhya3Journal of Computational and Theoretical Nanoscience1546-1955
27Location-Based Collaborative Filtering for Web Service RecommendationMareeswari Venkatachalaappaswamy, Vijayan Ramaraj, Saranya RavichandranRecent Patents on Computer Science2213-2759
28Evaluating and Visualizing influential Node Using Various Measures in Social Network DataG.kavitha and N M ELangojournal of Computational and Theoretical Nanoscience1546-1955
29Deep Learning for Short Answer ScoringSurya, K., Gayakwad, E., Nallakaruppan, M.K.International Journal of Recent Technology and Engineering22773878
30A survey on different continuous authentication systemsAyeswarya S., Norman J.International Journal of Biometrics1755-8301
31K-means and hierarchical based clustering in suicide analysisSujatha.R,Sree Dharinya.S,Ephzibah,Kirubathangam.RInternational Journal of Engineering and Advanced Technology2249-8958
32Risk-based availability modelling and reputation management on fault tolerant cloud computing systemsDeepa Mani; Anand MahendranInternational Journal of Internet Technology and Secured Transactions (IJITST)1748-569X
33Decision-making tool for crop selection for agriculture developmentDeepa N., Ganesan K.Neural Computing and Applications0941-0643
34Predicting Autism Spectrum Disorder Using Machine Learning Algorithms with Jaundice Symptomatic AnalysisSharath Chandrika M B, Nallakaruppan M K, Siva Rama Krishnan S, Senthilkumar N CInternational Journal of Recent Technology and Engineering2277-3878
35Real-Time Classification of Twitter Trends using Support Vector Machine with Location TrackingVijayan Ramaraj, G Gunasekaran, Prasanna Santhanam, S Meenatchi, Kishore Kumar KInternational Journal of Innovative Technology and Exploring Engineering2278-3075
36Semantic analysis – internet of things, study of past, present and future of IoTSnigdha Gharami, B.Prabadevi, Anupama BhimnathElectronic Government , an International Journal1740-7494
37Pattern Analysis of Genetics and Genomics: A Survey of the State-of-artJyotismita Chaki, Nilanjan DeyMultimedia Tools and Applications (Springer)1380-7501
38Pattern Mining Approaches used in Sensor-Based Biometric Recognition: A ReviewJyotismita Chaki, Nilanjan Dey, Fuqian Shi , R. Simon SherrattIEEE Sensors1530-437X
39A heuristic method for initial dominant point detection for polygonal approximationsS. Kalaivani , Bimal Kumar RaySoft Computing1432-7643
40A Survey and Analysis of various Objective Functions Defined for RPL in 6LoWPANSuganya. P, Pradeep Reddy. C.HInternational Journal of Recent Technology and Engineering2277-3878
41Car Sales Prediction Using Machine Learning AlgorithmnsMadhuvanthi.K, Nallakaruppan.M.K, Senthilkumar N C, Siva Rama Krishnan SInternational Journal of Innovative Technology and Exploring Engineering2278-3075
42Comparative Performance Analysis of Various Classifiers for Cloud E-Health UsersT. MuthamilSelvan,B. BalamuruganInternational Journal of E-Health and Medical Communications1947-315X
43Continuous Monitoring and Detection of Epileptic Seizures using Wearable DeviceDarshan Mehta, Tanay Deshmukh, Yokesh Babu Sundaresan,, P.KumaresanAdvances in Intelligent Systems and Computing Smart Innovations in Communication and Computational Sciences Proceedings of ICSICCS-2018,2194-5357
44Predicting Austim Spectrum Disorder Using Machine Learning Algorithms with Jaundice Symptomatic AnalysisSharath Chandrika M B, Nallakaruppan M K, Siva Rama Krishnan S, Senthilkumar N CInternational Journal of Recent Technology and Engineering2277-3878
45Stochastic Multifacility Location Problem under Triangular Area Constraint with Squared Euclidean NormA. K. SantraJournal of Scientific & Industrial Research0022-4456
46Test Suite Reduction based on knowledge Reuse: An Adaptive Elitism Based Intellect approach (AEBI) using Clustering TechniqueAsha N and Prasanna ManiInternational Journal of Innovative Technology and Exploring Engineering (IJITEE)2278-3075
47Prediction Intelligence System Based Real Time Monitoring of Yoga PerformersMani Prasanna, Thangavelu Arun Kumar, Sangaiah Arun Kumar, Mohamed Iqubal Jawid NazirRecent Patents on Computer Science1874-4796
48Walsh Hadamard Transform for Simple Linear Iterative Clustering (SLIC) Superpixel Based Spectral Clustering of Multimodal MRI Brain Tumor SegmentationM Angulakshmi, GG Lakshmi PriyaInnovation and Research in BioMedical engineering (IRBM)1959-0318
49Predictive analysis of stocks using data miningMagesh, G., Swarnalatha, P.Smart Innovation, Systems and Technologies2190-3018
50Classification of breast cancer based on thermal image using support vector machineAarthy, S.L., Prabu, S.International Journal of Bioinformatics Research and Applications1744-5485
51Estimating the distance of a human from an object using 3D image reconstructionSwarna Priya, R.M., Gunavathi, C., Aarthy, S.L.Advances in Intelligent Systems and Computing2194-5357
52Big data analysis for anomaly detection in telecommunication using clustering techniquesGunavathi, C., Swarna Priya, R.M., Aarthy, S.LAdvances in Intelligent Systems and Computing2194-5357
53VoIP Steganography Methods, a SurveyS. Deepikaa, R. SaravananCYBERNETICS AND INFORMATION TECHNOLOGIES1311-9702
54Flow based classification for specification based intrusion detection in software defined networking: FlowclassifySampath N, Dinakaran MInternational Journal of Software Innovation21667160
55Performance Comparison of Various Feature Descriptors in Object Category Detection Application using SVM ClassifierKavitha B R , G. Ramya, G.PriyaInternational Journal of Innovative Technology and Exploring Engineering2278-3075
56Energy-Efficient virtual machine selection based on resource ranking and utilization factor approach in cloud computing for IoTMekala M.S., Viswanathan P.Computers and Electrical Engineering0045-7906
57Effective Classification of Major Depressive Disorder Patients using Machine Learning TechniquesNivedhitha M, Durairaj Vincent P MRecent patents on computer science2213-2759
58Machine learning on medical datasetGopinath, M.P., Aarthy, S.L., Manchanda, A., RishadhAdvances in Intelligent Systems and Computing2194-5357
59Design of Secure Ehealth System Through Temporal Shadow using BlockchainR Charanya, Ra. K Saravanaguru, M AramudhanInternational Journal of Innovative Technology and Exploring Engineering (IJITEE)2278-3075
60K-means and hierarchical based clustering in suicide analysisSujatha.R,Sree Dharinya.S,Ephzibah,Kirubathangam.RInternational Journal of Engineering and Advanced Technology2249-8958
61New Approach Data Encryption using Key Generation and DS-PEKS AlgorithmPratik Badala, Senthilkumar N CResearch Journal of Engineering and Technology0976-2973
62Crime Pattern Matching based on Process Execution Context – An Evidence Acquisition TechniqueAsha Joseph and K. John SinghJournal of Advanced Research in Dynamical and Control Systems1943-023X
63Histogram-Equalized Hypercube Adaptive Linear Regression for Image Quality AssessmentBalakrishnan, N., Shantharajah, S.P.Sadhana – Indian Academy of Engineering and Sciences0256-2499
64A Survey, International Journal of Advanced Intelligence ParadigmsR. Jayanthi and K. John SinghInternational Journal of Advanced Intelligence Paradigms0
65Predicting ozone layer concentration using machine learning techniquesSrinivas, A.S., Somula, R., Govinda, K., Manivannan, S.S.Springer Briefs in Applied Sciences and Technology2191-530X
66Healthcare Android ApplicationShakila Basheer, Nithya Sampath, Jayakumar Sadhasivam R. Ilampirai R. Ramya Bharathi V. IlakkiyaJournal of Computational and Theoretical Nanoscience1546-1955
67An empirical comparison of supervised learning algorithms and hybrid WDBN algorithm for MOOC coursesJayakumar Sadhasivam Ramesh Babu KalivaradhanJournal of Ambient Intelligence and Humanized Computing1868-5137
68Image encryption techniques for data transmission in networks: A surveyJayanthi R., John Singh K.International Journal of Advanced Intelligence Paradigms1755-0386
69Accessibility Using Human Face Object and Text Recognition for Visually Impaired PeopleV. Mareeswari, Vijayan Ramaraj, G. Uma Maheswari, R. Sujatha, Preethi. EInternational Journal of Innovative Technology and Exploring Engineering22783075
70Machine Learning Based Classification of Cervical Cancer Using K-Nearest Neighbour, Random Forest and Multilayer Perceptron AlgorithmsShakila Basheer S. Mariyam Aysha Bivi S. Jayakumar Arpit Rathore Balajee JeyakumarJournal of Computational and Theoretical Nanoscience1546-1955
71Review on recent developments in frequent itemset based document clustering, its research trends and applicationsD. S. RajputInternational journal of data analysis techniques and strategies, InderScience1755-8069
72Ignition Pollution CheckYadav, V., Khatana, D., Bajoria, M., Nallakaruppan, M.K., Singh, S.P.International Journal of Innovative Technology and Exploring Engineering22783075
73Data cryptography based on musical notes on a fingerboard along with a diceTripathy, A.K., Das, T.K., Navaneethan, C.Indonesian Journal of Electrical Engineering and Computer Science2502-4752
74Comparison of particle swarm optimization and simulated annealing applied to travelling salesman problemSumathi, M., Rahamathunnisa, U., Anitha, A., Das, D., Nallakaruppan, M.K.International Journal of Innovative Technology and Exploring Engineering22783075
75Location-Based Collaborative Filtering for Web Service RecommendationVenkatachalaappaswamy, M., Ramaraj, V., Ravichandran, S.Recent Patents on Computer Science1874-4796
76Classifying streaming of Twitter data based on sentiment analysis using hybridizationSenthil Murugan N & Usha Devi GNeural Computing and Applications0941-0643
77Analyzing Financial Data and Mutual Funds Recommendation by Using Big Data AnalyticsNithya Sampath Jayakumar Sadhasivam R. Raj Kumar M. Sathish Kumar Balajee Jeyakumar P. V. PraveenSundarJournal of Computational and Theoretical Nanoscience1546-1955
78An approach to aggregate the partial rank list of web services in e-businessMareeswari V., Sathiyamoorthy E.International Journal of e-Business Research1548-1131
79Securing one-time password generation using elliptic-curve cryptography with self-portrait photograph for mobile commerce applicationRamasamy, P., Ranganathan, V., Palanisamy, V., Kadry, S.Multimedia Tools and Applications1380-7501
80Monitoring individual medical record by using wearable body sensorsGopal J,Sathiyamoorthy E,Mohammed Ayaz RSmart Innovation, Systems and Technologies21903018
81An Optimized Breast Cancer Diagnosis System Using a Cuckoo Search Algorithm and Support Vector Machine ClassifierManoharan prabukumar., Loganathan agilandeeswari., Arun kumar sangaiahHybrid Intelligence for Image Analysis and Understanding1868-5137
82Intelligent intrusion detection techniques for secure communications in wireless networks: A surveyRama Prabha K.P., Jeyanthi N.International Journal of Advanced Intelligence Paradigms1755-0386
8332-Bit One Instruction Core: A Low-Cost,Reliable, and Fault-Tolerant Core for Multi-core SystemsVenkatesha, S. and Parthasarathi, RJournal of Testing and Evaluation0090-3973
84Implementation of enhanced canny recognition algorithm and non – natural neural system based speech fusion for sightless personsArunkumar, P., Shantharajah, S.P.Multimedia Tools and Applications1380-7501
85E-health cloud security using timing enabled proxy re-encryptionV Vijayakumar, MK Priyan, G Ushadevi, R Varatharajan, G Manogaran, Prathamesh Vijay TarareMobile Networks and Applications1383-469X
86MMSI: A multi-mode service invocation algorithm to improve the connectivity in accessing cloud services in heterogeneous mobile cloudNadesh R.K., Aramudhan M.International Journal of Advanced Intelligence Paradigms1755-0386
87A Comparative Study On Transformation of UML/OCL to Other SpecificationsJagadeeswaran T, Senthilkumaran URecent Patents on Computer Science2213-2759
88Health care arrangement system for Doctor-Patient CommunicationsAngulakshmi.M, Sudha.S, Brindha.KIndian Journal for Public health and Research development0976-0245
89Accessibility using human face, object and text recognition for visually impaired peopleMareeswari, V., Vijayan Ramaraj, , Uma Maheswari, G., Sujatha, R., Preethi, EInternational Journal of Innovative Technology and Exploring Engineering2278-3075
90Network Support Data Analysis for Fault Identification Using Machine LearningParthasarathy Panchatcharam Shakila Basheer, Usha Devi GandhiInternational Journal of Software Innovation2166-7160
91Accurate facial ethnicity classification using artificial neural networks trained with galactic swarm optimization algorithmBagchi, C., Geraldine Bessie Amali, D., Dinakaran, M.Advances in Intelligent Systems and Computing2194-5357
92Agricultural leaf blight disease segmentation using indices based histogram intensity segmentation approachKalaivani.S, Shantharajah.S.P, Padma.T,Multimedia Tools and Applications1380-7501
93Optimal body mass index cutoff point for cardiovascular disease and high blood pressureChandra Babu, G., Shantharajah, S.P.Neural Computing and Applications0941-0643
94Gurumurthy S., Senthilkumar N.C., Ghalib M.R.A study of digital signal processing application for remote patient monitoring system using live EEG data transmissionInternational Journal of Applied Engineering Research0973-4562
95Jeyanthi N., Thandeeswaran R., Vinithra J.RQA based approach to detect and prevent DDOS attacks in VoIP networksCybernetics and Information Technologies1311-9702
96Angulakshmi M.A survey on multi-relational database based classification approachesInternational Journal of Applied Engineering Research0973-4562
2017
S.NO.TITLE OF PAPERNAME OF THE AUTHOR/SNAME OF JOURNALISBN/ISSN NUMBER
1A Novel Women Chaperone “An Anti-Violation Technology”Prabhu J , Thanapal P , Vijayanand R , Kirubathagam R , Sundaravadivazhagan BInternational Journal of Pure and Applied Mathematics1314-3395
2Classification: Grouping The Users Based On Their Web Search Using Fuzzy LogicSenthilkumar N C, Ch Pradeep ReddyInternational Journal of Pure and Applied Mathematics1314-3395
3An Empirical Study Of Various Load Balancing Algorithms For Cloud ComputingM Lawanyashri, S Subha. B BalamuruganInternational Journal of Pure and Applied Mathematics1314-3395
4An Improved Floating Point Addition AlgorithmS SubhaARPN Journal of Engineering and Applied Sciences1819-6608
5Analysis Of Performance Measures To Handle Medical Ecommerce Shopping Cart Abandonment In Cloud,V Priya, S Subha, B BalamuruganInformatics in Medicine Unlocked-Elsevier, March 20172352-9148
6Energy Aware Fruitfly Optimization Algorithm For Load Balancing In Cloud Computing EnvironmentsM. Lawanya Shri, S Subha, BalusamyInternational Journal of Intelligent Engineering and Systems,2185-310
7A Credential Data Privacy Preserving In Web Environment Using Secure Data Contribution Retrieval Algorithm”Kumaran U, Neelu KhareInternational Journal of Intelligent Engineering and Systems2185-310
82D Chaotic Map Based On 2D Adaptive Grey Wolf Algorithm For Ultra Sound Medical Image SecuritySrinivas Koppu & ViswanathamInternational Journal of Intelligent Engineering and System2185-310
93D Reconstruction Of A Scene From Multiple 2D ImagesSrinivas Koppu, Swarna Priya, R. M., Aarthy, S. L., Gunavathi, C., Venkatesh, P. & Gao, X. ZInternational Journal of Civil Engineering and Technology (IJCIET)0976-6316
10A Case Study : 3D City Generation Using Procedural Modeling Framework And Evaluations TrategiesDivya Udayan J, M.Priya, R.Charanya, Tamil Priya. D And Boyu GaoInternational Journal of Civil Engineering & Technology (IJCIET)0976-6316
11Enchanced Id Based Ring Signature By Validating Time Slots In Cloud EnvironmentNithya SInternational Journal of Mechanical Engineering and Technology0976-6340
12A Case Study On Coactive Subject Modelling For Acclaiming Technical ArticlesPraveen Kumar Reddy M, Rajesh Kaluri, Kuruva Lakshmanna, Nagaraja G, Swamy T, Guokun LiInternational Journal of Mechanical Engineering and Technology (IJMET)0976-6340
13A Case Study On Cost Estimation Of Cloud Service Using Fuzzy ApproachSrinivas Koppu, Joy Bhowmick., Madhu V. Satheesh S. And Tsung C.HInternational Journal of Pure and Applied Mathematics,13118080
14A Case Study: 3D City Generation Using Procedural Modeling Framework And Evaluation StrategiesM.PriyaInternational Journal of Civil Engineering and Technology (IJCIET)0976-6308
15A Case Study: Analysis Of Single Phase
And Hybrid Cascade Multilevel
Inverter With Pwm And Level
Inverters
M.PriyaInternational Journal of Mechanical Engineering and Technology (IJMET)0976-6340
16A Case Study: Home Environment Monitoring System Using Internet Of ThingsR. Raghavan, John Singh. K, Thippa Reddy. G, Sudheer. K, Venkatesh. P And Stephen Olatunde OlabiyisiInternational Journal of Mechanical Engineering and Technology0976-6359
17A Case Study: Usb Device Charging And Fitness Monitor With Smart Safety Shoe And IotJohn Singh. K, Sagar G. V, Sushmita Lenka, Belwin Edward. J, Jacob Raglend. I, Stephen Olatunde Olabiyisi,International Journal of Mechanical Engineering and Technology0976-6359
18A Comprehensive Overview On The Foundations Of Formal Concept AnalysisK. Sumangali Ch. Aswani KumarKnowledge Management & E-Learning2073-7904
19A Computer Aided System To Detect Breast Masses Using Digital MammogramsSujatha,R., Gao, X.-Z.,Gopinath, M.P., Prabu, S.,Murali, S.,Mohanasundaram, R., Kumar, N.S.International journal of Civil Engineering and Technology0976 – 6316
20A Condorcet Voting Theory Based Ahp Approach For Mcdm ProblemsSweta Bhattacharya, V. RajuIndonesian Journal of Electrical Engineering and Computer Science2502-4752
21A Fast Enhanced Secure Image Chaotic Cryptosystem Based On Hybrid Chaotic Magic TransformSrinivas Koppu & ViswanathamModelling and Simulation in Engineering16875591
22A Framework For Attribute Selection In Marketing Using Rough Computing And Formal Concept AnalysisT. K. DasIIMB Management Review0970-3896
23A Framework For Computational Offloading To Extend The Energy Of Mobile Devices In Mobile Cloud Computing.Thanapal, P., & Durai, M. S.International Journal of Embedded Systems1741-1076
24A Framework To Mitigate Arp Sniffing Attacks By Cache PoisoningB. Prabadevi, N. JeyanthiInternational Journal of Advanced Intelligence Paradigms (Inderscience)1755-0386
25A Mobile Application Based Smart System For Supporting Yoga Activities And Health MonitoringPrasanna M, Arunkumar T, Arunkumar SResearch Journal of Pharmacy and Technology0974-360X
26A Naive-Bayes Strategy For Sentiment Analysis On Demonetization And Indian Budget 2017-Case-StudyJasmine Norman, Mangayarkarasi R, Vanitha M, Praveen Kumar T, Umamaheswari GInternational Journal of Pure and Applied Mathematics1314-3399
27A New Algorithm For Password Encryption And DecryptionM.IyapparajaJournal of Advanced Research and Dynamical & Control Systems1943-023X
28A Novel Temporal Access Control Scheme For Outsourced Data In Cloud With User RevocationP. G. Shynu And K. John SinghElectronic Government, an International Journal,1740-7508
29A Novel Threshold Based Multi-Authority Access Control System In Cloud Storage EnvironmentM.LawanyashriInternational Journal of Pure and Applied Mathematics1314-3399
30A Prevention Model For Web Application Session Hijack Attacks In Wireless Networks Using Mac Appended Session IdS.S.Manivannan, E.SathiyamoorthyJournal of Advanced Research in Dynamical and Control Systems1943-023X
31A Privacy-Preserving Secure Access Control Mechanism In CloudM.IyapparajaJournal of Advanced Research and Dynamical & Control Systems1943-023X
32A Real Time Monitoring System For Yoga PractitionersPrasanna M, Arunkumar T, Akshat Sharma, Nikhil ChaudhariInternational Journal of Intelligent Engineering and Systems2185-3118
33A Replica Detection Scheme Based On The Deviation In Distance Travelled Sliding Window For Wireless Sensor NetworksAlekha Kumar Mishra, Asis Kumar Tripathy, Arun Kumar, And Ashok Kumar TurukWireless Communications and Mobile Computing,1530-8677
34A Review Of Soft Computing Techniques In Short-Term Load ForecastingSenthil Kumar PInternational Journal of Applied Engineering Research0973-4562
35A Review On Various Encoding Scehmes Used In Digital Dna Data StorageA.Swati, Forum Mathuria, S.Bhavani, E.Malathy, R.MahadevanInternational Journal of Civil Engineering and Technology0976-6308
36A Study On Different Types Of Authentication Techniques In Data SecurityDinesh Kumar D, K.Vijay, S.Bhavani, E.Malathy, R.MahadevanInternational Journal of Civil Engineering and Technology0976-6308
37A Survey On Fault Detection Techniques In Different Machines – An Image Processing ApproachU.Rahamathunnisa,Babu Chellappa Chetty And A.Clement KingInternational Journal of Civil Engineering and Technology0976-6316
38A Survey On Feature Selection Methods In Microarray Gene Expression Data For Cancer ClassificationGunavathi C, Premalatha K, Sivasubramanian KResearch Journal of Pharmacy and Technology0974-360X
39An Access Control Models In Cloud Computing: A ReviewPriya G, Kavitha Br, Ramya G , Kumaresan P , Feslin Anish MonInternational Journal of Pure and Applied MathematicsISSN: 1311
40An Analysis And Performance Evaluation Of Nosql Databases For Efficient Data Management In E-Health CloudsS L AarthyInternation Journal of Pure and Applied Mathematics13118080
41An Approach For Dynamic Replica Allocation For Sparse (Urban/Sub-Urban) And Dense Regions (City Side) In VanetKumar P J, Manikandan, N., Suganya, P., Sureka, SInternational Journal of Civil Engineering and Technology0976-6308
42An Approach To Evaluate The Availability Of System In Cloud Computing Using Fault Tree TechniqueM.Deepa, M.AnandINASS2185-3118
43An Efficient And Secure Biometric Authentication Scheme For M-CommerceR. Thandeeswaran, Hamid Mcheick, Hemant Agrawal, Ajay Thakur, N. Jeyanthi, Rajan Slathia,International Journal of Civil Engineering and Technology0976 – 6308
44An Efficient Deep Learning Neural Network Based Brain Tumor Detection SystemChinmayi, L Agilandeeswari, M Prabukumar, K MuralibabuInternational Journal of Pure and Applied Mathematics,1314-3395
45An Efficient Hybrid Approach For
Hyperspectral Image Classification,
L Agilandeeswari, M Prabukumar, S SathishkumarInternational Journal of Pure and Applied Mathematics,1314-3395
46A Survey On Iot Related PatternsSiva Kumar NInternational Journal of Pure and Applied Mathematics1314-3395
47An Enhanced Abe Based Secure Access Control Scheme For E-Health CloudsP. G. Shynu And K. John SinghInternational Journal of Intelligent Engineering and Systems2185-3118
48An Enhanced Cp-Abe Based Access Control Algorithm For Point To Multi-Point Communication In Cloud ComputingP. G. Shynu And K. John SinghJournal of Information Science and Engineering1016-2364
49An Enhanced Framework For Sign Gesture Recognition Using Hidden Markov Model And Adaptive Histogram TechniqueRajesh Kaluri, Pradeep Reddy ChInternational Journal of Intelligent Engineering and Systems2185-3118
50An Enhanced Virtual Backoff Algorithm For Wireless Sensor NetworksBabu, P.R., Krishna, P.V., Saritha, V., Pounambal, MInternational Journal of Wireless and Mobile Computing17411084
51An Intelligent Approach Of Query Process Optimisation Using Cooperative Semantic Caching TechniquP.MohankumarJournal of Engineering science and Technology1823-4690
52An Overview Of Data Mining Techniques And Its ApplicationsG.Kavitha,N.M.ElangoInternational Journal of Civil Engineering and Technology9766308
53Analysis Of Using Sparse Matrix Storage Formats In Image Compression TechniquesBanu,J.S, Babu.M.R, Thaseen,I.S And Balamurugan.PInternational Journal of Pure and Applied Mathematics1311-8080
54Analyzing Customer Sentiments Using Machine Learning TechniquesMagesh G, Dr.P.SwarnalathaInternational Journal of Civil Engineering and Technology (IJCIET Journal)0976 – 6316
55Assessment And Optimisation Of User Imprecise Queries In Cloud EnvironmentsP.MohankumarInternational journal of Intelligent Engineering and system2185-3118
56Automatic Brain Tumour Segmentation Techniques – A ReviewAngulakshmi.M, Lakshmi Priya. GgInternational Journal of Imaging Systems and technology1098-1098
57Automatic Grading System For Mangoes Using Multiclass Svm ClassifierL Agilandeeswari, M Prabukumar, Goel ShubhamInternational Journal of Pure and Applied Mathematics1311-1314
58Availability Modelling Of Fault Tolerant Cloud Computing SystemM.Deepa, M.AnandINASS2185-3118
59An Evolutionary Secre Energy Efficient Routing Protocol In IotPraveen Kumar Reddy, Rajasekhara BabuInternational Journal intelligent engineering and systems1311063047
60Big Data And Its Applications: A SurveyMagesh G, Dr.P.SwarnalathaResearch Journal of Pharmaceutical, Biological and Chemical Sciences0975-8585
61Big Data Management With Machine Learning Inscribed By Domain Knowlegde For Health CareSujatha R., E.P.EphzibahInternational Journal of Engineering & Technology2227-524X
62Biomarker Selection From Gene Expression Data For Tumour Categorization Using Bat AlgorithmGunavathi Chellamuthu, Premalatha Kandasamy, Sivasubramanian KanagarajInternational Journal of Intelligent Engineering & Systems2185-3118
63Bluetooth Based Low Power Data Acquisition System For BanKumaresan P Prabukumar M,International Journal of Pure and applied Mathematics – Special issue on Computer and Communication Editors1311-8083
64Case Study: A Line Following Robot For Hospital ManagementKumaresan P,Priya.G,Kavitha B R, Ramya G, M.LawanyashriInternational Journal of Pure and Applied Mathematics1311-1314
65Ciphertext-Scheme Based On Attribute Hybrid Encryption In Cloud Computing.Meenatchi, S., Navaneethan, C., Iyapparaja, M., Thanapal, P., & Prabhakaran, R.,Jour of Adv Research in dynamic & Control System1943-023X
66Clustering Of Wireless Sensor NetworksNallakaruppan, M.K., Ilango, P., Deepa, N., Muthukumarappan, A.Research Journal of Pharmacy and Technology9743618
67Comparative Study On Performance Analysis Of Time SeriesSyed Muzamil Basha, Yang Zhenning, Dharmendra Singh Rajput, Iyengar N.Ch.S.N. And Ronnie D. CaytilesInternational Journal of Grid and Distributed Computing2207-6379
68Computer Numerical Control Machine Based On Machine LearningKumaresan P Balavignesh G, Kavitha B R, Ramya Govindaraj, Venkatesan SInternational Journal of Pure and applied Mathematics – Special issue on Computer and Communication Editors1311-8080
69An Enhanced Trust Startegy For Online Social Networks Using Probalistic Reputation FeaturesRaj E D, Babu L.D.DNeurocomputing9252312
70Concept Compression In Formal Concept Analysis Using Entropy-Based Attribute PriorityK. Sumangali Ch. Aswani KumarApplied Artificial Intelligence An International Journal0883-9514
71Context Residual Energy Based Trust Management In Mobile Adhoc NetworksR. Vijayan, N. JeyanthiInternational Journal of Communication Networks and Distributed Systems (Inderscience1754-3916
72Covering Rough Set Fuzzy C- Medoids (Crfm) Clustering Algorithm For Gene Expression DataA.Jayaram ReddyJournal of Advanced Research in Dynamical and Control Systems1943-023X
73Crypto Currencies For Digital Currency Using Cipher Text And Sha 256Sukhbir, C.P., ManivannanJournal of Advanced Research in Dynamical and Control Systems1943-023X
74Customized Services To Generate Test Suits For Testing Custom Software Application System Based On Knowledge ReuseAsha N, Prasanna MJournal of Advanced Research in Dynamical and Control Systems1943-023X
75Decision Making Tool For Crop Selection For Agriculture DevelopmentN. Deepa, K.GanesanNeural Computing and Applications1433-3058
76Detection Of Anaemia From Tongue Datasets By Image Processing

Sujatha, R., Aarthy, S.L., Charulatha, A.R. And

Sasikala, T.M.S

International Journal of Research in Pharmaceutical Sciences0975-7538
77Development Of Advanced Encryption Standard Architecture With Sbox ValidityVanitha. M And S. SubhaWalailak Journal of Science and Technology2228-835X
78Discovery Of Drug And Medicine Using Datamining TechniquesAnish Chittora , A.Mary MekalaResearch Journal of Pharmacy and Technology0974-3618
79Domain Specific Predictive Analytics: A Case Study With R

Syed Muzamil Basha, Yang Zhenning,

Dharmendra Singh Rajput, Iyengar N.Ch.S.N. And

Ronnie D. Caytiles

International Journal of Multimedia and Ubiquitous Engineering1975-0080
80Dynamic Data Partitioning And Virtual Chunking For Effective Data Retrieval

M.Vanitha, R.Mangayarkarasi, Jasmine Norman,

R.Sakthivel, K.Baranitharan

International Journal of Pure and Applied Mathematics1311-8080
81Dynamic Energy Optimization Technique In Mobile Cloudlet For Mobile Cloud Computing Using Effective Offloading AlgorithmP.Priya, S.P.ShantharajahJournal of Theoretical and Applied Information Technolog1992-8645
82Effective Evaluation Of Prediction Accuracy Using Optimization Algorithm,Brindha.K, Sudha.S , Rathi.R And Charanya.S,International Journal of Pure and Applied Mathematics1311-8080
83Effective Mining Approach To Produce Quality Search Results Using Proposed ApproachElavarasan D, Durai Raj VincentInternational Journal of Intelligent Engineering and Systems2185-3118
84Energy Efficient Consumption For Quality Based Sleep Scheduling In Wireless Sensor NetworksA. S. Syed Navaz, N. Asha And D. SumathiARPN Journal of Engineering and Applied Sciences1819-6608
85Energy Efficient Node Selection Algorithm Based On Node Performance Index And Random Waypoint Mobility Model In Internet Of Vehicles

P M Kumar, Ushadevi Gandhi, R Varatharajan,

Gunasekaran Manogaran, R Jidhesh, Thanjai Vadivel

Cluster Computing1573-7543
86Integration Of Fuzzy Dematel And Fmcdm Approach For Evaluating Knowledge Transfer Effectiveness With Reference To Gsd Project OutcomeJagadeesh G, Arun Kumar S, X.Z.GaoInternational Journal of Machine Learning and cybernetics1868-8071
87Enhanced Dtls With Coap-Based Authentication Scheme For The Internet Of Things In Healthcare ApplicationPm Kumar, Ud GandhiThe Journal of Supercomputing0920-8542
88Enhancing Trust In Mobile Adhoc Network Using Trust And Dynamic With Energy Efficient Multipath Routing ProtocolVijayan R , Jeyanthi NInternational Journal of Signal and Imaging Systems Engineering1748-0698
89Estimating Construction Data Using An Authenticated Application For Urban Planning

S.Sree Dharinya, Ephzibah.E.P, Divya Udayan,

R. Kirubathangam, & Charanya.R

International Journal of Civil Engineering and Technology (IJCIET)9766308
90Evaluating The Impact Of Feature Selection On Overall Performance Of Sentiment AnalysisSyed Muzamil Basha, Dharmendra Singh RajputACM Digital Library978-1-4503
91Evolutionary And Neural Computing Based Decision Support System For Disease Diagnosis From Clinical Data Sets In Medical Practice,M. SudhaJournal of Medical Systems1573-689X
92Feature Selection For Privacy Preserving In Data Mining With Linear Regression Using Genetic AlgorithmKumaran U, Neelu KhareJournal of Advanced Research in Dynamical and Control Systems1943-023X
93Flowagent: Software Defined Firewall Rule Generator For Network Intrusion Detection SystemNithya SInternational Journal of Intelligent Engineering and Systems2185-3118
94Forward Secrecy Scheme For Data Sharing In Cloud

M. Lawanya Shri , G.Priya, M.B.Benjula Anbumalar,

Deepa Mani, K.Santhi

International Journal of Pure and Applied Mathematics1311-8080
95Handling Stakeholder Conflict By Agile Requirement Prioritization Using Apriori TechniqueRv Anand, M.DinakaranComputers & Electrical Engineering0045-7906
96Hb-Ppac: Hierarchy-Based Privacy Preserving Access Control Technique In Public CloudSudha Senthilkumar,Madhu ViswanathamInternational journal of High Performance computing and networking1740-0570
97Information Retrieval For Question Answering System Using Knowledge Based Query Reconstruction By Adapted Lesk And Latent Semantic AnalysisSaravanakumar K, Aswani Kumar CherukuriInternational Journal of Computer Science and Applications0972-9038
98Intelligent Decision Support System Based On Rough Set And Fuzzy Logic Approach For Efficacious Precipitation Forecast,M. SudhaDecision Science Letters19295812
99Intelligent Face Recognition And Navigation System Using Neural Learning For Smart Security In Internet Of ThingsPm Kumar, Ud GandhiCluster Computing1573-7543
100Intrusion Detection Model Using Fusion Of Chi-Square Feature Selection And Multi Class SvmI.Sumaiya Thaseen,Journal of King Saud University-Computer and Information Sciences1319-1578
101A Hybrid Cluster Head Selection Model For IotPraveen Kumar Reddy Mspringer1058601712
102K-Means Modification For Scalability

S.Bhavani,Sumit Patel, Dhanashri Patil, Yash Shah,

Rushikesh Babar, Abhishek Rathi

International Journal of Civil Engineering and Technology0976-6308
103Llvm Compiler

R.Bansal, Jasmine Norman,Mangayarkarasi R,Vanitha M,

Chandramouliswaran S

International Journal of Pure and Applied Mathematics1311-8080
104Luggage Tracking System Using IotSudha Senthilkumar, Brindha.K, Rathi.R, Charanya. R, Mayank JainInternational Journal of Pure and Applied Mathematics1314-3395
105Metrics Based Evaluation For Disease Affection In Distinct CitiesM.IyapparajaResearch Journal of Pharmacy and Technology0974-3618
106Multi-Voting And Binary Search Tree-Based Requirements Prioritisation For E-Service Software Project DevelopmentVijayanand R, Dinakaran MElectronic Government, an International Journal1740-7494
107Network Life Time Uniformed By Mutual Nodes Cooperation And Life Nodes Relay In Wsn’S.

Thanapal, P., Prabhakaran, R., Meenatchi, S., Navaneethan, C.,

& Iyapparaja, M.

Jour of Adv Research in dynamic & Control System1943-023X
108Non-Intrusive Transaction Aware Filtering During Enterprise Application ModernizationraRamadoss, R., Elango, N.M., Abimannan, S., Hsu, C.-H.Journal of Supercomputing0920-8542
109Soft Sequential Recognition Approach For User Activity Using A Wearable DevicePrabhavathy PIJMET9766359
110Opinion Mining Services Using Machine LearningSujatha. R, M Sai Praneeth And M Lakshmi DeepakJournal of Chemical and Pharmaceutical Sciences0974-2115
111Optimal Decision Tree Fuzzy Rule Based Classifier (Odt-Frc) For Heart Disease Prediction Using Improved Cuckoo Search Algorithm”Subhashini Narayan , Jagadeesh GobalInternational Journal of Business Intelligence and Data Mining.1943-023X
112Optimizing Health Care Records By Preventing Duplication In CloudSujatha R, Kaviya P.SInternational Journal of Research in Pharmaceutical Sciences0975-7538
113Overview Of Securing Multimedia Content Using Efficient Encryption Methods And ModesK. John Singh And Kunal GagnejaInternational Journal of Advanced and Applied Sciences2313-3724
114Parallel Aes Algorithm For Performance Improvement In Data Analytics Security For IotManikandan N, Subha SInternational Journal of Networking and Virtual Organisations1470-9503
115Passive Incidental Alertness—Based Link Visualization For Secure Data Transmission In ManetS.Uma, S.P.Shantharajah, C.RaniJournal of Applied Security Research1936-1610
116Prediction Of Diabetes Using Data Mining TechniquesV. Mareeswari, Saranya R, Mahalakshmi R, Preethi EResearch Journal of Pharmacy and Technology0974-3618
117Preventing From Phishing Attack By
Implementing Url Pattern Matching
Technique In Web

U.Rahamathunnisa,N.Manikandan,U.Senthilkumaran

And C.Niveditha

International Journal of Civil Engineering and Technology0976-6316
118Rating Prediction Based On Social Sentiment From Textual Reviews

M. Deepa, K. Santhi, M. B. Benjulaanbu Malar,Priya .

G, M. Lawanya Shri

International Journal of Pure and Applied Mathematics1311-8080
119Robust Classification Of Hyperspectral Remote Sensing Images Combined With Multihypothesis Prediction And 3 Dimensional Discrete Wavelet TransformBoggavarapu L N P, M PrabukumarInternational Journal of Pure and Applied Mathematics,1311-8080
120Secret Image Enhanced Sharing Using Visual CryptographyK.Brindha, N.JeyanthiCybernetics and Information Technologies1314-4081
121Secured Sharing Data In Cloud Using Revocable Storage Identity Based EncryptionM.IyapparajaJournal of Advanced Research and Dynamical & Control Systems1943-023X
122Securing Portable Document Format File Using Extended Visual Cryptography To Protect Cloud Data StorageK.Brindha, N.JeyanthiInternational Journal of Network Security1816-3548
123Security Algorithms In Cloud Computing: A Review,M B Benjula Anbu Malar, LawanyasriInternational Journal of Pure and Applied Mathematics1314-3395
124Security Solution For Arp Cache Poisoning Attacks In Large Data Center NetworksB. Prabadevi, N. JeyanthiCybernetics and Information Technologies1311-9702
125Smart Cooking Oil Analyzer Using Dielectric Constant Metric

Sriniavs Koppu., Rajesh D., Srinivasa Perumal R.,

Satheesh Kumar S., Rajeev Pankaj Nelapati

International Journal of Pure and Applied Mathematics,1311-8080
126Software Management Issues In Mobile Application Development

Deepa N, M. Senthilkumar, M.K.Nallakaruappn,

R.Chandrasekar, B R Kavitha ,Anand Muthukumarappan

International Journal of Civil Engineering and Technology (IJCIET)0976-6308
127Specification Based Intrusion Detection In Software Defined NetworkingNithya SInternational Journal of Pure and Applied Mathematics1314-3395
128An Improved Multiplication AlgorithmSubha SInternational Journal of Pure and Applied Mathematics1311-8080
129Stable Multipath Routing Protocol Using Different Route Selection Mechanism For Mobile Ad-Hoc Networks.

Alagiri, I., Muthamil Selvan, T., Thanapal, P.,

& Navaneethan C.

Inernational journal of pure and applied mathematics1314-3395
130Statistical Feature Ranking And Fuzzy Supervised Learning Approach In Modeling Regional Rainfall Prediction SystemsM. SudhaAGRIS on-line Papers in Economics and Informatics1804-1930
131Stratified Sampling Method Based Training Pixels Selection For Hyper Spectral Remote Sensing Image ClassificationM Radhesyam, Vaddi, Prabukumar MInternational Journal of Pure and Applied Mathematics,1314-3395
132Successive Shape Based Image Registration

L Agilandeeswari, M Prabukumar, Chinmay,

K Muralibabu, Sudharani

International Journal of Pure and Applied Mathematics,1314-3395
133Survey About Segmentation Feature Extraction And Classification Of Disease Affected Leaf Using Digital ImageS.Kalaivani, S.P.ShantharajahJournal of Advanced Research in Dynamical and Control System1943-023X
134Techiecardia-A System For Detection And Prediction Of Sudden Cardiac ArrestsM.IyapparajaJournal of Advanced Research and Dynamical & Control Systems1943-023X
135Test Case Generation For Embedded System Software Using Uml Interaction DiagramMani P, Prasanna MJournal of Engineering Science and Technology1823-4690
136Swf Scheduled Workflow Integration Profile For The Connectivity Problems In Radiology WorkflowPrabadevi. B,International Journal of Intelligent Engineering and Systems9758585
137Two Layered Optimized System Using Bluetooth And Hipherlan Interfaced Wireless Sensor NetworksM.IyapparajaJournal of Advanced Research and Dynamical & Control Systems1943-023X
138User Web Access Recording And Mining For Business IntelligenceSindhuja, T.,S.S. ManivannanJournal of Advanced Research in Dynamical and Control Systems1943-023X
139Weighted Fuzzy Rule Based Sentiment Prediction Analysis On Tweets

Syed Muzamil Basha, Yang Zhenning,

Dharmendra Singh Rajput, Iyengar N.Ch.S.N

And Ronnie D. Caytiles

International Journal of Grid and Distributed Computing2207-6379
140Cloud Based Automated Framework For Semantic Rich Ontology Construction
And Similarity Computation For E-Health Applications
T. Muthamilselvan , B. BalamuruganInformatics in Medicine Unlocked2352-9148
141Hybrid Approach For Data Classification In E-Health CloudT. Muthamilselvan , B. BalamuruganInternational Journal of Intelligent Engineering and Systems2185-3118
142Role Of Automation In Waste Management And Recent TrendsRaghavendra Desai, M ParimalaInternational Journal of Environment and Waste Management1478-9868
143An Optimized Replica Allocation Algorithm Amidst Of Selfish Nodes In ManetKumar Pj, Ilango PWireless Personal Communication, Springer0929-6212
144Mqrc: Qos Aware Multimedia Data Replication In CloudKumar Pj, Ilango PInternational Journal of BioMedical Engineering and Technology1752-6418
145Upper Bound Tighter Item Caps For Fast Frequent Itemsets Mining For Uncertain Data Implemented Using Splay TreesShashikiran.V And S.MuraliInternational Journal of Pure and Applied Mathematics1311-8080
146Energy Efficient Cluster Head Selection Algorithm In Wireless Sensor Networks Using Ea-Fkpso ProtocolMeenatchi, S., & Prabu, S.Jour of Adv Research in Dynamical & Control Systems.1943-023X
147Test Case Generation For Real Time System Software Using Specification DiagramPrasanna Minternational journal of intelligent engineering and systems2185-3118
148An Intelligent Lung Cancer Diagnosis System
Using Cuckoo Search Optimization And Support Vector Machine Classifier
Prabukumar M, Agilandeeswari, L. And Ganesan. KJournal of Ambient Intelligence and Humanized Computing1868-5137
149Heart Disease Prediction System Using Ann, Rbf And CbrN. Sivakumar, R.Jothikumar, P.S.Ramesh & SuganthanInternational Journal of Pure and Applied Mathematics1314-3395
150Applying Reversible Data Hiding For Medical Images In Hybrid Domain Using Haar And Modified HistogramVanmathi Chandrasekaran, Prabu Sevugan,International Journal of Intelligent Engineering and Systems2185-3118
151Image Steganography Using Fuzzy Logic And Chaotic For Large Payload And High ImperceptibilityVanmathi C., Prabu SInternational Journal of Fuzzy Systems1562-2479
152A Comparative Study Of Statistical And Rough Computing Models In Predictive Data AnalsisA. Anitha, D. P. AcharjyaInternational Journal of Ambient Computing and Intelligence (IJACI)1941-6237
153Crop Suitability Prediction In Vellore District Using Rough Set On Fuzzy Approximation Space And Neural NetworkA. Anitha, D. P. AcharjyaNeural Computing and Applications0941-0643
154Optimal View Point Selection In Direct Volume Rendering For 3D VisualizationGunasekaran, G., & Venkatesan, M.International Journal of Intelligent Engineering and Systems2185-3118
155An Efficient Technique For Three-Dimensional Image Visualization Through Two-Dimensional Images For Medical DataGunasekaran, G., & Venkatesan, M.Journal of Intelligent Systems2191-026X
156A Novel Method For Smart Vehicle SafetyK.Uma, Anand Kannan,Journal of Advanced Research in Dynamical and Control Systems1943-023X
157Alert On Detection Of Hazardous Changes In Environmental Parameters Using GsmK.UmaJournal of Advanced Research in Dynamical and Control Systems1943-023X
158Smart Vehicle Safety Using Efficient Technique To The Vehicle Traveller’SK.UmaJournal of Advanced Research in Dynamical and Control Systems1943-023X
159The Challenges And Issues On Big Data AnalyticsK.Uma, Anand KannanJournal of Advanced Research in Dynamical and Control Systems1943-023X
160An Analysis Of Decision Theoretic Kernalized Rough Intuitionistic Fuzzy C-MeansRyan Serrao, B.K.Tripathy And A.Jayaram ReddyAdvances in Intelligent Systems and Computing2194-5357
161Hocs : Host Oscommunication Service

Jayakumar Sadhasivam, Senthil Jayavel,

Balajee Jayakumar, Shoaib Merchant

International Journal of Civil Engineering and Technology0976-6316
162A Review On Polygonal Approximation Techniques Of The Digital Planar CurvesKalaivani SInternational Journal of pure and Applied Mathematics1311-8080
163Review Of Gaming And Its Evolution Over NetworksJaya Kumar SInternational Journal of Civil Engineering and Technology0976-6316
164Convoluted Local Binary Pattern Based Grouping Neural Network For Face Emotion RecognitionKrithika L B,Lakshmi Priya GgJournal of Engineering Science and Technology Review1791-2377
165A Case Study Of Carry Skip Adder And Design Of Feed-Forward Mechanism To Improve The Speed Of Carry ChainPremson Y, Sakthivel.R,Vivek.T, Vanitha MInternational Journal of Pure and Applied Mathematics1311-8080
166Performance Analysis Of Cloud Computing In Healthcare Systemusing Tandem QueuesK.Santhi, R.SaravananInternational Journal of Intelligent Engineering and Systems2185-3118
167Performance Analysis Of Cloud Computing Bulkservice Using Queueing ModelsK.Santhi, R.SaravananInternational Journal of Applied Engineering Research1311-8080
168Performance Analysis Of Cloud Computing Using Batch Queueing Models In Healthcare SystemsK.Santhi, R.SaravananResearch Journal of Pharmacy and Technology0974-360X
169Clustering Algorithm In Possibilistic Exponential Fuzzy C-Mean Segmenting Medical ImagesChiranji Lal ChowdharyJOURNAL OF BIOMIMETICS, BIOMATERIALS AND BIOMEDICAL ENGINEERING2296-9845
170Modelling The H1Ni Influenza Using Mathematical And Neural Network ApproachesDaphne Lopez, Gunasekaran M, Jagan MohanBiomedical Research0970-938X
171Parametric Model To Predict H1N1 Influenza In Vellore District, Tamil Nadu, IndiaDaphne Lopez, Gunasekaran MonoharanHandbook of Statistics1992-8408
172A Survey On Big Data Arcitectures And Machine Learning Algorithms In HealthcareGunasekaran M,Daphne LopezInternational Journal of Biomedical Engineering and Technology1752-6418
173A Gaussian Process Based Big Data Processing Framework In Cluster Computing EnvironmentGunasekaran M,Daphne LopezCluster Computing1386-7857
174Disease Surveillance System For Big Climate Data Processing And Dengue TransmissionGunasekaran M,Daphne LopezInternational Journal of Amient Computing and Intelligence1941-6237
175Document Level Prioritization And Identificataion Of Dominant Multi-Word Named Products In Customer ReviewsSivashankar,ValarmathiAab Journal of Science & Engineering2191-4281
176A Heuristic Approach To Machine-Part Cell Formation In The Presence Of Alternative Process Plans

Sowmiya N, Srinivasa Gupta, Valarmathi,

Poonambalam

International Journal of Advanced Manufacturing Technology14333015
177A Review Of Categorical Data Clustering Methodologies Based On Recent StudiesSowmiya,ValarmathiIIOAB Journal9763104
178Brain Tumour Segmentation From Mri Using Superpixels Based Spectral Clustering.Angulakshmi, M., Gg Lakshmi PriyaJournal of King Saud University-Computer and Information Sciences1319-1578
179Procedural Restoration Of Texture And Restruing Geometry From Façade ImageDivya UdayanIEEE access21693536
180A Study On Tailor-Made Security Schemes To Defend Iots

M N Rajaprabha, P Jayalakshmi,

R Vijay Anand

International Journal of Advance Research in Science and Engineering2319-8354
181Bike Sharing Prediction Using Deep Neural Networks

Thirumalai, Chandrasegar And Koppuravuri,

Ravisankar.

JOIV: International Journal on Informatics Visualization2549-9610
182Comparative Study On Various Graph Algorithms, . 414-419Angulakshmi., Rathi,R., Sudha, S., Brindha,K.,International journal of advance research in science and engineering2319-8346
183Honey Bee Foreaging Algorithm For Load Balancing In Cloud Computing Optimization

Sudha, S., Brindha,K., Rathi,R.,Angulakshmi.,

Jothi.,Thirani.,

International Journal of Engineering Science and Computing2321-3361
184A Case Study On Cognitively Improvised Min-Max Algorithm For Distributed Computer Systems,Sudha, S., Brindha,K., Rathi,R.,Nishanth,A., Vivek,P.,International Journal for Scientific Research & Development906-911
185A Case Study On Performance Analysis Of Routing Protocols In Mobile Adhoc Netwoks

Nallakaruppan.M.K, N. Deepa,Pranava Kumar.R,

Sudhanshu Gera,Arpit Chikara

International Journal for Science and Advance Research in Technology2395-1052
186Analysis Of Agricultural Data Using Big Data AnalyticsRavishankar K, Sidhardha K, Prabadevi BJournal of chemical and pharmaceutical Sciences0974-2115
187A Data Security Self-Attribute System In Cloud Computing
and Communication Engineering
Kumaresan P Dhanesh LokhandeInternational Journal of Innovative Research in Computer2320-9798
188A Modified Synthetic Division AlgorithmS SubhaInternational Journal of Computational and Applied Mathematics2349-5103
189A Novel Based Ranking Radically Influential Web Environment Users,M B Benjula Anbu MalarInternational Journal of Advance Research in Science and Engineering2319-8354
190A Novel Method Of Real Time City Scale Taxi Trip DistributionM B Benjula Anbu MalarInternational Journal of Advance Research in Science and Engineering2319-8354
191A Study On Travel Recommendation System

Angulakshmi , Rathi.R , Dr.Sudha Senthilkumar ,

Dr.K.Brindha , Rajat Tandon

International Journal of Engineering Science and Computing, December2321 3361
192A Survey On Trust Models In Cloud ComputingKumaresan P Ramya Govindaraj Kavitha B RInternational Journal of Advance research in Science and Engineering2319-8354
193A Synthetic Division Algorithm With Positive RemainderS SubhaInternational Journal of Advanced Science and Research2455-4227
194Agriculture E-Commerce Website,M B Benjula Anbu MalarInternational Journal of Advance Research in Science and Engineering ,2319-8354
195Agronomic Disaster Management Using Artificial Intelligence – A Case StudyM. SudhaInternational Journal of Computer Science and Business Intelligence2364-4168
196An Efficient And Secured Data Storage Scheme In Cloud Computing,M B Benjula Anbu MalarInternational Journal of Advance Research in Science and Engineering2319-8354
197Applications Of Iot In Green EnvironmentKumaresan P, Darshan K N, Kavitha B R, Ramya GovindarajInternational Journal of Advance research in Science and Engineering2319-8354
198Big Data In Healthcare: A ReviewMagesh G, P.SwarnalathaEmerging trends in Computer Engineering and Research, IIOAB Journal0976-3104
199Cloud With Iot In Smart ParkingSujatha R, Rahul Gorai, Harshita Wadhwa, Shivani TripathiInternational Journal of Innovative Research in Management, Engineering and Technology2456-0448
200Computational Intelligence Based Sports Success Prediction System Using Functional Pattern Growth Tree – A Case StudyM. SudhaInternational Journal of Computational Intelligence Research0974-1259
201Content Based Image Retrieval Using Hadoop And HipiKumaresan P, Kavitha B R, Ramya GovindarajInternational Journal of Advance research in Science and Engineering2319-8354
202Detection Of Phishing Pages Over The Internet Using Anti-Phishing TechniquesP Jayalakshmi, M N Rajaprabha, R Vijay AnandInternational Journal of Advance Research in Science and Engineering2319-8354
203Expelling Undesired Targets From An Image
Exploiting Surface Synthesis And Dispersion
and Communication Engineering
Based Technique
Kumaresan P, Pratik BhosaleInternational Journal of Innovative Research in Computer2320-9798
204Framework For Reliable Re Encryption In CloudMagesh G, P.SwarnalathaJournal of Chemical and Pharmaceutical Sciences0974-2115
205Fuzzy-Set Based Privacy Preserving Access Control Techniques In Cloud (Fb-Ppac)Brindha.K, Sudha.S ,SushmitakumariInternational Journal of Artificial Intelligence2252-8938
206Gdfs Based Data Encryption Technique In Cloud Computing EnvironmentsM B Benjula Anbu MalarInternational Journal of Advance Research in Science and Engineering2319-8354
207Heart Disease Prediction Using Data Mining TechniquesNallakaruppan.M.K, N. Deepa, Moin Ahmed, Tanuja, Ajith Kumar,Pranava Kumar.RInternational Journal of Engineering Science and Computing2321-3361
208An Improved Tumour Identification With Gabor Wavelet SegmentationCiranji Lal ChoudaharyResearch2321 3361
209Inquiry Based E-Learning System Using Personalized Knowledge Search

P Jayalakshmi, M N Rajaprabha, R Vijay Anand

And K Venkatesan

International Journal of Advance Research in Science and Engineering2319-8354
210Instant Medical Care And Drug Suggestion Service Using Data Mining And Machine Learning Based Intelligent Self-Diagnosis Medical SystemM. SudhaInternational Journal of Advanced Life Sciences2277-758X
211Iris Recognition SystemMagesh G, Ravee SundararajanInternational Research Journal of Engineering and Technology (IRJET)2395-0056
212Leaf Disease Detection Using Image ProcessingSujatha, R, Y Sravan Kumar And Garine Uma AkhilJournal of Chemical and Pharmaceutical Sciences0974-2115
213Precision Agriculture Using Real Time
Environmental Parameters And Internet Of Things
and Communication Engineering
Kumaresan P Ketan Prakash KandagaleInternational Journal of Innovative Research in Computer2320-9798
214Privacy Preserving And Secret Based Navigation Scheme In Vehicular Adhocnetwork : A Case StudyM B Benjula Anbu MalarInternational Journal of Advance Research in Science and Engineering ,2319-8354
215Reconfigurable Interpolation Filter Architecture Design

Satheesh Kumar S, Venugopal P, Srinivas Koppu,

Rajeev Pankaj N, Rajesh Kaluri, Madhusudhana Rao

International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering2278-8875
216Reconstruction Of Per Packet Routing PathM B Benjula Anbu MalarInternational Journal of Advance Research in Science and Engineering2319-8354
217Smarter Way To Access Multiple Mobile Cloud Applications Without Interoperability Issues.Thanapal, P., Marimuthu, K., Rajkumar, S., & Niranchana, R.I.J. Wireless and Microwave Technologies2076-1449
218Temperature Controlled Dc FanSudha, S., Brindha,K., Rathi,R.,Hardi,S., Kataria,S.,International journal of advance research in science and engineering498-506
219User Authentication Framework With Improved Performance In Multi-Cloud EnvironmentR. Thandeeswaran, M A Saleem DuraiAmerican Journal of Computer Science and Information Technology2349-3917
220Validation Of Automated Test Cases With Specification PathMani P, Prasanna MJournal of statistics and Management Systems0972-0510
221Weather Modeling Using Data-Driven Adaptive Rough-Neuro-Fuzzy ApproachM. SudhaCurrent World Environment0973-4929
222Assessment Of Unfair User Rating In Multidisciplinary SystemV.Mareeswari, Bala Prasanth PResearch Journal of Pharmaceutical, Biological and Chemical Sciences0975-8585
223Pattern Recognition Using Pca AlgorithmsUma Maheswari G, Ephzibah E P, Mareeswari VResearch Journal of Pharmaceutical, Biological and Chemical Sciences0975-8585
224Fog Computing – Enhancing The Maximum Energy Consumption Of Data ServersPriyanka C, Prabadevi, Jeyanthi NIDL – International Digital Library Of Technology & Research2349-302X
225Anomaly Based Intrusion Detection Methods In Network Infrastructure – A SurveyDhanabal L, S.P.Shantharajah, T. PadmaAsian Journal of Research in Social Sciences and Humanities2249-7315
226Survey Of Image Segmentation Algorithm For Medical Images: Challenges And MethodologiesP Chinmayi, M Prabukumar, L AgilandeeswariRESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES0975-8585
227Data Replication In Current Generation Computing EnvironmentKumar Pj, Ilango PInternational Journal of Engineering trends and Technology,2231-5381
228Data Replication In Conventional Computing EnvironmentKumar Pj, Ilango PInternational Journal of Computer Trends and Technology2231-2803.
229Case Study- Machine Learning Based On Scenario Analysis

Prabadevi. B, Vanmathi. C, Krithika. L. B,

Sudha. S, Vivek Akabote

International Journal of Scientific Research in Computer Science, Engineering and Information Technology2456-3307
230Precise Investigations Of Software QualityAlice Auxilia .L, Asha .N, Vanmathi .CInternational Journal of Engineering Science and Computing,2321-3361
231Intrusion Detection System Based On Artificial Intelligence
  1. Anitha,Sv Revathi, S Jeevanantham,
  2. Eliza Godwin
International Journal of Technology2231-3915
232Mooc : A Framework For Learners Using Learning StyleJayakumar Sadhasivam And Ramesh Babu KalivaradhanInternational Education and Research Journal2454-9916
233Review On Sentiment Analysis A Learners’ OpinionJayakumar Sadhasivam And Ramesh Babu KalivaradhanIIOAB – Emerging trends in Computer Engineering and Research0976-3104
234Comparative Study On Web Based Software Project Management ToolsJayakumar SadhasivamInternational Journal of Modern Computer Science2320-7868
235Data Load Balancing In A Big Data Heterogeneous Environment

P Jayalakshmi, M N Rajaprabha, R Vijay Anand

And K Venkatesan

International Journal of Advance Research in Science and Engineering2319-8354
236I Voting

P Jayalakshmi, M N Rajaprabha, R Vijay Anand

And K Venkatesan

International Journal of Advance Research in Science and Engineering2319-8354
237A Novel Method For Key Aggregation On Data Sharing In Cloud Stoeage EnvironmentK.Shanthi, M.Deepa, M.Lawanya ShriInternational Journal of Advance Research in Science and Engineering2319-8354
238Implementation Of Morphological Image Processing Algorithm Using MammogramsTk Das, Cl Chowdharyjournal of chemical and proceessing9742-115
239A Review On Internet Of Things And Its Applications In HealthcareChiranji Lal ChowdharyJournal of Chemical and Pharmaceutic al Sciences0974-2115
2016
S.NO.PUBLICATION DETAILS (INCL COMPLETE BIBLIOGRAPHY)
1.

Raj, E. D., & Babu, L. D. (2016). A fuzzy adaptive resonance theory inspired overlapping

community detection method for online social networks.

Knowledge-Based Systems, 113, 75-87.

2.

Vijayakumar, P., Chang, V., Deborah, L. J., Balusamy, B., & Shynu, P. G. (2016).

Computationally efficient privacy preserving

anonymous mutual and batch authentication schemes for vehicular ad hoc networks.

Future Generation Computer Systems.

3.

Loganathan, A., & Kaliyaperumal, G. (2016). An adaptive HVS based video watermarking

scheme for multiple watermarks using BAM neural networks and fuzzy inference system.

Expert Systems with Applications, 63, 412-434.

4.

PVSSR, C. M. (2016). Dimensionality reduced local directional pattern (DR-LDP) for face recognition.

Expert Systems with Applications, 63, 66-73.

5.

Boobalan, M. P., Lopez, D., & Gao, X. Z. (2016). Graph clustering using k-Neighbourhood

Attribute Structural similarity.

Applied Soft Computing, 47, 216-223.

6.

Deepa, N., & Ganesan, K. (2016). Multi-class classification using hybrid soft decision model

for agriculture crop selection.

Neural Computing and Applications, 1-14.

7.

Lopez, D., & Sekaran, G. (2016). Climate change and disease dynamics-a big data perspective.

International Journal of Infectious Diseases, 45(1):23-24.

8.

Singh, P. K., Kumar, C. A., & Li, J. (2016). Knowledge representation using interval-valued

fuzzy formal concept lattice.

Soft Computing., 20(4), 1485-1502.

9.

Agilandeeswari, L., & Ganesan, K. (2016). A bi-directional associative memory based multiple

image watermarking on cover video.

Multimedia Tools and Applications, 75(12), 7211.

10.

Agilandeeswari, L., & Ganesan, K. (2016). A robust color video watermarking scheme based on hybrid embedding techniques.

Multimedia Tools Appl., 75(14), 8745-8780.

11.

Ahamed, B. B., & Ramkumar, T. (2016). An intelligent web search framework for performing efficient retrieval of data.

Computers & Electrical Engineering, 56, 289-299.

12.

Balakrishnan, S. M., & Sangaiah, A. K. (2016). Integrated QoUE and QoS approach for optimal service

composition selection in internet of services (IoS).

Multimedia Tools and Applications, 1-28.

13.

Sujatha, R., & Ezhilmaran, D. (2016). A new efficient SIF-based FCIL (SIF–FCIL) mining algorithm in

predicting the crime locations.

Journal of Experimental & Theoretical Artificial Intelligence, 28(3), 561-579.

14.

Pounambal, M., & Krishna, P. V. (2016). Efficient channel assignment method for multimedia

traffic in wireless mesh networks.

International Journal of Communication Systems, 29(5), 929-941.

15.

Singh, P. K., Aswani Kumar, C., & Gani, A. (2016). A comprehensive survey on formal concept

analysis, its research trends and applications. International Journal of Applied Mathematics and

Computer Science, 26(2), 495-516.

16.

Tripathy, A. K., Chinara, S., & Sarkar, M. (2016). An application of wireless brain–computer interface

for drowsiness detection.

Biocybernetics and Biomedical Engineering, 36(1), 276-284.

17.

Navaneethan, C., & Prabha, K. H. (2016). Optimizing Network Layer with Adaptive Modulation for

Time Varying Channel.

Wireless Personal Communications, 90(2), 1003-1019.

18.

Balasubramanian, V., Nagarajan, S. G., & Veerappagoundar, P. (2016). Mahalanobis distance-the

ultimate measure for sentiment analysis.

Int. Arab J. Inf. Technol., 13(2), 252-257.

19.

Nalinipriya, G., Maheswari, K. G., Balusamy, B., Kotteswari, K., & Kumar Sangaiah, A. (2016).

Availability modeling for multi-tier cloud environment. Intelligent Automation & Soft Computing, 1-8.

20.

Kumar, C. A., Mouliswaran, S. C., Li, J. H., & Chandrasekar, C. (2016). Role based access control design

using triadic concept analysis.

Journal of Central South University, 23(12), 3183-3191.

21.

Swathi, G., & Saravanan, R. (2016). A Framework for Efficient Routing in MANET using Index Routing

Tables-based Algorithms.

Defence Science Journal, 66(6), 568.

22.

Deepa, N., & Ganesan, K. (2016). Mahalanobis Taguchi system based criteria selection tool for

agriculture crops.

Sādhanā, 41(12), 1407-1414.

23.

Leo Dencelin X, Ramkumar, T. (2016). Analysis of multilayer perceptron machine learning

approach in classifying protein secondary structures.

Biomedical Research. Special Issue- Computational Life Science and Smarter Technological

Advancement, August 2016, S166-S173.

24.

Rajavel, D., & Shantharajah, S. P. (2016). Scrambling algorithm for encryption of text using

cube rotation artificial intelligence technique.

Biomedical Research. Special Issue-Computational Life Science and Smarter Technological

Advancement, August 2016, S251-S256.

25.

Das, T. K., & Nahar, K. M. (2016). A Voice Identification System using Hidden Markov Model.

Indian Journal of Science and Technology, 9(4).

26.

Manikandan, N., & Subha, S. (2016). Software Design Challenges in Time Series Prediction Systems

Using Parallel Implementation of Artificial Neural Networks.

The Scientific World Journal, 2016.

27.Subha, S. (2016). A Power Saving Set Associative Cache Model. Indian Journal of Science and Technology, 9(6).
28.

Praveen Kumar Reddy M. & M. Rajasekhara Babu (2016). A scalable approach for improving dynamic

multithreaded applications on NUMA based architectures.

ARPN Journal of Engineering and Applied Sciences, 11(3), 1494-1503.

29.

Narayanan, M., & Cherukuri, A. K. (2016). A study and analysis of recommendation systems

for location-based social network (LBSN) with big data.

IIMB Management Review, 28(1), 25-30.

30.

Jayanthi R, Siva Rama Krishnan S, Rama Prabha K P., (2016). Spoofing Assault

Identification and Limiting Several Adversaries in Wireless Networks.

International Journal of Applied Engineering Research, 11(1), 286-289.

31.

Shynu, P. G., & Singh, K. J. (2016). A Comprehensive Survey and Analysis on Access

Control Schemes in Cloud Environment.

Cybernetics and Information Technologies, 16(1), 19-38.

32.

Subha, S. (2016). A literature survey on cpu cache reconfiguration. ARPN Journal of

Engineering and Applied Sciences. 11(5), 3008-3012.

33.

Prasanna, S., & Ezhilmaran, D. (2016). A Survey of Stock Price Prediction & Estimation

Using Data Mining Techniques.

International Journal of Applied Engineering Research, 11(6), 4097-4099.

34.

Vijayan, R., & Jeyanthi, N. (2016). A survey of trust management in mobile ad hoc networks.

International Journal of Applied Engineering Research, 11(4), 2833-2838.

35.

Thanapal P., Saleem Durai M A., (2016). A survey on application partitioning for mobile cloud computing.

International Journal of Pharmacy and Technology. 8(1), 10574-10589.

36.

Suganya P, (2016). A survey on various security measures used in cloud.

International Journal of Pharmacy and Technology. 8(1), 3644-3647

37.

Prathik, A., Uma, K., & Anuradha, J. (2016). An Overview of application of Graph theory.

International Journal of ChemTech Research, 9(2), 242-248.

38.

Anusha, K., & Sathiyamoorthy, E. (2016). Comparative study for feature selection

algorithms in intrusion detection system.

Automatic Control and Computer Sciences, 50(1), 1-9.

39.

Seetha R & Saravanan R. (2016). Digital Signature Schemes for group communication: A Survey.

International Journal of Applied Engineering Research, 11(6), 4416-4422.

40.

Rathi R., (2016). Hybridization of soft computing framework – a survey.

International Journal of Pharmacy & Technology, 8(1), 3594-3602.

41.

Das, T. K. (2016). Intelligent techniques in decision making: A survey.

Indian Journal of Science and Technology, 9(12).

42.

Anand, R. V., & Dinakaran, M. (2016). Popular Agile Methods in Software Development:

Review and Analysis. International Journal of Applied Engineering Research, 11(5), 3433-3437.

43.

Fiaz, A. S., Asha, N., Sumathi, D., & Navaz, A. S. (2016). Data Visualization: Enhancing

Big Data More Adaptable and Valuable.

International Journal of Applied Engineering Research, 11(4), 2801-2804.

44.

Thandeeswaran, R., & Durai, M. S. (2016). Wide-ranging Survey on Authentication Mechanisms.

International Journal of Applied Engineering Research, 11(6), 4114-4117.

45.

Sharon Moses J., Babu, L. D. (2016). A locality centred recommendation system combining

CNM clustering technique with fuzzy preference tree-based ranking algorithm.

International Journal of Business Intelligence and Data Mining, 11(1), 63-84.

46.

Siva Rama Krishnan S., karthik Balasubramanian, Arun Kumar T., Challenges in Data Aggregation

in Wireless Sensor Network – A Review. International Journal of Applied Engineering Research, 11(7), 5342-5345.

47.

Panneer, P., & Tripathy, B. K. (2016). Covering Rough Clustering Approach for Unstructured Activity Analysis.

International Journal of Intelligent Information Technologies (IJIIT), 12(2), 1-11.

48.

Kumar, K. S., & Deepa, K. (2016). Medical Query Expansion using UMLS. Indian Journal

of Science and Technology, 9(14).

49.

Bhushan, S. B. Reddy. C. H., Pradeep (2016). A network qos aware service ranking using

hybrid ahp-promethee

method in multi-cloud domain. International Journal of Engineering Research in Africa, 24.

50.

Senthil Kumar P., Daphne Lopez., (2016). A Review on Feature Selection Methods for High

Dimensional Data.

International Journal of Engineering and Technology, 8(2), 669-672.

51.

Hemalatha S., Margret Anouncia S., (2016). A Review on Human Identification Systems using

Biometrics Fingerprint Matching,

Internation Journal of Pharmacy and Technolog, 8(1), 3604-3610.

52.

Pushparaj R., Dinakaran M., (2016). An Energy aware routing for Manets using Dynamic power

threshold with load balancing.

World Applied Sciences Journal, 34(1), 120-127.

53.

SenthilKumar M, Ilango P., (2016). Analysis of DNA data using Hadoop Distributed File System.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(3).

54.

Dharinya, S. (2016). Analysis of document summarization and word classification in a smart

environment.

Indian Journal of Science and Technology, 9(19).

55.

Sangamithra A., Vani. M.P., (2016). Analysis of Network Security Spasms and Circumvention.

International Journal of Engineering and Technology, 8(2), 604-608.

56.

Thippa Reddy, G., & Khare, N. (2016). FFBAT-Optimized Rule Based Fuzzy Logic Classifier

for Diabetes.

In International Journal of Engineering Research in Africa (Vol. 24, pp. 137-152). Trans Tech Publications.

57.

Manogaran, G., Thota, C., & Kumar, M. V. (2016). Meta Cloud Data Storage architecture for

Big Data security

in cloud computing. Procedia Computer Science, 87, 128-133.

58.

Suganya P., Pradeep Reddy Ch., (2016). Potential threats caused by malicious nodes and various counter

measures available in MANET: A Survey. Research Journal of Pharmaceutical, Biological and

Chemical Sciences, 7(3), 1012-1016.

59.

Senthilkumar, M. N. M., & Senthilkumaran, U. (2016). Review of asymmetric key cryptography in wireless

sensor networks. International Journal of Engineering and Technology, 8(2), 859-862.

60.

Gunasekaran G., Venkatesan M., (2016). Review on Visualization Techniques for Medical Data and its Application.

Research Journal of Pharmaceutical, Biological and Chemical Science, 7(3), 169-173.

61.

Gagneja, K., & Singh, J. (2016). Survey and analysis of security issues on RSA algorithm for digital video data.

Journal of Discrete Mathematical Sciences and Cryptography, 19(1), 39-55.

62.

Rajesh kaluri, (2016). A Comparative study on image segmentation techniques. International Journal of Pharmacy

and Technology, 8(2), 12712-12717.

63.

Srinivas Koppu, Madhu Viswanathan, (2016). A Novel Chaotic Image Encryption System for color images based

Arnold Cat Map and Efficient Pixel Shuffling. International Journal of Pharmacy and Technology, 8(2), 13353-13361.

64.

Subha, S., & Sakthivel, R. (2016). A Power Saving Multiplication Algorithm. International Journal of Applied

Engineering Research, 11(9), 6200-6203.

65.

Manikandan N., Subha S., (2016). A Review on evaluating the usage of multiple cores effectively in personal

computer based applications. International Journal of Pharmacy & Technology, 8(2), 3916-3927.

66.

Dinakaran M., (2016). A Review on requirement of self sustainable natural farming and

application of information

and communication technology (Agro Informatics) for agriculture in India. International Journal

of Pharmacy & Technology, 8(2), 3944-3956.

67.

Nagaraja G., Pradeep Reddy Ch., (2016). A Survey on group key management frameworks for secure group

communication in mobile Ad hoc Networks. International Journal of Pharmacy & Technology, 8(2), 4121-4129.

68.

Srinivas Koppu, Madhu Viswanatham V., (2016). A Survey on security issues: Digital Images. International Journal

of Pharmacy & Technology, 8(2), 13420-13427.

69.

Santhi K., Saravanan R., (2016). A Survey on queueing models for cloud computing. International Journal of Pharmacy

& Technology, 8(2), 3964-3977.

70.

Manivannan S.S., (2016). A Systematic survey of routing attacks and counter measures in wireless networks.

International Journal of Pharmacy & Technology, 8(2), 3957-3963.

71.

Agilandeeswari, L., & Ganesan, K. (2016). An efficient hilbert and integer wavelet transform

based video watermarking.

Journal of Engineering Science and Technology, 11(3), 327-345.

72.

Kuruva Lakshmanna, Rajesh Kaluri, Thippa Reddy G., Nagaraja G., Dhenesh V Subramanian, (2016).

An enhanced algorithm for frequent pattern mining from Biological sequences. International

Journal of Pharmacy & Technology, 8(2), 12776-12784.

73.

Subha, S. (2016). An Improved Non-Restoring Algorithm. International Journal of Applied

Engineering Research, 11(8), 5452-5454.

74.

Rajesh Kaluri, Pradeep Reddy Ch., (2016). An overview of Human Gesture Recognition.

International Journal of Pharmacy & Technology, 8(2), 12037-12045.

75.

Arivu Selvan K., Sathiyamoorthy E., (2016). Automated Retrieval of medical images based on

distinct features using Fuzzy Logic approach.

International Journal of Pharmacy & Technology, 8(2), 13230-13239.

76.

Rahamathunnisa U., Saravanan R., (2016). Classificationn of Noise in Video – A Review.

International Journal of Pharmacy & Technology, 8(2), 3928-3932.

77.

Kumar, N. S., & Muruganantham, D. (2016). Disambiguating the Twitter Stream Entities and Enhancing

the Search Operation Using DBpedia Ontology: Named Entity Disambiguation for Twitter Streams.

International Journal of Information Technology and Web Engineering (IJITWE), 11(2), 51-62.

78.

Deepa M., Santhi K., Benjula Anbu Malar M.B., Lawanya Shri M., (2016).

Distributed Detection of malicious

nodes in wireless sensor networks under Byzantine Attack. International Journal of Pharmacy

& Technology, 8(2), 13546-13552.

79.

Lawanya Shri M., Benjula Anbu Malar M.B., Santhi K., Deepa M., (2016). E-Learning system

with Hierarchical

attribute set based encryption access control in cloud. International Journal of Pharmacy &

Technology, 8(2), 12785-12792.

80.

Mohankumar, S., & Balasubramanian, V. (2016). Identifying Effective Features and Classifiers for Short

Term Rainfall Forecast Using Rough Sets Maximum Frequency Weighted Feature Reduction Technique.

CIT. Journal of Computing and Information Technology, 24(2), 181-194.

  
81.

Dharmendra Singh Rajput, Praveen Kumar Reddy M, Shrivastava D.P., (2016).

Mining Frequent Termset for

Web document data using Genetic Algorithm. International Journal of

Pharmacy & Technology, 8(2), 4038-4054.

82.

Mohankumar P., Balamurugan, (2016). Optimality analysis of query processing using various

caching approaches –

A Review. International Journal of Pharmacy & Technology, 8(2), 3739-3751.

83.

Manivannan, S. S., & Sathiyamoorthy, E. (2016). Preventing health care web applications from

session hijack attacks

using session key authentication and distributed session id. ARPN Journal of Engineering and

Applied Sciences,11(13), 8257-8263.

84.

Perumal, V. (2016). Randomized Symmetric Crypto Spatial Fusion Steganographic System.

Journal of ICT Research and Applications, 10(1), 15-28.

85.

Durai Raj Vincent P M., (2016). RSA Encryption Algorithm – A Survey on its various forms and

its security level.

International Journal of Pharmacy & Technology, 8(2), 12230-12240.

86.

Durai Raj Vincent P M., (2016). Secured Healthcare Date exchange using proposed security scheme.

International Journal of Pharmacy & Technology, 8(2), 12144-12154.

87.

Prabukumar, M., & Ray, B. K. (2016). Semi-circular angle-based one bit circle generation algorithm

on a hexagonal grid.

International Journal of Computer Aided Engineering and Technology, 8(3), 199-216.

88.

Krithika, L. B. Lakshmi Priya G G. (2016). Student Emotion Recognition System (SERS)

for E-Learning

Improvement Based on Learner Concentration Metric. Procedia Computer Science, 85, 767-776.

89.

Kaushik Roy, Ramya G., (2016). Survey on mobile vulnerability issues and basic security policies.

International Journal of Pharmacy & Technology, 8(2), 3823-3833.

90.

Hemalatha, S., & Anouncia, S. M. (2016). A Computational Model for Texture

Analysis in Images with Fractional Differential Filter for Texture Detection. International

Journal of Ambient Computing and Intelligence, 7(2).

91.

Chowdhary, C. L., & Acharjya, D. P. (2016). A hybrid scheme for breast cancer detection using

intuitionistic fuzzy rough set technique.

International Journal of Healthcare Information Systems and Informatics, 11(2).

92.

Senthilkumar, M., & Ilango, P. (2016). A Survey on Job Scheduling in Big Data. Cybernetics

and Information Technologies, 16(3), 35-51.

93.

Malar, M. B. A., Shri, M. L., Deepa, M., & Santhi, K. (2016). Approach for Secure Authorized

Deduplication using Hybrid Cloud. International Journal of Applied Engineering Research,

11(15), 8480-8482.

94.

Ramachandran, P., & Dinakaran, M. (2016). Signal Strength and Residual Power Based Optimum

Transmission Power Routing for Mobile Ad hoc Networks. Procedia Computer Science, 92, 168-174.

95.

Parimala, M., & Lopez, D. (2016). Spatio-temporal graph clustering algorithm based on attribute

and structural similarity.

International Journal of Knowledge-based and Intelligent Engineering Systems, 20(3), 149-160.

96.

Das, A. J., Wahi, A., Kothari, I., & Raskar, R. (2016). Ultra-portable, wireless smartphone

spectrometer for rapid,

non-destructive testing of fruit ripeness. Scientific reports, 6, 32504.

97.

Anusha, K., & Sathiyamoorthy, E. (2016). OMAMIDS: Ontology Based Multi-Agent Model

Intrusion Detection System for Detecting

Web Service Attacks. Journal of Applied Security Research, 11(4), 489-508.

98.

Prabhavathy P, Tripathy BK, Venkatesan Meenakshi Sundaram, (2016). Covering based

refined Rough K-Means Algorithm,

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(5), 2142-2151.

99.

Senthil Kumar N, Kauser Ahamed P. (2016). Pervasive utilization of PSO techniques over

twitter data streams.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(5), 796-803.

100.

Anitha, A., & Acharjya, D. P. (2016). Customer Choice of Super Markets using Fuzzy

Rough Set on Two Universal Sets

and Radial Basis Function Neural Network. International Journal of Intelligent Information

Technologies (IJIIT), 12(3), 20-37.

101.

Vincent, P. D. R., & Sathiyamoorthy, E. (2016). A novel and efficient public key encryption

algorithm. International

Journal of Information and communication technology, 9(2), 199-211.

102.

Shivhare, R., & Kumar, C. A. (2016). On the cognitive process of abstraction. Procedia

Computer Science, 89, 243-252.

103.

Ramu, S. P., & Sevugan, P. (2016), An approach for efficient pre-processing of multi-temporal

hyperspectral satellite

imagery., The IIOAB Journal, 7(5), 12-20.

104.

Kumaran U., Neelu Khare, (2016). An Empirical study of security in Text mining for large

datasets. International

Journal of Control theory and applications, 9(6), 2737-2743.

105.

Prasanna, S., & Ezhilmaran, D. (2016). Association rule mining using enhanced apriori with

modified GA for stock

prediction. International Journal of Data Mining, Modelling and Management, 8(2), 195-207.

106.

Mani P., Prasanna M., (2016). A Study on functional specification based test case generation

for real-time systems.

International Journal of Engineering and Technology, 8(4), 1801-1806.

107.

Lakshmanna, K., & Khare, N. (2016). Constraint-based measures for DNA sequence mining

using group search

optimization algorithm. International Journal of Intelligent Engineering and systems, 9(3), 91-100.

108.

Radhakrishnan, S., & Devarasan, E. (2016). Computing the Probability on Socio Economic

Factors to Predict the Crime

Locations by Means of Joint Probability Based AMABC-FCIL. International Journal of Intelligent

Engineering & Systems, 9(3), 80-90.

109.

Bhushan, S. B., & Reddy, P. (2016). BB-LBA: biogeography-based load balancing algorithm in multi

cloud domain.

International Journal of Internet Protocol Technology, 9(2-3), 100-106.

110.

Balakrishnan, S. M., & Sangaiah, A. K. (2016). Aspect-oriented middleware framework for resolving

service discovery

issues in Internet of Things. International Journal of Internet Protocol Technology, 9(2-3), 62-78.

111.

Arivuselvan K., Sathiyamoorthy E., (2016). Analysing EEG sub-bands to distinguish between

individuals with neural

disorder using Back propagation neural network. International Journal of Pharma and

Bio sciences, 7(4), 80-87.

112.

Kumar, S., Saravanakumar, K., & Deepa, K. (2016). On Privacy and Security in Social Media–

A Comprehensive Study.

Procedia Computer Science, 78, 114-119.

113.

Pranusha Soma, Arivuselvan K., (2016). Automated Recognition of Emotions From Facial

Expressions using Back

propagation Neural networks. Research Journal of Pharmaceutical, Biological and Chemical Sciences,

7(4), 1895-1902.

114.

Magesh G., (2016). A review paper: Student attitude towards computer science. International

Journal of Pharmacy &

Technology, 8(3), 4653-4666.

115.

Angulakshmi M., (2016). Big Data Analytics – A Review. International Journal of Pharmacy &

Technology, 8(3), 4634-4639.

116.

Sudha Senthilkumar, Madhu Viswanatham, (2016). Survey on Data Access Control techniques in

cloud computing.

International Journal of Pharmacy & Technology, 8(3), 17442-17461.

117.

Kavitha G., (2016). Factors associated with improving quality of healthcare services. International

Journal of Pharmacy

& Technology, 8(3), 4844-4856.

118.

Praveen Kumar Reddy M., Nagaraja G., (2016). Creating trusted learning by using QR based

U learning System.

International Journal of Pharmacy & Technology, 8(3), 18268-18272.

119.

Rajeswari C., (2016). Performance analysis of sports persons using data mining based ranking

and classification

methods. International Journal of Pharmacy & Technology, 8(3), 18070-18097.

120.

Sree Dharinya S., Kirubathangam R., (2016). Analyzing a selection strategy for data De-duplication in large datasets.

International Journal of Pharmacy & Technology, 8(3), 16590-16595.

121.

Chandrasegar Thirumalai, (2016). Physicians drug encoding system using an efficient and secured linear public key

cryptosystem (ESLPKC). International Journal of Pharmacy & Technology, 8(3), 16296-16303.

122.

Prabhu J., (2016). A survey on slim process with developers in agile software. International Journal of

Pharmacy & Technology, 8(3), 15558-15565.

123.

Asha N., (2016). Customer segregation in banking organisation using knowledge management. International

Journal of Pharmacy & Technology, 8(3), 17645-17649.

124.

Vijay Anand R., Dinakaran M., (2016). Automation Framework to perform measure actions from NBI.

International Journal of Pharmacy & Technology, 8(3), 16261-16276.

125.

Chiranji Lal Chowdhary, (2016). A review of feature extraction application areas in medical imaging.

International Journal of Pharmacy & Technology, 8(3), 4501-4509.

126.

Navaneethan C., (2016). A Literature Review on energy saving along with precautions in wireless sensor network.

International Journal of Pharmacy & Technology, 8(3), 15408-15424.

127.

Sumangali K., (2016). Security in sensor networks and necessity for self destruction. International Journal

of Pharmacy & Technology, 8(3), 15566-15575.

128.

Rathi R., (2016). Hybridization of soft computing technique with Apriori for Association rule mining.

International Journal of Pharmacy & Technology, 8(3), 15820-15827.

129.

Kumaresan P., Prabukumar M., Yokesh Babu Sundaresan, (2016). An Adaptable web based light weight

framework for remote HVAC system using programmable thermostat. International Journal of

Pharmacy & Technology, 8(3), 16456-16466.

130.

Mohankumar P., Prasanna S., Gunasekaran G., (2016). Intelligence inference user satisfactory refinement

for E-Applications. International Journal of Pharmacy & Technology, 8(3), 15917-15931.

131.

Sudheer Karnam, Thippa Reddy G., Lakshmanna Kuruva, Rajesh Kaluri, Srinivas Koppu, (2016).

Dynamically improved weighted Apriori algorithm in Market analysis. International Journal

of Pharmacy & Technology, 8(3), 15658-15668.

132.

Siddharth Samal, Pradeep Reddy Ch., Bharath Bhushan S., (2016). Implementing a modified power

aware routing protocol using AODV protocol in MANET. International Journal of Pharmacy &

Technology, 8(3), 15600-15610.

133.

Vijayan R., (2016). An application for web navigation using speech engine for blind people.

International Journal of Pharmacy & Technology, 8(3), 15805-15819.

134.

Sudha M., (2016). Disease diagnosis using association rule mining based knowledge inference system.

International Journal of Pharmacy & Technology, 8(3), 16369-16379.

135.

Santhi K., Saravanan R., (2016). Facilitate refined keywords search over encrypted data on cloud.

International Journal of Pharmacy & Technology, 8(3), 15552-15557.

136.

Sudheer K., Thippa Reddy G., Lakshmanna K., (2016). An Android App to reduce battery power

consumption in smart phones. International Journal of Pharmacy & Technology, 8(3), 16164-16171.

137.

Vanitha M., (2016). Mutual Authentication using shared secret key generation. International Journal

of Pharmacy & Technology, 8(3), 16399-16411.

138.

Santhi K., Deepa M., Lawanya Shri M., Benjula Anbu Malar B., (2016). Efficient searching with multiple

keyword over encrypted cloud data by blind storage. International Journal of Pharmacy &

Technology, 8(3), 15704-15711.

139.

Prabhu J., Thanapal P., Vijay Anand R., (2016). Home Intruder Detection System. International

Journal of Pharmacy & Technology, 8(3), 15640-15650.

140.

Kumaresan P., Subha S., (2016). A Low cost multi-functional robot prototype for Intelligent services.

International Journal of Pharmacy & Technology, 8(3), 15370-15381.

141.

Suganya P., (2016). An approach for selection of replica nodes to support QOS requirement of

applications in VANET.

International Journal of Pharmacy & Technology, 8(3), 15789-15795.

142. 1

Nivash J P., Dhinesh Babu L D., (2016). An optimal IOT enabled data processing approach for effective

detection of remote air pollution. International Journal of Pharmacy & Technology, 8(3), 15496-15509.

143. 1.

Senthilkumaran U., Manikandan N., Senthilkumar M., (2016). Role of data mining on pharmaceutical

industry – a survey. International Journal of Pharmacy & Technology, 8(3), 16100-16106.

144. 1.

Kamalakannan J., Rajasekhara Babu, (2016). Segmentation techniques on Mammograms to detect breast abnormality:

A survey. International Journal of Pharmacy & Technology, 8(3), 16089-16099.

145. 1

Vanmathi C., Prabu S., (2016). Steganography: A Comparative study, analysis of key issues and current trends.

International Journal of Pharmacy & Technology, 8(3), 4696-4715.

146. 1.

Deepa Mani., Anand Mahendran, (2016). DDOS detection and mitigation for managed security of cloud resources.

International Journal of Pharmacy & Technology, 8(3), 15455-15470.

147. 1

Meenatchi S., Prabu S., (2016). A cluster based load balancing technique for increasing the wireless sensor network life time.

International Journal of Pharmacy & Technology, 8(3), 4716-4727.

148.

Pounambal M., Nithyadharshini P S., (2016). Distributed channel allocation in smart grid networks

using Particle Swarm Optimization.

International Journal of Pharmacy & Technology, 8(3), 18547-18558.

149.

Ranjith D., Balajee J., Kumar C., (2016). In premises of cloud computing and models.

International Journal of Pharmacy

& Technology, 8(3), 4685-4695.

150.

Reddy, G. T., & Khare, N. (2017). An Efficient System for Heart Disease Prediction Using Hybrid OFBAT

with Rule-Based Fuzzy Logic Model. Journal of Circuits, Systems and Computers, 26(04), 1750061.

151.

Paramasivan, S. K., & Lopez, D. (2016). Forecasting of wind speed using feature selection and neural networks.

International Journal of Renewable Energy Research (IJRER), 6(3), 833-837.

152.

Thakare, V. R., & Singh, K. J. (2016). A Study of Security and Privacy Issues at Service Models of Cloud Computing.

Indian Journal of Science and Technology, 9(38).

153.

Uma K., (2016). Ambient Air prominence information analysis collision/population. Journal of Chemical and

Pharmaceutical Sciences, 9(4), 2566-2569.

154.

Uma. K., (2016). Efficient finding of item sets in knowledge representation using RHUI extraction.

Journal of Chemical and Pharmaceutical Sciences, 9(4), 2599-2601.

155.

Chithapuram, C. U., Cherukuri, A. K., Jeppu, Y. (2016). Aerial vehicle guidance based on passive

machine learning technique.

International Journal of Intelligent Computing and Cybernetics, 9(3), 255-273.

156.

Praveen Kumar Reddy M., Rajasekhara Babu M., (2016). Improving performance of program

by finding good optimal

sequences using sequence selection approach. ARPN Journal of Engineering and Applied Sciences,

11(17), 10563-10570.

157.

Nithya, S., & Jayakumar, C. (2016). Automatic Firewall Rule Generator for Network Intrusion

Detection System based on

Multiple Minimum Support. Indian Journal of Science and Technology, 9(41).

158.

Krishnan, S. N., & Srinivasan, P. (2016). A QOS Parameter based Solution for Black hole

Denial of Service Attack in Wireless

Sensor Networks. Indian Journal of Science and Technology, 9(38).

159.

Rajesh Kaluri, Kuruva Lakshmanna, Thippa Reddy, Sudheer Karnam, Srinivas Koppu., (2016).

A Comparative study on selecting

and ranking the test cases in software testing. ARPN Journal of Engineering and

Applied Sciences, 11(1), 754-757.

160.

Kamalakannan, J., & Babu, R. M. (2016). Early detection of breast cancer using GLCM

feature extraction in Mammograms.

IIOAB JOURNAL, 7(5), 170-179.

161.

Ahamed, B., & Ramkumar, T. (2016). Data Integration-Challenges, Techniques and Future

Directions: A Comprehensive Study.

Indian Journal of Science and Technology, 9(44).

162.

Nagaraja, G., & Ch, P. R. (2016). A Reliable Group Key Management Framework Using

Fuzzy Logic for MANETs.

International Journal of Intelligent Engineering and Systems, 9(4), 107-115.

163.

Kaluri, R., & Reddy, P. (2016). Sign Gesture Recognition Using Modified Region Growing

Algorithm and Adaptive

Genetic Fuzzy Classifier. Int J Intell Eng Syst, 9, 225-233.

164.

Nagaraja, G., & Ch, P. R. (2016). Mitigate Lying and On-Off Attacks on Trust Based Group Key

Management Frameworks in MANETs.

International Journal of Intelligent Engineering and Systems, 9(4), 215-224.

165.

Parimala, M., & Lopez, D. Spatio-Temporal Modelling of Frequent Human Mobility Pattern to

Analyse the Dynamics of Epidemic Disease.

International Journal of Intelligent Engineering & Systems, 9(4), 167-178.

166.

Bhushan, S. B., & CH, P. R. A QoS Aware Cloud Service Composition Algorithm for Geo-Distributed Multi Cloud Domain.

International Journal of Intelligent Engineering & Systems, 9(4), 147-156.

167.

Lakshmanna, K., & Khare, N. (2016). FDSMO: frequent DNA sequence mining using FBSB and optimization.

International Journal of Intelligent Engineering & Systems, 9(4), 157-166.

168.

LawanyaShri, M., Balusamy, B., & Subha, S. (2016). Threshold-Based Workload Control for an Under-Utilized Virtual Machine

in Cloud Computing. International Journal of Intelligent Engineering & Systems, 9(4), 234-241.

169.

Anusha, K., & Sathiyamoorthy, E. (2016). A decision tree-based rule formation with combined PSO-GA algorithm for intrusion

detection system. International Journal of Internet Technology and Secured Transactions, 6(3), 186-202.

170.

Rajganesh, N., & Ramkumar, T. (2016). A Review on Broker Based Cloud Service Model. CIT. Journal of Computing and

Information Technology, 24(3), 283-292.

171.

Aarthy, S. L., & Prabu, S. (2016). A computerized approach on breast cancer detection and classification.

IIOAB JOURNAL, 7(5), 157-169.

172.

P J Kumar, Suganya P., (2016). Variable Replica allocation in VANET using node failure probability.

International Journal of Pharmacy & Technology, 8(4), 25990-25994.

173.

Sankar S., Srinivasan P., (2016). Internet of Things (IOT): A survey of empowering technologies, research opportunities and applications.

International Journal of Pharmacy & Technology, 8(4), 26117-26141.

174.

Srinivasan P., Nagamuthu Krishnan S.S., (2016). A recent survey on trust models for wireless sensor networks.

International Journal of Pharmacy & Technology, 8(4), 26163-26168.

175.

Vijaya C., Srinivasan P., (2016). A survey on resource scheduling in cloud computing.

International Journal of Pharmacy & Technology, 8(4), 26142-26162.

176.

Padmapriya, S., Kirubakaran, E., & Elango, N. M. (2016). Medical Image Classification using Hybrid classifier

by Extending the Attributes. Indian Journal of Science and Technology, 9(6).

177.

Uma, K., & Bangalore Morarji, A. R. Comparative Analysis of Current Engineering Education in Majority Countries.

Journal of Chemical and Pharmaceutical Sciences, 10(1), 293-296.

178.

Navaneethan C., Meenatchi S., Kumar P J., Suganya P., (2016). Comparison of RSA and MD5 algorithm.

International Journal of Pharmacy & Technology, 8(4), 26609-26615.

179.

Kumar P J., Suganya P., Navaneethan C., Meenatchi S., (2016). BigData social media analysis using R and Hadoop.

International Journal of Pharmacy & Technology, 8(4), 26616-16620.

180.

Divya Udayan J., HyungSeok Kim, (2016). Constrained Procedural Modeling of Real Buildings from single façade layout.

International Journal of Computer Vision and Signal Processing, 6(1), 33-46.

181.

Udayan, J. D. (2016). An Analysis of Reconstruction Algorithms Applied to 3D Building Modeling.

Indian Journal of Science and Technology, 9(33).

182.

Iyapparaja M., (2016). Coupling and Cohesion metrics based measurement of software reusable component strength.

International Journal of Pharmacy & Technology, 8(4), 21515-21526.

183.

Kumaran, U., & Khare, N. (2016). A Review on Privacy Preserving Data Mining using Secure Multiparty Computation.

Indian Journal of Science and Technology, 9(48).

184.

Ravi, C., & Khare, N. (2016). BGFS: Design and Development of Brain Genetic Fuzzy System for Data Classification.

Journal of Intelligent Systems.

185.

Ravi, C., & Khare, N. (2016). Review of Fuzzy Rule Based Classification systems. Research Journal of Pharmacy

and Technology, 9(8), 1299-1302.

186.

Deepa, N., & Ravi, C. (2016). Dimension Reduction Using Principal Component Analysis for Pharmaceutical

Domain. Research Journal of Pharmacy and Technology, 9(8), 1169-1173.

187.

Kaluri, R., & Reddy, C. P. (2016). A framework for sign gesture recognition using improved genetic algorithm and

adaptive filter. Cogent Engineering, 3(1), 1251730.

188.

Deepa, N., & Ganesan, K. (2016). A Brief Survey of Decision Making Methods and its Applications in Various

Domains. Research Journal of Pharmacy and Technology, 9(8), 1079-1082.

189.

Deepa, N., & Ganesan, K. (2016). Aqua Site Classification Using Neural Network Models. AGRIS on-line Papers

in Economics and Informatics, 8(4), 51.

190.

Deepika S., Ushadevi G., (2016). Performance analysis of topology based Ad-hoc wireless routing protocols using

Qualnet. International Journal of Pharmacy & Technology, 8(4), 25527-25533.

191.

Raman, I. (2016). Certain height-balanced subtrees of hypercubes. International Journal of Computer Mathematics:

Computer Systems Theory, 1(1), 32-41.

192.

Kuppusamy, L., Raman, I., & Krithivasan, K. (2016). On succinct description of certain context-free languages by

ins-del and matrix ins-del systems. International Journal of Foundations of Computer Science, 27(7), 775-786.

193.

Bhattacharya, S. (2016). A review of the application of automation technologies in healthcare domain. Research

Journal of Pharmacy and Technology, 9(12), 2343-2348.

194.

Singh, B., Bhattacharya, S., Chowdhary, C. L., & Jat, D. S. A review on internet of things and its applications in

healthcare. Journal of Chemical and Pharmaceutical Sciences. 10(1), 447-452.

195.

Srinivasa Gupta N., Valarmathi B., (2016). Opinion mining using intuitive scoring approach. International Journal

of Pharmacy & Technology, 8(4), 21527-21546.

196.

Sivashankari R., Valarmathi B., (2016). A Literature survey on entity extraction techniques in Bio-medical datasets.

International Journal of Pharmacy & Technology, 8(4), 5055-5066.

197.

Raghavan, R., & Singh, K. J. (2016). Necessity of different patterns of fingerprint and its applications: A study.

International Journal of Applied Engineering Research, 11(8), 5787-5790.

198.

Brindha, K., & Jeyanthi, N. (2016). DOVC: Data Obfuscation Visual Cryptography to Protect Cloud Storage.

International Journal of Soft Computing, 11(6), 374-381.

199.

Sundaresan, Y. B., & Kumaresan, P. (2016). A Comparative Analysis of Low Cost Solutions for Quiz Controller

and Classroom Access Control Systems. Research Journal of Pharmacy and Technology, 9(9), 1357-1362.

200.

Sundaresan, Y. B., Kumaresan, P., & Prabu, A. S. (2016). Anamolized Based Security for Private Information

Attacks on Social Network. International Journal of Applied Engineering Research, 11(13), 7914-7919.

201.

Ramya, G. (2016). Survey on various Classes of Picture Languages. International Journal of Applied Engineering

Research, 11(8), 5376-5381.

202.

Geraldine Bessie Amali D., Dinakaran M., (2016). Solution of the non linear least squares problem using a new gradient

based genetic algorithm, ARPN Journal of Engineering and Applied Sciences, 11(21), 12876-12882.

203.

Priya, R. S., Prabu, S., & Dharun, V. S. (2016). F-SIFT and FUZZY-RVM based efficient multi-temporal image

segmentation approach for remote sensing applications. Automatic Control and Computer Sciences, 50(3), 151-164.

204.

Senthilkumar M., Ilango P., (2016). Big data optimization for social networking tweet. International Journal

of Soft Computing, 11(5), 305-311.

205.

Rani, B. S. (2016). A Novice’s Perception of Partial Homomorphic Encryption Schemes. Indian Journal of

Science and Technology, 9(37).

206.

Pandiyan, S., & Perumal, V. (2016). A Survey on Various Problems and Techniques for Optimizing Energy

Efficiency in Cloud Architecture. Walailak Journal of Science and Technology (WJST), 14(10), 749-758.

207.

Sanjeevi, P., Balamurugan, G., & Viswanathan, P. (2016). The improved DROP security based on hard AI problem

in cloud. International Journal of Internet Protocol Technology, 9(4), 207-217.

208.

Sumathi, D., Velmurugan, T., Nandakumar, S., & Renugadevi, S. (2016). Dynamic Weight Assignment based

Vertical Handoff Algorithm for Load Optimization. Indian Journal of Science and Technology, 9(37).

209.

Ramaiah, M., & Ray, B. K. (2016). An iterative point elimination technique to retain significant vertices on

digital planar curves. International Journal of Computational Vision and Robotics, 6(4), 354-368.

210.

Shini, S. N. (2016). A survey on population based meta-heuristic techniques. International Journal of Chemical

and Pharmaceutical Analysis, 4(1), 7.

211.

Vanitha, M. (2016). Survey on Secured Password Authentication for IOT. Advances in Systems Science and

Applications, 16(3), 21-32.

212.

Thandeeswaran, R., & Durai, M. S. (2016). DPCA: Dual Phase Cloud Infrastructure Authentication.

International Journal of Communication Networks and Information Security, 8(3), 197.

213.

Pounambal, M. (2016). Survey on channel allocation techniques for Wireless Mesh Network to reduce

contention with Energy Requirement. Indian Journal of Science and Technology, 9(32).

214.

Gopal, D. G., & Saravanan, R. (2016). Selfish node detection based on evidence by trust authority and

selfish replica allocation in DANET. International Journal of Information and Communication Technology, 9(4), 473-491.

215.

Seetha, H., Murty, M. N., & Saravanan, R. (2016). Classification by majority voting in feature partitions.

International Journal of Information and Decision Sciences, 8(2), 109-124.

216.

Nirmala, M., Vidyavathi, M., Nivash, J. P., & Kumar, C. P.(2016). Scalable cloud computing based

healthcare application. International Journal of Pharmacy & Technology, 8(4), 25891-25901.

217.

Nirmala M., Pavan Kumar C S., Ansu Miriam Varghese, Neethu Santhosh. (2016). Text Encryption and

Decryption strategy using matrix operations. International Journal of Pharmacy & Technology, 8(4), 25910-25917.

218.

Thathera, H., Shashi, H., & Rajput, D. S. (2016). Green Computing: An Earth Friendly System,

International Journal of Pharmacy and Technology, 8(4):25540 – 25550.

219.

Gupta, S., AkashKataria, S. R., & Rajput, D. S. (2016). Information security issues in big data: solution

using ppdm (privacy preserving data mining), International Journal of Pharmacy & Technology, 8(4): 25551 – 25568.

220.

C. Ranichandra and B.K. Tripathy, 2016. A Study on Non Java Options for Mapreduce Programming with Hadoop.

Asian Journal of Information Technology, 15(16): 2999-3003.

221.

Nithya S., Asha Jerlin M., Jayakumar C. (2016). A Survey of software defined network. International

Journal of Pharmacy & Technology, 8(4), 25944-25958.

222.

Asha Jerlin, M., Nithya S., Coker Oswald, Jayakumar C., (2016). Layer two firewall in software defined network.

International Journal of Pharmacy & Technology, 8(4), 25365-25372.

223.

Asha Jerlin M., Jayakumar C., Prabhu J., (2016).EFE:Efficient feature extraction algorithm for dynamic

malware analysis in windows executables using API call sequence. International Journal of Pharmacy & Technology,

8(4), 25373-25383.

224.

Asha Jerlin M., Nithya S., Jayakumar C., Robin Rohit. (2016). A case study on advanced evasion techniques.

International Journal of Pharmacy & Technology, 8(4), 26599-26608.

225.

Alagiri I., (2016). Multipath life time prediction of node-to-node communication using multipoint relays

in OLSR protocol for mobile adhoc networks. International Journal of Pharmacy & Technology, 8(4), 26584-26598.

226.

Devendiran S., Manivannan K., Arun tom Mathew, Rajeswari C., (2016). Vibration signal based fault

diagnosis of gears using ensemble empirical mode decomposition and linguistic hedges neural fuzzy classifier with

selected features.

Journal of Chemical and Pharmaceutical Sciences, Special Issue 3, 47-57.

227.

Singh, B. (2016). Nurse’s attitude towards computerization in private hospitals of Tamil Nadu, India.

Research Journal of Pharmacy and Technology, 9(12), 2205-2210.

228.

Charanya, R., Aramudhan, M., & Saravananaguru, R. K. (2016). A Review on Access Control Issues in EHealth

Application in Cloud Computing. Indian Journal of Science and Technology, 9(42).

229.

Dharmendra Singh Rajput, Ramjeevan Singh Thakur, Ghanshyam Singh Thakur, (2016). A Computational model for

knowledge extraction in uncertain textual data using karnaugh map technique.

International Journal of Computing Science and Mathematics, 7(2).

230.

Ikram, S. T., & Cherukuri, A. K. (2016). Improving accuracy of intrusion detection model using PCA and optimized

SVM.

Journal of computing and information technology, 24(2), 133-148.

231.

Thaseen, S., & Kumar, C. A. (2016). Intrusion Detection Model using PCA and Ensemble of Classifiers.

Advances in Systems Science and Applications, 16(2), 15-38.

232.

Ramalingam, S. P., & Mouli, P. C. (2016). Two-level dimensionality reduced local directional pattern for

face recognition. International Journal of Biometrics, 8(1), 52-64.

233.

Priya V., Subha S., Balamurugan B., (2016). Quality-of-service in cloud computing: A Survey.

International Journal of Pharmacy & Technology, 8(4), 25742-25753.

234.

Singh, P. K., & Kumar, C. A. (2016). Analysis of composed fuzzy contexts through projection.

International Journal of Data Analysis Techniques and Strategies, 8(3), 206-219.

235.

Dinakaran M., Belgacem F.B.M. (2016). An experimental study to prevent packet hiding over wireless

networks using AONTS and swarm intelligent algorithm. International Journal of Pharmacy & Technology, 8(4),

25596-25605.

236.

Geraldine Bessie Amali D., Dinakaran M., (2016). A review of heuristic global optimization based

artificial neural network training approaches. International Journal of Pharmacy & Technology, 8(4), 21670-21679.

237.

Jayanthi, M. Prabadevi B., (2016). Multi-keyword ranked search over encrypted data supporting

synonym query. The IIOAB Journal, 7(1), 1.

238.

Susmita Subhadarshini Panda, Saravanan R., (2016). A secure approach to Spatial Image Steganography.

International Journal of Pharmacy & Technology, 8(2), 13384-13400.

239.

Harish H S., Vijayan R., (2016). A Secured and Reliable routing in opportunistic network in MANET

using Trust management scheme based on behaviour feedback. International Journal of Pharmacy &

Technology, 8(2), 12514-12522.

240.

Nagendramani P., Vijayan R., (2016). An analysis on the performance of various replica allocation

algorithms in cloud using Matlab. International Journal of Pharmacy & Technology, 8(2), 3892-3902.

241.

Hemavathi E., Srinivasa Perumal R., (2016). An approach for automatic vehicle plate recognition in

unconstrained environment. International Journal of Pharmacy & Technology, 8(2), 4013-4025.

242.

Ajay Mummadisetti, Rajeshwar Reddy Kadari, Rajeev Sushmanth Dammu, Durai Raj Vincent P M., (2016).

An effective approach of RSA & impact of wieners attack: Survey. International Journal of Pharmacy &

Technology, 8(2), 13093-13099

243.

Gopika D., Kumar P J., (2016). An innovative approach for user validation system using keylog and Sudoku

algorithm.

International Journal of Pharmacy & Technology, 8(2), 11732-11739.

244.

Ashutosh Sharma, Vijayan R., (2016). Correlative study of Video compression techniques – H.264/AVC.

International Journal of Pharmacy & Technology, 8(2), 12638-12646.

245.

Kaushik Roy, Brindha K., Sudha Senthil Kumar, (2016). Optimizing the executing time of compiler optimization

using code segmentation technique. International Journal of Pharmacy & Technology, 8(2), 12537-12551.

246.

Pavithra S., Lawanya Shri M., (2016). Privacy Preserving the Electronic Health Record using Encryption Protocol

in Cloud Computing. International Journal of Pharmacy & Technology, 8(2), 13261-13268.

247.

Sathiyamoorthy E., Jagadeesh G., Vaibhav Mahajan, (2016). Home Automation system over mobile network.

International Journal of Pharmacy & Technology, 8(3), 16352-16362.

248.

E. Vijayan, N.C. SenthilKumar, Siddhant Agnihotry, Mehaboob Subuhani, (2016). Effective Clustering in

Big Data for efficient knowledge discovery using parallel K-means and enhanced K-means algorithm.

International Journal of Pharmacy & Technology, 8(3), 18646-18652.

249.

Salman Ahmed G., (2016). A Framework for classification of medical data using Bijective soft set.

International Journal of Pharmacy & Technology, 8(3), 16559-16568.

250.

Vijayan E., Senthil Kumar N C., Navneet Shukla, Rudra Prasad Dwivedi, (2016). Architecture of parallel

database to make future database processing high. International Journal of Pharmacy & Technology, 8(3),

18640-18645.

251.

Navaneethan C., Ramkesh, (2016). Advanced Rail Fence Cipher Algorithm. International Journal

of Pharmacy & Technology, 8(3), 16539-16545.

252.

Akshay Gaikwad, Pradeep Reddy Ch., Bharath Bhushan S., (2016). A Keyed Hash message authentication

code technique for secure communication in VANETs. International Journal of Pharmacy & Technology, 8(3),

15620-15632.

253.

Vijayan E., SenthilKumar K., Shalini A.M., Suganya N., (2016). Image Segmentation and classification.

International Journal of Pharmacy & Technology, 8(3), 18325-18334.

254.

Thandeeswaran R., Ankita Vinod Mandekar, Jeyanthi N., (2016). Securing service set identifier of wireless

network. International Journal of Pharmaccy & Technology, 8(3), 16605-16610.

255.

Jidhesh R, Indusree J R, Sumathy S., (2016). Survey on congestion aware and adaptive routing protocols

in mobile ad hoc networks. International Journal of Pharmacy & Technology, 8(3), 16521-16538.

256.

Yuvan Shankar R K., Ramaprabha K P., Jayanthi R., (2016). Discovery against node isolation attack on

MANET and its node removal. International Journal of Pharmacy & Technology, 8(3), 16391-16398.

257.

Priya V., Sindhupaarkavi V., (2016). Convolution based Image Enhancement in unique finger impression.

International Journal of Pharmacy & Technology, 8(3), 15611-15619.

258.

Rajan Slathia, Jeyanthi N., (2016). Internet of Things in mobile health care (IOT-m Health). International

Journal of Pharmacy & Technology, 8(3), 15901-15916.

259.

Vijayan E., S., Hemalatha., S., Shweta Shaw, Alokananda Ghoshal, (2016). A new approach for collision free,

energy efficient, hybrid routing algorithm with the use of progressive adaptive concept.

International Journal of Pharmacy & Technology, 8(3), 18604-18610.

260.

Shakthi D.S., Prabadevi B., (2016). An approach to detect selfish and malicious node in Adhoc – MANETs.

International Journal of Pharmacy & Technology, 8(3), 16107-16117.

261.

Vijayan E., Senthilkumar K., Prernakumari, Sourabh Tolani, Prasenjeet Bhadra, (2016).

Convergence from SQL, NoSQL to NewSQL. International Journal of Pharmacy & Technology, 8(3), 18351-18355.

262.

Akshay Narayan Hegde, Vinay Kumar E., Vijayan R., (2016). Self-Routing: A Novel approach for

context based trust evaluation and malicious node detection in MANET. International Journal of Pharmacy &

Technology, 8(3), 15589-15599.

263.

Vijayan E., Senthil kumar K., Aishwarya Singh, Yasmeen Khatoon, (2016). Approach on big data using Hybrid cloud.

International Journal of Pharmacy & Technology, 8(3), 18344-18350.

264.

Shynu P.G., Lakshmipriya S., Pavithra J., (2016). A Novel Decentralised scheme for identity preserved access

control in cloud.

International Journal of Pharmacy & Technology, 8(3), 18141-18148.

265.

Sathya Sankaran, Sneha Ambhore, P.M. Durai Raj Vincent, (2016). Modified advanced encryption standard

with additional row transformation.

International Journal of Pharmacy & Technology, 8(3), 16436-16440.

266.

Koteswara Rao E., Vijayan R., (2016). Context based access optimizing system for Android mobile devices.

International Journal of Pharmacy & Technology, 8(3), 19071-19079.

267.

Manivannan S.S., Dhanashree P., Chandrasekaran C., (2016). Transport Plane [TP] simulator in

E-Utran LTE for Control Plane (CP).

International Journal of Pharmacy & Technology, 8(3), 16242-16253.

268.

Himanshu Dewangan, Angulakshmi M., Nagarajan I., (2016). Multiprocessing optimization –

parallel quick sort using OpenMp.

International Journal of Pharmacy & Technology, 8(3), 15633-15639.

269.

Harsha Sarah Thomas, Nancy Victor, (2016). An approach for Incremental frequent pattern mining

using modified Apriori Algorithm.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(6), 1049-1055.

270.

Uma, K., Radhakrishnan, P., & Vinoth, R. (2016). Compression of Compound Images using Fuzzy

Clustering Technique.

Indian Journal of Science and Technology, 9(S1).

271.

Uma, K., Vignesh, B., & Reynold, L. R. (2016). Encoding of Multifaceted Images using Pattern Matching Techniques.

Indian Journal of Science and Technology, 9(S1).

272.

Uma, K., Akram, K. W., & Vignesh, R. (2016). A Novel Method for Segmentation of Compound Images

using the Improved Fuzzy Clustering Technique.

Indian Journal of Science and Technology, 9(S1).

273.

Uma, K., Geetha, P., & Kannan, A. (2016). A novel segmentation of scanned compound images using fuzzy logic.

Journal of Medical Imaging and Health Informatics, 6(3), 763-768.

274.

Uma, K., & Kavitha, E. (2016). Comparison of Various Fingerprint Analysis Techniques.

Indian Journal of Science and Technology, 9(S1).

275.

Uma, K., & Reddy, G. R. (2016). Predicting Analysis of Data Mining Extraction Technique in

Secondary Education.

Indian Journal of Science and Technology, 9(S1).

276.

Uma, K., Pallavi, A. R., & Srilatha, S. (2016). Comparision of Blur Detection and Segmentation Techniques.

Indian Journal of Science and Technology, 9(S1).

277.

Aniket Sen, Prasun Jaiswal, Vikram, Prabadevi B. (2016). Improved K-Means clustering algorithm –

working with labelled datasets.

International Journal of Pharmacy & Technology, 8(4), 27091-27096.

278.

Mohamed Fahad M., Simama Hassan Mottur, Prasanna M., Mohammed Fazeel K., (2016). Prediction of

Life cycle models for software.

International Journal of Pharmacy & Technology, 8(4), 25763-25778.

279.

Girish Paul, Abhishek Chandan, Prasanna M., Abhishek Yadav, (2016). Voice based mail system for blind.

International Journal of Pharmacy & Technology, 8(4), 25754-25762.

280.

Shivam Kapil, Ashwini Kumar, Rishav Bansal, Nancy Victor, (2016). Social Network Forensics.

International Journal of Pharmacy & Technology, 8(4), 25843-25849.

281.

Ashish Gupta, Nancy Victor. (2016). Machine unlearning – An approach to make machine learning algorithms

forget data and authenticates ML level security. International Journal of Pharmacy & Technology, 8(4), 25807-25818.

282.

Ashish Gupta, Nancy Victor (2016). Real Time analysis of mobile GPS data. International Journal of Pharmacy &

Technology, 8(4), 25827-25834.

283.

Lokesh Sharma, Nancy Victor (2016). A Technique for classifying massive dataset using parallel ID3 approach.

International Journal of Pharmacy & Technology, 8(4), 25819-25826.

284.

Beryl Joylin A., Aswathi T., Nancy Victor, (2016). Sentiment analysis based on word-emoticon clusters.

International Journal of Pharmacy & Technology, 8(4), 25288-25296.

285.

Beryl Joylin A., Aswathi T., Suma P., Nancy Victor, (2016). Sentiment analysis on “Ebola” outbreak using twitter data.

International Journal of Pharmacy & Technology, 8(4), 25835-25842.

286.

Kumaran, U., Khare, N., & Suraj, A. S. (2016). Privacy preserving in data mining technical: A review. Research

Journal of Pharmacy and Technology, 9(11), 2023-2026.

287.

Sharathbabu B., Ayesha Banu S., Naveen Kumar S., Deepika S., (2016). Denoising ultrasound scan image from

speckle noise. International Journal of Pharmacy & Technology, 8(4), 26306-26311.

288.

Thanikaiselvan, V., Shastri, S., Ahmad, S., & Subashanthini, S. (2016). A New Pixel Value Based Steganography

Method for Data Security. Indian Journal of Science and Technology, 9(37).

289.

Kanugo, S., & Mekala, A. M. (2016). Particle Swarm Optimization based Edge Detection Algorithms for Computer

Tomography Images. Indian Journal of Science and Technology, 9(37).

290.

Shah, R., Subramaniam, S., Dasarathan, L., & Babu, D. (2016). Mitigating Malicious Attacks Using Trust Based

Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks. CIT. Journal of Computing and Information

Technology, 24(3), 237-252.

291.

Shubham D., Mithil P., Sumathy S., (2016). Fair resource allocation schemes for resource constrained cloud

computing environment. International Journal of Pharmacy & Technology, 8(4), 26260-26268.

292.

Shashank Joseph, Calvin Mugauri, Chunduru Anilkumar, Sumathy S., (2016). Access Control using attribute based

encryption in cloud computing: A survey. International Journal of Pharmacy & Technology, 8(4), 26282-26291.

293.

Meesala Shobha Rani, Sumathy S., (2016). Analysis of KNN, C5.0 and one class SVM for intrusion detection

system. International Journal of Pharmacy & Technology, 8(4), 26251-26259.

294.

Lawanya Shri M., Benjula Anbu Malar M B., Santhi K., Deepa M., Feslin Anish Mon., (2016). Threshold-based

virtual machine allocation in cloud environment. International Journal of Pharmacy & Technology, 8(4), 21547-21559.

295.

Nirmala M., Anshumati Gaikwad, Nittin Choudhary, Swati Bathla, (2016). A study on improving the

cloud security by virtualization. International Journal of Pharmacy & Technology, 8(4), 25885-25890.

296.

Nirmala M., Sharon Moses, Ankisetty Ramya, Ghanta Krishna Chaitanya., (2016). Managing and

Mitigating risks in Pharmaceutical supply chain management systems. International Journal of Pharmacy &

Technology, 8(4), 25864-25875.

297.

Nirmala M., Preethi E., Spoorti S Doddamani, Sharon Moses J, Chitturi Satya Pavan Kumar, (2016).

An approach to ensuring security in cloud-based social networks. International Journal of Pharmacy &

Technology, 8(4), 25918-25926.

298.

Tanu Maheshwari, Nirmala M., Dhinesh Babu L.D., Sharon Moses J., (2016). Extension of Rough set

K-Means using parallel mapreduce algorithm. International Journal of Pharmacy & Technology, 8(4), 25876-25884.

299.

Malge, A., Muthamil Selvan, T. (2016). A hybrid cloud approach for secure authorized deduplication.

International Journal of Pharmacy and Technology, 8(4), 25262-25272

300.

Hemanth, R.B., Vijayan, R. (2016). An enhanced ford-fulkerson algorithm to determine max-flow in large

mesh network using hadoop, International Journal of Pharmacy and Technology, 8(4), 25210-25220

301.

Das, S.K., Patil, M.D., Sumathy, S. (2016). Review On Neural Network Based Approaches For Intrusion

Detection System. International Journal of Pharmacy and Technology, 8(4), 26269-26281

302.

Ananya, Dutta, A., Sandhu, P.S., Thandeeswaran, R. (2016). A graph based message encryption algorithm.

International Journal of Pharmacy and Technology, 8(4), 26339-26345

303.

Benjula anbu Malar, M.B., Lawanya Shri, M., Deepa, M., Santhi, K., Mon, F.A. , (2016)Efficient system for

finding solution to recover bugs in software projects, International Journal of Pharmacy and Technology, 8(4), 21571-21579

304.

Khandelwal, R., Ellappan, V., Ajay, Hamsadhvani, A. (2016). Comparative study of algorithms to solve travelling

salesman problem. International Journal of Pharmacy and Technology,8(4), 25624-25631

305.

Kumar, P.J., Ellappan, V., Badala, P. (2016). Image duplication detection. International Journal of Pharmacy

and Technology, 8(4), 25632-25639

306.

Ellappan, V., Upadhayay, D., Yadav, R., Vandana (2016). Hand gesture recognition for physically disabled people.

International Journal of Pharmacy and Technology, 8(4), 25640-25647

307.

Dubey, A.K., Ellappan, V., Paul, R., Chopra, V. (2016). Comparative analysis of backtracking and genetic

algorithm in n queen’s problem. International Journal of Pharmacy and Technology, 8(4), pp. 25618-25623

308.

Aswini S., Kavya R S., Senthil kumaran U., (2016). Application of Internet of things and cloud computing for

health care – A survey. International Journal of Pharmacy & Technology, 8(4), 22009-22017.

309.

Aarthi B., Saranya R., Vaishnavi M., Senthil kumaran U., (2016). Agriculture facilitation using cloud computing

– survey. International Journal of Pharmacy & Technology, 8(4), 22028-22035.

310.

KV. Krishna, KV. Ganesh, Ashwini S., Senthil Kumaran U., (2016). A Survey on security methods in public id system.

International Journal of Pharmacy & Technology, 8(4), 21915-21922

311.

Suhasini K., Yamuna M., Senthil kumaran U., (2016). A review on various event management techniques.

International Journal of Pharmacy & Technology, 8(4), 5142-5149.

312.

Shreyas Kadu, Saryu Chugh, Nidhiben Bhatt, Nadesh R.K. (2016). Superintending of cloudlets in versatile

Ad-hoc ambience utilizing Qualnet – A review on performance analysis of routing mechanisms. International Journal

of Pharma and Bio sciences; Special issue SP02 “Healthcare Technology and management” 260-264.

313.

Keerthana A., Abirami B., Selva Kumar P., Rajaprabha M N., (2016). Dry eye monitors in computers & Mobiles –

Via Webcams & Front CAMs. International Journal of Pharmacy & Technology, 8(4), 26006-26012.

314.

Aman Shrivastav, Bharat Nalwaya, Sudish Kumar, Rajaprabha M N., (2016), Improvement on initial seed

selection for K-means algorithm.

International Journal of Pharmacy & Technology, 8(4), 26000-26005.

315.

Sunil Sigar, Senthil Kumar N., (2016). Effective processing of question generation from text. International

Journal of Pharmacy & Technology, 8(4), 25974-25980.

316.

Akshit Bhandari, Lavish Chhatwani, Shivali Chauhan, Senthil Kumar N., (2016).

An effective load balancing approach for handling big data.

International Journal of Pharmacy & Technology, 8(4), 25967-25973.

317.

Ayushi Jain, Saumya Bajpai, Shivali Jain, Uma Maheswari G., Jasmine Norman. (2016).

Providing and detecting steganographic content communication security.

International Journal of Pharmacy & Technology, 8(4), 26370-26375.

318.

Saurav K. Shaw, Mudit Jain, Jitesh Shaw, Durai Raj Vincent P M.,(2016).

A proposed design for secure hash algorithm-2 (SHA-2) using 640 bits.

International Journal of Pharmacy & Technology, 8(4), 26515-26523.

319.

Sudhir G., Lokesh S., Sathish Kumar K., Malathy E. (2016). Sharing file over cloud with privacy key generation.

International Journal of Pharmacy & Technology, 8(4), 25691-25698.

320.

Arjun Biyani, Ramya G., (2016). Recommendation engine for web products.

International Journal of Pharmacy & Technology, 8(4), 26019-26025.

321.

Prerna Kumari, Prasenjeet Bhadra, Ramya G., (2016). Study on performance issues in mobile application.

International Journal of Pharmacy & Technology, 8(4), 26292-26305.

322.

Shashi H., Honey Thathera, Ramya G., (2016). The Safeguarding concerns for mobile applications.

International Journal of Pharmacy & Technology, 8(4), 26032-26038.

323.

Himanshu Ewangan, Ramya G., (2016). Cross-platform mobile application development using Apache Cordova.

International Journal of Pharmacy & Technology, 8(4), 26026-26031.

324.

Nitish Chawla, Ramya G., (2016). Lookout Android Application. International Journal of

Pharmacy & Technology, 8(4), 26013-26018.

325.

Aditya Shivhare,Saurabh Kumar Pradhan, Manivannan S.S,(2016). Survey on Issues and Challenges in

biometric based authentication, International Journal of Pharmacy and Technology,4(8),26188-26192.

326.

E.Ragavan., C.Hariharan,N.Aravindraj, S.S.Manivannan., (2016). Real Time Water Quality Monitoring System,

International Journal of Pharmacy and Technology, 8(4), 26199-26205

327.

Ashwani Gupta, Nitin Katiyar, Brijendra Singh, Sweta Bhattacharya, (2016). Comparitive study on big data

architectures proposed for smart cities context, International Journal of Pharmacy and Technology,8(4), 25440-25451

328.

Yoginder Singh, Sweta Bhattacharya, Brijendra Singh, (2016). IoT: Framework for Smart City.

International Journal of Pharmacy and Technology, 8(4), 25432-25439.

329.

Pinaki Bhattacharjee, Sweta Bhattacharya, Govern Scholar Assessment Apparatus Employing Perusal Of Statistics,

International Journal of Pharmacy and Technology,8(4), 26312-26322

330.

Raju Kumar, Vijayan Ellappan, Kumar P.J, (2016), A Survey On Face Detection And Recognition Techniques

In Different Application Domain, International Journal of Pharmacy & Technology, 8(4), 25606 – 25610.

331.

Payal Nemade, Aarti Sharma, Eklendra Jadam, C.L.Chowdhary (2016), Survey On Grid Clustering Approach

With Intuitionistic Fuzzy Histogram, International Journal of Pharmacy & Technology, 8(4), 25475 – 25482.

332.

S. Kausal, V.K. Shukla, Eklendra Jadam, C.L.Chowdhary (2016), Learning Work On Online Educational Data

With Bi-Directional Mapping, International Journal of Pharmacy & Technology, 8(4), 25511 – 25520.

333.

Payal Nemade, Aarti Sharma, C.L.Chowdhary (2016), Study On Level Set Segmentation Based Classification

Using Mammograms, International Journal of Pharmacy & Technology, 8(4), 25483 – 25490.

334.

Gitanjali, J.,Abdul Khanadar, Bhanupriya Sharma, Shambhavi Srivastava (2016). Data mining from smart card

data using data clustering. International Journal of Applied Engineering Research, 11(1), 347-352.

335.

Hemalatha S., Giridharan L., (2016). A Steganographic Technique based region level sparse representation for

high density data hiding, International Journal of Pharmacy & Technology, 8(2), 12940-12949.

336.

Ajay, V. K., Desai, R., Gawannavar, M., & Nadesh, R. K. (2006). HGD: a rescue system for an alive human

gesture detection in disasters management-an experimental study. ARPN Journal of Engineering and

Applied Sciences, 11(11), 6826-6831.

337.

Hemalatha S., Santhosh Kumar S., (2016). Image Forgery Detection using Key-point Extraction and Segmentation.

International Journal of Pharmacy & Technology, 8(2), 13219-13229.

338.

Hemalatha S., Prasanna G., (2016). Robust Remote Authentication of Video Object through Steganographic mechanism.

International Journal of Pharmacy & Technology, 8(2), 12691-12700.

339.

Thanapal P, Muhammad Faizan M, (2016). Parental control for android smart phones. International Journal of

Pharmacy & Technology, 8(3), 16581-16589.

340.

Bharat Khatavkar, Nadesh R.K., (2016). A Comparative study and performance evaluations for using reactive

and hybrid routing approaches in intra and inter communication in VANET. International Journal of

Pharmacy & Technology, 8(3), 17776-17783.

341.

Priya V., Divya Vandana S., (2016). Chennai Rains Sentiment – An analysis of opinion about youngsters reflected

in tweets using Hadoop. International Journal of Pharmacy & Technology, 8(3), 16172-16180.

342.

Nadesh R.K., Akshaya Narayan Hegde, Vinay Kumar E., (2016). PANAS: A Personal Area Network for an

effective monitoring of an event in a pharmacy institute – An Empirical Study. International Journal of Pharmacy &

Technology, 8(3), 15932-15938.

343.

Priya V., Anupama Bhimnath, Sanjay M., (2016). Movement and motion modelling visitors of shopping mall.

International Journal of Pharmacy & Technology, 8(3), 16230-16241.

344.

Vijayan E., Senthilkumar N.C., Nirmal Kumar J., Mandakini Rastogi, Himika I., (2016). Cipher and Decipher of Image.

International Journal of Pharmacy & Technology, 8(3), 18653-18663.

345.

Vijayan E., Senthil kumar K., Aishwarya Singh, Yasmeen Khatoon, (2016). Approach on big data using Hybrid cloud.

International Journal of Pharmacy & Technology, 8(3), 18344-18350.

346.

Shynu P.G., Lakshmipriya S., Pavithra J., (2016). A Novel Decentralised scheme for identity preserved access control

in cloud. International Journal of Pharmacy & Technology, 8(3), 18141-18148.

347.

Baby C., Thippa Reddy G., (2016). Heart Disease prediction using Rule based Fuzzy Logic. International Journal of

Pharmacy & Technology, 8(3), 15471-15479.

348.

Nadesh, R. K., Arivuselvan, K., & Pathanjali, S. (2016). A Quantitative Review on Introducing the Election Process

with Cloud Based Electronic Voting and Measuring the Performance using Map Reduce. Indian Journal of Science

and Technology, 9(39).

349.

Bhavani S., Malathy E., Dorothy S., (2016). Prevailing parameters by Lease using Ant Colony Optimization.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(6), 1211-1219.

350.

Hardik Pandey, P J Kumar, Suganya P., (2016). Performance analysis of RBG Encryption algorithm.

International Journal of Pharmacy & Technology, 8(4), 25995-25999.

351.

Sundaresan, Y. B., Jaiswal, A. K., & Kumaresan, P. (2016). A Low Cost Prototype for Multiple Access Security System.

International Journal of Applied Engineering Research, 11(13), 7907-7913.

352.

Girish V K, Madhan R, Jagadeesh Gopal (2016). Sensor Detection Of Trains For National Train Enquiry System,

International Journal of Pharmacy & Technology, 8(4), 22182 – 22185.

353.

Suryapal singh, Ashish Singh and Arjun Lamba (2016) , GLCM and Gabor Wavelet Feature Extraction based Brain

Tumour Detection Using Medical Images, International Journal of Pharmacy and Technology, 8(4), 25505-25510.

354.

Ellappa, V., Kamalakannan, J., Babel, H., Dhamarikar, A. (2016). Access control mechanism in cloud. International

Journal of Pharmacy and Technology, 8(4), 25611-25617

355.

Vanmathi, C., Prabu, S. (2016). Steganography: A comparative study,analysis of key issues and current trends.

International Journal of Pharmacy and Technology,8(3), 4696-4715

356.

Vani M.P (2016).Incorporation Of Internet of Things with Cloud Auditing, International Journal of Pharmacy &

Technology, 8(4), 25779-25786

357.

Senthilkumaran U., Balamurugan B., Eswaran G., Mageswari U., (2016). Sentiment analysis of twitter data using

intelligent related word identification. International Journal of Pharmacy & Technology, 8(4), 26393-26401.

358.

Shreelekhya G., Yazhini, Senthilkumaran U., Manikandan N., (2016). Methods for evaluating software

architecture-A Survey. International Journal of Pharmacy & Technology, 8(4), 25720-25733.

359.

Sivaranjini V., Senthilkumaran U., Manikandan N., (2016). Optimizing the location deployment for

emergency meeting scheduling in disaster relief management. International Journal of Pharmacy & Technology, 8(4), 25714-25719.

360.

Deni Avinash A.B., SenthilKumaran U., Manikandan N., (2016). Automated summarization of academic

papers and generation of presentation slides. International Journal of Pharmacy & Technology, 8(4), 25710-25713.

361.

Manikandan N., Senthilkumaran U., Kumar P.J., (2016). Effective use of multiple cores for face recognition

in personal computers. International Journal of Pharmacy & Technology, 8(4), 25734-25741.

362.

Senthilkumar M., Manikandan N., Senthilkumaran U., Samy R., (2016). Weather data analysis using hadoop.

International Journal of Pharmacy & Technology, 8(4), 21827-21834.

363.

Thirumalai C.S., Senthil Kumar M., (2016). Secured e-mail system using base 128 encoding scheme.

International Journal of Pharmacy & Technology, 8(4), 21797-21806.

364.

Thirumalai C.S., Senthil Kumar M., (2016). Spanning tree approach for error detection and correction.

International Journal of Pharmacy & Technology, 8(4), 5009-5020.

365.

Chandrasegar T., Senthilkumar M., Silambarasan R., Westphall, C.B., (2016). Analyzing the strength of Pell’s RSA.

International Journal of Pharmacy & Technology, 8(4), 21869-21874.

366

Uma, K., Ashwini, S., & Kiruthika, S. (2016).Survey on Machine learning algorithms, International Journal

of Computer Science & Wireless Security (IJCSWS), 3(5):225-228.

367

Mishra, Sangeet, Asis Kumar Tripathy, and Pallavi Joshi. (2016).Making a Cloud Data Secure and Effective

for Better Performance of Services. Indonesian Journal of Electrical Engineering and Computer Science. 2(3): 695- 702

368

S. Sinduja, Dharmendra Singh Rajput, (2016). Analysis Of Imbalance Dataset Using Classification Techniques,

International Journal of Advanced Research Trends in Engineering and Technology, 4(19):517 – 522.

369

Rajput, D. S., & Gour, R. (2016). An IoT Framework for healthcare monitoring systems. International Journal

of Computer Science and Information Security, 14(5):451-455.

370

Sruthi, M., & Kavitha, B. R. (2016). A Survey on IoT Platform. International Journal of Scientific Research and

Modern Education.1(1): 468 – 473

371

Chowdhary, C. L., Sai, G. V. K., & Acharjya, D. P. (2016). Decreasing False Assumption for Improved Breast

Cancer Detection. Journal of Science And Arts, 2(35):157-176.

372

K.Santhi., M.Deepa.,M.Lawanya Shri.,M. B. BenjulaAnbu Malar,(2016). A Novel Method for Key

Aggregation On data Sharing in Cloud Storage Environment, International journal of Advanced Research

in Science and Engineering, 5(special issue no:1):142-148.

373

Santra, A. K. (2016). Stochastic Multifacility Location Problem under Triangular Area Constraint with

Euclidean Norm. International Journal on Recent and Innovation Trends in Computing and Communication

(IJRITCC), 4(3):111-116.

374

Mohan Vamsi M., Shantharajah S.P. (2016). Adaptive Neural Fuzzy Interface System for Cloud Computing,

International Journal of Advanced Research in Computer Science and Software Engineering, 6(10):92-96.

375

Sara Archana R, Prabadevi B, (2016).Social Network for Allocating and Sharing Cloud Resources using Trust Relationship.

International Journal of Computer Systems, 3(5): 394 – 396.

376

Deepika A, Prabadevi. (2016). A Decentralized Framework for Cloud Resources Provisioning with Malware

Detection, International journal of Computer Systems, 3(5):388-390.

377

Ananthy E, Prabadevi B, (2016).Gain Factor Trust – A Trust Evaluation Framework in Online Social Networks,

International Journal of Computer Systems, 3(5):391-393.

378

Rajput, D. S., & Khare, N. (2016). Fuzzy soft set decision-making model for social networking sites.

International Journal of Social Network Mining, 2(3): 256-266.

379

Kaavya, S., & Priya, G. L. (2016). Static Shot based Keyframe Extraction for Multimedia Event Detection.

International Journal of Computer Vision and Image Processing (IJCVIP), 6(1): 28-40.

380

Prasanna, M., & Iyapparaja, M. (2016). Optimistic Investigation on Open Source Testing Tools for Testing Applications.

International Research Journal of Engineering and Technology (IRJET), 3(12):633 – 635.

381

Prasanna, M., Iyapparaja, M., Dhenesh V Subramanian, (2016). Certain Investigations on Testing Tools for Regressing

Testing, International Research Journal of Engineering and Technology (IRJET), 3(12):630 – 632.

382

Rama Prabha K.P, Jayanthi R. (2016). Performance Issues of TCP in Wireless Networks and Performance

Enhancement Using TCP Vegas, Global Journal of Engineering Science and Researches, 3(7):72-80.

383

Jagadeesh,G., Ramaprabha,K., MohanVamsi P.M. (2016). Enhancing Software Quality in Web Applications using

Fault Tree Algorithm (FTA). International Journal of Advanced Research in Computer Science and Software

Engineering.6(4):448 – 452

384

Victor, N., Lopez, D., & Abawajy, J. H. (2016). Privacy models for big data: a survey. International Journal of

Big Data Intelligence, 3(1), 61-75.

385

Neelu Khare, Kumaran U,Mohan Vamsi M, (2016). Knowledge Acquisition and Privacy Preserving in Cloud using

Simultaneous Diagonalization Algorithm, International Journal of Advanced Research in Computer

Science and Software Engineering.6(9): 137 – 140.

386

Kaluri, R., & Li, G. (2016). A review on how to do the research in an effective way. International Journal of

Engineering Science Invention Research & Development.2 (9): 633 – 635.

387

Asha Jerlin. M, Jayakumar Sadhasivam, Nithya. S, (2016). Intelligent Interior Mapping using Wall Following

Behaviour, International Journal of Trend in Research and Development.3(6):112-114.

388

Swarna Priya, RM., Aarthy S. L.,Sujatha , R., Srinivas Koppu, Madhusudhana Rao, (2016). Reconstruction of

3D Realistic Models from Multiple Images – A Survey, International Journal of Advanced Research in Electrical,

Electronics and Instrumentation Engineering,5(12):8886 – 8891

389

Asha Joseph, John Singh K (2016). A Survey on Latest Trends and Challenges in Cyber Forensics,

International Journal of Advances in Electronics and Computer Science, Special Issue, 75-78.

390

Kunal Gagneja, K., John Singh, (2016). Quantum Encryption using Lattice on Streaming Video in VLSI.

International Journal of Advances in Electronics and Computer Science, Special Issue, 118-121.

391

M.Prabukumar.L., Agilandeeswari., Srinivas Koppu., Madhusudhana Rao., Geethanajali, S. (2016).

Vehicle License Plate Recognition Based on Concentric Windows and Deep Neural Networks, International J

of Advanced Research in Electrical, Electronics and Instrumentation Engg, 5(12):8950 – 8956

392

Agilandeeswari, L., & Ganesan, K. (2016). False-positive free Hilbert and multi-resolution-based image

watermarking technique using firefly optimisation algorithm. International Journal of Information Privacy,

Security and Integrity, 2(4): 257-280.

393

M P Gopinath, S Prabu, Srinivas Koppu, Madhusudhana Rao, Kamalakannan J. (2016). Automatic Region Growing

Algorithm based on Combined Filtering Technique to Detect Breast Cancer, International J of Advanced Research in

Electrical, Electronics and Instrumentation Engg 5(12):8878 – 8885.

394

S Ramani, P., Swarnalatha, L., Ramanathan., Srinivas Koppu., Madhusudhana Rao. (2016).Symmetric Private Key

Encryption and Decryption based on Matrix, International J of Advanced Research in Electrical, Electronics and

Instrumentation Engg, 5(12):8985 – 8991.

395

Venugopal P., Rajeev Pankaj N., Satheesh Kumar., Srinivas Koppu .,Madhusudhana Rao. (2016). Detection of Enemy

Intervention in Border and Battle Fields Using Smart Dust Technology, International J of Advanced Research in Electrical,

Electronics and Instrumentation Engg, 5(12):8833 – 8843

  
396

Ramya, G., Priya, G., & Mon, F. A. (2016). Isolating Tainted Nodule. Imperial Journal of Interdisciplinary Research,

2(11):1870-1973.

397

Bandaru Venkata Hemanth Kumar., Ramya, G.(2016). Clustered Information Retrieval Using Image Query,

International Journal of Innovative Research in Computer

 and Communication Engineering, 3(6):5503 – 5507.
398

Devi, G. U., Sowmitha, M. K., Jidhesh, R., & Jangir, A.(2016).Improved Eaack For Intrusion Detection System.

International Journal of Research in Engineering and Technology, 5(5): 28 – 33.

399

Prathamesh Vijay Tarare ,AnurajMalav,G., Usha Devi. (2016). Modified Ant Colony System Algorithm For IP-

Traceback Problem, International Journal of Research in Engineering and Technology, 5(5):19-23

400

Judith Nita, M., Rajaprabha. MN. (2016). Implementation of Shared Authority Based Privacy Preserving Authentication

Protocol in Cloud Computing, International Journal of Innovative Research in Computer and Communication

Engineering, 4(4):6780 – 6785.

401

Thenmozhi B., Rajaprabha, MN.(2016). Automatic Averting From Cyberbullying Using Efficient Polarity Count Algorithm,

International Journal of Innovative Research in Computer and Communication Engineering, 4(4): 6834 – 6840.

402

Bimal Kumar Ray, (2016). A technique for piecewise linear approximation of 2D digital curve, International Journal of

Computer Graphics, 7(1):1-16.

403

V. Shanthi., Godithi Ramya Sree., Senthil Kumaran. (2016). Confidential Communication and Secret Data Storing by

Embedding Files–Survey, International Journal of Research in Engineering and Technology, 3(11): 459 – 465.

404

Mangayarkarasi, R.,Vanitha, M.(2016). A Survey of suboptimal polygonal approximation methods, International Journal

of Communication and Computer Technologies, 4(16):4083 – 4090.

405

M. Lawanya Shri., M.B.Benjula Anbumalar., K. Santhi, Deepa. M., (2016).Task Scheduling Based On Efficient

Optimal Algorithm In Cloud Computing Environment, International Journal of Advanced Technology in Engineering

and Science, 4(special issue no:1):306-310.

406

Subha, S. (2006). A Literature Survey of CPU Exclusive Caches, International Journal of Advanced Scientific Technologies,

Engineering and Management, 2(7):9-10.

407

Tamizharasi, G. S., Manjula, R., Monisha, K., & Balamurugan, B. (2016). A Secure and Efficient Framework for Health

Data Management in E-Health Clouds. International Journal of Computer Science and Information Security, 14(9):1078-1085.

408

Vasumathy, M., Thirugnanam, M., & Sumathy, S. (2016). A framework for automatic intrude object identification in

paediatric foreign body aspired radiography images. International Journal of Image Mining, 2(1): 57 – 67.

409

Elavarassi M, Elango N.M, (2016). A Review On Recovering And Examining Computer Forensics Evidences.

Asian Journal of Computer Science Engineering, 1(2):22 – 24.

Beware of VITEEE fake websites

We came to know that some fake websites are misusing our VITEEE name. Kindly be aware of fraud websites. Please visit only https://vit.ac.in for admissions.