Sorry, you need to enable JavaScript to visit this website.

School of Information Technology & Engineering (SITE)

Publications

2017

S.No. Title Of Paper Name of the author/s Name of journal ISBN/ISSN Number
1 A Novel Women Chaperone "An Anti-Violation Technology" Prabhu J , Thanapal P , Vijayanand R , Kirubathagam R , Sundaravadivazhagan B International Journal of Pure and Applied Mathematics 1314-3395
2 Classification: Grouping The Users Based On Their Web Search Using Fuzzy Logic Senthilkumar N C, Ch Pradeep Reddy International Journal of Pure and Applied Mathematics 1314-3395
3 An Empirical Study Of Various Load Balancing Algorithms For Cloud Computing M Lawanyashri, S Subha. B Balamurugan International Journal of Pure and Applied Mathematics 1314-3395
4 An Improved Floating Point Addition Algorithm S Subha ARPN Journal of Engineering and Applied Sciences 1819-6608
5 Analysis Of Performance Measures To Handle Medical Ecommerce Shopping Cart Abandonment In Cloud, V Priya, S Subha, B Balamurugan Informatics in Medicine Unlocked-Elsevier, March 2017 2352-9148
6 Energy Aware Fruitfly Optimization Algorithm For Load Balancing In Cloud Computing Environments M. Lawanya Shri, S Subha, Balusamy International Journal of Intelligent Engineering and Systems, 2185-310
7 A Credential Data Privacy Preserving In Web Environment Using Secure Data Contribution Retrieval Algorithm” Kumaran U, Neelu Khare International Journal of Intelligent Engineering and Systems 2185-310
8 2D Chaotic Map Based On 2D Adaptive Grey Wolf Algorithm For Ultra Sound Medical Image Security Srinivas Koppu & Viswanatham International Journal of Intelligent Engineering and System 2185-310
9 3D Reconstruction Of A Scene From Multiple 2D Images Srinivas Koppu, Swarna Priya, R. M., Aarthy, S. L., Gunavathi, C., Venkatesh, P. & Gao, X. Z International Journal of Civil Engineering and Technology (IJCIET) 0976-6316
10 A Case Study : 3D City Generation Using Procedural Modeling Framework And Evaluations Trategies Divya Udayan J, M.Priya, R.Charanya, Tamil Priya. D And Boyu Gao International Journal of Civil Engineering & Technology (IJCIET) 0976-6316
11 Enchanced Id Based Ring Signature By Validating Time Slots In Cloud Environment Nithya S International Journal of Mechanical Engineering and Technology 0976-6340
12 A Case Study On Coactive Subject Modelling For Acclaiming Technical Articles Praveen Kumar Reddy M, Rajesh Kaluri, Kuruva Lakshmanna, Nagaraja G, Swamy T, Guokun Li International Journal of Mechanical Engineering and Technology (IJMET) 0976-6340
13   A Case Study On Cost Estimation Of Cloud Service Using Fuzzy Approach Srinivas Koppu, Joy Bhowmick., Madhu V. Satheesh S. And Tsung C.H International Journal of Pure and Applied Mathematics, 13118080
14 A Case Study: 3D City Generation Using Procedural Modeling Framework And Evaluation Strategies M.Priya International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
15 A Case Study: Analysis Of Single Phase
And Hybrid Cascade Multilevel
Inverter With Pwm And Level
Inverters
M.Priya International Journal of Mechanical Engineering and Technology (IJMET) 0976-6340
16 A Case Study: Home Environment Monitoring System Using Internet Of Things R. Raghavan, John Singh. K, Thippa Reddy. G, Sudheer. K, Venkatesh. P And Stephen Olatunde Olabiyisi International Journal of Mechanical Engineering and Technology 0976-6359
17 A Case Study: Usb Device Charging And Fitness Monitor With Smart Safety Shoe And Iot John Singh. K, Sagar G. V, Sushmita Lenka, Belwin Edward. J, Jacob Raglend. I, Stephen Olatunde Olabiyisi, International Journal of Mechanical Engineering and Technology 0976-6359
18 A Comprehensive Overview On The Foundations Of Formal Concept Analysis K. Sumangali Ch. Aswani Kumar Knowledge Management & E-Learning 2073-7904
19 A Computer Aided System To Detect Breast Masses Using Digital Mammograms Sujatha,R., Gao, X.-Z.,Gopinath, M.P., Prabu, S.,Murali, S.,Mohanasundaram, R., Kumar, N.S. International journal of Civil Engineering and Technology 0976 - 6316
20 A Condorcet Voting Theory Based Ahp Approach For Mcdm Problems Sweta Bhattacharya, V. Raju Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
21 A Fast Enhanced Secure Image Chaotic Cryptosystem Based On Hybrid Chaotic Magic Transform Srinivas Koppu & Viswanatham Modelling and Simulation in Engineering 16875591
22 A Framework For Attribute Selection In Marketing Using Rough Computing And Formal Concept Analysis T. K. Das IIMB Management Review 0970-3896
23 A Framework For Computational Offloading To Extend The Energy Of Mobile Devices In Mobile Cloud Computing. Thanapal, P., & Durai, M. S. International Journal of Embedded Systems 1741-1076
24 A Framework To Mitigate Arp Sniffing Attacks By Cache Poisoning B. Prabadevi, N. Jeyanthi International Journal of Advanced Intelligence Paradigms (Inderscience) 1755-0386
25 A Mobile Application Based Smart System For Supporting Yoga Activities And Health Monitoring Prasanna M, Arunkumar T, Arunkumar S Research Journal of Pharmacy and Technology 0974-360X
26 A Naive-Bayes Strategy For Sentiment Analysis On Demonetization And Indian Budget 2017-Case-Study Jasmine Norman, Mangayarkarasi R, Vanitha M, Praveen Kumar T, Umamaheswari G International Journal of Pure and Applied Mathematics 1314-3399
27 A New Algorithm For Password Encryption And Decryption M.Iyapparaja Journal of Advanced Research and Dynamical & Control Systems 1943-023X
28 A Novel Temporal Access Control Scheme For Outsourced Data In Cloud With User Revocation P. G. Shynu And K. John Singh Electronic Government, an International Journal, 1740-7508
29 A Novel Threshold Based Multi-Authority Access Control System In Cloud Storage Environment M.Lawanyashri International Journal of Pure and Applied Mathematics 1314-3399
30 A Prevention Model For Web Application Session Hijack Attacks In Wireless Networks Using Mac Appended Session Id S.S.Manivannan, E.Sathiyamoorthy Journal of Advanced Research in Dynamical and Control Systems 1943-023X
31 A Privacy-Preserving Secure Access Control Mechanism In Cloud M.Iyapparaja Journal of Advanced Research and Dynamical & Control Systems 1943-023X
32 A Real Time Monitoring System For Yoga Practitioners Prasanna M, Arunkumar T, Akshat Sharma, Nikhil Chaudhari International Journal of Intelligent Engineering and Systems 2185-3118
33 A Replica Detection Scheme Based On The Deviation In Distance Travelled Sliding Window For Wireless Sensor Networks Alekha Kumar Mishra, Asis Kumar Tripathy, Arun Kumar, And Ashok Kumar Turuk Wireless Communications and Mobile Computing, 1530-8677
34 A Review Of Soft Computing Techniques In Short-Term Load Forecasting Senthil Kumar P International Journal of Applied Engineering Research 0973-4562
35 A Review On Various Encoding Scehmes Used In Digital Dna Data Storage A.Swati, Forum Mathuria, S.Bhavani, E.Malathy, R.Mahadevan International Journal of Civil Engineering and Technology 0976-6308
36 A Study On Different Types Of Authentication Techniques In Data Security Dinesh Kumar D, K.Vijay, S.Bhavani, E.Malathy, R.Mahadevan International Journal of Civil Engineering and Technology 0976-6308
37 A Survey On Fault Detection Techniques In Different Machines - An Image Processing Approach U.Rahamathunnisa,Babu Chellappa Chetty And A.Clement King International Journal of Civil Engineering and Technology 0976-6316
38 A Survey On Feature Selection Methods In Microarray Gene Expression Data For Cancer Classification Gunavathi C, Premalatha K, Sivasubramanian K Research Journal of Pharmacy and Technology 0974-360X
39 An Access Control Models In Cloud Computing: A Review Priya G, Kavitha Br, Ramya G , Kumaresan P , Feslin Anish Mon International Journal of Pure and Applied Mathematics ISSN: 1311
40 An Analysis And Performance Evaluation Of Nosql Databases For Efficient Data Management In E-Health Clouds S L Aarthy Internation Journal of Pure and Applied Mathematics 13118080
41 An Approach For Dynamic Replica Allocation For Sparse (Urban/Sub-Urban) And Dense Regions (City Side) In Vanet Kumar P J, Manikandan, N., Suganya, P., Sureka, S International Journal of Civil Engineering and Technology 0976-6308
42 An Approach To Evaluate The Availability Of System In Cloud Computing Using Fault Tree Technique M.Deepa, M.Anand INASS 2185-3118
43 An Efficient And Secure Biometric Authentication Scheme For M-Commerce R. Thandeeswaran, Hamid Mcheick, Hemant Agrawal, Ajay Thakur, N. Jeyanthi, Rajan Slathia, International Journal of Civil Engineering and Technology 0976 - 6308
44 An Efficient Deep Learning Neural Network Based Brain Tumor Detection System Chinmayi, L Agilandeeswari, M Prabukumar, K Muralibabu International Journal of Pure and Applied Mathematics, 1314-3395
45 An Efficient Hybrid Approach For
Hyperspectral Image Classification,
L Agilandeeswari, M Prabukumar, S Sathishkumar International Journal of Pure and Applied Mathematics, 1314-3395
46 A Survey On Iot Related Patterns Siva Kumar N International Journal of Pure and Applied Mathematics 1314-3395
47 An Enhanced Abe Based Secure Access Control Scheme For E-Health Clouds P. G. Shynu And K. John Singh International Journal of Intelligent Engineering and Systems 2185-3118
48 An Enhanced Cp-Abe Based Access Control Algorithm For Point To Multi-Point Communication In Cloud Computing P. G. Shynu And K. John Singh Journal of Information Science and Engineering 1016-2364
49 An Enhanced Framework For Sign Gesture Recognition Using Hidden Markov Model And Adaptive Histogram Technique Rajesh Kaluri, Pradeep Reddy Ch International Journal of Intelligent Engineering and Systems 2185-3118
50 An Enhanced Virtual Backoff Algorithm For Wireless Sensor Networks Babu, P.R., Krishna, P.V., Saritha, V., Pounambal, M International Journal of Wireless and Mobile Computing 17411084
51 An Intelligent Approach Of Query Process Optimisation Using Cooperative Semantic Caching Techniqu P.Mohankumar Journal of Engineering science and Technology 1823-4690
52 An Overview Of Data Mining Techniques And Its Applications G.Kavitha,N.M.Elango International Journal of Civil Engineering and Technology 9766308
53 Analysis Of Using Sparse Matrix Storage Formats In Image Compression Techniques Banu,J.S, Babu.M.R, Thaseen,I.S And Balamurugan.P International Journal of Pure and Applied Mathematics 1311-8080
54 Analyzing Customer Sentiments Using Machine Learning Techniques Magesh G, Dr.P.Swarnalatha International Journal of Civil Engineering and Technology (IJCIET Journal) 0976 - 6316
55 Assessment And Optimisation Of User Imprecise Queries In Cloud Environments P.Mohankumar International journal of Intelligent Engineering and system 2185-3118
56 Automatic Brain Tumour Segmentation Techniques - A Review Angulakshmi.M, Lakshmi Priya. Gg International Journal of Imaging Systems and technology 1098-1098
57 Automatic Grading System For Mangoes Using Multiclass Svm Classifier L Agilandeeswari, M Prabukumar, Goel Shubham International Journal of Pure and Applied Mathematics 1311-1314
58 Availability Modelling Of Fault Tolerant Cloud Computing System M.Deepa, M.Anand INASS 2185-3118
59 An Evolutionary Secre Energy Efficient Routing Protocol In Iot Praveen Kumar Reddy, Rajasekhara Babu International Journal intelligent engineering and systems 1311063047
60 Big Data And Its Applications: A Survey Magesh G, Dr.P.Swarnalatha Research Journal of Pharmaceutical, Biological and Chemical Sciences 0975-8585
61 Big Data Management With Machine Learning Inscribed By Domain Knowlegde For Health Care Sujatha R., E.P.Ephzibah International Journal of Engineering & Technology 2227-524X
62 Biomarker Selection From Gene Expression Data For Tumour Categorization Using Bat Algorithm Gunavathi Chellamuthu, Premalatha Kandasamy,

Sivasubramanian Kanagaraj

International Journal of Intelligent Engineering & Systems 2185-3118
63 Bluetooth Based Low Power Data Acquisition System For Ban Kumaresan P Prabukumar M, International Journal of Pure and applied Mathematics - Special issue on Computer and Communication Editors 1311-8083
64 Case Study: A Line Following Robot For Hospital Management Kumaresan P,Priya.G,Kavitha B R, Ramya G,

M.Lawanyashri

International Journal of Pure and Applied Mathematics 1311-1314
65 Ciphertext-Scheme Based On Attribute Hybrid Encryption In Cloud Computing. Meenatchi, S., Navaneethan, C., Iyapparaja, M., Thanapal,

P., & Prabhakaran, R.,

Jour of Adv Research in dynamic & Control System 1943-023X
66 Clustering Of Wireless Sensor Networks Nallakaruppan, M.K., Ilango, P., Deepa, N., Muthukumarappan, A. Research Journal of Pharmacy and Technology 9743618
67 Comparative Study On Performance Analysis Of Time Series Syed Muzamil Basha, Yang Zhenning, Dharmendra Singh Rajput,

Iyengar N.Ch.S.N. And Ronnie D. Caytiles

International Journal of Grid and Distributed Computing 2207-6379
68 Computer Numerical Control Machine Based On Machine Learning Kumaresan P Balavignesh G, Kavitha B R, Ramya Govindaraj,

Venkatesan S

International Journal of Pure and applied Mathematics - Special issue on Computer and Communication Editors 1311-8080
69 An Enhanced Trust Startegy For Online Social Networks Using Probalistic Reputation Features Raj E D, Babu L.D.D Neurocomputing 9252312
70 Concept Compression In Formal Concept Analysis Using Entropy-Based Attribute Priority K. Sumangali Ch. Aswani Kumar Applied Artificial Intelligence An International Journal 0883-9514
71 Context Residual Energy Based Trust Management In Mobile Adhoc Networks R. Vijayan, N. Jeyanthi International Journal of Communication Networks and Distributed Systems (Inderscience 1754-3916
72 Covering Rough Set Fuzzy C- Medoids (Crfm) Clustering Algorithm For Gene Expression Data

A.Jayaram Reddy

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

73

Crypto Currencies For Digital Currency Using Cipher Text And Sha 256

Sukhbir, C.P., Manivannan

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

74

Customized Services To Generate Test Suits For Testing Custom Software Application System Based On Knowledge Reuse

Asha N, Prasanna M

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

75

Decision Making Tool For Crop Selection For Agriculture Development

N. Deepa, K.Ganesan

Neural Computing and Applications

1433-3058

76

Detection Of Anaemia From Tongue Datasets By Image Processing

Sujatha, R., Aarthy, S.L., Charulatha, A.R. And

Sasikala, T.M.S

International Journal of Research in Pharmaceutical Sciences

0975-7538

77

Development Of Advanced Encryption Standard Architecture With Sbox Validity

Vanitha. M And S. Subha

Walailak Journal of Science and Technology

2228-835X

78

Discovery Of Drug And Medicine Using Datamining Techniques

Anish Chittora , A.Mary Mekala

Research Journal of Pharmacy and Technology

0974-3618

79

Domain Specific Predictive Analytics: A Case Study With R

Syed Muzamil Basha, Yang Zhenning,

Dharmendra Singh Rajput, Iyengar N.Ch.S.N. And

Ronnie D. Caytiles

International Journal of Multimedia and Ubiquitous Engineering

1975-0080

80

Dynamic Data Partitioning And Virtual Chunking For Effective Data Retrieval

M.Vanitha, R.Mangayarkarasi, Jasmine Norman,

R.Sakthivel, K.Baranitharan

International Journal of Pure and Applied Mathematics

1311-8080

81

Dynamic Energy Optimization Technique In Mobile Cloudlet For Mobile Cloud Computing Using Effective Offloading Algorithm

P.Priya, S.P.Shantharajah

Journal of Theoretical and Applied Information Technolog

1992-8645

82

Effective Evaluation Of Prediction Accuracy Using Optimization Algorithm,

Brindha.K, Sudha.S , Rathi.R And Charanya.S,

International Journal of Pure and Applied Mathematics

1311-8080

83

Effective Mining Approach To Produce Quality Search Results Using Proposed Approach

Elavarasan D, Durai Raj Vincent

International Journal of Intelligent Engineering and Systems

2185-3118

84

Energy Efficient Consumption For Quality Based Sleep Scheduling In Wireless Sensor Networks

A. S. Syed Navaz, N. Asha And D. Sumathi

ARPN Journal of Engineering and Applied Sciences

1819-6608

85

Energy Efficient Node Selection Algorithm Based On Node Performance Index And Random Waypoint Mobility Model In Internet Of Vehicles

P M Kumar, Ushadevi Gandhi, R Varatharajan,

Gunasekaran Manogaran, R Jidhesh, Thanjai Vadivel

Cluster Computing

1573-7543

86

Integration Of Fuzzy Dematel And Fmcdm Approach For Evaluating Knowledge Transfer Effectiveness With Reference To Gsd Project Outcome

Jagadeesh G, Arun Kumar S, X.Z.Gao

International Journal of Machine Learning and cybernetics

1868-8071

87

Enhanced Dtls With Coap-Based Authentication Scheme For The Internet Of Things In Healthcare Application

Pm Kumar, Ud Gandhi

The Journal of Supercomputing

0920-8542

88

Enhancing Trust In Mobile Adhoc Network Using Trust And Dynamic With Energy Efficient Multipath Routing Protocol

Vijayan R , Jeyanthi N

International Journal of Signal and Imaging Systems Engineering

1748-0698

89

Estimating Construction Data Using An Authenticated Application For Urban Planning

S.Sree Dharinya, Ephzibah.E.P, Divya Udayan,

R. Kirubathangam, & Charanya.R

International Journal of Civil Engineering and Technology (IJCIET)

9766308

90

Evaluating The Impact Of Feature Selection On Overall Performance Of Sentiment Analysis

Syed Muzamil Basha, Dharmendra Singh Rajput

ACM Digital Library

978-1-4503

91

Evolutionary And Neural Computing Based Decision Support System For Disease Diagnosis From Clinical Data Sets In Medical Practice,

M. Sudha

Journal of Medical Systems

1573-689X

92

Feature Selection For Privacy Preserving In Data Mining With Linear Regression Using Genetic Algorithm

Kumaran U, Neelu Khare

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

93

Flowagent: Software Defined Firewall Rule Generator For Network Intrusion Detection System

Nithya S

International Journal of Intelligent Engineering and Systems

2185-3118

94

Forward Secrecy Scheme For Data Sharing In Cloud

M. Lawanya Shri , G.Priya, M.B.Benjula Anbumalar,

Deepa Mani, K.Santhi

International Journal of Pure and Applied Mathematics

1311-8080

95

Handling Stakeholder Conflict By Agile Requirement Prioritization Using Apriori Technique

Rv Anand, M.Dinakaran

Computers & Electrical Engineering

0045-7906

96

Hb-Ppac: Hierarchy-Based Privacy Preserving Access Control Technique In Public Cloud

Sudha Senthilkumar,Madhu Viswanatham

International journal of High Performance computing and networking

1740-0570

97

Information Retrieval For Question Answering System Using Knowledge Based Query Reconstruction By Adapted Lesk And Latent Semantic Analysis

Saravanakumar K, Aswani Kumar Cherukuri

International Journal of Computer Science and Applications

0972-9038

98

Intelligent Decision Support System Based On Rough Set And Fuzzy Logic Approach For Efficacious Precipitation Forecast,

M. Sudha

Decision Science Letters

19295812

99

Intelligent Face Recognition And Navigation System Using Neural Learning For Smart Security In Internet Of Things

Pm Kumar, Ud Gandhi

Cluster Computing

1573-7543

100

Intrusion Detection Model Using Fusion Of Chi-Square Feature Selection And Multi Class Svm

I.Sumaiya Thaseen,

Journal of King Saud University-Computer and Information Sciences

1319-1578

101

A Hybrid Cluster Head Selection Model For Iot

Praveen Kumar Reddy M

springer

1058601712

102

K-Means Modification For Scalability

S.Bhavani,Sumit Patel, Dhanashri Patil, Yash Shah,

Rushikesh Babar, Abhishek Rathi

International Journal of Civil Engineering and Technology

0976-6308

103

Llvm Compiler

R.Bansal, Jasmine Norman,Mangayarkarasi R,Vanitha M,

Chandramouliswaran S

International Journal of Pure and Applied Mathematics

1311-8080

104

Luggage Tracking System Using Iot

Sudha Senthilkumar, Brindha.K, Rathi.R, Charanya. R, Mayank Jain

International Journal of Pure and Applied Mathematics

1314-3395

105

Metrics Based Evaluation For Disease Affection In Distinct Cities

M.Iyapparaja

Research Journal of Pharmacy and Technology

0974-3618

106

Multi-Voting And Binary Search Tree-Based Requirements Prioritisation For E-Service Software Project Development

Vijayanand R, Dinakaran M

Electronic Government, an International Journal

1740-7494

107

Network Life Time Uniformed By Mutual Nodes Cooperation And Life Nodes Relay In Wsn’S.

Thanapal, P., Prabhakaran, R., Meenatchi, S., Navaneethan, C.,

& Iyapparaja, M.

Jour of Adv Research in dynamic & Control System

1943-023X

108

Non-Intrusive Transaction Aware Filtering During Enterprise Application Modernizationra

Ramadoss, R., Elango, N.M., Abimannan, S., Hsu, C.-H.

Journal of Supercomputing

0920-8542

109

Soft Sequential Recognition Approach For User Activity Using A Wearable Device

Prabhavathy P

IJMET

9766359

110

Opinion Mining Services Using Machine Learning

Sujatha. R, M Sai Praneeth And M Lakshmi Deepak

Journal of Chemical and Pharmaceutical Sciences

0974-2115

111

Optimal Decision Tree Fuzzy Rule Based Classifier (Odt-Frc) For Heart Disease Prediction Using Improved Cuckoo Search Algorithm”

Subhashini Narayan , Jagadeesh Gobal

International Journal of Business Intelligence and Data Mining.

1943-023X

112

Optimizing Health Care Records By Preventing Duplication In Cloud

Sujatha R, Kaviya P.S

International Journal of Research in Pharmaceutical Sciences

0975-7538

113

Overview Of Securing Multimedia Content Using Efficient Encryption Methods And Modes

K. John Singh And Kunal Gagneja

International Journal of Advanced and Applied Sciences

2313-3724

114

Parallel Aes Algorithm For Performance Improvement In Data Analytics Security For Iot

Manikandan N, Subha S

International Journal of Networking and Virtual Organisations

1470-9503

115

Passive Incidental Alertness—Based Link Visualization For Secure Data Transmission In Manet

S.Uma, S.P.Shantharajah, C.Rani

Journal of Applied Security Research

1936-1610

116

Prediction Of Diabetes Using Data Mining Techniques

V. Mareeswari, Saranya R, Mahalakshmi R, Preethi E

Research Journal of Pharmacy and Technology

0974-3618

117

Preventing From Phishing Attack By
Implementing Url Pattern Matching
Technique In Web

U.Rahamathunnisa,N.Manikandan,U.Senthilkumaran

And C.Niveditha

International Journal of Civil Engineering and Technology

0976-6316

118

Rating Prediction Based On Social Sentiment From Textual Reviews

M. Deepa, K. Santhi, M. B. Benjulaanbu Malar,Priya .

G, M. Lawanya Shri

International Journal of Pure and Applied Mathematics

1311-8080

119

Robust Classification Of Hyperspectral Remote Sensing Images Combined With Multihypothesis Prediction And 3 Dimensional Discrete Wavelet Transform

Boggavarapu L N P, M Prabukumar

International Journal of Pure and Applied Mathematics,

1311-8080

120

Secret Image Enhanced Sharing Using Visual Cryptography

K.Brindha, N.Jeyanthi

Cybernetics and Information Technologies

1314-4081

121

Secured Sharing Data In Cloud Using Revocable Storage Identity Based Encryption

M.Iyapparaja

Journal of Advanced Research and Dynamical & Control Systems

1943-023X

122

Securing Portable Document Format File Using Extended Visual Cryptography To Protect Cloud Data Storage

K.Brindha, N.Jeyanthi

International Journal of Network Security

1816-3548

123

Security Algorithms In Cloud Computing: A Review,

M B Benjula Anbu Malar, Lawanyasri

International Journal of Pure and Applied Mathematics

1314-3395

124

Security Solution For Arp Cache Poisoning Attacks In Large Data Center Networks

B. Prabadevi, N. Jeyanthi

Cybernetics and Information Technologies

1311-9702

125

Smart Cooking Oil Analyzer Using Dielectric Constant Metric

Sriniavs Koppu., Rajesh D., Srinivasa Perumal R.,

Satheesh Kumar S., Rajeev Pankaj Nelapati

International Journal of Pure and Applied Mathematics,

1311-8080

126

Software Management Issues In Mobile Application Development

Deepa N, M. Senthilkumar, M.K.Nallakaruappn,

R.Chandrasekar, B R Kavitha ,Anand Muthukumarappan

International Journal of Civil Engineering and Technology (IJCIET)

0976-6308

127

Specification Based Intrusion Detection In Software Defined Networking

Nithya S

International Journal of Pure and Applied Mathematics

1314-3395

128

An Improved Multiplication Algorithm

Subha S

International Journal of Pure and Applied Mathematics

1311-8080

129

Stable Multipath Routing Protocol Using Different Route Selection Mechanism For Mobile Ad-Hoc Networks.

Alagiri, I., Muthamil Selvan, T., Thanapal, P.,

& Navaneethan C.

Inernational journal of pure and applied mathematics

1314-3395

130

Statistical Feature Ranking And Fuzzy Supervised Learning Approach In Modeling Regional Rainfall Prediction Systems

M. Sudha

AGRIS on-line Papers in Economics and Informatics

1804-1930

131

Stratified Sampling Method Based Training Pixels Selection For Hyper Spectral Remote Sensing Image Classification

M Radhesyam, Vaddi, Prabukumar M

International Journal of Pure and Applied Mathematics,

1314-3395

132

Successive Shape Based Image Registration

L Agilandeeswari, M Prabukumar, Chinmay,

K Muralibabu, Sudharani

International Journal of Pure and Applied Mathematics,

1314-3395

133

Survey About Segmentation Feature Extraction And Classification Of Disease Affected Leaf Using Digital Image

S.Kalaivani, S.P.Shantharajah

Journal of Advanced Research in Dynamical and Control System

1943-023X

134

Techiecardia-A System For Detection And Prediction Of Sudden Cardiac Arrests

M.Iyapparaja

Journal of Advanced Research and Dynamical & Control Systems

1943-023X

135

Test Case Generation For Embedded System Software Using Uml Interaction Diagram

Mani P, Prasanna M

Journal of Engineering Science and Technology

1823-4690

136

Swf Scheduled Workflow Integration Profile For The Connectivity Problems In Radiology Workflow

Prabadevi. B,

International Journal of Intelligent Engineering and Systems

9758585

137

Two Layered Optimized System Using Bluetooth And Hipherlan Interfaced Wireless Sensor Networks

M.Iyapparaja

Journal of Advanced Research and Dynamical & Control Systems

1943-023X

138

User Web Access Recording And Mining For Business Intelligence

Sindhuja, T.,S.S. Manivannan

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

139

Weighted Fuzzy Rule Based Sentiment Prediction Analysis On Tweets

Syed Muzamil Basha, Yang Zhenning,

Dharmendra Singh Rajput, Iyengar N.Ch.S.N

And Ronnie D. Caytiles

International Journal of Grid and Distributed Computing

2207-6379

140

Cloud Based Automated Framework For Semantic Rich Ontology Construction
And Similarity Computation For E-Health Applications

T. Muthamilselvan , B. Balamurugan

Informatics in Medicine Unlocked

2352-9148

141

Hybrid Approach For Data Classification In E-Health Cloud

T. Muthamilselvan , B. Balamurugan

International Journal of Intelligent Engineering and Systems

2185-3118

142

Role Of Automation In Waste Management And Recent Trends

Raghavendra Desai, M Parimala

International Journal of Environment and Waste Management

1478-9868

143

An Optimized Replica Allocation Algorithm Amidst Of Selfish Nodes In Manet

Kumar Pj, Ilango P

Wireless Personal Communication, Springer

0929-6212

144

Mqrc: Qos Aware Multimedia Data Replication In Cloud

Kumar Pj, Ilango P

International Journal of BioMedical Engineering and Technology

1752-6418

145

Upper Bound Tighter Item Caps For Fast Frequent Itemsets Mining For Uncertain Data Implemented Using Splay Trees

Shashikiran.V And S.Murali

International Journal of Pure and Applied Mathematics

1311-8080

146

Energy Efficient Cluster Head Selection Algorithm In Wireless Sensor Networks Using Ea-Fkpso Protocol

Meenatchi, S., & Prabu, S.

Jour of Adv Research in Dynamical & Control Systems.

1943-023X

147

Test Case Generation For Real Time System Software Using Specification Diagram

Prasanna M

international journal of intelligent engineering and systems

2185-3118

148

An Intelligent Lung Cancer Diagnosis System
Using Cuckoo Search Optimization And Support Vector Machine Classifier

Prabukumar M, Agilandeeswari, L. And Ganesan. K

Journal of Ambient Intelligence and Humanized Computing

1868-5137

149

Heart Disease Prediction System Using Ann, Rbf And Cbr

N. Sivakumar, R.Jothikumar, P.S.Ramesh & Suganthan

International Journal of Pure and Applied Mathematics

1314-3395

150

Applying Reversible Data Hiding For Medical Images In Hybrid Domain Using Haar And Modified Histogram

Vanmathi Chandrasekaran, Prabu Sevugan,

International Journal of Intelligent Engineering and Systems

2185-3118

151

Image Steganography Using Fuzzy Logic And Chaotic For Large Payload And High Imperceptibility

Vanmathi C., Prabu S

International Journal of Fuzzy Systems

1562-2479

152

A Comparative Study Of Statistical And Rough Computing Models In Predictive Data Analsis

A. Anitha, D. P. Acharjya

International Journal of Ambient Computing and Intelligence (IJACI)

1941-6237

153

Crop Suitability Prediction In Vellore District Using Rough Set On Fuzzy Approximation Space And Neural Network

A. Anitha, D. P. Acharjya

Neural Computing and Applications

0941-0643

154

Optimal View Point Selection In Direct Volume Rendering For 3D Visualization

Gunasekaran, G., & Venkatesan, M.

International Journal of Intelligent Engineering and Systems

2185-3118

155

An Efficient Technique For Three-Dimensional Image Visualization Through Two-Dimensional Images For Medical Data

Gunasekaran, G., & Venkatesan, M.

Journal of Intelligent Systems

2191-026X

156

A Novel Method For Smart Vehicle Safety

K.Uma, Anand Kannan,

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

157

Alert On Detection Of Hazardous Changes In Environmental Parameters Using Gsm

K.Uma

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

158

Smart Vehicle Safety Using Efficient Technique To The Vehicle Traveller’S

K.Uma

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

159

The Challenges And Issues On Big Data Analytics

K.Uma, Anand Kannan

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

160

An Analysis Of Decision Theoretic Kernalized Rough Intuitionistic Fuzzy C-Means

Ryan Serrao, B.K.Tripathy And A.Jayaram Reddy

Advances in Intelligent Systems and Computing

2194-5357

161

Hocs : Host Oscommunication Service

Jayakumar Sadhasivam, Senthil Jayavel,

Balajee Jayakumar, Shoaib Merchant

International Journal of Civil Engineering and Technology

0976-6316

162

A Review On Polygonal Approximation Techniques Of The Digital Planar Curves

Kalaivani S

International Journal of pure and Applied Mathematics

1311-8080

163

Review Of Gaming And Its Evolution Over Networks

Jaya Kumar S

International Journal of Civil Engineering and Technology

0976-6316

164

Convoluted Local Binary Pattern Based Grouping Neural Network For Face Emotion Recognition

Krithika L B,Lakshmi Priya Gg

Journal of Engineering Science and Technology Review

1791-2377

165

A Case Study Of Carry Skip Adder And Design Of Feed-Forward Mechanism To Improve The Speed Of Carry Chain

Premson Y, Sakthivel.R,Vivek.T, Vanitha M

International Journal of Pure and Applied Mathematics

1311-8080

166

Performance Analysis Of Cloud Computing In Healthcare Systemusing Tandem Queues

K.Santhi, R.Saravanan

International Journal of Intelligent Engineering and Systems

2185-3118

167

Performance Analysis Of Cloud Computing Bulkservice Using Queueing Models

K.Santhi, R.Saravanan

International Journal of Applied Engineering Research

1311-8080

168

Performance Analysis Of Cloud Computing Using Batch Queueing Models In Healthcare Systems

K.Santhi, R.Saravanan

Research Journal of Pharmacy and Technology

0974-360X

169

Clustering Algorithm In Possibilistic Exponential Fuzzy C-Mean Segmenting Medical Images

Chiranji Lal Chowdhary

JOURNAL OF BIOMIMETICS, BIOMATERIALS AND BIOMEDICAL ENGINEERING

2296-9845

170

Modelling The H1Ni Influenza Using Mathematical And Neural Network Approaches

Daphne Lopez, Gunasekaran M, Jagan Mohan

Biomedical Research

0970-938X

171

Parametric Model To Predict H1N1 Influenza In Vellore District, Tamil Nadu, India

Daphne Lopez, Gunasekaran Monoharan

Handbook of Statistics

1992-8408

172

A Survey On Big Data Arcitectures And Machine Learning Algorithms In Healthcare

Gunasekaran M,Daphne Lopez

International Journal of Biomedical Engineering and Technology

1752-6418

173

A Gaussian Process Based Big Data Processing Framework In Cluster Computing Environment

Gunasekaran M,Daphne Lopez

Cluster Computing

1386-7857

174

Disease Surveillance System For Big Climate Data Processing And Dengue Transmission

Gunasekaran M,Daphne Lopez

International Journal of Amient Computing and Intelligence

1941-6237

175

Document Level Prioritization And Identificataion Of Dominant Multi-Word Named Products In Customer Reviews

Sivashankar,Valarmathi

Aab Journal of Science & Engineering

2191-4281

176

A Heuristic Approach To Machine-Part Cell Formation In The Presence Of Alternative Process Plans

Sowmiya N, Srinivasa Gupta, Valarmathi,

Poonambalam

International Journal of Advanced Manufacturing Technology

14333015

177

A Review Of Categorical Data Clustering Methodologies Based On Recent Studies

Sowmiya,Valarmathi

IIOAB Journal

9763104

178

Brain Tumour Segmentation From Mri Using Superpixels Based Spectral Clustering.

Angulakshmi, M., Gg Lakshmi Priya

Journal of King Saud University-Computer and Information Sciences

1319-1578

179

Procedural Restoration Of Texture And Restruing Geometry From Façade Image

Divya Udayan

IEEE access

21693536

180

A Study On Tailor-Made Security Schemes To Defend Iots

M N Rajaprabha, P Jayalakshmi,

R Vijay Anand

International Journal of Advance Research in Science and Engineering

2319-8354

181

Bike Sharing Prediction Using Deep Neural Networks

Thirumalai, Chandrasegar And Koppuravuri,

Ravisankar.

JOIV: International Journal on Informatics Visualization

2549-9610

182

Comparative Study On Various Graph Algorithms, . 414-419

Angulakshmi., Rathi,R., Sudha, S., Brindha,K.,

International journal of advance research in science and engineering

2319-8346

183

Honey Bee Foreaging Algorithm For Load Balancing In Cloud Computing Optimization

Sudha, S., Brindha,K., Rathi,R.,Angulakshmi.,

Jothi.,Thirani.,

International Journal of Engineering Science and Computing

2321-3361

184

A Case Study On Cognitively Improvised Min-Max Algorithm For Distributed Computer Systems,

Sudha, S., Brindha,K., Rathi,R.,Nishanth,A., Vivek,P.,

International Journal for Scientific Research & Development

906-911

185

A Case Study On Performance Analysis Of Routing Protocols In Mobile Adhoc Netwoks

Nallakaruppan.M.K, N. Deepa,Pranava Kumar.R,

Sudhanshu Gera,Arpit Chikara

International Journal for Science and Advance Research in Technology

2395-1052

186

Analysis Of Agricultural Data Using Big Data Analytics

Ravishankar K, Sidhardha K, Prabadevi B

Journal of chemical and pharmaceutical Sciences

0974-2115

187

A Data Security Self-Attribute System In Cloud Computing
and Communication Engineering

Kumaresan P Dhanesh Lokhande

International Journal of Innovative Research in Computer

2320-9798

188

A Modified Synthetic Division Algorithm

S Subha

International Journal of Computational and Applied Mathematics

2349-5103

189

A Novel Based Ranking Radically Influential Web Environment Users,

M B Benjula Anbu Malar

International Journal of Advance Research in Science and Engineering

2319-8354

190

A Novel Method Of Real Time City Scale Taxi Trip Distribution

M B Benjula Anbu Malar

International Journal of Advance Research in Science and Engineering

2319-8354

191

A Study On Travel Recommendation System

Angulakshmi , Rathi.R , Dr.Sudha Senthilkumar ,

Dr.K.Brindha , Rajat Tandon

International Journal of Engineering Science and Computing, December

2321 3361

192

A Survey On Trust Models In Cloud Computing

Kumaresan P Ramya Govindaraj Kavitha B R

International Journal of Advance research in Science and Engineering

2319-8354

193

A Synthetic Division Algorithm With Positive Remainder

S Subha

International Journal of Advanced Science and Research

2455-4227

194

Agriculture E-Commerce Website,

M B Benjula Anbu Malar

International Journal of Advance Research in Science and Engineering ,

2319-8354
195 Agronomic Disaster Management Using Artificial Intelligence – A Case Study M. Sudha International Journal of Computer Science and Business Intelligence 2364-4168
196 An Efficient And Secured Data Storage Scheme In Cloud Computing, M B Benjula Anbu Malar International Journal of Advance Research in Science and Engineering 2319-8354
197 Applications Of Iot In Green Environment Kumaresan P, Darshan K N, Kavitha B R, Ramya Govindaraj International Journal of Advance research in Science and Engineering 2319-8354
198 Big Data In Healthcare: A Review Magesh G, P.Swarnalatha Emerging trends in Computer Engineering and Research, IIOAB Journal 0976-3104
199 Cloud With Iot In Smart Parking Sujatha R, Rahul Gorai, Harshita Wadhwa, Shivani Tripathi International Journal of Innovative Research in Management, Engineering and Technology 2456-0448
200 Computational Intelligence Based Sports Success Prediction System Using Functional Pattern Growth Tree – A Case Study M. Sudha International Journal of Computational Intelligence Research 0974-1259
201 Content Based Image Retrieval Using Hadoop And Hipi Kumaresan P, Kavitha B R, Ramya Govindaraj International Journal of Advance research in Science and Engineering 2319-8354
202 Detection Of Phishing Pages Over The Internet Using Anti-Phishing Techniques P Jayalakshmi, M N Rajaprabha, R Vijay Anand International Journal of Advance Research in Science and Engineering 2319-8354
203 Expelling Undesired Targets From An Image
Exploiting Surface Synthesis And Dispersion
and Communication Engineering
Based Technique
Kumaresan P, Pratik Bhosale International Journal of Innovative Research in Computer 2320-9798
204 Framework For Reliable Re Encryption In Cloud Magesh G, P.Swarnalatha Journal of Chemical and Pharmaceutical Sciences 0974-2115
205 Fuzzy-Set Based Privacy Preserving Access Control Techniques In Cloud (Fb-Ppac) Brindha.K, Sudha.S ,Sushmitakumari International Journal of Artificial Intelligence 2252-8938
206 Gdfs Based Data Encryption Technique In Cloud Computing Environments M B Benjula Anbu Malar International Journal of Advance Research in Science and Engineering 2319-8354
207 Heart Disease Prediction Using Data Mining Techniques Nallakaruppan.M.K, N. Deepa, Moin Ahmed, Tanuja, Ajith Kumar,Pranava Kumar.R International Journal of Engineering Science and Computing 2321-3361
208 An Improved Tumour Identification With Gabor Wavelet Segmentation Ciranji Lal Choudahary Research 2321 3361

209

Inquiry Based E-Learning System Using Personalized Knowledge Search

P Jayalakshmi, M N Rajaprabha, R Vijay Anand

And K Venkatesan

International Journal of Advance Research in Science and Engineering

2319-8354

210

Instant Medical Care And Drug Suggestion Service Using Data Mining And Machine Learning Based Intelligent Self-Diagnosis Medical System

M. Sudha

International Journal of Advanced Life Sciences

2277-758X

211

Iris Recognition System

Magesh G, Ravee Sundararajan

International Research Journal of Engineering and Technology (IRJET)

2395-0056

212

Leaf Disease Detection Using Image Processing

Sujatha, R, Y Sravan Kumar And Garine Uma Akhil

Journal of Chemical and Pharmaceutical Sciences

0974-2115

213

Precision Agriculture Using Real Time
Environmental Parameters And Internet Of Things
and Communication Engineering

Kumaresan P Ketan Prakash Kandagale

International Journal of Innovative Research in Computer

2320-9798

214

Privacy Preserving And Secret Based Navigation Scheme In Vehicular Adhocnetwork : A Case Study

M B Benjula Anbu Malar

International Journal of Advance Research in Science and Engineering ,

2319-8354

215

Reconfigurable Interpolation Filter Architecture Design

Satheesh Kumar S, Venugopal P, Srinivas Koppu,

Rajeev Pankaj N, Rajesh Kaluri, Madhusudhana Rao

International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering

2278-8875

216

Reconstruction Of Per Packet Routing Path

M B Benjula Anbu Malar

International Journal of Advance Research in Science and Engineering

2319-8354

217

Smarter Way To Access Multiple Mobile Cloud Applications Without Interoperability Issues.

Thanapal, P., Marimuthu, K., Rajkumar, S., & Niranchana, R.

I.J. Wireless and Microwave Technologies

2076-1449

218

Temperature Controlled Dc Fan

Sudha, S., Brindha,K., Rathi,R.,Hardi,S., Kataria,S.,

International journal of advance research in science and engineering

498-506

219

User Authentication Framework With Improved Performance In Multi-Cloud Environment

R. Thandeeswaran, M A Saleem Durai

American Journal of Computer Science and Information Technology

2349-3917

220

Validation Of Automated Test Cases With Specification Path

Mani P, Prasanna M

Journal of statistics and Management Systems

0972-0510

221

Weather Modeling Using Data-Driven Adaptive Rough-Neuro-Fuzzy Approach

M. Sudha

Current World Environment

0973-4929

222

Assessment Of Unfair User Rating In Multidisciplinary System

V.Mareeswari, Bala Prasanth P

Research Journal of Pharmaceutical, Biological and Chemical Sciences

0975-8585

223

Pattern Recognition Using Pca Algorithms

Uma Maheswari G, Ephzibah E P, Mareeswari V

Research Journal of Pharmaceutical, Biological and Chemical Sciences

0975-8585

224

Fog Computing – Enhancing The Maximum Energy Consumption Of Data Servers

Priyanka C, Prabadevi, Jeyanthi N

IDL - International Digital Library Of Technology & Research

2349-302X

225

Anomaly Based Intrusion Detection Methods In Network Infrastructure – A Survey

Dhanabal L, S.P.Shantharajah, T. Padma

Asian Journal of Research in Social Sciences and Humanities

2249-7315

226

Survey Of Image Segmentation Algorithm For Medical Images: Challenges And Methodologies

P Chinmayi, M Prabukumar, L Agilandeeswari

RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES

0975-8585

227

Data Replication In Current Generation Computing Environment

Kumar Pj, Ilango P

International Journal of Engineering trends and Technology,

2231-5381

228

Data Replication In Conventional Computing Environment

Kumar Pj, Ilango P

International Journal of Computer Trends and Technology

2231-2803.

229

Case Study- Machine Learning Based On Scenario Analysis

Prabadevi. B, Vanmathi. C, Krithika. L. B,

Sudha. S, Vivek Akabote

International Journal of Scientific Research in Computer Science, Engineering and Information Technology

2456-3307

230

Precise Investigations Of Software Quality

Alice Auxilia .L, Asha .N, Vanmathi .C

International Journal of Engineering Science and Computing,

2321-3361

231

Intrusion Detection System Based On Artificial Intelligence

  1. Anitha,Sv Revathi, S Jeevanantham,
  2. Eliza Godwin

International Journal of Technology

2231-3915

232

Mooc : A Framework For Learners Using Learning Style

Jayakumar Sadhasivam And Ramesh Babu Kalivaradhan

International Education and Research Journal

2454-9916

233

Review On Sentiment Analysis A Learners’ Opinion

Jayakumar Sadhasivam And Ramesh Babu Kalivaradhan

IIOAB - Emerging trends in Computer Engineering and Research

0976-3104

234

Comparative Study On Web Based Software Project Management Tools

Jayakumar Sadhasivam

International Journal of Modern Computer Science

2320-7868

235

Data Load Balancing In A Big Data Heterogeneous Environment

P Jayalakshmi, M N Rajaprabha, R Vijay Anand

And K Venkatesan

International Journal of Advance Research in Science and Engineering

2319-8354

236

I Voting

P Jayalakshmi, M N Rajaprabha, R Vijay Anand

And K Venkatesan

International Journal of Advance Research in Science and Engineering

2319-8354

237

A Novel Method For Key Aggregation On Data Sharing In Cloud Stoeage Environment

K.Shanthi, M.Deepa, M.Lawanya Shri

International Journal of Advance Research in Science and Engineering

2319-8354

238

Implementation Of Morphological Image Processing Algorithm Using Mammograms

Tk Das, Cl Chowdhary

journal of chemical and proceessing

9742-115

239

A Review On Internet Of Things And Its Applications In Healthcare

Chiranji Lal Chowdhary

Journal of Chemical and Pharmaceutic al Sciences

0974-2115

2016

S.No. Publication details (incl complete bibliography)

1.

Raj, E. D., & Babu, L. D. (2016). A fuzzy adaptive resonance theory inspired overlapping

community detection method for online social networks.

Knowledge-Based Systems, 113, 75-87.

2.

Vijayakumar, P., Chang, V., Deborah, L. J., Balusamy, B., & Shynu, P. G. (2016).

Computationally efficient privacy preserving

anonymous mutual and batch authentication schemes for vehicular ad hoc networks.

Future Generation Computer Systems.

3.

Loganathan, A., & Kaliyaperumal, G. (2016). An adaptive HVS based video watermarking

scheme for multiple watermarks using BAM neural networks and fuzzy inference system.

Expert Systems with Applications, 63, 412-434.

4.

PVSSR, C. M. (2016). Dimensionality reduced local directional pattern (DR-LDP) for face recognition.

Expert Systems with Applications, 63, 66-73.

5.

Boobalan, M. P., Lopez, D., & Gao, X. Z. (2016). Graph clustering using k-Neighbourhood

Attribute Structural similarity.

Applied Soft Computing, 47, 216-223.

6.

Deepa, N., & Ganesan, K. (2016). Multi-class classification using hybrid soft decision model

for agriculture crop selection.

Neural Computing and Applications, 1-14.

7.

Lopez, D., & Sekaran, G. (2016). Climate change and disease dynamics-a big data perspective.

International Journal of Infectious Diseases, 45(1):23-24.

8.

Singh, P. K., Kumar, C. A., & Li, J. (2016). Knowledge representation using interval-valued

fuzzy formal concept lattice.

Soft Computing., 20(4), 1485-1502.

9.

Agilandeeswari, L., & Ganesan, K. (2016). A bi-directional associative memory based multiple

image watermarking on cover video.

Multimedia Tools and Applications, 75(12), 7211.

10.

Agilandeeswari, L., & Ganesan, K. (2016). A robust color video watermarking scheme based on hybrid embedding techniques.

Multimedia Tools Appl., 75(14), 8745-8780.

11.

Ahamed, B. B., & Ramkumar, T. (2016). An intelligent web search framework for performing efficient retrieval of data.

Computers & Electrical Engineering, 56, 289-299.

12.

Balakrishnan, S. M., & Sangaiah, A. K. (2016). Integrated QoUE and QoS approach for optimal service

composition selection in internet of services (IoS).

Multimedia Tools and Applications, 1-28.

13.

Sujatha, R., & Ezhilmaran, D. (2016). A new efficient SIF-based FCIL (SIF–FCIL) mining algorithm in

predicting the crime locations.

Journal of Experimental & Theoretical Artificial Intelligence, 28(3), 561-579.

14.

Pounambal, M., & Krishna, P. V. (2016). Efficient channel assignment method for multimedia

traffic in wireless mesh networks.

International Journal of Communication Systems, 29(5), 929-941.

15.

Singh, P. K., Aswani Kumar, C., & Gani, A. (2016). A comprehensive survey on formal concept

analysis, its research trends and applications. International Journal of Applied Mathematics and

Computer Science, 26(2), 495-516.

16.

Tripathy, A. K., Chinara, S., & Sarkar, M. (2016). An application of wireless brain–computer interface

for drowsiness detection.

Biocybernetics and Biomedical Engineering, 36(1), 276-284.

17.

Navaneethan, C., & Prabha, K. H. (2016). Optimizing Network Layer with Adaptive Modulation for

Time Varying Channel.

Wireless Personal Communications, 90(2), 1003-1019.

18.

Balasubramanian, V., Nagarajan, S. G., & Veerappagoundar, P. (2016). Mahalanobis distance-the

ultimate measure for sentiment analysis.

Int. Arab J. Inf. Technol., 13(2), 252-257.

19.

Nalinipriya, G., Maheswari, K. G., Balusamy, B., Kotteswari, K., & Kumar Sangaiah, A. (2016).

Availability modeling for multi-tier cloud environment. Intelligent Automation & Soft Computing, 1-8.

20.

Kumar, C. A., Mouliswaran, S. C., Li, J. H., & Chandrasekar, C. (2016). Role based access control design

using triadic concept analysis.

Journal of Central South University, 23(12), 3183-3191.

21.

Swathi, G., & Saravanan, R. (2016). A Framework for Efficient Routing in MANET using Index Routing

Tables-based Algorithms.

Defence Science Journal, 66(6), 568.

22.

Deepa, N., & Ganesan, K. (2016). Mahalanobis Taguchi system based criteria selection tool for

agriculture crops.

Sādhanā, 41(12), 1407-1414.

23.

Leo Dencelin X, Ramkumar, T. (2016). Analysis of multilayer perceptron machine learning

approach in classifying protein secondary structures.

Biomedical Research. Special Issue- Computational Life Science and Smarter Technological

Advancement, August 2016, S166-S173.

24.

Rajavel, D., & Shantharajah, S. P. (2016). Scrambling algorithm for encryption of text using

cube rotation artificial intelligence technique.

Biomedical Research. Special Issue-Computational Life Science and Smarter Technological

Advancement, August 2016, S251-S256.

25.

Das, T. K., & Nahar, K. M. (2016). A Voice Identification System using Hidden Markov Model.

Indian Journal of Science and Technology, 9(4).

26.

Manikandan, N., & Subha, S. (2016). Software Design Challenges in Time Series Prediction Systems

Using Parallel Implementation of Artificial Neural Networks.

The Scientific World Journal, 2016.

27.

Subha, S. (2016). A Power Saving Set Associative Cache Model. Indian Journal of Science and Technology, 9(6).

28.

Praveen Kumar Reddy M. & M. Rajasekhara Babu (2016). A scalable approach for improving dynamic

multithreaded applications on NUMA based architectures.

ARPN Journal of Engineering and Applied Sciences, 11(3), 1494-1503.

29.

Narayanan, M., & Cherukuri, A. K. (2016). A study and analysis of recommendation systems

for location-based social network (LBSN) with big data.

IIMB Management Review, 28(1), 25-30.

30.

Jayanthi R, Siva Rama Krishnan S, Rama Prabha K P., (2016). Spoofing Assault

Identification and Limiting Several Adversaries in Wireless Networks.

International Journal of Applied Engineering Research, 11(1), 286-289.

31.

Shynu, P. G., & Singh, K. J. (2016). A Comprehensive Survey and Analysis on Access

Control Schemes in Cloud Environment.

Cybernetics and Information Technologies, 16(1), 19-38.

32.

Subha, S. (2016). A literature survey on cpu cache reconfiguration. ARPN Journal of

Engineering and Applied Sciences. 11(5), 3008-3012.

33.

Prasanna, S., & Ezhilmaran, D. (2016). A Survey of Stock Price Prediction & Estimation

Using Data Mining Techniques.

International Journal of Applied Engineering Research, 11(6), 4097-4099.

34.

Vijayan, R., & Jeyanthi, N. (2016). A survey of trust management in mobile ad hoc networks.

International Journal of Applied Engineering Research, 11(4), 2833-2838.

35.

Thanapal P., Saleem Durai M A., (2016). A survey on application partitioning for mobile cloud computing.

International Journal of Pharmacy and Technology. 8(1), 10574-10589.

36.

Suganya P, (2016). A survey on various security measures used in cloud.

International Journal of Pharmacy and Technology. 8(1), 3644-3647

37.

Prathik, A., Uma, K., & Anuradha, J. (2016). An Overview of application of Graph theory.

International Journal of ChemTech Research, 9(2), 242-248.

38.

Anusha, K., & Sathiyamoorthy, E. (2016). Comparative study for feature selection

algorithms in intrusion detection system.

Automatic Control and Computer Sciences, 50(1), 1-9.

39.

Seetha R & Saravanan R. (2016). Digital Signature Schemes for group communication: A Survey.

International Journal of Applied Engineering Research, 11(6), 4416-4422.

40.

Rathi R., (2016). Hybridization of soft computing framework – a survey.

International Journal of Pharmacy & Technology, 8(1), 3594-3602.

41.

Das, T. K. (2016). Intelligent techniques in decision making: A survey.

Indian Journal of Science and Technology, 9(12).

42.

Anand, R. V., & Dinakaran, M. (2016). Popular Agile Methods in Software Development:

Review and Analysis. International Journal of Applied Engineering Research, 11(5), 3433-3437.

43.

Fiaz, A. S., Asha, N., Sumathi, D., & Navaz, A. S. (2016). Data Visualization: Enhancing

Big Data More Adaptable and Valuable.

International Journal of Applied Engineering Research, 11(4), 2801-2804.

44.

Thandeeswaran, R., & Durai, M. S. (2016). Wide-ranging Survey on Authentication Mechanisms.

International Journal of Applied Engineering Research, 11(6), 4114-4117.

45.

Sharon Moses J., Babu, L. D. (2016). A locality centred recommendation system combining

CNM clustering technique with fuzzy preference tree-based ranking algorithm.

International Journal of Business Intelligence and Data Mining, 11(1), 63-84.

46.

Siva Rama Krishnan S., karthik Balasubramanian, Arun Kumar T., Challenges in Data Aggregation

in Wireless Sensor Network – A Review. International Journal of Applied Engineering Research, 11(7), 5342-5345.

47.

Panneer, P., & Tripathy, B. K. (2016). Covering Rough Clustering Approach for Unstructured Activity Analysis.

International Journal of Intelligent Information Technologies (IJIIT), 12(2), 1-11.

48.

Kumar, K. S., & Deepa, K. (2016). Medical Query Expansion using UMLS. Indian Journal

of Science and Technology, 9(14).

49.

Bhushan, S. B. Reddy. C. H., Pradeep (2016). A network qos aware service ranking using

hybrid ahp-promethee

method in multi-cloud domain. International Journal of Engineering Research in Africa, 24.

50.

Senthil Kumar P., Daphne Lopez., (2016). A Review on Feature Selection Methods for High

Dimensional Data.

International Journal of Engineering and Technology, 8(2), 669-672.

51.

Hemalatha S., Margret Anouncia S., (2016). A Review on Human Identification Systems using

Biometrics Fingerprint Matching,

Internation Journal of Pharmacy and Technolog, 8(1), 3604-3610.

52.

Pushparaj R., Dinakaran M., (2016). An Energy aware routing for Manets using Dynamic power

threshold with load balancing.

World Applied Sciences Journal, 34(1), 120-127.

53.

SenthilKumar M, Ilango P., (2016). Analysis of DNA data using Hadoop Distributed File System.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(3).

54.

Dharinya, S. (2016). Analysis of document summarization and word classification in a smart

environment.

Indian Journal of Science and Technology, 9(19).

55.

Sangamithra A., Vani. M.P., (2016). Analysis of Network Security Spasms and Circumvention.

International Journal of Engineering and Technology, 8(2), 604-608.

56.

Thippa Reddy, G., & Khare, N. (2016). FFBAT-Optimized Rule Based Fuzzy Logic Classifier

for Diabetes.

In International Journal of Engineering Research in Africa (Vol. 24, pp. 137-152). Trans Tech Publications.

57.

Manogaran, G., Thota, C., & Kumar, M. V. (2016). Meta Cloud Data Storage architecture for

Big Data security

in cloud computing. Procedia Computer Science, 87, 128-133.

58.

Suganya P., Pradeep Reddy Ch., (2016). Potential threats caused by malicious nodes and various counter

measures available in MANET: A Survey. Research Journal of Pharmaceutical, Biological and

Chemical Sciences, 7(3), 1012-1016.

59.

Senthilkumar, M. N. M., & Senthilkumaran, U. (2016). Review of asymmetric key cryptography in wireless

sensor networks. International Journal of Engineering and Technology, 8(2), 859-862.

60.

Gunasekaran G., Venkatesan M., (2016). Review on Visualization Techniques for Medical Data and its Application.

Research Journal of Pharmaceutical, Biological and Chemical Science, 7(3), 169-173.

61.

Gagneja, K., & Singh, J. (2016). Survey and analysis of security issues on RSA algorithm for digital video data.

Journal of Discrete Mathematical Sciences and Cryptography, 19(1), 39-55.

62.

Rajesh kaluri, (2016). A Comparative study on image segmentation techniques. International Journal of Pharmacy

and Technology, 8(2), 12712-12717.

63.

Srinivas Koppu, Madhu Viswanathan, (2016). A Novel Chaotic Image Encryption System for color images based

Arnold Cat Map and Efficient Pixel Shuffling. International Journal of Pharmacy and Technology, 8(2), 13353-13361.

64.

Subha, S., & Sakthivel, R. (2016). A Power Saving Multiplication Algorithm. International Journal of Applied

Engineering Research, 11(9), 6200-6203.

65.

Manikandan N., Subha S., (2016). A Review on evaluating the usage of multiple cores effectively in personal

computer based applications. International Journal of Pharmacy & Technology, 8(2), 3916-3927.

66.

Dinakaran M., (2016). A Review on requirement of self sustainable natural farming and

application of information

and communication technology (Agro Informatics) for agriculture in India. International Journal

of Pharmacy & Technology, 8(2), 3944-3956.

67.

Nagaraja G., Pradeep Reddy Ch., (2016). A Survey on group key management frameworks for secure group

communication in mobile Ad hoc Networks. International Journal of Pharmacy & Technology, 8(2), 4121-4129.

68.

Srinivas Koppu, Madhu Viswanatham V., (2016). A Survey on security issues: Digital Images. International Journal

of Pharmacy & Technology, 8(2), 13420-13427.

69.

Santhi K., Saravanan R., (2016). A Survey on queueing models for cloud computing. International Journal of Pharmacy

& Technology, 8(2), 3964-3977.

70.

Manivannan S.S., (2016). A Systematic survey of routing attacks and counter measures in wireless networks.

International Journal of Pharmacy & Technology, 8(2), 3957-3963.

71.

Agilandeeswari, L., & Ganesan, K. (2016). An efficient hilbert and integer wavelet transform

based video watermarking.

Journal of Engineering Science and Technology, 11(3), 327-345.

72.

Kuruva Lakshmanna, Rajesh Kaluri, Thippa Reddy G., Nagaraja G., Dhenesh V Subramanian, (2016).

An enhanced algorithm for frequent pattern mining from Biological sequences. International

Journal of Pharmacy & Technology, 8(2), 12776-12784.

73.

Subha, S. (2016). An Improved Non-Restoring Algorithm. International Journal of Applied

Engineering Research, 11(8), 5452-5454.

74.

Rajesh Kaluri, Pradeep Reddy Ch., (2016). An overview of Human Gesture Recognition.

International Journal of Pharmacy & Technology, 8(2), 12037-12045.

75.

Arivu Selvan K., Sathiyamoorthy E., (2016). Automated Retrieval of medical images based on

distinct features using Fuzzy Logic approach.

International Journal of Pharmacy & Technology, 8(2), 13230-13239.

76.

Rahamathunnisa U., Saravanan R., (2016). Classificationn of Noise in Video – A Review.

International Journal of Pharmacy & Technology, 8(2), 3928-3932.

77.

Kumar, N. S., & Muruganantham, D. (2016). Disambiguating the Twitter Stream Entities and Enhancing

the Search Operation Using DBpedia Ontology: Named Entity Disambiguation for Twitter Streams.

International Journal of Information Technology and Web Engineering (IJITWE), 11(2), 51-62.

78.

Deepa M., Santhi K., Benjula Anbu Malar M.B., Lawanya Shri M., (2016).

Distributed Detection of malicious

nodes in wireless sensor networks under Byzantine Attack. International Journal of Pharmacy

& Technology, 8(2), 13546-13552.

79.

Lawanya Shri M., Benjula Anbu Malar M.B., Santhi K., Deepa M., (2016). E-Learning system

with Hierarchical

attribute set based encryption access control in cloud. International Journal of Pharmacy &

Technology, 8(2), 12785-12792.

80.

Mohankumar, S., & Balasubramanian, V. (2016). Identifying Effective Features and Classifiers for Short

Term Rainfall Forecast Using Rough Sets Maximum Frequency Weighted Feature Reduction Technique.

CIT. Journal of Computing and Information Technology, 24(2), 181-194.

   

81.

Dharmendra Singh Rajput, Praveen Kumar Reddy M, Shrivastava D.P., (2016).

Mining Frequent Termset for

Web document data using Genetic Algorithm. International Journal of

Pharmacy & Technology, 8(2), 4038-4054.

82.

Mohankumar P., Balamurugan, (2016). Optimality analysis of query processing using various

caching approaches –

A Review. International Journal of Pharmacy & Technology, 8(2), 3739-3751.

83.

Manivannan, S. S., & Sathiyamoorthy, E. (2016). Preventing health care web applications from

session hijack attacks

using session key authentication and distributed session id. ARPN Journal of Engineering and

Applied Sciences,11(13), 8257-8263.

84.

Perumal, V. (2016). Randomized Symmetric Crypto Spatial Fusion Steganographic System.

Journal of ICT Research and Applications, 10(1), 15-28.

85.

Durai Raj Vincent P M., (2016). RSA Encryption Algorithm – A Survey on its various forms and

its security level.

International Journal of Pharmacy & Technology, 8(2), 12230-12240.

86.

Durai Raj Vincent P M., (2016). Secured Healthcare Date exchange using proposed security scheme.

International Journal of Pharmacy & Technology, 8(2), 12144-12154.

87.

Prabukumar, M., & Ray, B. K. (2016). Semi-circular angle-based one bit circle generation algorithm

on a hexagonal grid.

International Journal of Computer Aided Engineering and Technology, 8(3), 199-216.

88.

Krithika, L. B. Lakshmi Priya G G. (2016). Student Emotion Recognition System (SERS)

for E-Learning

Improvement Based on Learner Concentration Metric. Procedia Computer Science, 85, 767-776.

89.

Kaushik Roy, Ramya G., (2016). Survey on mobile vulnerability issues and basic security policies.

International Journal of Pharmacy & Technology, 8(2), 3823-3833.

90.

Hemalatha, S., & Anouncia, S. M. (2016). A Computational Model for Texture

Analysis in Images with Fractional Differential Filter for Texture Detection. International

Journal of Ambient Computing and Intelligence, 7(2).

91.

Chowdhary, C. L., & Acharjya, D. P. (2016). A hybrid scheme for breast cancer detection using

intuitionistic fuzzy rough set technique.

International Journal of Healthcare Information Systems and Informatics, 11(2).

92.

Senthilkumar, M., & Ilango, P. (2016). A Survey on Job Scheduling in Big Data. Cybernetics

and Information Technologies, 16(3), 35-51.

93.

Malar, M. B. A., Shri, M. L., Deepa, M., & Santhi, K. (2016). Approach for Secure Authorized

Deduplication using Hybrid Cloud. International Journal of Applied Engineering Research,

11(15), 8480-8482.

94.

Ramachandran, P., & Dinakaran, M. (2016). Signal Strength and Residual Power Based Optimum

Transmission Power Routing for Mobile Ad hoc Networks. Procedia Computer Science, 92, 168-174.

95.

Parimala, M., & Lopez, D. (2016). Spatio-temporal graph clustering algorithm based on attribute

and structural similarity.

International Journal of Knowledge-based and Intelligent Engineering Systems, 20(3), 149-160.

96.

Das, A. J., Wahi, A., Kothari, I., & Raskar, R. (2016). Ultra-portable, wireless smartphone

spectrometer for rapid,

non-destructive testing of fruit ripeness. Scientific reports, 6, 32504.

97.

Anusha, K., & Sathiyamoorthy, E. (2016). OMAMIDS: Ontology Based Multi-Agent Model

Intrusion Detection System for Detecting

Web Service Attacks. Journal of Applied Security Research, 11(4), 489-508.

98.

Prabhavathy P, Tripathy BK, Venkatesan Meenakshi Sundaram, (2016). Covering based

refined Rough K-Means Algorithm,

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(5), 2142-2151.

99.

Senthil Kumar N, Kauser Ahamed P. (2016). Pervasive utilization of PSO techniques over

twitter data streams.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(5), 796-803.

100.

Anitha, A., & Acharjya, D. P. (2016). Customer Choice of Super Markets using Fuzzy

Rough Set on Two Universal Sets

and Radial Basis Function Neural Network. International Journal of Intelligent Information

Technologies (IJIIT), 12(3), 20-37.

101.

Vincent, P. D. R., & Sathiyamoorthy, E. (2016). A novel and efficient public key encryption

algorithm. International

Journal of Information and communication technology, 9(2), 199-211.

102.

Shivhare, R., & Kumar, C. A. (2016). On the cognitive process of abstraction. Procedia

Computer Science, 89, 243-252.

103.

Ramu, S. P., & Sevugan, P. (2016), An approach for efficient pre-processing of multi-temporal

hyperspectral satellite

imagery., The IIOAB Journal, 7(5), 12-20.

104.

Kumaran U., Neelu Khare, (2016). An Empirical study of security in Text mining for large

datasets. International

Journal of Control theory and applications, 9(6), 2737-2743.

105.

Prasanna, S., & Ezhilmaran, D. (2016). Association rule mining using enhanced apriori with

modified GA for stock

prediction. International Journal of Data Mining, Modelling and Management, 8(2), 195-207.

106.

Mani P., Prasanna M., (2016). A Study on functional specification based test case generation

for real-time systems.

International Journal of Engineering and Technology, 8(4), 1801-1806.

107.

Lakshmanna, K., & Khare, N. (2016). Constraint-based measures for DNA sequence mining

using group search

optimization algorithm. International Journal of Intelligent Engineering and systems, 9(3), 91-100.

108.

Radhakrishnan, S., & Devarasan, E. (2016). Computing the Probability on Socio Economic

Factors to Predict the Crime

Locations by Means of Joint Probability Based AMABC-FCIL. International Journal of Intelligent

Engineering & Systems, 9(3), 80-90.

109.

Bhushan, S. B., & Reddy, P. (2016). BB-LBA: biogeography-based load balancing algorithm in multi

cloud domain.

International Journal of Internet Protocol Technology, 9(2-3), 100-106.

110.

Balakrishnan, S. M., & Sangaiah, A. K. (2016). Aspect-oriented middleware framework for resolving

service discovery

issues in Internet of Things. International Journal of Internet Protocol Technology, 9(2-3), 62-78.

111.

Arivuselvan K., Sathiyamoorthy E., (2016). Analysing EEG sub-bands to distinguish between

individuals with neural

disorder using Back propagation neural network. International Journal of Pharma and

Bio sciences, 7(4), 80-87.

112.

Kumar, S., Saravanakumar, K., & Deepa, K. (2016). On Privacy and Security in Social Media–

A Comprehensive Study.

Procedia Computer Science, 78, 114-119.

113.

Pranusha Soma, Arivuselvan K., (2016). Automated Recognition of Emotions From Facial

Expressions using Back

propagation Neural networks. Research Journal of Pharmaceutical, Biological and Chemical Sciences,

7(4), 1895-1902.

114.

Magesh G., (2016). A review paper: Student attitude towards computer science. International

Journal of Pharmacy &

Technology, 8(3), 4653-4666.

115.

Angulakshmi M., (2016). Big Data Analytics – A Review. International Journal of Pharmacy &

Technology, 8(3), 4634-4639.

116.

Sudha Senthilkumar, Madhu Viswanatham, (2016). Survey on Data Access Control techniques in

cloud computing.

International Journal of Pharmacy & Technology, 8(3), 17442-17461.

117.

Kavitha G., (2016). Factors associated with improving quality of healthcare services. International

Journal of Pharmacy

& Technology, 8(3), 4844-4856.

118.

Praveen Kumar Reddy M., Nagaraja G., (2016). Creating trusted learning by using QR based

U learning System.

International Journal of Pharmacy & Technology, 8(3), 18268-18272.

119.

Rajeswari C., (2016). Performance analysis of sports persons using data mining based ranking

and classification

methods. International Journal of Pharmacy & Technology, 8(3), 18070-18097.

120.

Sree Dharinya S., Kirubathangam R., (2016). Analyzing a selection strategy for data De-duplication in large datasets.

International Journal of Pharmacy & Technology, 8(3), 16590-16595.

121.

Chandrasegar Thirumalai, (2016). Physicians drug encoding system using an efficient and secured linear public key

cryptosystem (ESLPKC). International Journal of Pharmacy & Technology, 8(3), 16296-16303.

122.

Prabhu J., (2016). A survey on slim process with developers in agile software. International Journal of

Pharmacy & Technology, 8(3), 15558-15565.

123.

Asha N., (2016). Customer segregation in banking organisation using knowledge management. International

Journal of Pharmacy & Technology, 8(3), 17645-17649.

124.

Vijay Anand R., Dinakaran M., (2016). Automation Framework to perform measure actions from NBI.

International Journal of Pharmacy & Technology, 8(3), 16261-16276.

125.

Chiranji Lal Chowdhary, (2016). A review of feature extraction application areas in medical imaging.

International Journal of Pharmacy & Technology, 8(3), 4501-4509.

126.

Navaneethan C., (2016). A Literature Review on energy saving along with precautions in wireless sensor network.

International Journal of Pharmacy & Technology, 8(3), 15408-15424.

127.

Sumangali K., (2016). Security in sensor networks and necessity for self destruction. International Journal

of Pharmacy & Technology, 8(3), 15566-15575.

128.

Rathi R., (2016). Hybridization of soft computing technique with Apriori for Association rule mining.

International Journal of Pharmacy & Technology, 8(3), 15820-15827.

129.

Kumaresan P., Prabukumar M., Yokesh Babu Sundaresan, (2016). An Adaptable web based light weight

framework for remote HVAC system using programmable thermostat. International Journal of

Pharmacy & Technology, 8(3), 16456-16466.

130.

Mohankumar P., Prasanna S., Gunasekaran G., (2016). Intelligence inference user satisfactory refinement

for E-Applications. International Journal of Pharmacy & Technology, 8(3), 15917-15931.

131.

Sudheer Karnam, Thippa Reddy G., Lakshmanna Kuruva, Rajesh Kaluri, Srinivas Koppu, (2016).

Dynamically improved weighted Apriori algorithm in Market analysis. International Journal

of Pharmacy & Technology, 8(3), 15658-15668.

132.

Siddharth Samal, Pradeep Reddy Ch., Bharath Bhushan S., (2016). Implementing a modified power

aware routing protocol using AODV protocol in MANET. International Journal of Pharmacy &

Technology, 8(3), 15600-15610.

133.

Vijayan R., (2016). An application for web navigation using speech engine for blind people.

International Journal of Pharmacy & Technology, 8(3), 15805-15819.

134.

Sudha M., (2016). Disease diagnosis using association rule mining based knowledge inference system.

International Journal of Pharmacy & Technology, 8(3), 16369-16379.

135.

Santhi K., Saravanan R., (2016). Facilitate refined keywords search over encrypted data on cloud.

International Journal of Pharmacy & Technology, 8(3), 15552-15557.

136.

Sudheer K., Thippa Reddy G., Lakshmanna K., (2016). An Android App to reduce battery power

consumption in smart phones. International Journal of Pharmacy & Technology, 8(3), 16164-16171.

137.

Vanitha M., (2016). Mutual Authentication using shared secret key generation. International Journal

of Pharmacy & Technology, 8(3), 16399-16411.

138.

Santhi K., Deepa M., Lawanya Shri M., Benjula Anbu Malar B., (2016). Efficient searching with multiple

keyword over encrypted cloud data by blind storage. International Journal of Pharmacy &

Technology, 8(3), 15704-15711.

139.

Prabhu J., Thanapal P., Vijay Anand R., (2016). Home Intruder Detection System. International

Journal of Pharmacy & Technology, 8(3), 15640-15650.

140.

Kumaresan P., Subha S., (2016). A Low cost multi-functional robot prototype for Intelligent services.

International Journal of Pharmacy & Technology, 8(3), 15370-15381.

141.

Suganya P., (2016). An approach for selection of replica nodes to support QOS requirement of

applications in VANET.

International Journal of Pharmacy & Technology, 8(3), 15789-15795.

142. 1

Nivash J P., Dhinesh Babu L D., (2016). An optimal IOT enabled data processing approach for effective

detection of remote air pollution. International Journal of Pharmacy & Technology, 8(3), 15496-15509.

143. 1.

Senthilkumaran U., Manikandan N., Senthilkumar M., (2016). Role of data mining on pharmaceutical

industry – a survey. International Journal of Pharmacy & Technology, 8(3), 16100-16106.

144. 1.

Kamalakannan J., Rajasekhara Babu, (2016). Segmentation techniques on Mammograms to detect breast abnormality:

A survey. International Journal of Pharmacy & Technology, 8(3), 16089-16099.

145. 1

Vanmathi C., Prabu S., (2016). Steganography: A Comparative study, analysis of key issues and current trends.

International Journal of Pharmacy & Technology, 8(3), 4696-4715.

146. 1.

Deepa Mani., Anand Mahendran, (2016). DDOS detection and mitigation for managed security of cloud resources.

International Journal of Pharmacy & Technology, 8(3), 15455-15470.

147. 1

Meenatchi S., Prabu S., (2016). A cluster based load balancing technique for increasing the wireless sensor network life time.

International Journal of Pharmacy & Technology, 8(3), 4716-4727.

148.

Pounambal M., Nithyadharshini P S., (2016). Distributed channel allocation in smart grid networks

using Particle Swarm Optimization.

International Journal of Pharmacy & Technology, 8(3), 18547-18558.

149.

Ranjith D., Balajee J., Kumar C., (2016). In premises of cloud computing and models.

International Journal of Pharmacy

& Technology, 8(3), 4685-4695.

150.

Reddy, G. T., & Khare, N. (2017). An Efficient System for Heart Disease Prediction Using Hybrid OFBAT

with Rule-Based Fuzzy Logic Model. Journal of Circuits, Systems and Computers, 26(04), 1750061.

151.

Paramasivan, S. K., & Lopez, D. (2016). Forecasting of wind speed using feature selection and neural networks.

International Journal of Renewable Energy Research (IJRER), 6(3), 833-837.

152.

Thakare, V. R., & Singh, K. J. (2016). A Study of Security and Privacy Issues at Service Models of Cloud Computing.

Indian Journal of Science and Technology, 9(38).

153.

Uma K., (2016). Ambient Air prominence information analysis collision/population. Journal of Chemical and

Pharmaceutical Sciences, 9(4), 2566-2569.

154.

Uma. K., (2016). Efficient finding of item sets in knowledge representation using RHUI extraction.

Journal of Chemical and Pharmaceutical Sciences, 9(4), 2599-2601.

155.

Chithapuram, C. U., Cherukuri, A. K., Jeppu, Y. (2016). Aerial vehicle guidance based on passive

machine learning technique.

International Journal of Intelligent Computing and Cybernetics, 9(3), 255-273.

156.

Praveen Kumar Reddy M., Rajasekhara Babu M., (2016). Improving performance of program

by finding good optimal

sequences using sequence selection approach. ARPN Journal of Engineering and Applied Sciences,

11(17), 10563-10570.

157.

Nithya, S., & Jayakumar, C. (2016). Automatic Firewall Rule Generator for Network Intrusion

Detection System based on

Multiple Minimum Support. Indian Journal of Science and Technology, 9(41).

158.

Krishnan, S. N., & Srinivasan, P. (2016). A QOS Parameter based Solution for Black hole

Denial of Service Attack in Wireless

Sensor Networks. Indian Journal of Science and Technology, 9(38).

159.

Rajesh Kaluri, Kuruva Lakshmanna, Thippa Reddy, Sudheer Karnam, Srinivas Koppu., (2016).

A Comparative study on selecting

and ranking the test cases in software testing. ARPN Journal of Engineering and

Applied Sciences, 11(1), 754-757.

160.

Kamalakannan, J., & Babu, R. M. (2016). Early detection of breast cancer using GLCM

feature extraction in Mammograms.

IIOAB JOURNAL, 7(5), 170-179.

161.

Ahamed, B., & Ramkumar, T. (2016). Data Integration-Challenges, Techniques and Future

Directions: A Comprehensive Study.

Indian Journal of Science and Technology, 9(44).

162.

Nagaraja, G., & Ch, P. R. (2016). A Reliable Group Key Management Framework Using

Fuzzy Logic for MANETs.

International Journal of Intelligent Engineering and Systems, 9(4), 107-115.

163.

Kaluri, R., & Reddy, P. (2016). Sign Gesture Recognition Using Modified Region Growing

Algorithm and Adaptive

Genetic Fuzzy Classifier. Int J Intell Eng Syst, 9, 225-233.

164.

Nagaraja, G., & Ch, P. R. (2016). Mitigate Lying and On-Off Attacks on Trust Based Group Key

Management Frameworks in MANETs.

International Journal of Intelligent Engineering and Systems, 9(4), 215-224.

165.

Parimala, M., & Lopez, D. Spatio-Temporal Modelling of Frequent Human Mobility Pattern to

Analyse the Dynamics of Epidemic Disease.

International Journal of Intelligent Engineering & Systems, 9(4), 167-178.

166.

Bhushan, S. B., & CH, P. R. A QoS Aware Cloud Service Composition Algorithm for Geo-Distributed Multi Cloud Domain.

International Journal of Intelligent Engineering & Systems, 9(4), 147-156.

167.

Lakshmanna, K., & Khare, N. (2016). FDSMO: frequent DNA sequence mining using FBSB and optimization.

International Journal of Intelligent Engineering & Systems, 9(4), 157-166.

168.

LawanyaShri, M., Balusamy, B., & Subha, S. (2016). Threshold-Based Workload Control for an Under-Utilized Virtual Machine

in Cloud Computing. International Journal of Intelligent Engineering & Systems, 9(4), 234-241.

169.

Anusha, K., & Sathiyamoorthy, E. (2016). A decision tree-based rule formation with combined PSO-GA algorithm for intrusion

detection system. International Journal of Internet Technology and Secured Transactions, 6(3), 186-202.

170.

Rajganesh, N., & Ramkumar, T. (2016). A Review on Broker Based Cloud Service Model. CIT. Journal of Computing and

Information Technology, 24(3), 283-292.

171.

Aarthy, S. L., & Prabu, S. (2016). A computerized approach on breast cancer detection and classification.

IIOAB JOURNAL, 7(5), 157-169.

172.

P J Kumar, Suganya P., (2016). Variable Replica allocation in VANET using node failure probability.

International Journal of Pharmacy & Technology, 8(4), 25990-25994.

173.

Sankar S., Srinivasan P., (2016). Internet of Things (IOT): A survey of empowering technologies, research opportunities and applications.

International Journal of Pharmacy & Technology, 8(4), 26117-26141.

174.

Srinivasan P., Nagamuthu Krishnan S.S., (2016). A recent survey on trust models for wireless sensor networks.

International Journal of Pharmacy & Technology, 8(4), 26163-26168.

175.

Vijaya C., Srinivasan P., (2016). A survey on resource scheduling in cloud computing.

International Journal of Pharmacy & Technology, 8(4), 26142-26162.

176.

Padmapriya, S., Kirubakaran, E., & Elango, N. M. (2016). Medical Image Classification using Hybrid classifier

by Extending the Attributes. Indian Journal of Science and Technology, 9(6).

177.

Uma, K., & Bangalore Morarji, A. R. Comparative Analysis of Current Engineering Education in Majority Countries.

Journal of Chemical and Pharmaceutical Sciences, 10(1), 293-296.

178.

Navaneethan C., Meenatchi S., Kumar P J., Suganya P., (2016). Comparison of RSA and MD5 algorithm.

International Journal of Pharmacy & Technology, 8(4), 26609-26615.

179.

Kumar P J., Suganya P., Navaneethan C., Meenatchi S., (2016). BigData social media analysis using R and Hadoop.

International Journal of Pharmacy & Technology, 8(4), 26616-16620.

180.

Divya Udayan J., HyungSeok Kim, (2016). Constrained Procedural Modeling of Real Buildings from single façade layout.

International Journal of Computer Vision and Signal Processing, 6(1), 33-46.

181.

Udayan, J. D. (2016). An Analysis of Reconstruction Algorithms Applied to 3D Building Modeling.

Indian Journal of Science and Technology, 9(33).

182.

Iyapparaja M., (2016). Coupling and Cohesion metrics based measurement of software reusable component strength.

International Journal of Pharmacy & Technology, 8(4), 21515-21526.

183.

Kumaran, U., & Khare, N. (2016). A Review on Privacy Preserving Data Mining using Secure Multiparty Computation.

Indian Journal of Science and Technology, 9(48).

184.

Ravi, C., & Khare, N. (2016). BGFS: Design and Development of Brain Genetic Fuzzy System for Data Classification.

Journal of Intelligent Systems.

185.

Ravi, C., & Khare, N. (2016). Review of Fuzzy Rule Based Classification systems. Research Journal of Pharmacy

and Technology, 9(8), 1299-1302.

186.

Deepa, N., & Ravi, C. (2016). Dimension Reduction Using Principal Component Analysis for Pharmaceutical

Domain. Research Journal of Pharmacy and Technology, 9(8), 1169-1173.

187.

Kaluri, R., & Reddy, C. P. (2016). A framework for sign gesture recognition using improved genetic algorithm and

adaptive filter. Cogent Engineering, 3(1), 1251730.

188.

Deepa, N., & Ganesan, K. (2016). A Brief Survey of Decision Making Methods and its Applications in Various

Domains. Research Journal of Pharmacy and Technology, 9(8), 1079-1082.

189.

Deepa, N., & Ganesan, K. (2016). Aqua Site Classification Using Neural Network Models. AGRIS on-line Papers

in Economics and Informatics, 8(4), 51.

190.

Deepika S., Ushadevi G., (2016). Performance analysis of topology based Ad-hoc wireless routing protocols using

Qualnet. International Journal of Pharmacy & Technology, 8(4), 25527-25533.

191.

Raman, I. (2016). Certain height-balanced subtrees of hypercubes. International Journal of Computer Mathematics:

Computer Systems Theory, 1(1), 32-41.

192.

Kuppusamy, L., Raman, I., & Krithivasan, K. (2016). On succinct description of certain context-free languages by

ins-del and matrix ins-del systems. International Journal of Foundations of Computer Science, 27(7), 775-786.

193.

Bhattacharya, S. (2016). A review of the application of automation technologies in healthcare domain. Research

Journal of Pharmacy and Technology, 9(12), 2343-2348.

194.

Singh, B., Bhattacharya, S., Chowdhary, C. L., & Jat, D. S. A review on internet of things and its applications in

healthcare. Journal of Chemical and Pharmaceutical Sciences. 10(1), 447-452.

195.

Srinivasa Gupta N., Valarmathi B., (2016). Opinion mining using intuitive scoring approach. International Journal

of Pharmacy & Technology, 8(4), 21527-21546.

196.

Sivashankari R., Valarmathi B., (2016). A Literature survey on entity extraction techniques in Bio-medical datasets.

International Journal of Pharmacy & Technology, 8(4), 5055-5066.

197.

Raghavan, R., & Singh, K. J. (2016). Necessity of different patterns of fingerprint and its applications: A study.

International Journal of Applied Engineering Research, 11(8), 5787-5790.

198.

Brindha, K., & Jeyanthi, N. (2016). DOVC: Data Obfuscation Visual Cryptography to Protect Cloud Storage.

International Journal of Soft Computing, 11(6), 374-381.

199.

Sundaresan, Y. B., & Kumaresan, P. (2016). A Comparative Analysis of Low Cost Solutions for Quiz Controller

and Classroom Access Control Systems. Research Journal of Pharmacy and Technology, 9(9), 1357-1362.

200.

Sundaresan, Y. B., Kumaresan, P., & Prabu, A. S. (2016). Anamolized Based Security for Private Information

Attacks on Social Network. International Journal of Applied Engineering Research, 11(13), 7914-7919.

201.

Ramya, G. (2016). Survey on various Classes of Picture Languages. International Journal of Applied Engineering

Research, 11(8), 5376-5381.

202.

Geraldine Bessie Amali D., Dinakaran M., (2016). Solution of the non linear least squares problem using a new gradient

based genetic algorithm, ARPN Journal of Engineering and Applied Sciences, 11(21), 12876-12882.

203.

Priya, R. S., Prabu, S., & Dharun, V. S. (2016). F-SIFT and FUZZY-RVM based efficient multi-temporal image

segmentation approach for remote sensing applications. Automatic Control and Computer Sciences, 50(3), 151-164.

204.

Senthilkumar M., Ilango P., (2016). Big data optimization for social networking tweet. International Journal

of Soft Computing, 11(5), 305-311.

205.

Rani, B. S. (2016). A Novice’s Perception of Partial Homomorphic Encryption Schemes. Indian Journal of

Science and Technology, 9(37).

206.

Pandiyan, S., & Perumal, V. (2016). A Survey on Various Problems and Techniques for Optimizing Energy

Efficiency in Cloud Architecture. Walailak Journal of Science and Technology (WJST), 14(10), 749-758.

207.

Sanjeevi, P., Balamurugan, G., & Viswanathan, P. (2016). The improved DROP security based on hard AI problem

in cloud. International Journal of Internet Protocol Technology, 9(4), 207-217.

208.

Sumathi, D., Velmurugan, T., Nandakumar, S., & Renugadevi, S. (2016). Dynamic Weight Assignment based

Vertical Handoff Algorithm for Load Optimization. Indian Journal of Science and Technology, 9(37).

209.

Ramaiah, M., & Ray, B. K. (2016). An iterative point elimination technique to retain significant vertices on

digital planar curves. International Journal of Computational Vision and Robotics, 6(4), 354-368.

210.

Shini, S. N. (2016). A survey on population based meta-heuristic techniques. International Journal of Chemical

and Pharmaceutical Analysis, 4(1), 7.

211.

Vanitha, M. (2016). Survey on Secured Password Authentication for IOT. Advances in Systems Science and

Applications, 16(3), 21-32.

212.

Thandeeswaran, R., & Durai, M. S. (2016). DPCA: Dual Phase Cloud Infrastructure Authentication.

International Journal of Communication Networks and Information Security, 8(3), 197.

213.

Pounambal, M. (2016). Survey on channel allocation techniques for Wireless Mesh Network to reduce

contention with Energy Requirement. Indian Journal of Science and Technology, 9(32).

214.

Gopal, D. G., & Saravanan, R. (2016). Selfish node detection based on evidence by trust authority and

selfish replica allocation in DANET. International Journal of Information and Communication Technology, 9(4), 473-491.

215.

Seetha, H., Murty, M. N., & Saravanan, R. (2016). Classification by majority voting in feature partitions.

International Journal of Information and Decision Sciences, 8(2), 109-124.

216.

Nirmala, M., Vidyavathi, M., Nivash, J. P., & Kumar, C. P.(2016). Scalable cloud computing based

healthcare application. International Journal of Pharmacy & Technology, 8(4), 25891-25901.

217.

Nirmala M., Pavan Kumar C S., Ansu Miriam Varghese, Neethu Santhosh. (2016). Text Encryption and

Decryption strategy using matrix operations. International Journal of Pharmacy & Technology, 8(4), 25910-25917.

218.

Thathera, H., Shashi, H., & Rajput, D. S. (2016). Green Computing: An Earth Friendly System,

International Journal of Pharmacy and Technology, 8(4):25540 – 25550.

219.

Gupta, S., AkashKataria, S. R., & Rajput, D. S. (2016). Information security issues in big data: solution

using ppdm (privacy preserving data mining), International Journal of Pharmacy & Technology, 8(4): 25551 – 25568.

220.

C. Ranichandra and B.K. Tripathy, 2016. A Study on Non Java Options for Mapreduce Programming with Hadoop.

Asian Journal of Information Technology, 15(16): 2999-3003.

221.

Nithya S., Asha Jerlin M., Jayakumar C. (2016). A Survey of software defined network. International

Journal of Pharmacy & Technology, 8(4), 25944-25958.

222.

Asha Jerlin, M., Nithya S., Coker Oswald, Jayakumar C., (2016). Layer two firewall in software defined network.

International Journal of Pharmacy & Technology, 8(4), 25365-25372.

223.

Asha Jerlin M., Jayakumar C., Prabhu J., (2016).EFE:Efficient feature extraction algorithm for dynamic

malware analysis in windows executables using API call sequence. International Journal of Pharmacy & Technology,

8(4), 25373-25383.

224.

Asha Jerlin M., Nithya S., Jayakumar C., Robin Rohit. (2016). A case study on advanced evasion techniques.

International Journal of Pharmacy & Technology, 8(4), 26599-26608.

225.

Alagiri I., (2016). Multipath life time prediction of node-to-node communication using multipoint relays

in OLSR protocol for mobile adhoc networks. International Journal of Pharmacy & Technology, 8(4), 26584-26598.

226.

Devendiran S., Manivannan K., Arun tom Mathew, Rajeswari C., (2016). Vibration signal based fault

diagnosis of gears using ensemble empirical mode decomposition and linguistic hedges neural fuzzy classifier with

selected features.

Journal of Chemical and Pharmaceutical Sciences, Special Issue 3, 47-57.

227.

Singh, B. (2016). Nurse’s attitude towards computerization in private hospitals of Tamil Nadu, India.

Research Journal of Pharmacy and Technology, 9(12), 2205-2210.

228.

Charanya, R., Aramudhan, M., & Saravananaguru, R. K. (2016). A Review on Access Control Issues in EHealth

Application in Cloud Computing. Indian Journal of Science and Technology, 9(42).

229.

Dharmendra Singh Rajput, Ramjeevan Singh Thakur, Ghanshyam Singh Thakur, (2016). A Computational model for

knowledge extraction in uncertain textual data using karnaugh map technique.

International Journal of Computing Science and Mathematics, 7(2).

230.

Ikram, S. T., & Cherukuri, A. K. (2016). Improving accuracy of intrusion detection model using PCA and optimized

SVM.

Journal of computing and information technology, 24(2), 133-148.

231.

Thaseen, S., & Kumar, C. A. (2016). Intrusion Detection Model using PCA and Ensemble of Classifiers.

Advances in Systems Science and Applications, 16(2), 15-38.

232.

Ramalingam, S. P., & Mouli, P. C. (2016). Two-level dimensionality reduced local directional pattern for

face recognition. International Journal of Biometrics, 8(1), 52-64.

233.

Priya V., Subha S., Balamurugan B., (2016). Quality-of-service in cloud computing: A Survey.

International Journal of Pharmacy & Technology, 8(4), 25742-25753.

234.

Singh, P. K., & Kumar, C. A. (2016). Analysis of composed fuzzy contexts through projection.

International Journal of Data Analysis Techniques and Strategies, 8(3), 206-219.

235.

Dinakaran M., Belgacem F.B.M. (2016). An experimental study to prevent packet hiding over wireless

networks using AONTS and swarm intelligent algorithm. International Journal of Pharmacy & Technology, 8(4),

25596-25605.

236.

Geraldine Bessie Amali D., Dinakaran M., (2016). A review of heuristic global optimization based

artificial neural network training approaches. International Journal of Pharmacy & Technology, 8(4), 21670-21679.

237.

Jayanthi, M. Prabadevi B., (2016). Multi-keyword ranked search over encrypted data supporting

synonym query. The IIOAB Journal, 7(1), 1.

238.

Susmita Subhadarshini Panda, Saravanan R., (2016). A secure approach to Spatial Image Steganography.

International Journal of Pharmacy & Technology, 8(2), 13384-13400.

239.

Harish H S., Vijayan R., (2016). A Secured and Reliable routing in opportunistic network in MANET

using Trust management scheme based on behaviour feedback. International Journal of Pharmacy &

Technology, 8(2), 12514-12522.

240.

Nagendramani P., Vijayan R., (2016). An analysis on the performance of various replica allocation

algorithms in cloud using Matlab. International Journal of Pharmacy & Technology, 8(2), 3892-3902.

241.

Hemavathi E., Srinivasa Perumal R., (2016). An approach for automatic vehicle plate recognition in

unconstrained environment. International Journal of Pharmacy & Technology, 8(2), 4013-4025.

242.

Ajay Mummadisetti, Rajeshwar Reddy Kadari, Rajeev Sushmanth Dammu, Durai Raj Vincent P M., (2016).

An effective approach of RSA & impact of wieners attack: Survey. International Journal of Pharmacy &

Technology, 8(2), 13093-13099

243.

Gopika D., Kumar P J., (2016). An innovative approach for user validation system using keylog and Sudoku

algorithm.

International Journal of Pharmacy & Technology, 8(2), 11732-11739.

244.

Ashutosh Sharma, Vijayan R., (2016). Correlative study of Video compression techniques – H.264/AVC.

International Journal of Pharmacy & Technology, 8(2), 12638-12646.

245.

Kaushik Roy, Brindha K., Sudha Senthil Kumar, (2016). Optimizing the executing time of compiler optimization

using code segmentation technique. International Journal of Pharmacy & Technology, 8(2), 12537-12551.

246.

Pavithra S., Lawanya Shri M., (2016). Privacy Preserving the Electronic Health Record using Encryption Protocol

in Cloud Computing. International Journal of Pharmacy & Technology, 8(2), 13261-13268.

247.

Sathiyamoorthy E., Jagadeesh G., Vaibhav Mahajan, (2016). Home Automation system over mobile network.

International Journal of Pharmacy & Technology, 8(3), 16352-16362.

248.

E. Vijayan, N.C. SenthilKumar, Siddhant Agnihotry, Mehaboob Subuhani, (2016). Effective Clustering in

Big Data for efficient knowledge discovery using parallel K-means and enhanced K-means algorithm.

International Journal of Pharmacy & Technology, 8(3), 18646-18652.

249.

Salman Ahmed G., (2016). A Framework for classification of medical data using Bijective soft set.

International Journal of Pharmacy & Technology, 8(3), 16559-16568.

250.

Vijayan E., Senthil Kumar N C., Navneet Shukla, Rudra Prasad Dwivedi, (2016). Architecture of parallel

database to make future database processing high. International Journal of Pharmacy & Technology, 8(3),

18640-18645.

251.

Navaneethan C., Ramkesh, (2016). Advanced Rail Fence Cipher Algorithm. International Journal

of Pharmacy & Technology, 8(3), 16539-16545.

252.

Akshay Gaikwad, Pradeep Reddy Ch., Bharath Bhushan S., (2016). A Keyed Hash message authentication

code technique for secure communication in VANETs. International Journal of Pharmacy & Technology, 8(3),

15620-15632.

253.

Vijayan E., SenthilKumar K., Shalini A.M., Suganya N., (2016). Image Segmentation and classification.

International Journal of Pharmacy & Technology, 8(3), 18325-18334.

254.

Thandeeswaran R., Ankita Vinod Mandekar, Jeyanthi N., (2016). Securing service set identifier of wireless

network. International Journal of Pharmaccy & Technology, 8(3), 16605-16610.

255.

Jidhesh R, Indusree J R, Sumathy S., (2016). Survey on congestion aware and adaptive routing protocols

in mobile ad hoc networks. International Journal of Pharmacy & Technology, 8(3), 16521-16538.

256.

Yuvan Shankar R K., Ramaprabha K P., Jayanthi R., (2016). Discovery against node isolation attack on

MANET and its node removal. International Journal of Pharmacy & Technology, 8(3), 16391-16398.

257.

Priya V., Sindhupaarkavi V., (2016). Convolution based Image Enhancement in unique finger impression.

International Journal of Pharmacy & Technology, 8(3), 15611-15619.

258.

Rajan Slathia, Jeyanthi N., (2016). Internet of Things in mobile health care (IOT-m Health). International

Journal of Pharmacy & Technology, 8(3), 15901-15916.

259.

Vijayan E., S., Hemalatha., S., Shweta Shaw, Alokananda Ghoshal, (2016). A new approach for collision free,

energy efficient, hybrid routing algorithm with the use of progressive adaptive concept.

International Journal of Pharmacy & Technology, 8(3), 18604-18610.

260.

Shakthi D.S., Prabadevi B., (2016). An approach to detect selfish and malicious node in Adhoc – MANETs.

International Journal of Pharmacy & Technology, 8(3), 16107-16117.

261.

Vijayan E., Senthilkumar K., Prernakumari, Sourabh Tolani, Prasenjeet Bhadra, (2016).

Convergence from SQL, NoSQL to NewSQL. International Journal of Pharmacy & Technology, 8(3), 18351-18355.

262.

Akshay Narayan Hegde, Vinay Kumar E., Vijayan R., (2016). Self-Routing: A Novel approach for

context based trust evaluation and malicious node detection in MANET. International Journal of Pharmacy &

Technology, 8(3), 15589-15599.

263.

Vijayan E., Senthil kumar K., Aishwarya Singh, Yasmeen Khatoon, (2016). Approach on big data using Hybrid cloud.

International Journal of Pharmacy & Technology, 8(3), 18344-18350.

264.

Shynu P.G., Lakshmipriya S., Pavithra J., (2016). A Novel Decentralised scheme for identity preserved access

control in cloud.

International Journal of Pharmacy & Technology, 8(3), 18141-18148.

265.

Sathya Sankaran, Sneha Ambhore, P.M. Durai Raj Vincent, (2016). Modified advanced encryption standard

with additional row transformation.

International Journal of Pharmacy & Technology, 8(3), 16436-16440.

266.

Koteswara Rao E., Vijayan R., (2016). Context based access optimizing system for Android mobile devices.

International Journal of Pharmacy & Technology, 8(3), 19071-19079.

267.

Manivannan S.S., Dhanashree P., Chandrasekaran C., (2016). Transport Plane [TP] simulator in

E-Utran LTE for Control Plane (CP).

International Journal of Pharmacy & Technology, 8(3), 16242-16253.

268.

Himanshu Dewangan, Angulakshmi M., Nagarajan I., (2016). Multiprocessing optimization –

parallel quick sort using OpenMp.

International Journal of Pharmacy & Technology, 8(3), 15633-15639.

269.

Harsha Sarah Thomas, Nancy Victor, (2016). An approach for Incremental frequent pattern mining

using modified Apriori Algorithm.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(6), 1049-1055.

270.

Uma, K., Radhakrishnan, P., & Vinoth, R. (2016). Compression of Compound Images using Fuzzy

Clustering Technique.

Indian Journal of Science and Technology, 9(S1).

271.

Uma, K., Vignesh, B., & Reynold, L. R. (2016). Encoding of Multifaceted Images using Pattern Matching Techniques.

Indian Journal of Science and Technology, 9(S1).

272.

Uma, K., Akram, K. W., & Vignesh, R. (2016). A Novel Method for Segmentation of Compound Images

using the Improved Fuzzy Clustering Technique.

Indian Journal of Science and Technology, 9(S1).

273.

Uma, K., Geetha, P., & Kannan, A. (2016). A novel segmentation of scanned compound images using fuzzy logic.

Journal of Medical Imaging and Health Informatics, 6(3), 763-768.

274.

Uma, K., & Kavitha, E. (2016). Comparison of Various Fingerprint Analysis Techniques.

Indian Journal of Science and Technology, 9(S1).

275.

Uma, K., & Reddy, G. R. (2016). Predicting Analysis of Data Mining Extraction Technique in

Secondary Education.

Indian Journal of Science and Technology, 9(S1).

276.

Uma, K., Pallavi, A. R., & Srilatha, S. (2016). Comparision of Blur Detection and Segmentation Techniques.

Indian Journal of Science and Technology, 9(S1).

277.

Aniket Sen, Prasun Jaiswal, Vikram, Prabadevi B. (2016). Improved K-Means clustering algorithm –

working with labelled datasets.

International Journal of Pharmacy & Technology, 8(4), 27091-27096.

278.

Mohamed Fahad M., Simama Hassan Mottur, Prasanna M., Mohammed Fazeel K., (2016). Prediction of

Life cycle models for software.

International Journal of Pharmacy & Technology, 8(4), 25763-25778.

279.

Girish Paul, Abhishek Chandan, Prasanna M., Abhishek Yadav, (2016). Voice based mail system for blind.

International Journal of Pharmacy & Technology, 8(4), 25754-25762.

280.

Shivam Kapil, Ashwini Kumar, Rishav Bansal, Nancy Victor, (2016). Social Network Forensics.

International Journal of Pharmacy & Technology, 8(4), 25843-25849.

281.

Ashish Gupta, Nancy Victor. (2016). Machine unlearning – An approach to make machine learning algorithms

forget data and authenticates ML level security. International Journal of Pharmacy & Technology, 8(4), 25807-25818.

282.

Ashish Gupta, Nancy Victor (2016). Real Time analysis of mobile GPS data. International Journal of Pharmacy &

Technology, 8(4), 25827-25834.

283.

Lokesh Sharma, Nancy Victor (2016). A Technique for classifying massive dataset using parallel ID3 approach.

International Journal of Pharmacy & Technology, 8(4), 25819-25826.

284.

Beryl Joylin A., Aswathi T., Nancy Victor, (2016). Sentiment analysis based on word-emoticon clusters.

International Journal of Pharmacy & Technology, 8(4), 25288-25296.

285.

Beryl Joylin A., Aswathi T., Suma P., Nancy Victor, (2016). Sentiment analysis on “Ebola” outbreak using twitter data.

International Journal of Pharmacy & Technology, 8(4), 25835-25842.

286.

Kumaran, U., Khare, N., & Suraj, A. S. (2016). Privacy preserving in data mining technical: A review. Research

Journal of Pharmacy and Technology, 9(11), 2023-2026.

287.

Sharathbabu B., Ayesha Banu S., Naveen Kumar S., Deepika S., (2016). Denoising ultrasound scan image from

speckle noise. International Journal of Pharmacy & Technology, 8(4), 26306-26311.

288.

Thanikaiselvan, V., Shastri, S., Ahmad, S., & Subashanthini, S. (2016). A New Pixel Value Based Steganography

Method for Data Security. Indian Journal of Science and Technology, 9(37).

289.

Kanugo, S., & Mekala, A. M. (2016). Particle Swarm Optimization based Edge Detection Algorithms for Computer

Tomography Images. Indian Journal of Science and Technology, 9(37).

290.

Shah, R., Subramaniam, S., Dasarathan, L., & Babu, D. (2016). Mitigating Malicious Attacks Using Trust Based

Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks. CIT. Journal of Computing and Information

Technology, 24(3), 237-252.

291.

Shubham D., Mithil P., Sumathy S., (2016). Fair resource allocation schemes for resource constrained cloud

computing environment. International Journal of Pharmacy & Technology, 8(4), 26260-26268.

292.

Shashank Joseph, Calvin Mugauri, Chunduru Anilkumar, Sumathy S., (2016). Access Control using attribute based

encryption in cloud computing: A survey. International Journal of Pharmacy & Technology, 8(4), 26282-26291.

293.

Meesala Shobha Rani, Sumathy S., (2016). Analysis of KNN, C5.0 and one class SVM for intrusion detection

system. International Journal of Pharmacy & Technology, 8(4), 26251-26259.

294.

Lawanya Shri M., Benjula Anbu Malar M B., Santhi K., Deepa M., Feslin Anish Mon., (2016). Threshold-based

virtual machine allocation in cloud environment. International Journal of Pharmacy & Technology, 8(4), 21547-21559.

295.

Nirmala M., Anshumati Gaikwad, Nittin Choudhary, Swati Bathla, (2016). A study on improving the

cloud security by virtualization. International Journal of Pharmacy & Technology, 8(4), 25885-25890.

296.

Nirmala M., Sharon Moses, Ankisetty Ramya, Ghanta Krishna Chaitanya., (2016). Managing and

Mitigating risks in Pharmaceutical supply chain management systems. International Journal of Pharmacy &

Technology, 8(4), 25864-25875.

297.

Nirmala M., Preethi E., Spoorti S Doddamani, Sharon Moses J, Chitturi Satya Pavan Kumar, (2016).

An approach to ensuring security in cloud-based social networks. International Journal of Pharmacy &

Technology, 8(4), 25918-25926.

298.

Tanu Maheshwari, Nirmala M., Dhinesh Babu L.D., Sharon Moses J., (2016). Extension of Rough set

K-Means using parallel mapreduce algorithm. International Journal of Pharmacy & Technology, 8(4), 25876-25884.

299.

Malge, A., Muthamil Selvan, T. (2016). A hybrid cloud approach for secure authorized deduplication.

International Journal of Pharmacy and Technology, 8(4), 25262-25272

300.

Hemanth, R.B., Vijayan, R. (2016). An enhanced ford-fulkerson algorithm to determine max-flow in large

mesh network using hadoop, International Journal of Pharmacy and Technology, 8(4), 25210-25220

301.

Das, S.K., Patil, M.D., Sumathy, S. (2016). Review On Neural Network Based Approaches For Intrusion

Detection System. International Journal of Pharmacy and Technology, 8(4), 26269-26281

302.

Ananya, Dutta, A., Sandhu, P.S., Thandeeswaran, R. (2016). A graph based message encryption algorithm.

International Journal of Pharmacy and Technology, 8(4), 26339-26345

303.

Benjula anbu Malar, M.B., Lawanya Shri, M., Deepa, M., Santhi, K., Mon, F.A. , (2016)Efficient system for

finding solution to recover bugs in software projects, International Journal of Pharmacy and Technology, 8(4), 21571-21579

304.

Khandelwal, R., Ellappan, V., Ajay, Hamsadhvani, A. (2016). Comparative study of algorithms to solve travelling

salesman problem. International Journal of Pharmacy and Technology,8(4), 25624-25631

305.

Kumar, P.J., Ellappan, V., Badala, P. (2016). Image duplication detection. International Journal of Pharmacy

and Technology, 8(4), 25632-25639

306.

Ellappan, V., Upadhayay, D., Yadav, R., Vandana (2016). Hand gesture recognition for physically disabled people.

International Journal of Pharmacy and Technology, 8(4), 25640-25647

307.

Dubey, A.K., Ellappan, V., Paul, R., Chopra, V. (2016). Comparative analysis of backtracking and genetic

algorithm in n queen’s problem. International Journal of Pharmacy and Technology, 8(4), pp. 25618-25623

308.

Aswini S., Kavya R S., Senthil kumaran U., (2016). Application of Internet of things and cloud computing for

health care – A survey. International Journal of Pharmacy & Technology, 8(4), 22009-22017.

309.

Aarthi B., Saranya R., Vaishnavi M., Senthil kumaran U., (2016). Agriculture facilitation using cloud computing

– survey. International Journal of Pharmacy & Technology, 8(4), 22028-22035.

310.

KV. Krishna, KV. Ganesh, Ashwini S., Senthil Kumaran U., (2016). A Survey on security methods in public id system.

International Journal of Pharmacy & Technology, 8(4), 21915-21922

311.

Suhasini K., Yamuna M., Senthil kumaran U., (2016). A review on various event management techniques.

International Journal of Pharmacy & Technology, 8(4), 5142-5149.

312.

Shreyas Kadu, Saryu Chugh, Nidhiben Bhatt, Nadesh R.K. (2016). Superintending of cloudlets in versatile

Ad-hoc ambience utilizing Qualnet – A review on performance analysis of routing mechanisms. International Journal

of Pharma and Bio sciences; Special issue SP02 “Healthcare Technology and management” 260-264.

313.

Keerthana A., Abirami B., Selva Kumar P., Rajaprabha M N., (2016). Dry eye monitors in computers & Mobiles –

Via Webcams & Front CAMs. International Journal of Pharmacy & Technology, 8(4), 26006-26012.

314.

Aman Shrivastav, Bharat Nalwaya, Sudish Kumar, Rajaprabha M N., (2016), Improvement on initial seed

selection for K-means algorithm.

International Journal of Pharmacy & Technology, 8(4), 26000-26005.

315.

Sunil Sigar, Senthil Kumar N., (2016). Effective processing of question generation from text. International

Journal of Pharmacy & Technology, 8(4), 25974-25980.

316.

Akshit Bhandari, Lavish Chhatwani, Shivali Chauhan, Senthil Kumar N., (2016).

An effective load balancing approach for handling big data.

International Journal of Pharmacy & Technology, 8(4), 25967-25973.

317.

Ayushi Jain, Saumya Bajpai, Shivali Jain, Uma Maheswari G., Jasmine Norman. (2016).

Providing and detecting steganographic content communication security.

International Journal of Pharmacy & Technology, 8(4), 26370-26375.

318.

Saurav K. Shaw, Mudit Jain, Jitesh Shaw, Durai Raj Vincent P M.,(2016).

A proposed design for secure hash algorithm-2 (SHA-2) using 640 bits.

International Journal of Pharmacy & Technology, 8(4), 26515-26523.

319.

Sudhir G., Lokesh S., Sathish Kumar K., Malathy E. (2016). Sharing file over cloud with privacy key generation.

International Journal of Pharmacy & Technology, 8(4), 25691-25698.

320.

Arjun Biyani, Ramya G., (2016). Recommendation engine for web products.

International Journal of Pharmacy & Technology, 8(4), 26019-26025.

321.

Prerna Kumari, Prasenjeet Bhadra, Ramya G., (2016). Study on performance issues in mobile application.

International Journal of Pharmacy & Technology, 8(4), 26292-26305.

322.

Shashi H., Honey Thathera, Ramya G., (2016). The Safeguarding concerns for mobile applications.

International Journal of Pharmacy & Technology, 8(4), 26032-26038.

323.

Himanshu Ewangan, Ramya G., (2016). Cross-platform mobile application development using Apache Cordova.

International Journal of Pharmacy & Technology, 8(4), 26026-26031.

324.

Nitish Chawla, Ramya G., (2016). Lookout Android Application. International Journal of

Pharmacy & Technology, 8(4), 26013-26018.

325.

Aditya Shivhare,Saurabh Kumar Pradhan, Manivannan S.S,(2016). Survey on Issues and Challenges in

biometric based authentication, International Journal of Pharmacy and Technology,4(8),26188-26192.

326.

E.Ragavan., C.Hariharan,N.Aravindraj, S.S.Manivannan., (2016). Real Time Water Quality Monitoring System,

International Journal of Pharmacy and Technology, 8(4), 26199-26205

327.

Ashwani Gupta, Nitin Katiyar, Brijendra Singh, Sweta Bhattacharya, (2016). Comparitive study on big data

architectures proposed for smart cities context, International Journal of Pharmacy and Technology,8(4), 25440-25451

328.

Yoginder Singh, Sweta Bhattacharya, Brijendra Singh, (2016). IoT: Framework for Smart City.

International Journal of Pharmacy and Technology, 8(4), 25432-25439.

329.

Pinaki Bhattacharjee, Sweta Bhattacharya, Govern Scholar Assessment Apparatus Employing Perusal Of Statistics,

International Journal of Pharmacy and Technology,8(4), 26312-26322

330.

Raju Kumar, Vijayan Ellappan, Kumar P.J, (2016), A Survey On Face Detection And Recognition Techniques

In Different Application Domain, International Journal of Pharmacy & Technology, 8(4), 25606 – 25610.

331.

Payal Nemade, Aarti Sharma, Eklendra Jadam, C.L.Chowdhary (2016), Survey On Grid Clustering Approach

With Intuitionistic Fuzzy Histogram, International Journal of Pharmacy & Technology, 8(4), 25475 – 25482.

332.

S. Kausal, V.K. Shukla, Eklendra Jadam, C.L.Chowdhary (2016), Learning Work On Online Educational Data

With Bi-Directional Mapping, International Journal of Pharmacy & Technology, 8(4), 25511 – 25520.

333.

Payal Nemade, Aarti Sharma, C.L.Chowdhary (2016), Study On Level Set Segmentation Based Classification

Using Mammograms, International Journal of Pharmacy & Technology, 8(4), 25483 – 25490.

334.

Gitanjali, J.,Abdul Khanadar, Bhanupriya Sharma, Shambhavi Srivastava (2016). Data mining from smart card

data using data clustering. International Journal of Applied Engineering Research, 11(1), 347-352.

335.

Hemalatha S., Giridharan L., (2016). A Steganographic Technique based region level sparse representation for

high density data hiding, International Journal of Pharmacy & Technology, 8(2), 12940-12949.

336.

Ajay, V. K., Desai, R., Gawannavar, M., & Nadesh, R. K. (2006). HGD: a rescue system for an alive human

gesture detection in disasters management-an experimental study. ARPN Journal of Engineering and

Applied Sciences, 11(11), 6826-6831.

337.

Hemalatha S., Santhosh Kumar S., (2016). Image Forgery Detection using Key-point Extraction and Segmentation.

International Journal of Pharmacy & Technology, 8(2), 13219-13229.

338.

Hemalatha S., Prasanna G., (2016). Robust Remote Authentication of Video Object through Steganographic mechanism.

International Journal of Pharmacy & Technology, 8(2), 12691-12700.

339.

Thanapal P, Muhammad Faizan M, (2016). Parental control for android smart phones. International Journal of

Pharmacy & Technology, 8(3), 16581-16589.

340.

Bharat Khatavkar, Nadesh R.K., (2016). A Comparative study and performance evaluations for using reactive

and hybrid routing approaches in intra and inter communication in VANET. International Journal of

Pharmacy & Technology, 8(3), 17776-17783.

341.

Priya V., Divya Vandana S., (2016). Chennai Rains Sentiment – An analysis of opinion about youngsters reflected

in tweets using Hadoop. International Journal of Pharmacy & Technology, 8(3), 16172-16180.

342.

Nadesh R.K., Akshaya Narayan Hegde, Vinay Kumar E., (2016). PANAS: A Personal Area Network for an

effective monitoring of an event in a pharmacy institute – An Empirical Study. International Journal of Pharmacy &

Technology, 8(3), 15932-15938.

343.

Priya V., Anupama Bhimnath, Sanjay M., (2016). Movement and motion modelling visitors of shopping mall.

International Journal of Pharmacy & Technology, 8(3), 16230-16241.

344.

Vijayan E., Senthilkumar N.C., Nirmal Kumar J., Mandakini Rastogi, Himika I., (2016). Cipher and Decipher of Image.

International Journal of Pharmacy & Technology, 8(3), 18653-18663.

345.

Vijayan E., Senthil kumar K., Aishwarya Singh, Yasmeen Khatoon, (2016). Approach on big data using Hybrid cloud.

International Journal of Pharmacy & Technology, 8(3), 18344-18350.

346.

Shynu P.G., Lakshmipriya S., Pavithra J., (2016). A Novel Decentralised scheme for identity preserved access control

in cloud. International Journal of Pharmacy & Technology, 8(3), 18141-18148.

347.

Baby C., Thippa Reddy G., (2016). Heart Disease prediction using Rule based Fuzzy Logic. International Journal of

Pharmacy & Technology, 8(3), 15471-15479.

348.

Nadesh, R. K., Arivuselvan, K., & Pathanjali, S. (2016). A Quantitative Review on Introducing the Election Process

with Cloud Based Electronic Voting and Measuring the Performance using Map Reduce. Indian Journal of Science

and Technology, 9(39).

349.

Bhavani S., Malathy E., Dorothy S., (2016). Prevailing parameters by Lease using Ant Colony Optimization.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(6), 1211-1219.

350.

Hardik Pandey, P J Kumar, Suganya P., (2016). Performance analysis of RBG Encryption algorithm.

International Journal of Pharmacy & Technology, 8(4), 25995-25999.

351.

Sundaresan, Y. B., Jaiswal, A. K., & Kumaresan, P. (2016). A Low Cost Prototype for Multiple Access Security System.

International Journal of Applied Engineering Research, 11(13), 7907-7913.

352.

Girish V K, Madhan R, Jagadeesh Gopal (2016). Sensor Detection Of Trains For National Train Enquiry System,

International Journal of Pharmacy & Technology, 8(4), 22182 – 22185.

353.

Suryapal singh, Ashish Singh and Arjun Lamba (2016) , GLCM and Gabor Wavelet Feature Extraction based Brain

Tumour Detection Using Medical Images, International Journal of Pharmacy and Technology, 8(4), 25505-25510.

354.

Ellappa, V., Kamalakannan, J., Babel, H., Dhamarikar, A. (2016). Access control mechanism in cloud. International

Journal of Pharmacy and Technology, 8(4), 25611-25617

355.

Vanmathi, C., Prabu, S. (2016). Steganography: A comparative study,analysis of key issues and current trends.

International Journal of Pharmacy and Technology,8(3), 4696-4715

356.

Vani M.P (2016).Incorporation Of Internet of Things with Cloud Auditing, International Journal of Pharmacy &

Technology, 8(4), 25779-25786

357.

Senthilkumaran U., Balamurugan B., Eswaran G., Mageswari U., (2016). Sentiment analysis of twitter data using

intelligent related word identification. International Journal of Pharmacy & Technology, 8(4), 26393-26401.

358.

Shreelekhya G., Yazhini, Senthilkumaran U., Manikandan N., (2016). Methods for evaluating software

architecture-A Survey. International Journal of Pharmacy & Technology, 8(4), 25720-25733.

359.

Sivaranjini V., Senthilkumaran U., Manikandan N., (2016). Optimizing the location deployment for

emergency meeting scheduling in disaster relief management. International Journal of Pharmacy & Technology, 8(4), 25714-25719.

360.

Deni Avinash A.B., SenthilKumaran U., Manikandan N., (2016). Automated summarization of academic

papers and generation of presentation slides. International Journal of Pharmacy & Technology, 8(4), 25710-25713.

361.

Manikandan N., Senthilkumaran U., Kumar P.J., (2016). Effective use of multiple cores for face recognition

in personal computers. International Journal of Pharmacy & Technology, 8(4), 25734-25741.

362.

Senthilkumar M., Manikandan N., Senthilkumaran U., Samy R., (2016). Weather data analysis using hadoop.

International Journal of Pharmacy & Technology, 8(4), 21827-21834.

363.

Thirumalai C.S., Senthil Kumar M., (2016). Secured e-mail system using base 128 encoding scheme.

International Journal of Pharmacy & Technology, 8(4), 21797-21806.

364.

Thirumalai C.S., Senthil Kumar M., (2016). Spanning tree approach for error detection and correction.

International Journal of Pharmacy & Technology, 8(4), 5009-5020.

365.

Chandrasegar T., Senthilkumar M., Silambarasan R., Westphall, C.B., (2016). Analyzing the strength of Pell’s RSA.

International Journal of Pharmacy & Technology, 8(4), 21869-21874.

366

Uma, K., Ashwini, S., & Kiruthika, S. (2016).Survey on Machine learning algorithms, International Journal

of Computer Science & Wireless Security (IJCSWS), 3(5):225-228.

367

Mishra, Sangeet, Asis Kumar Tripathy, and Pallavi Joshi. (2016).Making a Cloud Data Secure and Effective

for Better Performance of Services. Indonesian Journal of Electrical Engineering and Computer Science. 2(3): 695- 702

368

S. Sinduja, Dharmendra Singh Rajput, (2016). Analysis Of Imbalance Dataset Using Classification Techniques,

International Journal of Advanced Research Trends in Engineering and Technology, 4(19):517 – 522.

369

Rajput, D. S., & Gour, R. (2016). An IoT Framework for healthcare monitoring systems. International Journal

of Computer Science and Information Security, 14(5):451-455.

370

Sruthi, M., & Kavitha, B. R. (2016). A Survey on IoT Platform. International Journal of Scientific Research and

Modern Education.1(1): 468 – 473

371

Chowdhary, C. L., Sai, G. V. K., & Acharjya, D. P. (2016). Decreasing False Assumption for Improved Breast

Cancer Detection. Journal of Science And Arts, 2(35):157-176.

372

K.Santhi., M.Deepa.,M.Lawanya Shri.,M. B. BenjulaAnbu Malar,(2016). A Novel Method for Key

Aggregation On data Sharing in Cloud Storage Environment, International journal of Advanced Research

in Science and Engineering, 5(special issue no:1):142-148.

373

Santra, A. K. (2016). Stochastic Multifacility Location Problem under Triangular Area Constraint with

Euclidean Norm. International Journal on Recent and Innovation Trends in Computing and Communication

(IJRITCC), 4(3):111-116.

374

Mohan Vamsi M., Shantharajah S.P. (2016). Adaptive Neural Fuzzy Interface System for Cloud Computing,

International Journal of Advanced Research in Computer Science and Software Engineering, 6(10):92-96.

375

Sara Archana R, Prabadevi B, (2016).Social Network for Allocating and Sharing Cloud Resources using Trust Relationship.

International Journal of Computer Systems, 3(5): 394 – 396.

376

Deepika A, Prabadevi. (2016). A Decentralized Framework for Cloud Resources Provisioning with Malware

Detection, International journal of Computer Systems, 3(5):388-390.

377

Ananthy E, Prabadevi B, (2016).Gain Factor Trust - A Trust Evaluation Framework in Online Social Networks,

International Journal of Computer Systems, 3(5):391-393.

378

Rajput, D. S., & Khare, N. (2016). Fuzzy soft set decision-making model for social networking sites.

International Journal of Social Network Mining, 2(3): 256-266.

379

Kaavya, S., & Priya, G. L. (2016). Static Shot based Keyframe Extraction for Multimedia Event Detection.

International Journal of Computer Vision and Image Processing (IJCVIP), 6(1): 28-40.

380

Prasanna, M., & Iyapparaja, M. (2016). Optimistic Investigation on Open Source Testing Tools for Testing Applications.

International Research Journal of Engineering and Technology (IRJET), 3(12):633 – 635.

381

Prasanna, M., Iyapparaja, M., Dhenesh V Subramanian, (2016). Certain Investigations on Testing Tools for Regressing

Testing, International Research Journal of Engineering and Technology (IRJET), 3(12):630 – 632.

382

Rama Prabha K.P, Jayanthi R. (2016). Performance Issues of TCP in Wireless Networks and Performance

Enhancement Using TCP Vegas, Global Journal of Engineering Science and Researches, 3(7):72-80.

383

Jagadeesh,G., Ramaprabha,K., MohanVamsi P.M. (2016). Enhancing Software Quality in Web Applications using

Fault Tree Algorithm (FTA). International Journal of Advanced Research in Computer Science and Software

Engineering.6(4):448 – 452

384

Victor, N., Lopez, D., & Abawajy, J. H. (2016). Privacy models for big data: a survey. International Journal of

Big Data Intelligence, 3(1), 61-75.

385

Neelu Khare, Kumaran U,Mohan Vamsi M, (2016). Knowledge Acquisition and Privacy Preserving in Cloud using

Simultaneous Diagonalization Algorithm, International Journal of Advanced Research in Computer

Science and Software Engineering.6(9): 137 – 140.

386

Kaluri, R., & Li, G. (2016). A review on how to do the research in an effective way. International Journal of

Engineering Science Invention Research & Development.2 (9): 633 – 635.

387

Asha Jerlin. M, Jayakumar Sadhasivam, Nithya. S, (2016). Intelligent Interior Mapping using Wall Following

Behaviour, International Journal of Trend in Research and Development.3(6):112-114.

388

Swarna Priya, RM., Aarthy S. L.,Sujatha , R., Srinivas Koppu, Madhusudhana Rao, (2016). Reconstruction of

3D Realistic Models from Multiple Images – A Survey, International Journal of Advanced Research in Electrical,

Electronics and Instrumentation Engineering,5(12):8886 – 8891

389

Asha Joseph, John Singh K (2016). A Survey on Latest Trends and Challenges in Cyber Forensics,

International Journal of Advances in Electronics and Computer Science, Special Issue, 75-78.

390

Kunal Gagneja, K., John Singh, (2016). Quantum Encryption using Lattice on Streaming Video in VLSI.

International Journal of Advances in Electronics and Computer Science, Special Issue, 118-121.

391

M.Prabukumar.L., Agilandeeswari., Srinivas Koppu., Madhusudhana Rao., Geethanajali, S. (2016).

Vehicle License Plate Recognition Based on Concentric Windows and Deep Neural Networks, International J

of Advanced Research in Electrical, Electronics and Instrumentation Engg, 5(12):8950 – 8956

392

Agilandeeswari, L., & Ganesan, K. (2016). False-positive free Hilbert and multi-resolution-based image

watermarking technique using firefly optimisation algorithm. International Journal of Information Privacy,

Security and Integrity, 2(4): 257-280.

393

M P Gopinath, S Prabu, Srinivas Koppu, Madhusudhana Rao, Kamalakannan J. (2016). Automatic Region Growing

Algorithm based on Combined Filtering Technique to Detect Breast Cancer, International J of Advanced Research in

Electrical, Electronics and Instrumentation Engg 5(12):8878 – 8885.

394

S Ramani, P., Swarnalatha, L., Ramanathan., Srinivas Koppu., Madhusudhana Rao. (2016).Symmetric Private Key

Encryption and Decryption based on Matrix, International J of Advanced Research in Electrical, Electronics and

Instrumentation Engg, 5(12):8985 – 8991.

395

Venugopal P., Rajeev Pankaj N., Satheesh Kumar., Srinivas Koppu .,Madhusudhana Rao. (2016). Detection of Enemy

Intervention in Border and Battle Fields Using Smart Dust Technology, International J of Advanced Research in Electrical,

Electronics and Instrumentation Engg, 5(12):8833 – 8843

   

396

Ramya, G., Priya, G., & Mon, F. A. (2016). Isolating Tainted Nodule. Imperial Journal of Interdisciplinary Research,

2(11):1870-1973.

397

Bandaru Venkata Hemanth Kumar., Ramya, G.(2016). Clustered Information Retrieval Using Image Query,

International Journal of Innovative Research in Computer

 

and Communication Engineering, 3(6):5503 – 5507.

398

Devi, G. U., Sowmitha, M. K., Jidhesh, R., & Jangir, A.(2016).Improved Eaack For Intrusion Detection System.

International Journal of Research in Engineering and Technology, 5(5): 28 – 33.

399

Prathamesh Vijay Tarare ,AnurajMalav,G., Usha Devi. (2016). Modified Ant Colony System Algorithm For IP-

Traceback Problem, International Journal of Research in Engineering and Technology, 5(5):19-23

400

Judith Nita, M., Rajaprabha. MN. (2016). Implementation of Shared Authority Based Privacy Preserving Authentication

Protocol in Cloud Computing, International Journal of Innovative Research in Computer and Communication

Engineering, 4(4):6780 – 6785.

401

Thenmozhi B., Rajaprabha, MN.(2016). Automatic Averting From Cyberbullying Using Efficient Polarity Count Algorithm,

International Journal of Innovative Research in Computer and Communication Engineering, 4(4): 6834 – 6840.

402

Bimal Kumar Ray, (2016). A technique for piecewise linear approximation of 2D digital curve, International Journal of

Computer Graphics, 7(1):1-16.

403

V. Shanthi., Godithi Ramya Sree., Senthil Kumaran. (2016). Confidential Communication and Secret Data Storing by

Embedding Files–Survey, International Journal of Research in Engineering and Technology, 3(11): 459 – 465.

404

Mangayarkarasi, R.,Vanitha, M.(2016). A Survey of suboptimal polygonal approximation methods, International Journal

of Communication and Computer Technologies, 4(16):4083 – 4090.

405

M. Lawanya Shri., M.B.Benjula Anbumalar., K. Santhi, Deepa. M., (2016).Task Scheduling Based On Efficient

Optimal Algorithm In Cloud Computing Environment, International Journal of Advanced Technology in Engineering

and Science, 4(special issue no:1):306-310.

406

Subha, S. (2006). A Literature Survey of CPU Exclusive Caches, International Journal of Advanced Scientific Technologies,

Engineering and Management, 2(7):9-10.

407

Tamizharasi, G. S., Manjula, R., Monisha, K., & Balamurugan, B. (2016). A Secure and Efficient Framework for Health

Data Management in E-Health Clouds. International Journal of Computer Science and Information Security, 14(9):1078-1085.

408

Vasumathy, M., Thirugnanam, M., & Sumathy, S. (2016). A framework for automatic intrude object identification in

paediatric foreign body aspired radiography images. International Journal of Image Mining, 2(1): 57 – 67.

409

Elavarassi M, Elango N.M, (2016). A Review On Recovering And Examining Computer Forensics Evidences.

Asian Journal of Computer Science Engineering, 1(2):22 – 24.