Sorry, you need to enable JavaScript to visit this website.

School of Information Technology & Engineering (SITE)

Publications

2019

Sl.No TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL ISBN/ISSN NUMBER
1 IoT based fall detection and ambient assisted system for the elderly Chandra I., Sivakumar N., Gokulnath C.B., Parthasarathy P. Cluster Computing 1386-7857
2 Periodicity Mining, "a Time Inference over High Utility Item set mining" - A study Arunkumar M.S, Suresh P, Gunavathi C, Preethi S International Journal of Recent Technology and Engineering 2277-3878
3 Real time sentiment analysis of e-commerce websites using machine learning algorithms Sudheer K., Valarmathi B. International Journal of Mechanical Engineering and Technology 0976-6340
4 Analyzing Gene Expression Data By Using Crfm-Covering Rough Set Fuzzy C-Medoids Clustering Approach   Journal of Web Engineering 1540-9589
5 Comparative study on dimensionality reduction for disease diagnosis using fuzzy classifier R.Sujatha , E.P.Ephzibah, Sree Dharinya , G. Uma Maheswari, V.Mareeswari, Vamsi Pamidimarri International Journal of Engineering & Technology 2227-524X
6 ANALYSING EFFECTIVE METHODOLOGIES USED FOR TEXT CLUSTERING USING WEIGHTED ALGORITHMS S.Sree Dharinya ARPN Journal of Engineering and Applied Sciences 1819-6608
7 Analysis and comparison of routing attacks and preventive measures in IoT environment Aditya Sai Srinivas T., Manivannan S.S. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
8 Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm Srinivas Koppu,Madhu Viswanatham Vankadara Evolutionary Intelligence 1864-5909
9 High Utility Infrequent Itemset Mining Using a Customized Ant Colony Algorithm M.S. Arunkumar, P.Suresh, C.Gunavathi International Journal of Parallel Programming 0885-7458
10 Integration of fuzzy DEMATEL and FMCDM approach for evaluating knowledge transfer effectiveness with reference to GSD project outcome Gopal J., Sangaiah A.K., Basu A., Gao X.Z. International Journal of Machine Learning and Cybernetics 1868-8071
11 Adaptive mechanism for distributed query processing and data loading using the RDF data in the cloud Ranichandra Dharmaraj C., Tripathy B. International Journal of Communication Systems 1074-5351
12 Investigation on different clustering techniques in wireless sensor networks Meenatchi S., Prabu S. International Journal of Advanced Intelligence Paradigms 1755-0386
13 Analysis of performance measures to improve the quality of service in cloud based e-government web portal Priya V., Subha S., Balamurugan B. Electronic Government 1740-7494
14 an overview of web socket: the future real time communication Dr.M.P.vani bhumji International journal of engineering and technology 2395-0056
15 Adaptive cruise control and cooperative cruise control in real life traffic situation Ravikumar C.V., Venugopal P., Jagannadha Naidu K., Satheesh Kumar S., Koppu S. International Journal of Mechanical Engineering and Technology 0976-6340
16 Encrypted image-based data hiding technique using elliptic curve ElGamal cryptography Jayanthi R., John Singh K. International Journal of Reasoning-based Intelligent Systems 1755-0556
17 A Fuzzy Linguistic Approach-Based Non-malicious Noise Detection Algorithm for Recommendation System Sharon Moses J., Dhinesh Babu L.D. International Journal of Fuzzy Systems 1562-2479
18 A case study on partial homomorphic encryption: Breast cancer diagnosis Sushmetha N., Vairamuthu S., Selvarani B. International Journal of Pure and Applied Mathematics 1311-8080
19 Optimization of QoS parameters using scheduling techniques in heterogeneous network Chandra I., Prabha K.H., Sivakumar N. Personal and Ubiquitous Computing 1617-4909
20 DTCF: Deadline task consolidation first for energy minimisation in cloud data centres Sanjeevi P., Viswanathan P. International Journal of Networking and Virtual Organisations 1470-9503
21 A fuzzy-based decision-making broker for effective identification and selection of cloud infrastructure services Nagarajan R., Thirunavukarasu R. Soft Computing 1432-7643
22 A case study on commending user in social media based on user information and rating of product in interface forums Deepa M., Santhi K., Lawnyashri M., Malar M.B.B.A., Priya G., Mon F.A. International Journal of Civil Engineering and Technology 0976-6308
23 Density Based Traffic Management Using IoT M Pounambal K Lalitha International Journal of Pure and Applied Mathematics 1314-3395
24 Coagulation attacks over networked UAVs: concept, challenges, and research aspects Vishal Sharma., Dushantha Nalin K. Jayakody., Kathiravan Srinivasan., Ravinder Kumar International Journal of Engineering & Technology 2227-524X
25 Energy-efficient border intrusion detection using pipeline monitoring system Jeevitha K., Manivannan S.S. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
26 Optimized approach for data sharing in WRN using NS2 simulation Shalini R., Manivannan S.S. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
27 Dimensionality reduced local directional number pattern for face recognition Srinivasa perumal ramalingam., Chandra mouli paturu venkata subbu sita rama Journal of Ambient Intelligence and Humanized Computing 1868-5137
28 Hybrid rough fuzzy soft classifier based multi-class classification model for agriculture crop selection Deepa N., Ganesan K. Soft Computing 1432-7643
29 Machine learning based approach for pothole detection Karmel A., Adhithiyan M., Senthil Kumar P. International Journal of Civil Engineering and Technology 0976-6308
30 Heart disease classification system using optimised fuzzy rule based algorithm Reddy G.T., Khare N. International Journal of Biomedical Engineering and Technology 1752-6418
31 Optimized feature extraction for precise sign gesture recognition using Self-Improved Genetic Algorithm Kaluri R., Reddy C.H.P. International Journal of Engineering and Technology Innovation 2223-5329
32 Concept Lattice Simplification in Formal Concept Analysis Using Attribute Clustering K. S., Ch. A.K. Journal of Ambient Intelligence and Humanized Computing 1868-5137
33 Stock Prediction Using Machine-Learning Algorithms Jayavel, Senthil Rathore, Arpit Sadhasivam, Jayakumar International Journal of Engineering and Advanced Technology 22498958
34 Agent Based Hybrid Routing Protocol for Vehicular Ad Hoc Networks Dr. P.S.Nithyadharshini1 , Dr. SanthiyaKumari2 and * Dr. M.Pounambal3 International Journal of Pure and Applied Mathematics 1314-3395
35 An empirical study on peer-to-peer sharing of resources in mobile cloud environment Nadesh R.K., Aramudhan M. International Journal of Electrical and Computer Engineering 2088-8708
36 A survey of block chain technology for digitization in india Manikandan N., Vijayakumar K., Anusha K. International Journal of Civil Engineering and Technology 0976-6308
37 Software Effort Estimation Techniques E J Sai Pavan Chowdary R Charanya International Journal for Research in Applied Science & Engineering Technology (IJRASET) 23219653
38 TSCBA-A Mitigation System for ARP Cache Poisoning Attacks Prabadevi, B; Jeyanthi, N; Cybernetics and Information Technologies 1311-9702
39 Analytical Model for Sybil Attack Phases in Internet of Things Mishra A.K., Tripathy A.K., Puthal D., Yang L.T. IEEE Internet of Things Journal 2327-4662
40 A walk-through: complete survey on blood pressure monitoring devices and applications Jeyanthi, N; Thandeeswaran, R; Gokulnath, BV; Biomedical Research 0970-938X
41 Haloop approach for concept generation in formal concept analysis Chunduri R.K., Cherukuri A.K. Journal of Information and Knowledge Management 0219-6492
42 A cloud broker framework for infrastructure service discovery using semantic network Nagarajan R., Thirunavukarasu R., Shanmugam S. International Journal of Intelligent Engineering and Systems 2185-310X
43 A framework to mitigate ARP sniffing attacks by cache poisoning Prabadevi B., Jeyanthi N. International Journal of Advanced Intelligence Paradigms 1755-0386
44 Recommendation systems: A beginner's perspective Selva Rani B., Ananda Kumar S. International Journal of Pure and Applied Mathematics 1311-8080
45 Region-specific multi-attribute white mass estimation-based mammogram classification Padmavathy T.V., Vimalkumar M.N., Sivakumar N. Personal and Ubiquitous Computing 1617-4909
46 Intrusion detection model using feature extraction and LPBoost technique Thaseen I.S., Kumar Ch.A. International Journal of Internet Technology and Secured Transactions 1748-569X
47 Detection of Intrusion by Stochastic Gradient Descent and K-means Clustering Suraj Saha., Riya Shaji., Abhijeet Giri., John Singh. K Research article -
48 A framework for prediction using rough set and real coded genetic algorithm Rathi R., Acharjya D.P. Arabian journal of science and engineering 2193-567X
49 Decision support systems - An overview Rahamathunnisa U., Chellappa B. International Journal of Mechanical Engineering and Technology 0976-6340
50 An automated detection of human disease using supervised learning method Manivannan S.S., Lakshmi S.K. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
51 TRAM-based VM handover with dynamic scheduling for improved QoS of cloud environment Nadesh R.K., Aramudhan M. International Journal of Internet Technology and Secured Transactions 1748-569X
52 A Fuzzy-Based Intelligent Cloud Broker with MapReduce Framework to Evaluate the Trust Level of Cloud Services Using Customer Feedback Nagarajan R., Thirunavukarasu R., Shanmugam S. International Journal of Fuzzy Systems 1562-2479
53 Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing Shynu P.G., Singh K.J. International Journal of Embedded Systems 1741-1068
54 Energy-Aware task scheduling using hybrid Firefly-BAT (FFABAT) in Big data Senthilkumar M. Cybernetics and Information Technologies 1311-9702
55 Intelligent intrusion detection system using temporal analysis and type-2 fuzzy neural classification Rama Prabha K.P., Jeyanthi N. International Journal of Internet Technology and Secured Transactions 1748-569X
56 Arranging job flow on hadoop Navaneethan C., Meenatchi S., Iyapparaja M., Thanapal P. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
57 Maching language prediction algorithm for crypto currency Prasanna M., Iyapparaja M., Thanapal P., Navaneethan C., Meenatchi S. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
58 The sequence way of performance analysis for device to device communication Meenatchi S., Navaneethan C., Iyapparaja M., Thanapal P., Suganya P. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
59 Case study on big data inspection in pharmaceutical services Iyapparaja M., Prasanna M., Thanapal P., Meenatchi S., Navaneethan C. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
60 BMAQR: Balanced multi attribute QoS aware replication in HDFS Kumar P.J., Ilango P. International Journal of Internet Technology and Secured Transactions 1748-569X
61 Angle Based Energy and Power Efficient Node Detection Routing Protocol for MANET Jayalakshmi Periyasamy., R. Saravanan. Recent Patents on Computer Science 1874-4796
62 Vehicular Cloud for Smart Driving Using Internet of Things Vijayarangam S., Megalai J., Krishnan S., Nagarajan S., Devi M.R., Lokesh S. Journal of Medical Systems 0148-5598
63 Visualizing trade-off between performance and energy in parallel computations Maheswari G.U., Subha S. Journal of Computational and Theoretical Nanoscience 1546-1955
64 Walsh Hadamard kernel-based texture feature for multimodal MRI brain tumour segmentation Angulakshmi M., Lakshmi Priya G.G. International Journal of Imaging Systems and Technology 0899-9457
65 Multi-Layer Cluster Based Energy Aware Routing Protocol for Internet of Things Sankar, S.; Srinivasan, P. Cybernetics and Information Technologies 1311-9702
66 An intelligent neuro-genetic framework for effective intrusion detection Rama Prabha K.P., Jeyanthi N. International Journal of Reasoning-based Intelligent Systems 1755-0556
67 An improved carry save adder design S Subha International Journal of Advanced Science and Research 2455-4227
68 A novel recommender system based on FFT with machine learning for predicting and identifying heart diseases Narayan S., Sathiyamoorthy E. Neural Computing and Applications 0941-0643
69 Calorie Measurement Predicting the Nutrient Content of Food using image Analysis Thamarai, Nivetha, P.M. Durai Raj Vincent, S.S. Manivannan Research Journal of Pharmacy and Technology 0974-3618
70 Internet of Things Based Digital Lock System S Sankar., P Srinivasan Journal of Computational and Theoretical Nanoscience 1546-1955
71 The significance of holographic data storage in cost effective and faster data transfer rates Bhavani S., Chhabra S. International Journal of Civil Engineering and Technology 0976-6308
72 Region-based colour image spatial fusion steganographic system PV Krishna., P Viswanathan International Journal of Multimedia Intelligence and Security 2042-3462
73 Link stable routing with minimal delay nodes for MANETs P Jayalakshmi., R Saravanan International Journal of Social and Humanistic Computing 1752-6124
74 Providing privacy and dimensional search on longitudinal data using safe computing: A case study Deepa M., Santhi K., Lawnya Shri M., Benjula Anbu Malar M.B., Priya G., Mon F.A. International Journal of Civil Engineering and Technology 0976-6308
75 Fuzzy Logic Based Energy Aware Routing Protocol for Internet of Things S.Sankar., P.Srinivasan International Journal Intelligent Systems and Applications 2074-904X
76 A reference model for testing internet of things based applications Jacob P.M., Mani P. Journal of Engineering Science and Technology 1823-4690
77 A review on graph-based semi-supervised learning methods for hyperspectral image classification Sawant S.S., Prabukumar M. Egyptian Journal of Remote Sensing and Space Science 1110-9823
78 Quantum aspects of high dimensional formal representation of conceptual spaces M S Ishwarya., Aswani Kumar Cherukuri Artificial Intelligence 1694-0814
79 Ant colony optimization algorithm with Internet of Vehicles for intelligent traffic control system Kumar P.M., Devi G U., Manogaran G., Sundarasekar R., Chilamkurti N., Varatharajan R. Computer Networks 1389-1286
80 Software architecture pattern selection model for internet of things based systems Jacob P.M., Mani P. IET Software 1751-8806
81 Secure wireless communication and surveillance system Swarnalatha P., Anandakumar S., Vairamuthu S., Priya S.R.M., Sathyaraj R. International Journal of Civil Engineering and Technology 0976-6308
82 Self service software Vijay Anand R., Prabhu J., Jayalakshmi P. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
83 Semantic filtering and event extraction of twitter streams through RDF and SPARQL Kumar N.S., Dinakaran M. International Journal of Computer Information Systems and Industrial Management Applications 2150-7988
84 Smart green resource conservation approach for smart IoT cloud Shanmugam G.S., Shantharajah S.P., Sriman Narayana Iyengar N.C. Journal of Computational and Theoretical Nanoscience 1546-1955
85 Smart home-control and monitoring system for power and security management Gami M., Brindha K., Sudha S., Thandeeswaran R., Priya M. International Journal of Civil Engineering and Technology 0976-6308
86 Secure big data storage using training dataset filtering-K nearest neighbour classification with elliptic curve cryptography Ezhilarsan E., Dinakaran M. Journal of Computational and Theoretical Nanoscience 1546-1955
87 Scalable formal concept analysis algorithms for large datasets using Spark Chunduri R.K., Cherukuri A.K. Journal of Ambient Intelligence and Humanized Computing 1868-5137
88 An improved tumour identification with Gabor Wavelet segmentation Chowdhary C.L., Das T.K., Gurani V., Ranjan A. Research Journal of Pharmacy and Technology 0974-3618
89 An efficient implementation of mobile Raspberry Pi Hadoop clusters for Robust and Augmented computing performance Srinivasan K., Chang C.-Y., Huang C.-H., Chang M.-H., Sharma A., Ankur A. Journal of Information Processing Systems 1976-913X
90 Three-dimensional discrete cosine transform-based feature extraction for hyperspectral image classification Prabukumar M., Sawant S., Samiappan S., Agilandeeswari L. Journal of Applied Remote Sensing 1931-3195
91 Spam review detection on e-commerce sites Nandhini G., Muthamilselvan T., Alagiri I., Thanapal P. International Journal of Civil Engineering and Technology 0976-6308
92 Survey on data analytics techniques in healthcare using IOT platform Babu G.C., Shantharajah S.P. International Journal of Reasoning-based Intelligent Systems 1755-0556
93 Role based access control design using three-way formal concept analysis Subramanian C.M., Cherukuri A.K., Chelliah C. International Journal of Machine Learning and Cybernetics 1868-8071
94 Removing leaf petioles and auto locating apex-base points using straight line interpolation and bisection Visu P., Sivakumar N., Kumaresan P., Yokesh Babu S., Ramesh P.S. Multimedia Tools and Applications 1380-7501
95 Query expansion using named entity disambiguation for a question-answering system Kandasamy S., Cherukuri A.K. Concurrency Computation 1532-0626
96 Public key cryptography using sphere and spheroid John Singh K., Gagneja K. International Journal of Communication Networks and Distributed Systems 1754-3916
97 A new Quantum Tunneling Particle Swarm Optimization algorithm for training feedforward neural networks Geraldine Bessie Amali D., Dinakaran M. International Journal of Intelligent Systems and Applications 2074-904X
98 Providing cyber security using machine learning for social networks Sheba Pari N., Chandrababu M., Senthil Kumar K. Indian Journal of Public Health Research and Development 0976-0245
99 Smart home observing and control security system: A case study Santhi K., Deepa M., Shri M.L., Malar M.B.B.A., Priya G., Mon F.A. International Journal of Civil Engineering and Technology 0976-6308
100 Evaluating the performance of supervised classification models: Decision tree and Naïve Bayes Using KNIME Basha S.M., Rajput D.S., Poluru R.K., Bharath Bhushan S., Basha S.A.K. International Journal of Engineering and Technology(UAE) 2227-524X
101 Lattice based Conceptual Spaces to Explore Cognitive Functionalities for Prosthetic Arm MS Ishwarya., Aswani Kumar Cherukuri Artificial Intelligence 1694-0814
102 On the positioning likelihood of UAVs in 5G networks Sharma V., Jayakody D.N.K., Srinivasan K. Physical Communication 1874-4907
103 Curvelet transform based feature extraction and selection for multimedia event classification Kanagaraj K., Priya G.G.L. Journal of King Saud University - Computer and Information Sciences 1319-1578
104 Online social networking services and spam detection approaches in opinion mining – A review Rani M.S., Sumathy S. International Journal of Web Based Communities 1477-8394
105 Design and implementation of energy efficient reconfigurable networks (WORN-DEAR) for BAN in IOT environment (BIOT) Kumaresan P., Prabukumar M. International Journal of Reasoning-based Intelligent Systems 1755-0556
106 Diagnosing sudden and gradual drifts in business process Thanapal P., Meenatchi S., Navaneethan C., Iyapparaja M., Prasanna M. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
107 Public key encryption for SAFE transfer of one time password Thirumalai C., Budugutta S. International Journal of Pure and Applied Mathematics 1311-8080
108 Cluster-based EA-PATM protocol for energy consumption in hierarchical WSNs Meenatchi S., Prabu S. International Journal of Reasoning-based Intelligent Systems 1755-0556
109 Online compilers for android using mobile cloud computing Vijayan R., Mareeswari V., Gunesekaran G., Balasubramanian V., Senthil Kumar R. International Journal of Civil Engineering and Technology 0976-6308
110 Parsing based sarcasm detection from literal language in tweets Basha S.M., Rajput D.S. Recent Patents on Computer Science 2213-2759
111 Predicting dispersion of radionuclides through parallel approach Uma Maheswari, G., Subha, S ProProgress in Industrial Ecology, An International Journal 1476-8917
112 Future of Storage Technologies Bhavani S, Charanya R, Mahadevan R, Malathy E, Priya M International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
113 Octagonal picture languages Govindaraj R., Mahendran A. International Journal of Reasoning-based Intelligent Systems 1755-0556
114 Nano drive: Privacy preserving decentralized storage Seetha R., Malisetty N. International Journal of Mechanical Engineering and Technology 0976-6340
115 MAFONN-EP: A Minimal Angular Feature Oriented Neural Network based Emotion Prediction system in image processing Krithika L.B., Lakshmi Priya G.G. Journal of King Saud University - Computer and Information Sciences 1319-1578
116 IoT based smart garbage collector for smart cities Rajaprabha M.N., Jayalakshmi P., Anand R.V., Asha N. International Journal of Civil Engineering and Technology 0976-6308
117 A survey: energy-efficient sensor and VM selection approaches in green computing for X-IoT applications Mekala M.S., Viswanathan P. International Journal of Computers and Applications 1206-212X
118 Forecasting yield by integrating agrarian factors and machine learning models A survey Dhivya Elavarasan, Durai Raj Vincent, Vishal Sharma, Albert Y. Zomaya, Kathiravan Srinivasan Computers and Electronics in Agriculture 0168-1699
119 Proficient information method for inconsistency detection in multiple data sources Bazeer Ahamed B., Ramkumar T. International Journal of Artificial Intelligence 0974-0635
120 Properties of multigranular rough sets on fuzzy approximation spaces and their application to rainfall prediction Tripathy B.K., Bhambhani U. International Journal of Intelligent Systems and Applications 2074-904X
121 Machine Learning and Deep Learning Methods in Heart Disease (HD) Research Kusuma S, Divya Udayan J International Journal of Pure and Applied Mathematics 0972-9828
122 Integrated Intrusion Detection Model Using Chi-Square Feature Selection and Ensemble of Classifiers I. Sumaiya Thaseen., Ch. Aswani Kumar., Amir Ahmad Arabian Journal for Science and Engineering 1319-8025
123 A scaled-down neural conversational model for chatbots Mathur S., Lopez D. Concurrency Computation 1532-0626
124 Image anonymization using clustering with pixelization Ria. Elin Thomas., Sharmila K. Banu., B. K. Tripathy International Journal of Engineering & Technology 2227-524X
125 Internet of Things based Ambient assisted living for Elderly People Health Monitoring S. Sankar., P. Srinivasan., R. Saravanakumar Research Journal of Pharmacy and Technology 0974-3618
126 Energy and Load Aware Routing Protocol for Internet of Things S Sankar., P Srinivasan International Journal of Advances in Applied Sciences 2252-8814
127 A study of handwritten characters recognition through neural networks using data mining approaches Bothra G., Bhattacharya S., Deepa P. International Journal of Mechanical Engineering and Technology 0976-6340
128 Comparison of multi-criteria recommendation system for improving accurate prediction Sandeepkumar M., Prabhu J. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
129 A survey, design and analysis of IoT security and QoS challenges Kesavan M., Prabhu J. International Journal of Information System Modeling and Design 1947-8186
130 A review on various sniffing attacks and its mitigation techniques Prabadevi B., Jeyanthi N. Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
131 Predicting user behaviour on E-Commerce site using Ann Srinivas A.S., Ramasubbareddy S., Manivannan S.S., Govinda K. International Journal of Engineering and Technology(UAE) 2227-524X
132 Non-Intrusive Transaction Aware Filtering During Enterprise Application Modernization Ravikumar Ramadoss., N. M. Elango., Satheesh Abimannan., Ching-Hsien Hsu Journal of Supercomputing 0920-8542
133 Privacy-preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing P.G. Shynu., K. John Singh International Journal of Embedded Systems 1741-1068
134 Band clustering using expectation-maximization algorithm and weighted average fusion-based feature extraction for hyperspectral image classification Prabukumar M., Shrutika S. Journal of Applied Remote Sensing 1931-3195
135 Classification of breast abnormality using decision tree based on GLCM features in mammograms Kamalakannan J., Babu M.R. International Journal of Computer Aided Engineering and Technology 1757-2657
136 An amoeboid approach for identifying optimal citation flow in big scholarly data network Nivash J.P., Dhinesh Babu L.D. International Journal of Communication Systems 1074-5351
137 PFB+- tree for big data memory management system Santhi K., Chellatamilan T., Valarmathi B. Indian Journal of Public Health Research and Development 0976-0245
138 Performing item-based recommendation for mining multi-source big data by considering various weighting parameters Thillainayagam V., Kunjithapatham S., Thirunavukarasu R. International Journal of Engineering and Technology(UAE) 2227-524X
139 A supervised aspect level sentiment model to predict overall sentiment on tweeter documents Basha S.M., Rajput D.S. International Journal of Metadata, Semantics and Ontologies 1744-2621
140 A Diabetes Case Management Study in a Rural Setting in India Radhakrishnan, S.Email Author, Rajakumar, C.A., Radhakrishnan, B. Professional Case Management 19328087
141 Predicting justice delivery time using Machine learning Megha Kanwar ,Prabhavathy.P International Journal of Pure and Applied Mathematics 1314-3395
142 A Cloud Based Natural Hazard Detection and Warning System Nishanth A, Vanmathi C International Journal of Research and Scientific Innovation (IJRSI) 2321-2705
143 Smart Home Automation in Air Conditioning using Data Mining and Image Processing Ishaan Arora, Vanmathi C, International Journal of Engineering Trends and Technology (IJETT) 2231-5381
144 Detecting Streaming of Twitter Spam Using Hybrid Method Senthil Murugan N., Usha Devi G. Wireless Personal Communications 0929-6212
145 A complete survey on blood pressure monitoring devices and applications Thandeeswaran R Jeyanthi N, Gokulnath BV Biomedical Research 0970-938X
146 Advanced Vehicle Safety and Monitoring System, Akhil Sharma, Vanmathi C International Journal of Engineering Science Invention Research & Development 2349-6185
147 Transportation Service System for Grocery Kart using Genetic Algorithm Deepank Kartikey, Vanmathi C International Journal of Engineering Trends and Technology (IJETT) 2231-5381
148 Weighing Type Rain Gauge with Weather Monitoring System Rajkumar R, Vanmathi C, International Journal of Research and Scientific Innovation (IJRSI) 2321-2705
149 Design and development of exponential lion algorithm for optimal allocation of cluster resources in cloud Devagnanam J., Elango N.M. Cluster Computing 1386-7857
150 ENCRYPTION AND DECRYPTION OF GRAY SCALE IMAGES USING SCALABLE CODING MECHANISM K.UMA International Journal of Mechanical Engineering and Technology (IJMET) 0976-6340
151 Comparative study on dimensionality reduction for disease diagnosis using fuzzy classifier Sujatha, R., Ephzibah, E.P., Dharinya, S., Uma Maheswari, G., Mareeswari, V., Pamidimarri, V. International Journal of Engineering and Technology(UAE) 2227524X
152 Analyzing Gene Expression Data By Using Crfm-Covering Rough Set Fuzzy C-Medoids Clustering Approach Avulapalli Jayaram Reddy, B.K Tripathy Journal of Web Engineering 1540-9589
153 WhaleRank: An optimisation based ranking approach for software requirements prioritisation Anand R.V., Dinakaran M. International Journal of Environment and Waste Management 1478-9876
154 Predictive mathematical model for solving multi-criteria decision-making problems Deepa N., Ganesan K., Sethuramasamyraja B. Neural Computing and Applications 0941-0643
155 Performance analysis of pre-cancerous mammographic image enhancement feature using non-subsampled shearlet transform Padmavathy T.V., Vimalkumar M.N., Nagarajan S., Babu G.C., Parthasarathy P. Multimedia Tools and Applications 1380-7501
156 In-Mapper combiner based MapReduce algorithm for processing of big climate data Manogaran G., Lopez D., Chilamkurti N. Future Generation Computer Systems 0167-739X
157 An Interval valued fuzzy soft set based optimization algorithm for high yielding seed selection Sooraj T.R., Tripathy B.K. International Journal of Fuzzy System Applications 2156-177X
158 Design of I-shaped dual C-slotted rectangular microstrip patch antenna (I-DCSRMPA) for breast cancer tumor detection Padmavathy T.V., Venkatesh P., Bhargava D., Sivakumar N. Cluster Computing 1386-7857
159 IOT BASED SMART GARBAGE COLLECTOR FOR SMART CITIES M N Rajaprabha, P Jayalakshmi, R Vijay Anand and N Asha International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
160 Energy saving offloading scheme for mobile cloud computing using CloudSim Thanapal P., Durai M.A.S. International Journal of Advanced Intelligence Paradigms 1755-0386
161 Walsh Hadamard kernel‐based texture feature for multimodal MRI brain tumour segmentation M. Angulakshmi, G. G Lakshmi Priya International Journal of Imaging Systems and Technology 1098-1098
162 Brain tumour segmentation from MRI using superpixels based spectral clustering Angulakshmi, M., Lakshmi Priya, G.G Journal of King Saud University - Computer and Information Sciences. Elsevier 1319-1578
163 An intelligent decision support system to prevent and control of dengue Lopez D., Manogaran G., Varatharajan R., Abbas K.M. Journal of Ambient Intelligence and Humanized Computing 1868-5137
164 Experimenting with runtime and energy tradeoffs in high-performance computing G Uma Maheswari, S Subha , Progress in Industrial Ecology12(1-2), pp. 154-163 1476-8917
165 Resourceful Investigte Encryption Method using Data Hunt in Mobile Cloud Service A. S. Syed Navaz , Asha. N , Vanmathi Chandrasekaran , J. Jayashree ARPN Journal of Engineering and Applied Sciences 1819-6608
166 Embarrassingly parallel GPU based matrix inversion algorithm for big climate data assimilation Varalakshmi M., Kesarkar A.P., Lopez D. International Journal of Grid and High Performance Computing 1938-0259
167 A Review on Utilizing Queuing Models for Improving Performance in Cloud M. Sathish Kumar, M. Iyappa Raja Jour of Advance Research in Dynamical & Control Systems 1943-023X
168 RFID BASED AUTOMATED GATE SECURITY SYSTEM Asha. N, A. S. Syed Navaz, J. Jayashree and J. Vijayashree ARPN Journal of Engineering and Applied Sciences 1819-6608
169 Detecting spams in social networks using ML algorithms �€“ a review Murugan N.S., Devi G.U. International Journal of Environment and Waste Management 1478-9876
170 Face Recognition and Detection with New Image Enhancement Techniques A.S.Syed Navaz and Asha. N Jour of Adv Research in Dynamical & Control Systems 1943-023X
171 Applying Knowledge Based Heuristic Method for Efficient Test Automation Asha. N and Prasanna Mani Jour of Adv Research in Dynamical & Control Systems 1943-023X
172 Knowledge-based Acceptance Test driven agile Approach for Quality Software Development Asha. N and Prasanna Mani International Journal of Recent Technology and Engineering (IJRTE) 2277-3878
173 Efficient routing based on core relay intermediate nodes in MANET Jayalakshmi P., Saravanan R. Electronic Government 1740-7494
174 Earthquake analysis: Visualizing seismic data with python Tulsyan S., Bahl B., Kaya S., Reddy G.T. Lecture Notes in Computational Vision and Biomechanics 2212-9391
175 A novel approach to perform analysis and prediction on breast cancer dataset using R Basha S.M., Rajput D.S., Iyengar N.C.S.N., Caytiles R.D. International Journal of Grid and Distributed Computing 2005-4262
176 WIRELESS HEALTH ACQUISITION SYSTEM USING INTERNET OF THINGS Dr.K.Uma International Journal of Mechanical Engineering and Technology (IJMET) 0976-6340
177 RESOURCEFUL INVESTIGATE ENCRYPTION METHOD USING DATA HUNT IN MOBILE CLOUD SERVICE A. S. Syed Navaz, Asha. N, Vanmathi Chandrasekaran and J. Jayashree ARPN Journal of Engineering and Applied Sciences 1819-6608
178 Group Decision Making through Interval Valued Intuitionistic Fuzzy Soft Sets BK Tripathy., TR Sooraj., RK Mohanty., A Panigraghi International Journal of Fuzzy System Applications 2156-177X
179 Implementation of moving object detection and categorization from hevc compressed surveillance video Kruthi S., Kamalakannan J. International Journal of Mechanical Engineering and Technology 0976-6340
180 BGFS: Design and development of brain genetic fuzzy system for data classification Chandrasekar Ravi., Neelu Khare Journal of Intelligent Systems 0334-1860
181 Neighborhood Rough-Sets-Based Spatial Data Analytics Sharmila Banu K.., B. K. Tripathy Encyclopedia of Information Science and Technology, Fourth Edition -
182 A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks Rama Prabha K.P., Jeyanthi N. Wireless Personal Communications 0929-6212
183 Tracking eye center location based on inner product detector MythiliBoopathi , Nivetha R Journal of International Pharmaceutical Research 1674-0440
184 Smart City Based on Cloud Computing and IoT Mythili BoopathiS. Pati International Journal of Civil Engineering and Technology 0976-6308
185 Comparison of NoSQL Database and Traditional Database-An emphatic analysis M. Sandeep Kumar., Prabhu. J INTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION 2549-9610
186 A Survey of Big Data Analytics Using Machine Learning Algorithms usha moorthy., usha devi gandhi HCI Challenges and Privacy Preservation in Big Data Security 15225-28636
187 Future of storage technologies Bhavani, S., Charanya, R., Mahadevan, R., Malathy, E., Priya, M. International Journal of Civil Engineering and Technology 0976-6308
188 Robust Face Recognition Using Enhanced Local Binary Pattern Srinivasa Perumal R., Nadesh R. K., Senthil Kumar N. C Bulletin of Electrical Engineering and Informatics 2089-3191
189 Optimization of Seed Selection for Higher Product using Interval Valued Hesitant Fuzzy Soft sets BK Tripathy., Sooraj.T.R Songklanakarin Journal of Science and Technology 0125-3395
190 Experimenting with runtime and energy tradeoffs in high-performance computing Uma Maheswari, G., Subha, S Progress in Industrial Ecology 1476-8917
191 Enhancing security for end users in cloud computing environment using hybrid encryption technique Nadesh R.K., Srinivasa Perumal R., Shynu P.G., Gaurav Sharma1 International Journal of Engineering and Technology 0975-4024
192 ONLINE COMPILERS FOR ANDROID USING MOBILE CLOUD COMPUTING Vijayan R, Mareeswari V, Gunesekaran G,Balasubramanian V,Senthil Kumar R International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
193 Mapping USE Specifications into Spec# Jagadeeswaran T Senthilkumaran U Software Technologies: Applications and Foundations 0302-9743
194 A risk-centric defensive architecture for threat modelling in e-government application Venkatasen M., Mani P. Electronic Government 1740-7494
195 Model Reusability and Multidirectional Transformation using Unified Metamodel Jagadeeswaran T, Senthilkumaran U IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER) 1854-8419
196 Quick fix for obstacles emerging in management recruitment measure using IOT-based candidate selection Nallakaruppan, M.K., Senthil Kumaran, U. Service Oriented Computing and Applications 18632386
197 Verification of Cloud Based Information Integration Architecture using Colored Petri Nets Murale Narayanan., Aswani Kumar Cherukuri International Journal of Computer Network and Information Security -
198 Secure big data storage using training dataset filtering-K nearest neighbour classification with elliptic curve cryptography Ezhilarsan E, Dinakaran M Journal of Computational and Theoretical Nanoscience 15461955
199 D‐ConvNet: Deep learning model for enhancement of brain MR images Kathiravan Srinivasan, Vishal Sharma, DNK Jayakody, Durai Raj Vincent Basic & Clinical Pharmacology & Toxicology -
200 Robust design and validation of balanced tournaments via Hamiltonian path Kathiravan Srinivasan, Desh Deepak Pathak Ravinder Kumar, Durai Raj Vincent, Chuan-Yu Chang Journal of Information and Optimization Sciences 0252-2667
201 Semantic filtering and event extraction of twitter streams through RDF and SPARQL Kumar, NS, Dinakaran, M International Journal of Computer Information Systems and Industrial Management Applications 21507988
202 Design and development of microstrip patch antenna with circular and rectangular slot for structural health monitoring Padmavathy T.V., Bhargava D.S., Venkatesh P., Sivakumar N. Personal and Ubiquitous Computing 1617-4909
203 Propels in compiler construction for versatile figuring Ezilarasan, E, Dinakaran, M, Boominathan P, Krishnamoorthy, A, Naresh, K International Journal of Internet Technology and Secured Transactions 1748569
204 An adaptive fault tolerance mechanism in Grid computing Nithyadharshini P.S., Pounambal M., Nagaraju D., Saritha V. ARPN Journal of Engineering and Applied Sciences 1819-6608
205 PSPO: a framework for cost-effective service placement optimisation during enterprise modernisation on hybrid clouds Ravikumar Ramadoss., N.M. Elango., A. Satheesh., Ching-Hsien Hsu International Journal of Web and Grid Services 1741-1106
206 A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases Kumar P.M., Devi Gandhi U. Computers and Electrical Engineering 0045-7906
207 An optimized feature selection based on genetic approach and support vector machine for heart disease Gokulnath C.B., Shantharajah S.P. Cluster Computing 1386-7857
208 An Efficient and Secure Content Contribution and Retrieval content in Online Social Networks using Level-level Security Optimization and Content Visualization Algorithm Kumaran Umapathy., Neelu Khare Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
209 Performance Analysis of Clustering Algorithm in Data Mining in R Language Avulapalli Jayaram Reddy, Balakrushna Tripathy , Seema Nimje, Communications in Computer and Information Science 1865-0929
210 Load balancing prototype for cost proficient fault tolerant geo-distributed datacenters Anusha, K., Manikandan, N., Nallakaruppan, M.K., Rahamathunnissa, U. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
211 Application of Soft Set in Game Theory B. K. Tripathy Sooraj., T. R. Radhakrishna., N. Mohanty Encyclopedia of Information Science and Technology, Fourth Edition -
212 Secure Group Key Sharing Protocols and Cloud System Vaishali Ravindra Thakar., John Singh K Encyclopedia of Information Science and Technology, Fourth Edition -
213 Secure data storage in cloud computing to avoiding some cipher text attack Gundala Swathi., Gundala Swathi JOURNAL OF INFORMATION and OPTIMIZATION SCIENCES 0252-2667
214 Optimal Decision Tree Fuzzy Rule-Based Classifier (ODT-FRC) For Heart Disease Prediction Using Improved Cuckoo Search Algorithm Subhashini Narayan, Jagadeesh Gobal International Journal of Business Intelligence and Data Mining 1743-8187
215 Brain tumour segmentation from MRI using superpixels based spectral clustering Angulakshmi M., Lakshmi Priya G.G. Journal of King Saud University - Computer and Information Sciences 1319-1578
216 Depth Impurity Pruned Strategies for Extracting High Utility Itemsets K. Santhi1*, B.Valarmathi2, T.Chellatamilan3 International Journal of Engineering & Technology 2227-524X
217 Software Project Management Risk Management Literature Review CHARANYA R International Journal for Research in Applied Science & Engineering Technology (IJRASET) -
218 Student performance dashboard using mining approach Suganya D., Kumar K., Ramesh P.S., Suganthan C. International Journal of Pure and Applied Mathematics 1311-8080
219 Predicting life time of heart attack patient using improved c4.5 classification algorithm Jothikumar R., Susi S., Sivakumar N., Ramesh P.S. Research Journal of Pharmacy and Technology 0974-3618
220 Scheduling tasks using Bat's algorithm in cloud sim Gitanjali J., Sathiyamoorthi E., Mummadisetti A., Dammu R.S., Kadari R.R. International Journal of Pure and Applied Mathematics 1311-8080
221 Survey on the role of IoT in intelligent transportation system Varun Chand H., Karthikeyan J. Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
222 Comparative study on dimensionality reduction for disease diagnosis using fuzzy classifier Sujatha R., Ephzibah E.P., Dharinya S., Uma Maheswari G., Mareeswari V., Pamidimarri V. International Journal of Engineering and Technology(UAE) 2227-524X
223 An empirical machine learning approach to extract and rank multi-word product names using iCIW approach Sivashankari R., Valarmathi B. Journal of Engineering Science and Technology 1823-4690
224 Parallel AES algorithm for performance improvement in data analytics security for IoT Manikandan N., Subha S. International Journal of Networking and Virtual Organisations 1470-9503
225 A Study of Handwritten Characters Recgnition through Neural Networks using Data Mining approaches Gaurav Bothra, Sweta Bhattacharya and Deepa P. International Journal of Mechanical Engineering and Technology 09766340
226 Secure medical data transmission by using collaborative neighbour based method in WBAN Devi L., Shantharajah S.P. World Review of Science, Technology and Sustainable Development 1741-2242
227 , Predicting dispersion of radionuclides through parallel approach G Uma Maheswari, S Subha Progress in Industrial Ecology 12(1-2), pp. 35-45 1476-8917
228 Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles Priyan M.K., Devi G.U. Cluster Computing 1386-7857
229 One-Dimension Force Balance System for Hypersonic Vehicle an experimental and Fuzzy Prediction Approach Kalaiarassan G., Krishan., Somanadh M., Thirumalai C., Senthil Kumar M. Materials Today: Proceedings 2214-7853
230 A SURVEY ON IMPLEMENTATION METHODS AND APPLICATIONS OF SENTIMENT Sudheer K and B.Valarmathi International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
231 Stout unidirectional face recognition system in hands of DRBF methodology Sudhan M., Dharun V.S., Swarna Priya R.M. International Journal of Pure and Applied Mathematics 1311-8080
232 Software Project Management Risk Management Literature Review CHARANYA R International Journal of Innovative Science and Research Technology(IJISRT) -
233 Secured cloud banking transactions using two-way verification process Anitha A., Varalakhshmi M., Mary Mekala A., Subashanthini., Thilagavathy M. International Journal of Civil Engineering and Technology 0976-6308
234 A rule based classifcation for vegetable production using rough set and genetic algorithm Rathi R., Acharjya D.P. International Journal of Fuzzy System Applications 2156-177X
235 Modified dimensionality reduced local directional pattern for facial analysis Srinivasa Perumal R, Chandra Mouli P.V.S.S.R Journal of Ambient Intelligence and Humanized Computing 1868-5137
236 Group and hierarchical key management for secure communications in internet of things Karrothu A., Norman J. International Journal of Communication Systems 1074-5351
237 Dr. Cloud- IOT Based Health Monitoring System Aditya Shukla, Vanmathi C International Journal of Scientific Research in Computer Sciences and Engineering 2456-3307
238 A survey on applications of internet of things in healthcare domain Mugauri P.C., Aravind K., Deshmukh A., Vhansure F., Kavitha B.R. Research Journal of Pharmacy and Technology 0974-3618
239 Security strategies for cloud identity management - a study Anilkumar C., Sumathy S. International Journal of Engineering and Technology(UAE) 2227-524X
240 RST invariant robust video watermarking algorithm using quaternion curvelet transform Agilandeeswari L., Ganesan K. Multimedia Tools and Applications 1380-7501
241 Robustness of DR-LDP over PCANet for face analysis Ramalingam S.P., Chandra Mouli P.V.S.S.R. International Journal of Multimedia Information Retrieval 2192-6611
242 Calorie measurement: predicting the nutrient content of food using image analysis Thamarai., Nivetha., Durai Raj Vincent P.M., Manivannan S.S. Research Journal of Pharmacy and Technology 0974-3618
243 An efficient method for secure 2D image visualization and transmission through chaotic confusion and pixel diffusion Gunasekaran G., Venkatesan M. Pertanika Journal of Science and Technology 0128-7680
244 Multi-class classification using hybrid soft decision model for agriculture crop selection Deepa N., Ganesan K. Neural Computing and Applications 0941-0643
245 Tri-texture feature extraction and region growing-level set segmentation in breast cancer diagnosis Aarthy S.L., Prabu S. International Journal of Biomedical Engineering and Technology 1752-6418
246 Spam filtering and phishing in facebook Gitanjali J., Jagadeesh G., Mummadisetti A., Dammu R.S., Kadari R.R. International Journal of Pure and Applied Mathematics 1311-8080
247 Impact of Gradient ascent and Boosting algorithm in classification Basha S.M., Rajput D.S., Vandhan V. International Journal of Intelligent Engineering and Systems 2185-310X
248 Generating various kolam patterns using new kolam picture grammar Govindaraj R., Mahendran A. International Journal of Internet Technology and Secured Transactions 1748-569X
249 HIoTPOT: Surveillance on IoT Devices against Recent Threats Gandhi U.D., Kumar P.M., Varatharajan R., Manogaran G., Sundarasekar R., Kadu S. Wireless Personal Communications 0929-6212
250 Hybrid IT architecture by gene-based cryptomata (HITAGC) for lightweight security services Thirumalai, C., Viswanathan, P. Service Oriented Computing and Applications 1863-2386
251 High utility itemset mining using partition utility list structure Arunkumar M.S., Suresh P., Gunavathi C. Journal of Computational and Theoretical Nanoscience 1546-1955
252 A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT) Gopinath, M.P., Arasi, G.S., Kavisankar, L., Sathyaraj, R., Karthi, S., Aarthy, S.L., & Balusamy, B. (2018) Neural Computing and Applications 0941-0643
253 Secure and Optimized Real-Time System for Internet of Medical Things Using MATuino and ThingSpeak Analytics Ranjani, J., A. Shanthoshini Selvapriya, and E. Vijayan Journal of Testing and Evaluation 00903973
254 Implementing self adaptiveness in whale optimization for cluster head section in Internet of Things Reddy M.P.K., Babu M.R. Cluster Computing 1386-7857
255 Buyagain grocery recommender algorithm for Online shopping of grocery and gourmet foods Moses S.J., Dhinesh Babu L.D. International Journal of Web Services Research 1545-7362
256 CONVENTIONAL IMPLEMENTATION OF LFS SYSTEM FOR DEVELOPMENT OF LINUX OPERATING SYSTEM M.Priya J. Raju International Journal of Pure and Applied Mathematics 13118080
257 Health data analytics using scalable logistic regression with stochastic gradient descent Manogaran G., Lopez D. International Journal of Advanced Intelligence Paradigms 1755-0386
258 Feature extraction using LR-PCA hybridization on twitter data and classification accuracy using machine learning algorithms Murugan N.S., Devi G.U. Cluster Computing 1386-7857
259 G-L fractional differential operator modified using auto-correlation function: Texture enhancement in images Hemalatha S & Margret Anouncia S Ain Shams Engineering Journal 2090-4479
260 Predictive Cloud resource management framework for enterprise workloads Balaji M., Aswani Kumar C., Rao G.S.V.R.K. Journal of King Saud University - Computer and Information Sciences 1319-1578
261 Advancing knowledge on Regulating and saving of the Animals Health with Sensor and Networks through IoT Subrata Chowdhury, P.Mayilvahanan, Ramya Govindaraj Jour of Adv Research in Dynamical & Control Systems -
262 Videocompression techniques: A review Singh J.K., Gagneja K., Raghuvanshi U. International Journal of Pure and Applied Mathematics 1311-8080
263 A Comparative Analysis on Smart Farming Techniques using Internet of Things (IoT) Pramod Mathew Jacob, Prasanna M, Parveen Sultana H Helix 2277-3495
264 Knowledge-based Acceptance Test driven agile Approach for Quality Software Development N. Asha, Prasanna Mani International Journal of Recent Technology and Engineering 2277-3878
265 A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system Manogaran G., Varatharajan R., Lopez D., Kumar P.M., Sundarasekar R., Thota C. Future Generation Computer Systems 0167-739X
266 A Descriptive Study on Contents Being Generalized in News Apps and Smartphone Users’ Attitude Towards Them Surendheran Kaliyaperumal OmniScience: A Multi-disciplinary Journal 2347-9949
267 Mining DNA Sequence Patterns with Constraints Using Hybridization of Firefly and Group Search Optimization Lakshmanna K., Khare N. Journal of Intelligent Systems 0334-1860
268 A Novel Genetic Algorithm for Solving Machine Part Cell Formation Problem considering alternative Process Plans Sowmiya N., Valarmathi B., Srinivasa Gupta N., Essaki Muthu P., Rajendran C. Materials Today: Proceedings 2214-7853
269 Outlet sales analysis using r and various machine learning algorithms Singh J.K., Gagneja K., Bhushan V. International Journal of Pure and Applied Mathematics 1311-8080
270 Improved scrum method through staging priority and cyclomatic complexity to enhance software process and quality Vijay Anand R., Dinakaran M. International Journal of Internet Technology and Secured Transactions 1748-569X
271 Wireless camera network with enhanced SIFT algorithm for human tracking mechanism Usha Devi G., Priyan M.K., Gokulnath C. International Journal of Internet Technology and Secured Transactions 1748-569X
272 LocPSORank-prediction of ranking of web services using location-based clustering and PSO algorithm Mareeswari V., Sathiyamoorthy E. International Journal of Web Services Research 1545-7362
273 A firefly inspired game dissemination and QoS-based priority pricing strategy for online social network games Raj E.D., Dhinesh Babu L.D. International Journal of Bio-Inspired Computation 1758-0366

Last updated on 16 Mar 2020

2018

Sl.No TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL ISBN/ISSN NUMBER
1 A Comparative Analysis of Firefly and FuzzyFirefly based Kernelized Hybrid C-Means Algorithms B.K. Tripathy, Anmol Agrawal, A. Jayaram Reddy 1 I.J. Intelligent Systems and Applications 2074-904X
2 IoT based machine learning techniques for climate predictive analysis Nallakaruppan, M.K., Senthil Kumaran, U. International Journal of Recent Technology and Engineering 22773878
3 Patients Health Monitoring System Using IOT Sudha Senthilkumar, Brindha.K, Charanya R, Abishek Kumar Indian Journal of Public Health Research & Development 0976-0245
4 Fragmented plant leaf recognition: Bag-of-features, fuzzy-color and edge-texture histogram descriptors with multi-layer perceptron Chaki J., Dey N., Moraru L., Shi F. Optik 0030-4026
5 Walsh Hadamard Transform for Simple Linear Iterative Clustering (SLIC)Superpixel based Spectral Clustering of Multimodal MRI Brain Tumour Segmentation M. Angulakshmi, G. G Lakshmi Priya Innovation and Research in BioMedical engineering- Elesiver 1959-0318
6 An efficient algorithm for dynamic task offloading using cloudlets in mobile cloud computing Shobha Rani, D., Pounambal, M., Saritha, V. International Journal of Communication Systems 1099-1131
7 A Big Data Recommendation Engine Framework Based on Local Pattern Analytics Strategy for Mining Multi-Sourced Big Data Venkatesan, T., Saravanan, K., Ramkumar, T. Journal of Information and Knowledge Management 0219-6492
8 CLAY-MIST: IoT-cloud enabled CMM index for smart agriculture monitoring system Mekala M.S., Viswanathan P. Measurement: Journal of the International Measurement Confederation 0263-2241
9 Sentiment analysis of Amazon products using ensemble machine learning algorithm Jayakumar Sadhasivam, Ramesh Babu Kalivaradhan International Journal of Mathematical, Engineering and Management Sciences 2455-7749
10 Implementation of Collage Grammar in Kolam Grammar to Generate Kolam Patterns in Picture Languages Ramya Govindaraj, M.Anand International Journal of Innovative Technology and Exploring Engineering (IJITEE) 22783075
11 Health Machine Sensors Network Controlling and Generating Trust Count in the Servers Platform through IoT Subrata Chowdhury, P. Mayilvahananan, Ramya Govindaraj International Journal of Recent Technology and Engineering (IJRTE) 2277-3878
12 A survey on internet of vehicles: Applications, technologies, challenges and opportunities Priyan M.K., Usha Devi G. International Journal of Advanced Intelligence Paradigms 1755-0386
13 Performance analysis of cloud computing using series of queues with Erlang service K.Santhi, R.Saravanan International Journal of Internet Technology and Secured Transactions 1748-5703
14 Accurate facial ethnicity classification using artificial neural networks trained with galactic swarm optimization algorithm Bagchi, C, Geraldine Bessie Amali, D, Dinakaran, M Advances in Intelligent Systems and Computing 21945357
15 A novel dyadic multiresolution wavelet image steganography using N-ary C. Vanmathi; S. Prabu International Journal of Internet Technology and Secured Transactions 1748-5703
16 Performance comparison of various feature descriptors in object category detection application using SVM classifier Kavitha B R , Ramya G, Priya G International Journal of Innovative Technology and Exploring Engineering 22783075
17 A roadmap towards implementing parallel aspect level sentiment analysis Basha S.M., Rajput D.S. Multimedia Tools and Applications 1380-7501
18 K-means and hierarchical based clustering in suicide analysis Sujatha, R., Sree Dharinya, S., Ephzibah, E.P., Thangam, R.K. International Journal of Engineering and Advanced Technology 22498958
19 AN ANALYSIS OF SECURITY ISSUES IN CLOUD COMPUTING M B BENJULA ANBU MALAR J PRABHU International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
20 A Suite of Load Balancing Algorithms and Service Broker Policies for Cloud: A Quantitative Analysis with Different User Grouping Factor in Cloud Kumar PJ, Suganya P, Komal Malhotra, Payal Yadav International Journal of Recent Technology and Engineering (IJRTE) 2277-3878
21 Reduction of Artefacts in JPEG-XR Compressed Images Kai-Lung Hua, Ho Thi Trang, Kathiravan Srinivasan, Yung-Yao Chen, Chun-Hao Chen, Vishal Sharma, Albert Y Zomaya MDPI Sensors 1424-8220
22 EFF-FAS: Enhanced Fruit Fly Optimization Based Search and Tracking By Flying Ad Hoc Swarm Vishal Sharma, Roberto Sabatini, Subramanian Ramasamy, Kathiravan Srinivasan, Rajesh Kumar International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) 1743-8225
23 A Comprehensive Survey On Various Semantic Based Video/Image Retrieval Techniques Tamil Priya D, Divya Udayan J International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2278-3075
24 Evaluating and Visualizing Influential Node Using Various Measures in Social Network Data G. Kavitha and N. M. Elango journal of Computational and Theoretical Nanoscience 1546-1955
25 Distribution of Frequency Words Using Hierarchical Clustering Method in R Shakila Basheer1, S. Mariyam Aysha Bivi2, G. Kavitha3 ∗, P. V. Praveen Sundar4, C. Kousalya3, and B. Lokeshwari3 Journal of Computational and Theoretical Nanoscience 1546-1955
26 Analysis and Visualize Text Mining Using Twitter Data in R Shakila Basheer1, Rincy Merlin Mathew2, G. Kavitha3 ∗, K. Nivetha3, S. Kalai Selvi3, and R. Sandhya3 Journal of Computational and Theoretical Nanoscience 1546-1955
27 Location-Based Collaborative Filtering for Web Service Recommendation Mareeswari Venkatachalaappaswamy, Vijayan Ramaraj, Saranya Ravichandran Recent Patents on Computer Science 2213-2759
28 Evaluating and Visualizing influential Node Using Various Measures in Social Network Data G.kavitha and N M ELango journal of Computational and Theoretical Nanoscience 1546-1955
29 Deep Learning for Short Answer Scoring Surya, K., Gayakwad, E., Nallakaruppan, M.K. International Journal of Recent Technology and Engineering 22773878
30 A survey on different continuous authentication systems Ayeswarya S., Norman J. International Journal of Biometrics 1755-8301
31 K-means and hierarchical based clustering in suicide analysis Sujatha.R,Sree Dharinya.S,Ephzibah,Kirubathangam.R International Journal of Engineering and Advanced Technology 2249-8958
32 Risk-based availability modelling and reputation management on fault tolerant cloud computing systems Deepa Mani; Anand Mahendran International Journal of Internet Technology and Secured Transactions (IJITST) 1748-569X
33 Decision-making tool for crop selection for agriculture development Deepa N., Ganesan K. Neural Computing and Applications 0941-0643
34 Predicting Autism Spectrum Disorder Using Machine Learning Algorithms with Jaundice Symptomatic Analysis Sharath Chandrika M B, Nallakaruppan M K, Siva Rama Krishnan S, Senthilkumar N C International Journal of Recent Technology and Engineering 2277-3878
35 Real-Time Classification of Twitter Trends using Support Vector Machine with Location Tracking Vijayan Ramaraj, G Gunasekaran, Prasanna Santhanam, S Meenatchi, Kishore Kumar K International Journal of Innovative Technology and Exploring Engineering 2278-3075
36 Semantic analysis - internet of things, study of past, present and future of IoT Snigdha Gharami, B.Prabadevi, Anupama Bhimnath Electronic Government , an International Journal 1740-7494
37 Pattern Analysis of Genetics and Genomics: A Survey of the State-of-art Jyotismita Chaki, Nilanjan Dey Multimedia Tools and Applications (Springer) 1380-7501
38 Pattern Mining Approaches used in Sensor-Based Biometric Recognition: A Review Jyotismita Chaki, Nilanjan Dey, Fuqian Shi , R. Simon Sherratt IEEE Sensors 1530-437X
39 A heuristic method for initial dominant point detection for polygonal approximations S. Kalaivani , Bimal Kumar Ray Soft Computing 1432-7643
40 A Survey and Analysis of various Objective Functions Defined for RPL in 6LoWPAN Suganya. P, Pradeep Reddy. C.H International Journal of Recent Technology and Engineering 2277-3878
41 Car Sales Prediction Using Machine Learning Algorithmns Madhuvanthi.K, Nallakaruppan.M.K, Senthilkumar N C, Siva Rama Krishnan S International Journal of Innovative Technology and Exploring Engineering 2278-3075
42 Comparative Performance Analysis of Various Classifiers for Cloud E-Health Users T. MuthamilSelvan,B. Balamurugan International Journal of E-Health and Medical Communications 1947-315X
43 Continuous Monitoring and Detection of Epileptic Seizures using Wearable Device Darshan Mehta, Tanay Deshmukh, Yokesh Babu Sundaresan,, P.Kumaresan Advances in Intelligent Systems and Computing Smart Innovations in Communication and Computational Sciences Proceedings of ICSICCS-2018, 2194-5357
44 Predicting Austim Spectrum Disorder Using Machine Learning Algorithms with Jaundice Symptomatic Analysis Sharath Chandrika M B, Nallakaruppan M K, Siva Rama Krishnan S, Senthilkumar N C International Journal of Recent Technology and Engineering 2277-3878
45 Stochastic Multifacility Location Problem under Triangular Area Constraint with Squared Euclidean Norm A. K. Santra Journal of Scientific & Industrial Research 0022-4456
46 Test Suite Reduction based on knowledge Reuse: An Adaptive Elitism Based Intellect approach (AEBI) using Clustering Technique Asha N and Prasanna Mani International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2278-3075
47 Prediction Intelligence System Based Real Time Monitoring of Yoga Performers Mani Prasanna, Thangavelu Arun Kumar, Sangaiah Arun Kumar, Mohamed Iqubal Jawid Nazir Recent Patents on Computer Science 1874-4796
48 Walsh Hadamard Transform for Simple Linear Iterative Clustering (SLIC) Superpixel Based Spectral Clustering of Multimodal MRI Brain Tumor Segmentation M Angulakshmi, GG Lakshmi Priya Innovation and Research in BioMedical engineering (IRBM) 1959-0318
49 Predictive analysis of stocks using data mining Magesh, G., Swarnalatha, P. Smart Innovation, Systems and Technologies 2190-3018
50 Classification of breast cancer based on thermal image using support vector machine Aarthy, S.L., Prabu, S. International Journal of Bioinformatics Research and Applications 1744-5485
51 Estimating the distance of a human from an object using 3D image reconstruction Swarna Priya, R.M., Gunavathi, C., Aarthy, S.L. Advances in Intelligent Systems and Computing 2194-5357
52 Big data analysis for anomaly detection in telecommunication using clustering techniques Gunavathi, C., Swarna Priya, R.M., Aarthy, S.L Advances in Intelligent Systems and Computing 2194-5357
53 VoIP Steganography Methods, a Survey S. Deepikaa, R. Saravanan CYBERNETICS AND INFORMATION TECHNOLOGIES 1311-9702
54 Flow based classification for specification based intrusion detection in software defined networking: Flowclassify Sampath N, Dinakaran M International Journal of Software Innovation 21667160
55 Performance Comparison of Various Feature Descriptors in Object Category Detection Application using SVM Classifier Kavitha B R , G. Ramya, G.Priya International Journal of Innovative Technology and Exploring Engineering 2278-3075
56 Energy-Efficient virtual machine selection based on resource ranking and utilization factor approach in cloud computing for IoT Mekala M.S., Viswanathan P. Computers and Electrical Engineering 0045-7906
57 Effective Classification of Major Depressive Disorder Patients using Machine Learning Techniques Nivedhitha M, Durairaj Vincent P M Recent patents on computer science 2213-2759
58 Machine learning on medical dataset Gopinath, M.P., Aarthy, S.L., Manchanda, A., Rishadh Advances in Intelligent Systems and Computing 2194-5357
59 Design of Secure Ehealth System Through Temporal Shadow using Blockchain R Charanya, Ra. K Saravanaguru, M Aramudhan International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2278-3075
60 K-means and hierarchical based clustering in suicide analysis Sujatha.R,Sree Dharinya.S,Ephzibah,Kirubathangam.R International Journal of Engineering and Advanced Technology 2249-8958
61 New Approach Data Encryption using Key Generation and DS-PEKS Algorithm Pratik Badala, Senthilkumar N C Research Journal of Engineering and Technology 0976-2973
62 Crime Pattern Matching based on Process Execution Context – An Evidence Acquisition Technique Asha Joseph and K. John Singh Journal of Advanced Research in Dynamical and Control Systems 1943-023X
63 Histogram-Equalized Hypercube Adaptive Linear Regression for Image Quality Assessment Balakrishnan, N., Shantharajah, S.P. Sadhana - Indian Academy of Engineering and Sciences 0256-2499
64 A Survey, International Journal of Advanced Intelligence Paradigms R. Jayanthi and K. John Singh International Journal of Advanced Intelligence Paradigms 0
65 Predicting ozone layer concentration using machine learning techniques Srinivas, A.S., Somula, R., Govinda, K., Manivannan, S.S. Springer Briefs in Applied Sciences and Technology 2191-530X
66 Healthcare Android Application Shakila Basheer, Nithya Sampath, Jayakumar Sadhasivam R. Ilampirai R. Ramya Bharathi V. Ilakkiya Journal of Computational and Theoretical Nanoscience 1546-1955
67 An empirical comparison of supervised learning algorithms and hybrid WDBN algorithm for MOOC courses Jayakumar Sadhasivam Ramesh Babu Kalivaradhan Journal of Ambient Intelligence and Humanized Computing 1868-5137
68 Image encryption techniques for data transmission in networks: A survey Jayanthi R., John Singh K. International Journal of Advanced Intelligence Paradigms 1755-0386
69 Accessibility Using Human Face Object and Text Recognition for Visually Impaired People V. Mareeswari, Vijayan Ramaraj, G. Uma Maheswari, R. Sujatha, Preethi. E International Journal of Innovative Technology and Exploring Engineering 22783075
70 Machine Learning Based Classification of Cervical Cancer Using K-Nearest Neighbour, Random Forest and Multilayer Perceptron Algorithms Shakila Basheer S. Mariyam Aysha Bivi S. Jayakumar Arpit Rathore Balajee Jeyakumar Journal of Computational and Theoretical Nanoscience 1546-1955
71 Review on recent developments in frequent itemset based document clustering, its research trends and applications D. S. Rajput International journal of data analysis techniques and strategies, InderScience 1755-8069
72 Ignition Pollution Check Yadav, V., Khatana, D., Bajoria, M., Nallakaruppan, M.K., Singh, S.P. International Journal of Innovative Technology and Exploring Engineering 22783075
73 Data cryptography based on musical notes on a fingerboard along with a dice Tripathy, A.K., Das, T.K., Navaneethan, C. Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
74 Comparison of particle swarm optimization and simulated annealing applied to travelling salesman problem Sumathi, M., Rahamathunnisa, U., Anitha, A., Das, D., Nallakaruppan, M.K. International Journal of Innovative Technology and Exploring Engineering 22783075
75 Location-Based Collaborative Filtering for Web Service Recommendation Venkatachalaappaswamy, M., Ramaraj, V., Ravichandran, S. Recent Patents on Computer Science 1874-4796
76 Classifying streaming of Twitter data based on sentiment analysis using hybridization Senthil Murugan N & Usha Devi G Neural Computing and Applications 0941-0643
77 Analyzing Financial Data and Mutual Funds Recommendation by Using Big Data Analytics Nithya Sampath Jayakumar Sadhasivam R. Raj Kumar M. Sathish Kumar Balajee Jeyakumar P. V. PraveenSundar Journal of Computational and Theoretical Nanoscience 1546-1955
78 An approach to aggregate the partial rank list of web services in e-business Mareeswari V., Sathiyamoorthy E. International Journal of e-Business Research 1548-1131
79 Securing one-time password generation using elliptic-curve cryptography with self-portrait photograph for mobile commerce application Ramasamy, P., Ranganathan, V., Palanisamy, V., Kadry, S. Multimedia Tools and Applications 1380-7501
80 Monitoring individual medical record by using wearable body sensors Gopal J,Sathiyamoorthy E,Mohammed Ayaz R Smart Innovation, Systems and Technologies 21903018
81 An Optimized Breast Cancer Diagnosis System Using a Cuckoo Search Algorithm and Support Vector Machine Classifier Manoharan prabukumar., Loganathan agilandeeswari., Arun kumar sangaiah Hybrid Intelligence for Image Analysis and Understanding 1868-5137
82 Intelligent intrusion detection techniques for secure communications in wireless networks: A survey Rama Prabha K.P., Jeyanthi N. International Journal of Advanced Intelligence Paradigms 1755-0386
83 32-Bit One Instruction Core: A Low-Cost,Reliable, and Fault-Tolerant Core for Multi-core Systems Venkatesha, S. and Parthasarathi, R Journal of Testing and Evaluation 0090-3973
84 Implementation of enhanced canny recognition algorithm and non – natural neural system based speech fusion for sightless persons Arunkumar, P., Shantharajah, S.P. Multimedia Tools and Applications 1380-7501
85 E-health cloud security using timing enabled proxy re-encryption V Vijayakumar, MK Priyan, G Ushadevi, R Varatharajan, G Manogaran, Prathamesh Vijay Tarare Mobile Networks and Applications 1383-469X
86 MMSI: A multi-mode service invocation algorithm to improve the connectivity in accessing cloud services in heterogeneous mobile cloud Nadesh R.K., Aramudhan M. International Journal of Advanced Intelligence Paradigms 1755-0386
87 A Comparative Study On Transformation of UML/OCL to Other Specifications Jagadeeswaran T, Senthilkumaran U Recent Patents on Computer Science 2213-2759
88 Health care arrangement system for Doctor-Patient Communications Angulakshmi.M, Sudha.S, Brindha.K Indian Journal for Public health and Research development 0976-0245
89 Accessibility using human face, object and text recognition for visually impaired people Mareeswari, V., Vijayan Ramaraj, , Uma Maheswari, G., Sujatha, R., Preethi, E International Journal of Innovative Technology and Exploring Engineering 2278-3075
90 Network Support Data Analysis for Fault Identification Using Machine Learning Parthasarathy Panchatcharam Shakila Basheer, Usha Devi Gandhi International Journal of Software Innovation 2166-7160
91 Accurate facial ethnicity classification using artificial neural networks trained with galactic swarm optimization algorithm Bagchi, C., Geraldine Bessie Amali, D., Dinakaran, M. Advances in Intelligent Systems and Computing 2194-5357
92 Agricultural leaf blight disease segmentation using indices based histogram intensity segmentation approach Kalaivani.S, Shantharajah.S.P, Padma.T, Multimedia Tools and Applications 1380-7501
93 Optimal body mass index cutoff point for cardiovascular disease and high blood pressure Chandra Babu, G., Shantharajah, S.P. Neural Computing and Applications 0941-0643
94 Gurumurthy S., Senthilkumar N.C., Ghalib M.R. A study of digital signal processing application for remote patient monitoring system using live EEG data transmission International Journal of Applied Engineering Research 0973-4562
95 Jeyanthi N., Thandeeswaran R., Vinithra J. RQA based approach to detect and prevent DDOS attacks in VoIP networks Cybernetics and Information Technologies 1311-9702
96 Angulakshmi M. A survey on multi-relational database based classification approaches International Journal of Applied Engineering Research 0973-4562

2017

S.No. Title Of Paper Name of the author/s Name of journal ISBN/ISSN Number
1 A Novel Women Chaperone "An Anti-Violation Technology" Prabhu J , Thanapal P , Vijayanand R , Kirubathagam R , Sundaravadivazhagan B International Journal of Pure and Applied Mathematics 1314-3395
2 Classification: Grouping The Users Based On Their Web Search Using Fuzzy Logic Senthilkumar N C, Ch Pradeep Reddy International Journal of Pure and Applied Mathematics 1314-3395
3 An Empirical Study Of Various Load Balancing Algorithms For Cloud Computing M Lawanyashri, S Subha. B Balamurugan International Journal of Pure and Applied Mathematics 1314-3395
4 An Improved Floating Point Addition Algorithm S Subha ARPN Journal of Engineering and Applied Sciences 1819-6608
5 Analysis Of Performance Measures To Handle Medical Ecommerce Shopping Cart Abandonment In Cloud, V Priya, S Subha, B Balamurugan Informatics in Medicine Unlocked-Elsevier, March 2017 2352-9148
6 Energy Aware Fruitfly Optimization Algorithm For Load Balancing In Cloud Computing Environments M. Lawanya Shri, S Subha, Balusamy International Journal of Intelligent Engineering and Systems, 2185-310
7 A Credential Data Privacy Preserving In Web Environment Using Secure Data Contribution Retrieval Algorithm” Kumaran U, Neelu Khare International Journal of Intelligent Engineering and Systems 2185-310
8 2D Chaotic Map Based On 2D Adaptive Grey Wolf Algorithm For Ultra Sound Medical Image Security Srinivas Koppu & Viswanatham International Journal of Intelligent Engineering and System 2185-310
9 3D Reconstruction Of A Scene From Multiple 2D Images Srinivas Koppu, Swarna Priya, R. M., Aarthy, S. L., Gunavathi, C., Venkatesh, P. & Gao, X. Z International Journal of Civil Engineering and Technology (IJCIET) 0976-6316
10 A Case Study : 3D City Generation Using Procedural Modeling Framework And Evaluations Trategies Divya Udayan J, M.Priya, R.Charanya, Tamil Priya. D And Boyu Gao International Journal of Civil Engineering & Technology (IJCIET) 0976-6316
11 Enchanced Id Based Ring Signature By Validating Time Slots In Cloud Environment Nithya S International Journal of Mechanical Engineering and Technology 0976-6340
12 A Case Study On Coactive Subject Modelling For Acclaiming Technical Articles Praveen Kumar Reddy M, Rajesh Kaluri, Kuruva Lakshmanna, Nagaraja G, Swamy T, Guokun Li International Journal of Mechanical Engineering and Technology (IJMET) 0976-6340
13   A Case Study On Cost Estimation Of Cloud Service Using Fuzzy Approach Srinivas Koppu, Joy Bhowmick., Madhu V. Satheesh S. And Tsung C.H International Journal of Pure and Applied Mathematics, 13118080
14 A Case Study: 3D City Generation Using Procedural Modeling Framework And Evaluation Strategies M.Priya International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
15 A Case Study: Analysis Of Single Phase
And Hybrid Cascade Multilevel
Inverter With Pwm And Level
Inverters
M.Priya International Journal of Mechanical Engineering and Technology (IJMET) 0976-6340
16 A Case Study: Home Environment Monitoring System Using Internet Of Things R. Raghavan, John Singh. K, Thippa Reddy. G, Sudheer. K, Venkatesh. P And Stephen Olatunde Olabiyisi International Journal of Mechanical Engineering and Technology 0976-6359
17 A Case Study: Usb Device Charging And Fitness Monitor With Smart Safety Shoe And Iot John Singh. K, Sagar G. V, Sushmita Lenka, Belwin Edward. J, Jacob Raglend. I, Stephen Olatunde Olabiyisi, International Journal of Mechanical Engineering and Technology 0976-6359
18 A Comprehensive Overview On The Foundations Of Formal Concept Analysis K. Sumangali Ch. Aswani Kumar Knowledge Management & E-Learning 2073-7904
19 A Computer Aided System To Detect Breast Masses Using Digital Mammograms Sujatha,R., Gao, X.-Z.,Gopinath, M.P., Prabu, S.,Murali, S.,Mohanasundaram, R., Kumar, N.S. International journal of Civil Engineering and Technology 0976 - 6316
20 A Condorcet Voting Theory Based Ahp Approach For Mcdm Problems Sweta Bhattacharya, V. Raju Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
21 A Fast Enhanced Secure Image Chaotic Cryptosystem Based On Hybrid Chaotic Magic Transform Srinivas Koppu & Viswanatham Modelling and Simulation in Engineering 16875591
22 A Framework For Attribute Selection In Marketing Using Rough Computing And Formal Concept Analysis T. K. Das IIMB Management Review 0970-3896
23 A Framework For Computational Offloading To Extend The Energy Of Mobile Devices In Mobile Cloud Computing. Thanapal, P., & Durai, M. S. International Journal of Embedded Systems 1741-1076
24 A Framework To Mitigate Arp Sniffing Attacks By Cache Poisoning B. Prabadevi, N. Jeyanthi International Journal of Advanced Intelligence Paradigms (Inderscience) 1755-0386
25 A Mobile Application Based Smart System For Supporting Yoga Activities And Health Monitoring Prasanna M, Arunkumar T, Arunkumar S Research Journal of Pharmacy and Technology 0974-360X
26 A Naive-Bayes Strategy For Sentiment Analysis On Demonetization And Indian Budget 2017-Case-Study Jasmine Norman, Mangayarkarasi R, Vanitha M, Praveen Kumar T, Umamaheswari G International Journal of Pure and Applied Mathematics 1314-3399
27 A New Algorithm For Password Encryption And Decryption M.Iyapparaja Journal of Advanced Research and Dynamical & Control Systems 1943-023X
28 A Novel Temporal Access Control Scheme For Outsourced Data In Cloud With User Revocation P. G. Shynu And K. John Singh Electronic Government, an International Journal, 1740-7508
29 A Novel Threshold Based Multi-Authority Access Control System In Cloud Storage Environment M.Lawanyashri International Journal of Pure and Applied Mathematics 1314-3399
30 A Prevention Model For Web Application Session Hijack Attacks In Wireless Networks Using Mac Appended Session Id S.S.Manivannan, E.Sathiyamoorthy Journal of Advanced Research in Dynamical and Control Systems 1943-023X
31 A Privacy-Preserving Secure Access Control Mechanism In Cloud M.Iyapparaja Journal of Advanced Research and Dynamical & Control Systems 1943-023X
32 A Real Time Monitoring System For Yoga Practitioners Prasanna M, Arunkumar T, Akshat Sharma, Nikhil Chaudhari International Journal of Intelligent Engineering and Systems 2185-3118
33 A Replica Detection Scheme Based On The Deviation In Distance Travelled Sliding Window For Wireless Sensor Networks Alekha Kumar Mishra, Asis Kumar Tripathy, Arun Kumar, And Ashok Kumar Turuk Wireless Communications and Mobile Computing, 1530-8677
34 A Review Of Soft Computing Techniques In Short-Term Load Forecasting Senthil Kumar P International Journal of Applied Engineering Research 0973-4562
35 A Review On Various Encoding Scehmes Used In Digital Dna Data Storage A.Swati, Forum Mathuria, S.Bhavani, E.Malathy, R.Mahadevan International Journal of Civil Engineering and Technology 0976-6308
36 A Study On Different Types Of Authentication Techniques In Data Security Dinesh Kumar D, K.Vijay, S.Bhavani, E.Malathy, R.Mahadevan International Journal of Civil Engineering and Technology 0976-6308
37 A Survey On Fault Detection Techniques In Different Machines - An Image Processing Approach U.Rahamathunnisa,Babu Chellappa Chetty And A.Clement King International Journal of Civil Engineering and Technology 0976-6316
38 A Survey On Feature Selection Methods In Microarray Gene Expression Data For Cancer Classification Gunavathi C, Premalatha K, Sivasubramanian K Research Journal of Pharmacy and Technology 0974-360X
39 An Access Control Models In Cloud Computing: A Review Priya G, Kavitha Br, Ramya G , Kumaresan P , Feslin Anish Mon International Journal of Pure and Applied Mathematics ISSN: 1311
40 An Analysis And Performance Evaluation Of Nosql Databases For Efficient Data Management In E-Health Clouds S L Aarthy Internation Journal of Pure and Applied Mathematics 13118080
41 An Approach For Dynamic Replica Allocation For Sparse (Urban/Sub-Urban) And Dense Regions (City Side) In Vanet Kumar P J, Manikandan, N., Suganya, P., Sureka, S International Journal of Civil Engineering and Technology 0976-6308
42 An Approach To Evaluate The Availability Of System In Cloud Computing Using Fault Tree Technique M.Deepa, M.Anand INASS 2185-3118
43 An Efficient And Secure Biometric Authentication Scheme For M-Commerce R. Thandeeswaran, Hamid Mcheick, Hemant Agrawal, Ajay Thakur, N. Jeyanthi, Rajan Slathia, International Journal of Civil Engineering and Technology 0976 - 6308
44 An Efficient Deep Learning Neural Network Based Brain Tumor Detection System Chinmayi, L Agilandeeswari, M Prabukumar, K Muralibabu International Journal of Pure and Applied Mathematics, 1314-3395
45 An Efficient Hybrid Approach For
Hyperspectral Image Classification,
L Agilandeeswari, M Prabukumar, S Sathishkumar International Journal of Pure and Applied Mathematics, 1314-3395
46 A Survey On Iot Related Patterns Siva Kumar N International Journal of Pure and Applied Mathematics 1314-3395
47 An Enhanced Abe Based Secure Access Control Scheme For E-Health Clouds P. G. Shynu And K. John Singh International Journal of Intelligent Engineering and Systems 2185-3118
48 An Enhanced Cp-Abe Based Access Control Algorithm For Point To Multi-Point Communication In Cloud Computing P. G. Shynu And K. John Singh Journal of Information Science and Engineering 1016-2364
49 An Enhanced Framework For Sign Gesture Recognition Using Hidden Markov Model And Adaptive Histogram Technique Rajesh Kaluri, Pradeep Reddy Ch International Journal of Intelligent Engineering and Systems 2185-3118
50 An Enhanced Virtual Backoff Algorithm For Wireless Sensor Networks Babu, P.R., Krishna, P.V., Saritha, V., Pounambal, M International Journal of Wireless and Mobile Computing 17411084
51 An Intelligent Approach Of Query Process Optimisation Using Cooperative Semantic Caching Techniqu P.Mohankumar Journal of Engineering science and Technology 1823-4690
52 An Overview Of Data Mining Techniques And Its Applications G.Kavitha,N.M.Elango International Journal of Civil Engineering and Technology 9766308
53 Analysis Of Using Sparse Matrix Storage Formats In Image Compression Techniques Banu,J.S, Babu.M.R, Thaseen,I.S And Balamurugan.P International Journal of Pure and Applied Mathematics 1311-8080
54 Analyzing Customer Sentiments Using Machine Learning Techniques Magesh G, Dr.P.Swarnalatha International Journal of Civil Engineering and Technology (IJCIET Journal) 0976 - 6316
55 Assessment And Optimisation Of User Imprecise Queries In Cloud Environments P.Mohankumar International journal of Intelligent Engineering and system 2185-3118
56 Automatic Brain Tumour Segmentation Techniques - A Review Angulakshmi.M, Lakshmi Priya. Gg International Journal of Imaging Systems and technology 1098-1098
57 Automatic Grading System For Mangoes Using Multiclass Svm Classifier L Agilandeeswari, M Prabukumar, Goel Shubham International Journal of Pure and Applied Mathematics 1311-1314
58 Availability Modelling Of Fault Tolerant Cloud Computing System M.Deepa, M.Anand INASS 2185-3118
59 An Evolutionary Secre Energy Efficient Routing Protocol In Iot Praveen Kumar Reddy, Rajasekhara Babu International Journal intelligent engineering and systems 1311063047
60 Big Data And Its Applications: A Survey Magesh G, Dr.P.Swarnalatha Research Journal of Pharmaceutical, Biological and Chemical Sciences 0975-8585
61 Big Data Management With Machine Learning Inscribed By Domain Knowlegde For Health Care Sujatha R., E.P.Ephzibah International Journal of Engineering & Technology 2227-524X
62 Biomarker Selection From Gene Expression Data For Tumour Categorization Using Bat Algorithm Gunavathi Chellamuthu, Premalatha Kandasamy, Sivasubramanian Kanagaraj International Journal of Intelligent Engineering & Systems 2185-3118
63 Bluetooth Based Low Power Data Acquisition System For Ban Kumaresan P Prabukumar M, International Journal of Pure and applied Mathematics - Special issue on Computer and Communication Editors 1311-8083
64 Case Study: A Line Following Robot For Hospital Management Kumaresan P,Priya.G,Kavitha B R, Ramya G, M.Lawanyashri International Journal of Pure and Applied Mathematics 1311-1314
65 Ciphertext-Scheme Based On Attribute Hybrid Encryption In Cloud Computing. Meenatchi, S., Navaneethan, C., Iyapparaja, M., Thanapal, P., & Prabhakaran, R., Jour of Adv Research in dynamic & Control System 1943-023X
66 Clustering Of Wireless Sensor Networks Nallakaruppan, M.K., Ilango, P., Deepa, N., Muthukumarappan, A. Research Journal of Pharmacy and Technology 9743618
67 Comparative Study On Performance Analysis Of Time Series Syed Muzamil Basha, Yang Zhenning, Dharmendra Singh Rajput, Iyengar N.Ch.S.N. And Ronnie D. Caytiles International Journal of Grid and Distributed Computing 2207-6379
68 Computer Numerical Control Machine Based On Machine Learning Kumaresan P Balavignesh G, Kavitha B R, Ramya Govindaraj, Venkatesan S International Journal of Pure and applied Mathematics - Special issue on Computer and Communication Editors 1311-8080
69 An Enhanced Trust Startegy For Online Social Networks Using Probalistic Reputation Features Raj E D, Babu L.D.D Neurocomputing 9252312
70 Concept Compression In Formal Concept Analysis Using Entropy-Based Attribute Priority K. Sumangali Ch. Aswani Kumar Applied Artificial Intelligence An International Journal 0883-9514
71 Context Residual Energy Based Trust Management In Mobile Adhoc Networks R. Vijayan, N. Jeyanthi International Journal of Communication Networks and Distributed Systems (Inderscience 1754-3916
72 Covering Rough Set Fuzzy C- Medoids (Crfm) Clustering Algorithm For Gene Expression Data

A.Jayaram Reddy

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

73

Crypto Currencies For Digital Currency Using Cipher Text And Sha 256

Sukhbir, C.P., Manivannan

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

74

Customized Services To Generate Test Suits For Testing Custom Software Application System Based On Knowledge Reuse

Asha N, Prasanna M

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

75

Decision Making Tool For Crop Selection For Agriculture Development

N. Deepa, K.Ganesan

Neural Computing and Applications

1433-3058

76

Detection Of Anaemia From Tongue Datasets By Image Processing

Sujatha, R., Aarthy, S.L., Charulatha, A.R. And

Sasikala, T.M.S

International Journal of Research in Pharmaceutical Sciences

0975-7538

77

Development Of Advanced Encryption Standard Architecture With Sbox Validity

Vanitha. M And S. Subha

Walailak Journal of Science and Technology

2228-835X

78

Discovery Of Drug And Medicine Using Datamining Techniques

Anish Chittora , A.Mary Mekala

Research Journal of Pharmacy and Technology

0974-3618

79

Domain Specific Predictive Analytics: A Case Study With R

Syed Muzamil Basha, Yang Zhenning,

Dharmendra Singh Rajput, Iyengar N.Ch.S.N. And

Ronnie D. Caytiles

International Journal of Multimedia and Ubiquitous Engineering

1975-0080

80

Dynamic Data Partitioning And Virtual Chunking For Effective Data Retrieval

M.Vanitha, R.Mangayarkarasi, Jasmine Norman,

R.Sakthivel, K.Baranitharan

International Journal of Pure and Applied Mathematics

1311-8080

81

Dynamic Energy Optimization Technique In Mobile Cloudlet For Mobile Cloud Computing Using Effective Offloading Algorithm

P.Priya, S.P.Shantharajah

Journal of Theoretical and Applied Information Technolog

1992-8645

82

Effective Evaluation Of Prediction Accuracy Using Optimization Algorithm,

Brindha.K, Sudha.S , Rathi.R And Charanya.S,

International Journal of Pure and Applied Mathematics

1311-8080

83

Effective Mining Approach To Produce Quality Search Results Using Proposed Approach

Elavarasan D, Durai Raj Vincent

International Journal of Intelligent Engineering and Systems

2185-3118

84

Energy Efficient Consumption For Quality Based Sleep Scheduling In Wireless Sensor Networks

A. S. Syed Navaz, N. Asha And D. Sumathi

ARPN Journal of Engineering and Applied Sciences

1819-6608

85

Energy Efficient Node Selection Algorithm Based On Node Performance Index And Random Waypoint Mobility Model In Internet Of Vehicles

P M Kumar, Ushadevi Gandhi, R Varatharajan,

Gunasekaran Manogaran, R Jidhesh, Thanjai Vadivel

Cluster Computing

1573-7543

86

Integration Of Fuzzy Dematel And Fmcdm Approach For Evaluating Knowledge Transfer Effectiveness With Reference To Gsd Project Outcome

Jagadeesh G, Arun Kumar S, X.Z.Gao

International Journal of Machine Learning and cybernetics

1868-8071

87

Enhanced Dtls With Coap-Based Authentication Scheme For The Internet Of Things In Healthcare Application

Pm Kumar, Ud Gandhi

The Journal of Supercomputing

0920-8542

88

Enhancing Trust In Mobile Adhoc Network Using Trust And Dynamic With Energy Efficient Multipath Routing Protocol

Vijayan R , Jeyanthi N

International Journal of Signal and Imaging Systems Engineering

1748-0698

89

Estimating Construction Data Using An Authenticated Application For Urban Planning

S.Sree Dharinya, Ephzibah.E.P, Divya Udayan,

R. Kirubathangam, & Charanya.R

International Journal of Civil Engineering and Technology (IJCIET)

9766308

90

Evaluating The Impact Of Feature Selection On Overall Performance Of Sentiment Analysis

Syed Muzamil Basha, Dharmendra Singh Rajput

ACM Digital Library

978-1-4503

91

Evolutionary And Neural Computing Based Decision Support System For Disease Diagnosis From Clinical Data Sets In Medical Practice,

M. Sudha

Journal of Medical Systems

1573-689X

92

Feature Selection For Privacy Preserving In Data Mining With Linear Regression Using Genetic Algorithm

Kumaran U, Neelu Khare

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

93

Flowagent: Software Defined Firewall Rule Generator For Network Intrusion Detection System

Nithya S

International Journal of Intelligent Engineering and Systems

2185-3118

94

Forward Secrecy Scheme For Data Sharing In Cloud

M. Lawanya Shri , G.Priya, M.B.Benjula Anbumalar,

Deepa Mani, K.Santhi

International Journal of Pure and Applied Mathematics

1311-8080

95

Handling Stakeholder Conflict By Agile Requirement Prioritization Using Apriori Technique

Rv Anand, M.Dinakaran

Computers & Electrical Engineering

0045-7906

96

Hb-Ppac: Hierarchy-Based Privacy Preserving Access Control Technique In Public Cloud

Sudha Senthilkumar,Madhu Viswanatham

International journal of High Performance computing and networking

1740-0570

97

Information Retrieval For Question Answering System Using Knowledge Based Query Reconstruction By Adapted Lesk And Latent Semantic Analysis

Saravanakumar K, Aswani Kumar Cherukuri

International Journal of Computer Science and Applications

0972-9038

98

Intelligent Decision Support System Based On Rough Set And Fuzzy Logic Approach For Efficacious Precipitation Forecast,

M. Sudha

Decision Science Letters

19295812

99

Intelligent Face Recognition And Navigation System Using Neural Learning For Smart Security In Internet Of Things

Pm Kumar, Ud Gandhi

Cluster Computing

1573-7543

100

Intrusion Detection Model Using Fusion Of Chi-Square Feature Selection And Multi Class Svm

I.Sumaiya Thaseen,

Journal of King Saud University-Computer and Information Sciences

1319-1578

101

A Hybrid Cluster Head Selection Model For Iot

Praveen Kumar Reddy M

springer

1058601712

102

K-Means Modification For Scalability

S.Bhavani,Sumit Patel, Dhanashri Patil, Yash Shah,

Rushikesh Babar, Abhishek Rathi

International Journal of Civil Engineering and Technology

0976-6308

103

Llvm Compiler

R.Bansal, Jasmine Norman,Mangayarkarasi R,Vanitha M,

Chandramouliswaran S

International Journal of Pure and Applied Mathematics

1311-8080

104

Luggage Tracking System Using Iot

Sudha Senthilkumar, Brindha.K, Rathi.R, Charanya. R, Mayank Jain

International Journal of Pure and Applied Mathematics

1314-3395

105

Metrics Based Evaluation For Disease Affection In Distinct Cities

M.Iyapparaja

Research Journal of Pharmacy and Technology

0974-3618

106

Multi-Voting And Binary Search Tree-Based Requirements Prioritisation For E-Service Software Project Development

Vijayanand R, Dinakaran M

Electronic Government, an International Journal

1740-7494

107

Network Life Time Uniformed By Mutual Nodes Cooperation And Life Nodes Relay In Wsn’S.

Thanapal, P., Prabhakaran, R., Meenatchi, S., Navaneethan, C.,

& Iyapparaja, M.

Jour of Adv Research in dynamic & Control System

1943-023X

108

Non-Intrusive Transaction Aware Filtering During Enterprise Application Modernizationra

Ramadoss, R., Elango, N.M., Abimannan, S., Hsu, C.-H.

Journal of Supercomputing

0920-8542

109

Soft Sequential Recognition Approach For User Activity Using A Wearable Device

Prabhavathy P

IJMET

9766359

110

Opinion Mining Services Using Machine Learning

Sujatha. R, M Sai Praneeth And M Lakshmi Deepak

Journal of Chemical and Pharmaceutical Sciences

0974-2115

111

Optimal Decision Tree Fuzzy Rule Based Classifier (Odt-Frc) For Heart Disease Prediction Using Improved Cuckoo Search Algorithm”

Subhashini Narayan , Jagadeesh Gobal

International Journal of Business Intelligence and Data Mining.

1943-023X

112

Optimizing Health Care Records By Preventing Duplication In Cloud

Sujatha R, Kaviya P.S

International Journal of Research in Pharmaceutical Sciences

0975-7538

113

Overview Of Securing Multimedia Content Using Efficient Encryption Methods And Modes

K. John Singh And Kunal Gagneja

International Journal of Advanced and Applied Sciences

2313-3724

114

Parallel Aes Algorithm For Performance Improvement In Data Analytics Security For Iot

Manikandan N, Subha S

International Journal of Networking and Virtual Organisations

1470-9503

115

Passive Incidental Alertness—Based Link Visualization For Secure Data Transmission In Manet

S.Uma, S.P.Shantharajah, C.Rani

Journal of Applied Security Research

1936-1610

116

Prediction Of Diabetes Using Data Mining Techniques

V. Mareeswari, Saranya R, Mahalakshmi R, Preethi E

Research Journal of Pharmacy and Technology

0974-3618

117

Preventing From Phishing Attack By
Implementing Url Pattern Matching
Technique In Web

U.Rahamathunnisa,N.Manikandan,U.Senthilkumaran

And C.Niveditha

International Journal of Civil Engineering and Technology

0976-6316

118

Rating Prediction Based On Social Sentiment From Textual Reviews

M. Deepa, K. Santhi, M. B. Benjulaanbu Malar,Priya .

G, M. Lawanya Shri

International Journal of Pure and Applied Mathematics

1311-8080

119

Robust Classification Of Hyperspectral Remote Sensing Images Combined With Multihypothesis Prediction And 3 Dimensional Discrete Wavelet Transform

Boggavarapu L N P, M Prabukumar

International Journal of Pure and Applied Mathematics,

1311-8080

120

Secret Image Enhanced Sharing Using Visual Cryptography

K.Brindha, N.Jeyanthi

Cybernetics and Information Technologies

1314-4081

121

Secured Sharing Data In Cloud Using Revocable Storage Identity Based Encryption

M.Iyapparaja

Journal of Advanced Research and Dynamical & Control Systems

1943-023X

122

Securing Portable Document Format File Using Extended Visual Cryptography To Protect Cloud Data Storage

K.Brindha, N.Jeyanthi

International Journal of Network Security

1816-3548

123

Security Algorithms In Cloud Computing: A Review,

M B Benjula Anbu Malar, Lawanyasri

International Journal of Pure and Applied Mathematics

1314-3395

124

Security Solution For Arp Cache Poisoning Attacks In Large Data Center Networks

B. Prabadevi, N. Jeyanthi

Cybernetics and Information Technologies

1311-9702

125

Smart Cooking Oil Analyzer Using Dielectric Constant Metric

Sriniavs Koppu., Rajesh D., Srinivasa Perumal R.,

Satheesh Kumar S., Rajeev Pankaj Nelapati

International Journal of Pure and Applied Mathematics,

1311-8080

126

Software Management Issues In Mobile Application Development

Deepa N, M. Senthilkumar, M.K.Nallakaruappn,

R.Chandrasekar, B R Kavitha ,Anand Muthukumarappan

International Journal of Civil Engineering and Technology (IJCIET)

0976-6308

127

Specification Based Intrusion Detection In Software Defined Networking

Nithya S

International Journal of Pure and Applied Mathematics

1314-3395

128

An Improved Multiplication Algorithm

Subha S

International Journal of Pure and Applied Mathematics

1311-8080

129

Stable Multipath Routing Protocol Using Different Route Selection Mechanism For Mobile Ad-Hoc Networks.

Alagiri, I., Muthamil Selvan, T., Thanapal, P.,

& Navaneethan C.

Inernational journal of pure and applied mathematics

1314-3395

130

Statistical Feature Ranking And Fuzzy Supervised Learning Approach In Modeling Regional Rainfall Prediction Systems

M. Sudha

AGRIS on-line Papers in Economics and Informatics

1804-1930

131

Stratified Sampling Method Based Training Pixels Selection For Hyper Spectral Remote Sensing Image Classification

M Radhesyam, Vaddi, Prabukumar M

International Journal of Pure and Applied Mathematics,

1314-3395

132

Successive Shape Based Image Registration

L Agilandeeswari, M Prabukumar, Chinmay,

K Muralibabu, Sudharani

International Journal of Pure and Applied Mathematics,

1314-3395

133

Survey About Segmentation Feature Extraction And Classification Of Disease Affected Leaf Using Digital Image

S.Kalaivani, S.P.Shantharajah

Journal of Advanced Research in Dynamical and Control System

1943-023X

134

Techiecardia-A System For Detection And Prediction Of Sudden Cardiac Arrests

M.Iyapparaja

Journal of Advanced Research and Dynamical & Control Systems

1943-023X

135

Test Case Generation For Embedded System Software Using Uml Interaction Diagram

Mani P, Prasanna M

Journal of Engineering Science and Technology

1823-4690

136

Swf Scheduled Workflow Integration Profile For The Connectivity Problems In Radiology Workflow

Prabadevi. B,

International Journal of Intelligent Engineering and Systems

9758585

137

Two Layered Optimized System Using Bluetooth And Hipherlan Interfaced Wireless Sensor Networks

M.Iyapparaja

Journal of Advanced Research and Dynamical & Control Systems

1943-023X

138

User Web Access Recording And Mining For Business Intelligence

Sindhuja, T.,S.S. Manivannan

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

139

Weighted Fuzzy Rule Based Sentiment Prediction Analysis On Tweets

Syed Muzamil Basha, Yang Zhenning,

Dharmendra Singh Rajput, Iyengar N.Ch.S.N

And Ronnie D. Caytiles

International Journal of Grid and Distributed Computing

2207-6379

140

Cloud Based Automated Framework For Semantic Rich Ontology Construction
And Similarity Computation For E-Health Applications

T. Muthamilselvan , B. Balamurugan

Informatics in Medicine Unlocked

2352-9148

141

Hybrid Approach For Data Classification In E-Health Cloud

T. Muthamilselvan , B. Balamurugan

International Journal of Intelligent Engineering and Systems

2185-3118

142

Role Of Automation In Waste Management And Recent Trends

Raghavendra Desai, M Parimala

International Journal of Environment and Waste Management

1478-9868

143

An Optimized Replica Allocation Algorithm Amidst Of Selfish Nodes In Manet

Kumar Pj, Ilango P

Wireless Personal Communication, Springer

0929-6212

144

Mqrc: Qos Aware Multimedia Data Replication In Cloud

Kumar Pj, Ilango P

International Journal of BioMedical Engineering and Technology

1752-6418

145

Upper Bound Tighter Item Caps For Fast Frequent Itemsets Mining For Uncertain Data Implemented Using Splay Trees

Shashikiran.V And S.Murali

International Journal of Pure and Applied Mathematics

1311-8080

146

Energy Efficient Cluster Head Selection Algorithm In Wireless Sensor Networks Using Ea-Fkpso Protocol

Meenatchi, S., & Prabu, S.

Jour of Adv Research in Dynamical & Control Systems.

1943-023X

147

Test Case Generation For Real Time System Software Using Specification Diagram

Prasanna M

international journal of intelligent engineering and systems

2185-3118

148

An Intelligent Lung Cancer Diagnosis System
Using Cuckoo Search Optimization And Support Vector Machine Classifier

Prabukumar M, Agilandeeswari, L. And Ganesan. K

Journal of Ambient Intelligence and Humanized Computing

1868-5137

149

Heart Disease Prediction System Using Ann, Rbf And Cbr

N. Sivakumar, R.Jothikumar, P.S.Ramesh & Suganthan

International Journal of Pure and Applied Mathematics

1314-3395

150

Applying Reversible Data Hiding For Medical Images In Hybrid Domain Using Haar And Modified Histogram

Vanmathi Chandrasekaran, Prabu Sevugan,

International Journal of Intelligent Engineering and Systems

2185-3118

151

Image Steganography Using Fuzzy Logic And Chaotic For Large Payload And High Imperceptibility

Vanmathi C., Prabu S

International Journal of Fuzzy Systems

1562-2479

152

A Comparative Study Of Statistical And Rough Computing Models In Predictive Data Analsis

A. Anitha, D. P. Acharjya

International Journal of Ambient Computing and Intelligence (IJACI)

1941-6237

153

Crop Suitability Prediction In Vellore District Using Rough Set On Fuzzy Approximation Space And Neural Network

A. Anitha, D. P. Acharjya

Neural Computing and Applications

0941-0643

154

Optimal View Point Selection In Direct Volume Rendering For 3D Visualization

Gunasekaran, G., & Venkatesan, M.

International Journal of Intelligent Engineering and Systems

2185-3118

155

An Efficient Technique For Three-Dimensional Image Visualization Through Two-Dimensional Images For Medical Data

Gunasekaran, G., & Venkatesan, M.

Journal of Intelligent Systems

2191-026X

156

A Novel Method For Smart Vehicle Safety

K.Uma, Anand Kannan,

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

157

Alert On Detection Of Hazardous Changes In Environmental Parameters Using Gsm

K.Uma

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

158

Smart Vehicle Safety Using Efficient Technique To The Vehicle Traveller’S

K.Uma

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

159

The Challenges And Issues On Big Data Analytics

K.Uma, Anand Kannan

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

160

An Analysis Of Decision Theoretic Kernalized Rough Intuitionistic Fuzzy C-Means

Ryan Serrao, B.K.Tripathy And A.Jayaram Reddy

Advances in Intelligent Systems and Computing

2194-5357

161

Hocs : Host Oscommunication Service

Jayakumar Sadhasivam, Senthil Jayavel,

Balajee Jayakumar, Shoaib Merchant

International Journal of Civil Engineering and Technology

0976-6316

162

A Review On Polygonal Approximation Techniques Of The Digital Planar Curves

Kalaivani S

International Journal of pure and Applied Mathematics

1311-8080

163

Review Of Gaming And Its Evolution Over Networks

Jaya Kumar S

International Journal of Civil Engineering and Technology

0976-6316

164

Convoluted Local Binary Pattern Based Grouping Neural Network For Face Emotion Recognition

Krithika L B,Lakshmi Priya Gg

Journal of Engineering Science and Technology Review

1791-2377

165

A Case Study Of Carry Skip Adder And Design Of Feed-Forward Mechanism To Improve The Speed Of Carry Chain

Premson Y, Sakthivel.R,Vivek.T, Vanitha M

International Journal of Pure and Applied Mathematics

1311-8080

166

Performance Analysis Of Cloud Computing In Healthcare Systemusing Tandem Queues

K.Santhi, R.Saravanan

International Journal of Intelligent Engineering and Systems

2185-3118

167

Performance Analysis Of Cloud Computing Bulkservice Using Queueing Models

K.Santhi, R.Saravanan

International Journal of Applied Engineering Research

1311-8080

168

Performance Analysis Of Cloud Computing Using Batch Queueing Models In Healthcare Systems

K.Santhi, R.Saravanan

Research Journal of Pharmacy and Technology

0974-360X

169

Clustering Algorithm In Possibilistic Exponential Fuzzy C-Mean Segmenting Medical Images

Chiranji Lal Chowdhary

JOURNAL OF BIOMIMETICS, BIOMATERIALS AND BIOMEDICAL ENGINEERING

2296-9845

170

Modelling The H1Ni Influenza Using Mathematical And Neural Network Approaches

Daphne Lopez, Gunasekaran M, Jagan Mohan

Biomedical Research

0970-938X

171

Parametric Model To Predict H1N1 Influenza In Vellore District, Tamil Nadu, India

Daphne Lopez, Gunasekaran Monoharan

Handbook of Statistics

1992-8408

172

A Survey On Big Data Arcitectures And Machine Learning Algorithms In Healthcare

Gunasekaran M,Daphne Lopez

International Journal of Biomedical Engineering and Technology

1752-6418

173

A Gaussian Process Based Big Data Processing Framework In Cluster Computing Environment

Gunasekaran M,Daphne Lopez

Cluster Computing

1386-7857

174

Disease Surveillance System For Big Climate Data Processing And Dengue Transmission

Gunasekaran M,Daphne Lopez

International Journal of Amient Computing and Intelligence

1941-6237

175

Document Level Prioritization And Identificataion Of Dominant Multi-Word Named Products In Customer Reviews

Sivashankar,Valarmathi

Aab Journal of Science & Engineering

2191-4281

176

A Heuristic Approach To Machine-Part Cell Formation In The Presence Of Alternative Process Plans

Sowmiya N, Srinivasa Gupta, Valarmathi,

Poonambalam

International Journal of Advanced Manufacturing Technology

14333015

177

A Review Of Categorical Data Clustering Methodologies Based On Recent Studies

Sowmiya,Valarmathi

IIOAB Journal

9763104

178

Brain Tumour Segmentation From Mri Using Superpixels Based Spectral Clustering.

Angulakshmi, M., Gg Lakshmi Priya

Journal of King Saud University-Computer and Information Sciences

1319-1578

179

Procedural Restoration Of Texture And Restruing Geometry From Façade Image

Divya Udayan

IEEE access

21693536

180

A Study On Tailor-Made Security Schemes To Defend Iots

M N Rajaprabha, P Jayalakshmi,

R Vijay Anand

International Journal of Advance Research in Science and Engineering

2319-8354

181

Bike Sharing Prediction Using Deep Neural Networks

Thirumalai, Chandrasegar And Koppuravuri,

Ravisankar.

JOIV: International Journal on Informatics Visualization

2549-9610

182

Comparative Study On Various Graph Algorithms, . 414-419

Angulakshmi., Rathi,R., Sudha, S., Brindha,K.,

International journal of advance research in science and engineering

2319-8346

183

Honey Bee Foreaging Algorithm For Load Balancing In Cloud Computing Optimization

Sudha, S., Brindha,K., Rathi,R.,Angulakshmi.,

Jothi.,Thirani.,

International Journal of Engineering Science and Computing

2321-3361

184

A Case Study On Cognitively Improvised Min-Max Algorithm For Distributed Computer Systems,

Sudha, S., Brindha,K., Rathi,R.,Nishanth,A., Vivek,P.,

International Journal for Scientific Research & Development

906-911

185

A Case Study On Performance Analysis Of Routing Protocols In Mobile Adhoc Netwoks

Nallakaruppan.M.K, N. Deepa,Pranava Kumar.R,

Sudhanshu Gera,Arpit Chikara

International Journal for Science and Advance Research in Technology

2395-1052

186

Analysis Of Agricultural Data Using Big Data Analytics

Ravishankar K, Sidhardha K, Prabadevi B

Journal of chemical and pharmaceutical Sciences

0974-2115

187

A Data Security Self-Attribute System In Cloud Computing
and Communication Engineering

Kumaresan P Dhanesh Lokhande

International Journal of Innovative Research in Computer

2320-9798

188

A Modified Synthetic Division Algorithm

S Subha

International Journal of Computational and Applied Mathematics

2349-5103

189

A Novel Based Ranking Radically Influential Web Environment Users,

M B Benjula Anbu Malar

International Journal of Advance Research in Science and Engineering

2319-8354

190

A Novel Method Of Real Time City Scale Taxi Trip Distribution

M B Benjula Anbu Malar

International Journal of Advance Research in Science and Engineering

2319-8354

191

A Study On Travel Recommendation System

Angulakshmi , Rathi.R , Dr.Sudha Senthilkumar ,

Dr.K.Brindha , Rajat Tandon

International Journal of Engineering Science and Computing, December

2321 3361

192

A Survey On Trust Models In Cloud Computing

Kumaresan P Ramya Govindaraj Kavitha B R

International Journal of Advance research in Science and Engineering

2319-8354

193

A Synthetic Division Algorithm With Positive Remainder

S Subha

International Journal of Advanced Science and Research

2455-4227

194

Agriculture E-Commerce Website,

M B Benjula Anbu Malar

International Journal of Advance Research in Science and Engineering ,

2319-8354
195 Agronomic Disaster Management Using Artificial Intelligence – A Case Study M. Sudha International Journal of Computer Science and Business Intelligence 2364-4168
196 An Efficient And Secured Data Storage Scheme In Cloud Computing, M B Benjula Anbu Malar International Journal of Advance Research in Science and Engineering 2319-8354
197 Applications Of Iot In Green Environment Kumaresan P, Darshan K N, Kavitha B R, Ramya Govindaraj International Journal of Advance research in Science and Engineering 2319-8354
198 Big Data In Healthcare: A Review Magesh G, P.Swarnalatha Emerging trends in Computer Engineering and Research, IIOAB Journal 0976-3104
199 Cloud With Iot In Smart Parking Sujatha R, Rahul Gorai, Harshita Wadhwa, Shivani Tripathi International Journal of Innovative Research in Management, Engineering and Technology 2456-0448
200 Computational Intelligence Based Sports Success Prediction System Using Functional Pattern Growth Tree – A Case Study M. Sudha International Journal of Computational Intelligence Research 0974-1259
201 Content Based Image Retrieval Using Hadoop And Hipi Kumaresan P, Kavitha B R, Ramya Govindaraj International Journal of Advance research in Science and Engineering 2319-8354
202 Detection Of Phishing Pages Over The Internet Using Anti-Phishing Techniques P Jayalakshmi, M N Rajaprabha, R Vijay Anand International Journal of Advance Research in Science and Engineering 2319-8354
203 Expelling Undesired Targets From An Image
Exploiting Surface Synthesis And Dispersion
and Communication Engineering
Based Technique
Kumaresan P, Pratik Bhosale International Journal of Innovative Research in Computer 2320-9798
204 Framework For Reliable Re Encryption In Cloud Magesh G, P.Swarnalatha Journal of Chemical and Pharmaceutical Sciences 0974-2115
205 Fuzzy-Set Based Privacy Preserving Access Control Techniques In Cloud (Fb-Ppac) Brindha.K, Sudha.S ,Sushmitakumari International Journal of Artificial Intelligence 2252-8938
206 Gdfs Based Data Encryption Technique In Cloud Computing Environments M B Benjula Anbu Malar International Journal of Advance Research in Science and Engineering 2319-8354
207 Heart Disease Prediction Using Data Mining Techniques Nallakaruppan.M.K, N. Deepa, Moin Ahmed, Tanuja, Ajith Kumar,Pranava Kumar.R International Journal of Engineering Science and Computing 2321-3361
208 An Improved Tumour Identification With Gabor Wavelet Segmentation Ciranji Lal Choudahary Research 2321 3361

209

Inquiry Based E-Learning System Using Personalized Knowledge Search

P Jayalakshmi, M N Rajaprabha, R Vijay Anand

And K Venkatesan

International Journal of Advance Research in Science and Engineering

2319-8354

210

Instant Medical Care And Drug Suggestion Service Using Data Mining And Machine Learning Based Intelligent Self-Diagnosis Medical System

M. Sudha

International Journal of Advanced Life Sciences

2277-758X

211

Iris Recognition System

Magesh G, Ravee Sundararajan

International Research Journal of Engineering and Technology (IRJET)

2395-0056

212

Leaf Disease Detection Using Image Processing

Sujatha, R, Y Sravan Kumar And Garine Uma Akhil

Journal of Chemical and Pharmaceutical Sciences

0974-2115

213

Precision Agriculture Using Real Time
Environmental Parameters And Internet Of Things
and Communication Engineering

Kumaresan P Ketan Prakash Kandagale

International Journal of Innovative Research in Computer

2320-9798

214

Privacy Preserving And Secret Based Navigation Scheme In Vehicular Adhocnetwork : A Case Study

M B Benjula Anbu Malar

International Journal of Advance Research in Science and Engineering ,

2319-8354

215

Reconfigurable Interpolation Filter Architecture Design

Satheesh Kumar S, Venugopal P, Srinivas Koppu,

Rajeev Pankaj N, Rajesh Kaluri, Madhusudhana Rao

International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering

2278-8875

216

Reconstruction Of Per Packet Routing Path

M B Benjula Anbu Malar

International Journal of Advance Research in Science and Engineering

2319-8354

217

Smarter Way To Access Multiple Mobile Cloud Applications Without Interoperability Issues.

Thanapal, P., Marimuthu, K., Rajkumar, S., & Niranchana, R.

I.J. Wireless and Microwave Technologies

2076-1449

218

Temperature Controlled Dc Fan

Sudha, S., Brindha,K., Rathi,R.,Hardi,S., Kataria,S.,

International journal of advance research in science and engineering

498-506

219

User Authentication Framework With Improved Performance In Multi-Cloud Environment

R. Thandeeswaran, M A Saleem Durai

American Journal of Computer Science and Information Technology

2349-3917

220

Validation Of Automated Test Cases With Specification Path

Mani P, Prasanna M

Journal of statistics and Management Systems

0972-0510

221

Weather Modeling Using Data-Driven Adaptive Rough-Neuro-Fuzzy Approach

M. Sudha

Current World Environment

0973-4929

222

Assessment Of Unfair User Rating In Multidisciplinary System

V.Mareeswari, Bala Prasanth P

Research Journal of Pharmaceutical, Biological and Chemical Sciences

0975-8585

223

Pattern Recognition Using Pca Algorithms

Uma Maheswari G, Ephzibah E P, Mareeswari V

Research Journal of Pharmaceutical, Biological and Chemical Sciences

0975-8585

224

Fog Computing – Enhancing The Maximum Energy Consumption Of Data Servers

Priyanka C, Prabadevi, Jeyanthi N

IDL - International Digital Library Of Technology & Research

2349-302X

225

Anomaly Based Intrusion Detection Methods In Network Infrastructure – A Survey

Dhanabal L, S.P.Shantharajah, T. Padma

Asian Journal of Research in Social Sciences and Humanities

2249-7315

226

Survey Of Image Segmentation Algorithm For Medical Images: Challenges And Methodologies

P Chinmayi, M Prabukumar, L Agilandeeswari

RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES

0975-8585

227

Data Replication In Current Generation Computing Environment

Kumar Pj, Ilango P

International Journal of Engineering trends and Technology,

2231-5381

228

Data Replication In Conventional Computing Environment

Kumar Pj, Ilango P

International Journal of Computer Trends and Technology

2231-2803.

229

Case Study- Machine Learning Based On Scenario Analysis

Prabadevi. B, Vanmathi. C, Krithika. L. B,

Sudha. S, Vivek Akabote

International Journal of Scientific Research in Computer Science, Engineering and Information Technology

2456-3307

230

Precise Investigations Of Software Quality

Alice Auxilia .L, Asha .N, Vanmathi .C

International Journal of Engineering Science and Computing,

2321-3361

231

Intrusion Detection System Based On Artificial Intelligence

  1. Anitha,Sv Revathi, S Jeevanantham,
  2. Eliza Godwin

International Journal of Technology

2231-3915

232

Mooc : A Framework For Learners Using Learning Style

Jayakumar Sadhasivam And Ramesh Babu Kalivaradhan

International Education and Research Journal

2454-9916

233

Review On Sentiment Analysis A Learners’ Opinion

Jayakumar Sadhasivam And Ramesh Babu Kalivaradhan

IIOAB - Emerging trends in Computer Engineering and Research

0976-3104

234

Comparative Study On Web Based Software Project Management Tools

Jayakumar Sadhasivam

International Journal of Modern Computer Science

2320-7868

235

Data Load Balancing In A Big Data Heterogeneous Environment

P Jayalakshmi, M N Rajaprabha, R Vijay Anand

And K Venkatesan

International Journal of Advance Research in Science and Engineering

2319-8354

236

I Voting

P Jayalakshmi, M N Rajaprabha, R Vijay Anand

And K Venkatesan

International Journal of Advance Research in Science and Engineering

2319-8354

237

A Novel Method For Key Aggregation On Data Sharing In Cloud Stoeage Environment

K.Shanthi, M.Deepa, M.Lawanya Shri

International Journal of Advance Research in Science and Engineering

2319-8354

238

Implementation Of Morphological Image Processing Algorithm Using Mammograms

Tk Das, Cl Chowdhary

journal of chemical and proceessing

9742-115

239

A Review On Internet Of Things And Its Applications In Healthcare

Chiranji Lal Chowdhary

Journal of Chemical and Pharmaceutic al Sciences

0974-2115

2016

S.No. Publication details (incl complete bibliography)

1.

Raj, E. D., & Babu, L. D. (2016). A fuzzy adaptive resonance theory inspired overlapping

community detection method for online social networks.

Knowledge-Based Systems, 113, 75-87.

2.

Vijayakumar, P., Chang, V., Deborah, L. J., Balusamy, B., & Shynu, P. G. (2016).

Computationally efficient privacy preserving

anonymous mutual and batch authentication schemes for vehicular ad hoc networks.

Future Generation Computer Systems.

3.

Loganathan, A., & Kaliyaperumal, G. (2016). An adaptive HVS based video watermarking

scheme for multiple watermarks using BAM neural networks and fuzzy inference system.

Expert Systems with Applications, 63, 412-434.

4.

PVSSR, C. M. (2016). Dimensionality reduced local directional pattern (DR-LDP) for face recognition.

Expert Systems with Applications, 63, 66-73.

5.

Boobalan, M. P., Lopez, D., & Gao, X. Z. (2016). Graph clustering using k-Neighbourhood

Attribute Structural similarity.

Applied Soft Computing, 47, 216-223.

6.

Deepa, N., & Ganesan, K. (2016). Multi-class classification using hybrid soft decision model

for agriculture crop selection.

Neural Computing and Applications, 1-14.

7.

Lopez, D., & Sekaran, G. (2016). Climate change and disease dynamics-a big data perspective.

International Journal of Infectious Diseases, 45(1):23-24.

8.

Singh, P. K., Kumar, C. A., & Li, J. (2016). Knowledge representation using interval-valued

fuzzy formal concept lattice.

Soft Computing., 20(4), 1485-1502.

9.

Agilandeeswari, L., & Ganesan, K. (2016). A bi-directional associative memory based multiple

image watermarking on cover video.

Multimedia Tools and Applications, 75(12), 7211.

10.

Agilandeeswari, L., & Ganesan, K. (2016). A robust color video watermarking scheme based on hybrid embedding techniques.

Multimedia Tools Appl., 75(14), 8745-8780.

11.

Ahamed, B. B., & Ramkumar, T. (2016). An intelligent web search framework for performing efficient retrieval of data.

Computers & Electrical Engineering, 56, 289-299.

12.

Balakrishnan, S. M., & Sangaiah, A. K. (2016). Integrated QoUE and QoS approach for optimal service

composition selection in internet of services (IoS).

Multimedia Tools and Applications, 1-28.

13.

Sujatha, R., & Ezhilmaran, D. (2016). A new efficient SIF-based FCIL (SIF–FCIL) mining algorithm in

predicting the crime locations.

Journal of Experimental & Theoretical Artificial Intelligence, 28(3), 561-579.

14.

Pounambal, M., & Krishna, P. V. (2016). Efficient channel assignment method for multimedia

traffic in wireless mesh networks.

International Journal of Communication Systems, 29(5), 929-941.

15.

Singh, P. K., Aswani Kumar, C., & Gani, A. (2016). A comprehensive survey on formal concept

analysis, its research trends and applications. International Journal of Applied Mathematics and

Computer Science, 26(2), 495-516.

16.

Tripathy, A. K., Chinara, S., & Sarkar, M. (2016). An application of wireless brain–computer interface

for drowsiness detection.

Biocybernetics and Biomedical Engineering, 36(1), 276-284.

17.

Navaneethan, C., & Prabha, K. H. (2016). Optimizing Network Layer with Adaptive Modulation for

Time Varying Channel.

Wireless Personal Communications, 90(2), 1003-1019.

18.

Balasubramanian, V., Nagarajan, S. G., & Veerappagoundar, P. (2016). Mahalanobis distance-the

ultimate measure for sentiment analysis.

Int. Arab J. Inf. Technol., 13(2), 252-257.

19.

Nalinipriya, G., Maheswari, K. G., Balusamy, B., Kotteswari, K., & Kumar Sangaiah, A. (2016).

Availability modeling for multi-tier cloud environment. Intelligent Automation & Soft Computing, 1-8.

20.

Kumar, C. A., Mouliswaran, S. C., Li, J. H., & Chandrasekar, C. (2016). Role based access control design

using triadic concept analysis.

Journal of Central South University, 23(12), 3183-3191.

21.

Swathi, G., & Saravanan, R. (2016). A Framework for Efficient Routing in MANET using Index Routing

Tables-based Algorithms.

Defence Science Journal, 66(6), 568.

22.

Deepa, N., & Ganesan, K. (2016). Mahalanobis Taguchi system based criteria selection tool for

agriculture crops.

Sādhanā, 41(12), 1407-1414.

23.

Leo Dencelin X, Ramkumar, T. (2016). Analysis of multilayer perceptron machine learning

approach in classifying protein secondary structures.

Biomedical Research. Special Issue- Computational Life Science and Smarter Technological

Advancement, August 2016, S166-S173.

24.

Rajavel, D., & Shantharajah, S. P. (2016). Scrambling algorithm for encryption of text using

cube rotation artificial intelligence technique.

Biomedical Research. Special Issue-Computational Life Science and Smarter Technological

Advancement, August 2016, S251-S256.

25.

Das, T. K., & Nahar, K. M. (2016). A Voice Identification System using Hidden Markov Model.

Indian Journal of Science and Technology, 9(4).

26.

Manikandan, N., & Subha, S. (2016). Software Design Challenges in Time Series Prediction Systems

Using Parallel Implementation of Artificial Neural Networks.

The Scientific World Journal, 2016.

27.

Subha, S. (2016). A Power Saving Set Associative Cache Model. Indian Journal of Science and Technology, 9(6).

28.

Praveen Kumar Reddy M. & M. Rajasekhara Babu (2016). A scalable approach for improving dynamic

multithreaded applications on NUMA based architectures.

ARPN Journal of Engineering and Applied Sciences, 11(3), 1494-1503.

29.

Narayanan, M., & Cherukuri, A. K. (2016). A study and analysis of recommendation systems

for location-based social network (LBSN) with big data.

IIMB Management Review, 28(1), 25-30.

30.

Jayanthi R, Siva Rama Krishnan S, Rama Prabha K P., (2016). Spoofing Assault

Identification and Limiting Several Adversaries in Wireless Networks.

International Journal of Applied Engineering Research, 11(1), 286-289.

31.

Shynu, P. G., & Singh, K. J. (2016). A Comprehensive Survey and Analysis on Access

Control Schemes in Cloud Environment.

Cybernetics and Information Technologies, 16(1), 19-38.

32.

Subha, S. (2016). A literature survey on cpu cache reconfiguration. ARPN Journal of

Engineering and Applied Sciences. 11(5), 3008-3012.

33.

Prasanna, S., & Ezhilmaran, D. (2016). A Survey of Stock Price Prediction & Estimation

Using Data Mining Techniques.

International Journal of Applied Engineering Research, 11(6), 4097-4099.

34.

Vijayan, R., & Jeyanthi, N. (2016). A survey of trust management in mobile ad hoc networks.

International Journal of Applied Engineering Research, 11(4), 2833-2838.

35.

Thanapal P., Saleem Durai M A., (2016). A survey on application partitioning for mobile cloud computing.

International Journal of Pharmacy and Technology. 8(1), 10574-10589.

36.

Suganya P, (2016). A survey on various security measures used in cloud.

International Journal of Pharmacy and Technology. 8(1), 3644-3647

37.

Prathik, A., Uma, K., & Anuradha, J. (2016). An Overview of application of Graph theory.

International Journal of ChemTech Research, 9(2), 242-248.

38.

Anusha, K., & Sathiyamoorthy, E. (2016). Comparative study for feature selection

algorithms in intrusion detection system.

Automatic Control and Computer Sciences, 50(1), 1-9.

39.

Seetha R & Saravanan R. (2016). Digital Signature Schemes for group communication: A Survey.

International Journal of Applied Engineering Research, 11(6), 4416-4422.

40.

Rathi R., (2016). Hybridization of soft computing framework – a survey.

International Journal of Pharmacy & Technology, 8(1), 3594-3602.

41.

Das, T. K. (2016). Intelligent techniques in decision making: A survey.

Indian Journal of Science and Technology, 9(12).

42.

Anand, R. V., & Dinakaran, M. (2016). Popular Agile Methods in Software Development:

Review and Analysis. International Journal of Applied Engineering Research, 11(5), 3433-3437.

43.

Fiaz, A. S., Asha, N., Sumathi, D., & Navaz, A. S. (2016). Data Visualization: Enhancing

Big Data More Adaptable and Valuable.

International Journal of Applied Engineering Research, 11(4), 2801-2804.

44.

Thandeeswaran, R., & Durai, M. S. (2016). Wide-ranging Survey on Authentication Mechanisms.

International Journal of Applied Engineering Research, 11(6), 4114-4117.

45.

Sharon Moses J., Babu, L. D. (2016). A locality centred recommendation system combining

CNM clustering technique with fuzzy preference tree-based ranking algorithm.

International Journal of Business Intelligence and Data Mining, 11(1), 63-84.

46.

Siva Rama Krishnan S., karthik Balasubramanian, Arun Kumar T., Challenges in Data Aggregation

in Wireless Sensor Network – A Review. International Journal of Applied Engineering Research, 11(7), 5342-5345.

47.

Panneer, P., & Tripathy, B. K. (2016). Covering Rough Clustering Approach for Unstructured Activity Analysis.

International Journal of Intelligent Information Technologies (IJIIT), 12(2), 1-11.

48.

Kumar, K. S., & Deepa, K. (2016). Medical Query Expansion using UMLS. Indian Journal

of Science and Technology, 9(14).

49.

Bhushan, S. B. Reddy. C. H., Pradeep (2016). A network qos aware service ranking using

hybrid ahp-promethee

method in multi-cloud domain. International Journal of Engineering Research in Africa, 24.

50.

Senthil Kumar P., Daphne Lopez., (2016). A Review on Feature Selection Methods for High

Dimensional Data.

International Journal of Engineering and Technology, 8(2), 669-672.

51.

Hemalatha S., Margret Anouncia S., (2016). A Review on Human Identification Systems using

Biometrics Fingerprint Matching,

Internation Journal of Pharmacy and Technolog, 8(1), 3604-3610.

52.

Pushparaj R., Dinakaran M., (2016). An Energy aware routing for Manets using Dynamic power

threshold with load balancing.

World Applied Sciences Journal, 34(1), 120-127.

53.

SenthilKumar M, Ilango P., (2016). Analysis of DNA data using Hadoop Distributed File System.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(3).

54.

Dharinya, S. (2016). Analysis of document summarization and word classification in a smart

environment.

Indian Journal of Science and Technology, 9(19).

55.

Sangamithra A., Vani. M.P., (2016). Analysis of Network Security Spasms and Circumvention.

International Journal of Engineering and Technology, 8(2), 604-608.

56.

Thippa Reddy, G., & Khare, N. (2016). FFBAT-Optimized Rule Based Fuzzy Logic Classifier

for Diabetes.

In International Journal of Engineering Research in Africa (Vol. 24, pp. 137-152). Trans Tech Publications.

57.

Manogaran, G., Thota, C., & Kumar, M. V. (2016). Meta Cloud Data Storage architecture for

Big Data security

in cloud computing. Procedia Computer Science, 87, 128-133.

58.

Suganya P., Pradeep Reddy Ch., (2016). Potential threats caused by malicious nodes and various counter

measures available in MANET: A Survey. Research Journal of Pharmaceutical, Biological and

Chemical Sciences, 7(3), 1012-1016.

59.

Senthilkumar, M. N. M., & Senthilkumaran, U. (2016). Review of asymmetric key cryptography in wireless

sensor networks. International Journal of Engineering and Technology, 8(2), 859-862.

60.

Gunasekaran G., Venkatesan M., (2016). Review on Visualization Techniques for Medical Data and its Application.

Research Journal of Pharmaceutical, Biological and Chemical Science, 7(3), 169-173.

61.

Gagneja, K., & Singh, J. (2016). Survey and analysis of security issues on RSA algorithm for digital video data.

Journal of Discrete Mathematical Sciences and Cryptography, 19(1), 39-55.

62.

Rajesh kaluri, (2016). A Comparative study on image segmentation techniques. International Journal of Pharmacy

and Technology, 8(2), 12712-12717.

63.

Srinivas Koppu, Madhu Viswanathan, (2016). A Novel Chaotic Image Encryption System for color images based

Arnold Cat Map and Efficient Pixel Shuffling. International Journal of Pharmacy and Technology, 8(2), 13353-13361.

64.

Subha, S., & Sakthivel, R. (2016). A Power Saving Multiplication Algorithm. International Journal of Applied

Engineering Research, 11(9), 6200-6203.

65.

Manikandan N., Subha S., (2016). A Review on evaluating the usage of multiple cores effectively in personal

computer based applications. International Journal of Pharmacy & Technology, 8(2), 3916-3927.

66.

Dinakaran M., (2016). A Review on requirement of self sustainable natural farming and

application of information

and communication technology (Agro Informatics) for agriculture in India. International Journal

of Pharmacy & Technology, 8(2), 3944-3956.

67.

Nagaraja G., Pradeep Reddy Ch., (2016). A Survey on group key management frameworks for secure group

communication in mobile Ad hoc Networks. International Journal of Pharmacy & Technology, 8(2), 4121-4129.

68.

Srinivas Koppu, Madhu Viswanatham V., (2016). A Survey on security issues: Digital Images. International Journal

of Pharmacy & Technology, 8(2), 13420-13427.

69.

Santhi K., Saravanan R., (2016). A Survey on queueing models for cloud computing. International Journal of Pharmacy

& Technology, 8(2), 3964-3977.

70.

Manivannan S.S., (2016). A Systematic survey of routing attacks and counter measures in wireless networks.

International Journal of Pharmacy & Technology, 8(2), 3957-3963.

71.

Agilandeeswari, L., & Ganesan, K. (2016). An efficient hilbert and integer wavelet transform

based video watermarking.

Journal of Engineering Science and Technology, 11(3), 327-345.

72.

Kuruva Lakshmanna, Rajesh Kaluri, Thippa Reddy G., Nagaraja G., Dhenesh V Subramanian, (2016).

An enhanced algorithm for frequent pattern mining from Biological sequences. International

Journal of Pharmacy & Technology, 8(2), 12776-12784.

73.

Subha, S. (2016). An Improved Non-Restoring Algorithm. International Journal of Applied

Engineering Research, 11(8), 5452-5454.

74.

Rajesh Kaluri, Pradeep Reddy Ch., (2016). An overview of Human Gesture Recognition.

International Journal of Pharmacy & Technology, 8(2), 12037-12045.

75.

Arivu Selvan K., Sathiyamoorthy E., (2016). Automated Retrieval of medical images based on

distinct features using Fuzzy Logic approach.

International Journal of Pharmacy & Technology, 8(2), 13230-13239.

76.

Rahamathunnisa U., Saravanan R., (2016). Classificationn of Noise in Video – A Review.

International Journal of Pharmacy & Technology, 8(2), 3928-3932.

77.

Kumar, N. S., & Muruganantham, D. (2016). Disambiguating the Twitter Stream Entities and Enhancing

the Search Operation Using DBpedia Ontology: Named Entity Disambiguation for Twitter Streams.

International Journal of Information Technology and Web Engineering (IJITWE), 11(2), 51-62.

78.

Deepa M., Santhi K., Benjula Anbu Malar M.B., Lawanya Shri M., (2016).

Distributed Detection of malicious

nodes in wireless sensor networks under Byzantine Attack. International Journal of Pharmacy

& Technology, 8(2), 13546-13552.

79.

Lawanya Shri M., Benjula Anbu Malar M.B., Santhi K., Deepa M., (2016). E-Learning system

with Hierarchical

attribute set based encryption access control in cloud. International Journal of Pharmacy &

Technology, 8(2), 12785-12792.

80.

Mohankumar, S., & Balasubramanian, V. (2016). Identifying Effective Features and Classifiers for Short

Term Rainfall Forecast Using Rough Sets Maximum Frequency Weighted Feature Reduction Technique.

CIT. Journal of Computing and Information Technology, 24(2), 181-194.

   

81.

Dharmendra Singh Rajput, Praveen Kumar Reddy M, Shrivastava D.P., (2016).

Mining Frequent Termset for

Web document data using Genetic Algorithm. International Journal of

Pharmacy & Technology, 8(2), 4038-4054.

82.

Mohankumar P., Balamurugan, (2016). Optimality analysis of query processing using various

caching approaches –

A Review. International Journal of Pharmacy & Technology, 8(2), 3739-3751.

83.

Manivannan, S. S., & Sathiyamoorthy, E. (2016). Preventing health care web applications from

session hijack attacks

using session key authentication and distributed session id. ARPN Journal of Engineering and

Applied Sciences,11(13), 8257-8263.

84.

Perumal, V. (2016). Randomized Symmetric Crypto Spatial Fusion Steganographic System.

Journal of ICT Research and Applications, 10(1), 15-28.

85.

Durai Raj Vincent P M., (2016). RSA Encryption Algorithm – A Survey on its various forms and

its security level.

International Journal of Pharmacy & Technology, 8(2), 12230-12240.

86.

Durai Raj Vincent P M., (2016). Secured Healthcare Date exchange using proposed security scheme.

International Journal of Pharmacy & Technology, 8(2), 12144-12154.

87.

Prabukumar, M., & Ray, B. K. (2016). Semi-circular angle-based one bit circle generation algorithm

on a hexagonal grid.

International Journal of Computer Aided Engineering and Technology, 8(3), 199-216.

88.

Krithika, L. B. Lakshmi Priya G G. (2016). Student Emotion Recognition System (SERS)

for E-Learning

Improvement Based on Learner Concentration Metric. Procedia Computer Science, 85, 767-776.

89.

Kaushik Roy, Ramya G., (2016). Survey on mobile vulnerability issues and basic security policies.

International Journal of Pharmacy & Technology, 8(2), 3823-3833.

90.

Hemalatha, S., & Anouncia, S. M. (2016). A Computational Model for Texture

Analysis in Images with Fractional Differential Filter for Texture Detection. International

Journal of Ambient Computing and Intelligence, 7(2).

91.

Chowdhary, C. L., & Acharjya, D. P. (2016). A hybrid scheme for breast cancer detection using

intuitionistic fuzzy rough set technique.

International Journal of Healthcare Information Systems and Informatics, 11(2).

92.

Senthilkumar, M., & Ilango, P. (2016). A Survey on Job Scheduling in Big Data. Cybernetics

and Information Technologies, 16(3), 35-51.

93.

Malar, M. B. A., Shri, M. L., Deepa, M., & Santhi, K. (2016). Approach for Secure Authorized

Deduplication using Hybrid Cloud. International Journal of Applied Engineering Research,

11(15), 8480-8482.

94.

Ramachandran, P., & Dinakaran, M. (2016). Signal Strength and Residual Power Based Optimum

Transmission Power Routing for Mobile Ad hoc Networks. Procedia Computer Science, 92, 168-174.

95.

Parimala, M., & Lopez, D. (2016). Spatio-temporal graph clustering algorithm based on attribute

and structural similarity.

International Journal of Knowledge-based and Intelligent Engineering Systems, 20(3), 149-160.

96.

Das, A. J., Wahi, A., Kothari, I., & Raskar, R. (2016). Ultra-portable, wireless smartphone

spectrometer for rapid,

non-destructive testing of fruit ripeness. Scientific reports, 6, 32504.

97.

Anusha, K., & Sathiyamoorthy, E. (2016). OMAMIDS: Ontology Based Multi-Agent Model

Intrusion Detection System for Detecting

Web Service Attacks. Journal of Applied Security Research, 11(4), 489-508.

98.

Prabhavathy P, Tripathy BK, Venkatesan Meenakshi Sundaram, (2016). Covering based

refined Rough K-Means Algorithm,

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(5), 2142-2151.

99.

Senthil Kumar N, Kauser Ahamed P. (2016). Pervasive utilization of PSO techniques over

twitter data streams.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(5), 796-803.

100.

Anitha, A., & Acharjya, D. P. (2016). Customer Choice of Super Markets using Fuzzy

Rough Set on Two Universal Sets

and Radial Basis Function Neural Network. International Journal of Intelligent Information

Technologies (IJIIT), 12(3), 20-37.

101.

Vincent, P. D. R., & Sathiyamoorthy, E. (2016). A novel and efficient public key encryption

algorithm. International

Journal of Information and communication technology, 9(2), 199-211.

102.

Shivhare, R., & Kumar, C. A. (2016). On the cognitive process of abstraction. Procedia

Computer Science, 89, 243-252.

103.

Ramu, S. P., & Sevugan, P. (2016), An approach for efficient pre-processing of multi-temporal

hyperspectral satellite

imagery., The IIOAB Journal, 7(5), 12-20.

104.

Kumaran U., Neelu Khare, (2016). An Empirical study of security in Text mining for large

datasets. International

Journal of Control theory and applications, 9(6), 2737-2743.

105.

Prasanna, S., & Ezhilmaran, D. (2016). Association rule mining using enhanced apriori with

modified GA for stock

prediction. International Journal of Data Mining, Modelling and Management, 8(2), 195-207.

106.

Mani P., Prasanna M., (2016). A Study on functional specification based test case generation

for real-time systems.

International Journal of Engineering and Technology, 8(4), 1801-1806.

107.

Lakshmanna, K., & Khare, N. (2016). Constraint-based measures for DNA sequence mining

using group search

optimization algorithm. International Journal of Intelligent Engineering and systems, 9(3), 91-100.

108.

Radhakrishnan, S., & Devarasan, E. (2016). Computing the Probability on Socio Economic

Factors to Predict the Crime

Locations by Means of Joint Probability Based AMABC-FCIL. International Journal of Intelligent

Engineering & Systems, 9(3), 80-90.

109.

Bhushan, S. B., & Reddy, P. (2016). BB-LBA: biogeography-based load balancing algorithm in multi

cloud domain.

International Journal of Internet Protocol Technology, 9(2-3), 100-106.

110.

Balakrishnan, S. M., & Sangaiah, A. K. (2016). Aspect-oriented middleware framework for resolving

service discovery

issues in Internet of Things. International Journal of Internet Protocol Technology, 9(2-3), 62-78.

111.

Arivuselvan K., Sathiyamoorthy E., (2016). Analysing EEG sub-bands to distinguish between

individuals with neural

disorder using Back propagation neural network. International Journal of Pharma and

Bio sciences, 7(4), 80-87.

112.

Kumar, S., Saravanakumar, K., & Deepa, K. (2016). On Privacy and Security in Social Media–

A Comprehensive Study.

Procedia Computer Science, 78, 114-119.

113.

Pranusha Soma, Arivuselvan K., (2016). Automated Recognition of Emotions From Facial

Expressions using Back

propagation Neural networks. Research Journal of Pharmaceutical, Biological and Chemical Sciences,

7(4), 1895-1902.

114.

Magesh G., (2016). A review paper: Student attitude towards computer science. International

Journal of Pharmacy &

Technology, 8(3), 4653-4666.

115.

Angulakshmi M., (2016). Big Data Analytics – A Review. International Journal of Pharmacy &

Technology, 8(3), 4634-4639.

116.

Sudha Senthilkumar, Madhu Viswanatham, (2016). Survey on Data Access Control techniques in

cloud computing.

International Journal of Pharmacy & Technology, 8(3), 17442-17461.

117.

Kavitha G., (2016). Factors associated with improving quality of healthcare services. International

Journal of Pharmacy

& Technology, 8(3), 4844-4856.

118.

Praveen Kumar Reddy M., Nagaraja G., (2016). Creating trusted learning by using QR based

U learning System.

International Journal of Pharmacy & Technology, 8(3), 18268-18272.

119.

Rajeswari C., (2016). Performance analysis of sports persons using data mining based ranking

and classification

methods. International Journal of Pharmacy & Technology, 8(3), 18070-18097.

120.

Sree Dharinya S., Kirubathangam R., (2016). Analyzing a selection strategy for data De-duplication in large datasets.

International Journal of Pharmacy & Technology, 8(3), 16590-16595.

121.

Chandrasegar Thirumalai, (2016). Physicians drug encoding system using an efficient and secured linear public key

cryptosystem (ESLPKC). International Journal of Pharmacy & Technology, 8(3), 16296-16303.

122.

Prabhu J., (2016). A survey on slim process with developers in agile software. International Journal of

Pharmacy & Technology, 8(3), 15558-15565.

123.

Asha N., (2016). Customer segregation in banking organisation using knowledge management. International

Journal of Pharmacy & Technology, 8(3), 17645-17649.

124.

Vijay Anand R., Dinakaran M., (2016). Automation Framework to perform measure actions from NBI.

International Journal of Pharmacy & Technology, 8(3), 16261-16276.

125.

Chiranji Lal Chowdhary, (2016). A review of feature extraction application areas in medical imaging.

International Journal of Pharmacy & Technology, 8(3), 4501-4509.

126.

Navaneethan C., (2016). A Literature Review on energy saving along with precautions in wireless sensor network.

International Journal of Pharmacy & Technology, 8(3), 15408-15424.

127.

Sumangali K., (2016). Security in sensor networks and necessity for self destruction. International Journal

of Pharmacy & Technology, 8(3), 15566-15575.

128.

Rathi R., (2016). Hybridization of soft computing technique with Apriori for Association rule mining.

International Journal of Pharmacy & Technology, 8(3), 15820-15827.

129.

Kumaresan P., Prabukumar M., Yokesh Babu Sundaresan, (2016). An Adaptable web based light weight

framework for remote HVAC system using programmable thermostat. International Journal of

Pharmacy & Technology, 8(3), 16456-16466.

130.

Mohankumar P., Prasanna S., Gunasekaran G., (2016). Intelligence inference user satisfactory refinement

for E-Applications. International Journal of Pharmacy & Technology, 8(3), 15917-15931.

131.

Sudheer Karnam, Thippa Reddy G., Lakshmanna Kuruva, Rajesh Kaluri, Srinivas Koppu, (2016).

Dynamically improved weighted Apriori algorithm in Market analysis. International Journal

of Pharmacy & Technology, 8(3), 15658-15668.

132.

Siddharth Samal, Pradeep Reddy Ch., Bharath Bhushan S., (2016). Implementing a modified power

aware routing protocol using AODV protocol in MANET. International Journal of Pharmacy &

Technology, 8(3), 15600-15610.

133.

Vijayan R., (2016). An application for web navigation using speech engine for blind people.

International Journal of Pharmacy & Technology, 8(3), 15805-15819.

134.

Sudha M., (2016). Disease diagnosis using association rule mining based knowledge inference system.

International Journal of Pharmacy & Technology, 8(3), 16369-16379.

135.

Santhi K., Saravanan R., (2016). Facilitate refined keywords search over encrypted data on cloud.

International Journal of Pharmacy & Technology, 8(3), 15552-15557.

136.

Sudheer K., Thippa Reddy G., Lakshmanna K., (2016). An Android App to reduce battery power

consumption in smart phones. International Journal of Pharmacy & Technology, 8(3), 16164-16171.

137.

Vanitha M., (2016). Mutual Authentication using shared secret key generation. International Journal

of Pharmacy & Technology, 8(3), 16399-16411.

138.

Santhi K., Deepa M., Lawanya Shri M., Benjula Anbu Malar B., (2016). Efficient searching with multiple

keyword over encrypted cloud data by blind storage. International Journal of Pharmacy &

Technology, 8(3), 15704-15711.

139.

Prabhu J., Thanapal P., Vijay Anand R., (2016). Home Intruder Detection System. International

Journal of Pharmacy & Technology, 8(3), 15640-15650.

140.

Kumaresan P., Subha S., (2016). A Low cost multi-functional robot prototype for Intelligent services.

International Journal of Pharmacy & Technology, 8(3), 15370-15381.

141.

Suganya P., (2016). An approach for selection of replica nodes to support QOS requirement of

applications in VANET.

International Journal of Pharmacy & Technology, 8(3), 15789-15795.

142. 1

Nivash J P., Dhinesh Babu L D., (2016). An optimal IOT enabled data processing approach for effective

detection of remote air pollution. International Journal of Pharmacy & Technology, 8(3), 15496-15509.

143. 1.

Senthilkumaran U., Manikandan N., Senthilkumar M., (2016). Role of data mining on pharmaceutical

industry – a survey. International Journal of Pharmacy & Technology, 8(3), 16100-16106.

144. 1.

Kamalakannan J., Rajasekhara Babu, (2016). Segmentation techniques on Mammograms to detect breast abnormality:

A survey. International Journal of Pharmacy & Technology, 8(3), 16089-16099.

145. 1

Vanmathi C., Prabu S., (2016). Steganography: A Comparative study, analysis of key issues and current trends.

International Journal of Pharmacy & Technology, 8(3), 4696-4715.

146. 1.

Deepa Mani., Anand Mahendran, (2016). DDOS detection and mitigation for managed security of cloud resources.

International Journal of Pharmacy & Technology, 8(3), 15455-15470.

147. 1

Meenatchi S., Prabu S., (2016). A cluster based load balancing technique for increasing the wireless sensor network life time.

International Journal of Pharmacy & Technology, 8(3), 4716-4727.

148.

Pounambal M., Nithyadharshini P S., (2016). Distributed channel allocation in smart grid networks

using Particle Swarm Optimization.

International Journal of Pharmacy & Technology, 8(3), 18547-18558.

149.

Ranjith D., Balajee J., Kumar C., (2016). In premises of cloud computing and models.

International Journal of Pharmacy

& Technology, 8(3), 4685-4695.

150.

Reddy, G. T., & Khare, N. (2017). An Efficient System for Heart Disease Prediction Using Hybrid OFBAT

with Rule-Based Fuzzy Logic Model. Journal of Circuits, Systems and Computers, 26(04), 1750061.

151.

Paramasivan, S. K., & Lopez, D. (2016). Forecasting of wind speed using feature selection and neural networks.

International Journal of Renewable Energy Research (IJRER), 6(3), 833-837.

152.

Thakare, V. R., & Singh, K. J. (2016). A Study of Security and Privacy Issues at Service Models of Cloud Computing.

Indian Journal of Science and Technology, 9(38).

153.

Uma K., (2016). Ambient Air prominence information analysis collision/population. Journal of Chemical and

Pharmaceutical Sciences, 9(4), 2566-2569.

154.

Uma. K., (2016). Efficient finding of item sets in knowledge representation using RHUI extraction.

Journal of Chemical and Pharmaceutical Sciences, 9(4), 2599-2601.

155.

Chithapuram, C. U., Cherukuri, A. K., Jeppu, Y. (2016). Aerial vehicle guidance based on passive

machine learning technique.

International Journal of Intelligent Computing and Cybernetics, 9(3), 255-273.

156.

Praveen Kumar Reddy M., Rajasekhara Babu M., (2016). Improving performance of program

by finding good optimal

sequences using sequence selection approach. ARPN Journal of Engineering and Applied Sciences,

11(17), 10563-10570.

157.

Nithya, S., & Jayakumar, C. (2016). Automatic Firewall Rule Generator for Network Intrusion

Detection System based on

Multiple Minimum Support. Indian Journal of Science and Technology, 9(41).

158.

Krishnan, S. N., & Srinivasan, P. (2016). A QOS Parameter based Solution for Black hole

Denial of Service Attack in Wireless

Sensor Networks. Indian Journal of Science and Technology, 9(38).

159.

Rajesh Kaluri, Kuruva Lakshmanna, Thippa Reddy, Sudheer Karnam, Srinivas Koppu., (2016).

A Comparative study on selecting

and ranking the test cases in software testing. ARPN Journal of Engineering and

Applied Sciences, 11(1), 754-757.

160.

Kamalakannan, J., & Babu, R. M. (2016). Early detection of breast cancer using GLCM

feature extraction in Mammograms.

IIOAB JOURNAL, 7(5), 170-179.

161.

Ahamed, B., & Ramkumar, T. (2016). Data Integration-Challenges, Techniques and Future

Directions: A Comprehensive Study.

Indian Journal of Science and Technology, 9(44).

162.

Nagaraja, G., & Ch, P. R. (2016). A Reliable Group Key Management Framework Using

Fuzzy Logic for MANETs.

International Journal of Intelligent Engineering and Systems, 9(4), 107-115.

163.

Kaluri, R., & Reddy, P. (2016). Sign Gesture Recognition Using Modified Region Growing

Algorithm and Adaptive

Genetic Fuzzy Classifier. Int J Intell Eng Syst, 9, 225-233.

164.

Nagaraja, G., & Ch, P. R. (2016). Mitigate Lying and On-Off Attacks on Trust Based Group Key

Management Frameworks in MANETs.

International Journal of Intelligent Engineering and Systems, 9(4), 215-224.

165.

Parimala, M., & Lopez, D. Spatio-Temporal Modelling of Frequent Human Mobility Pattern to

Analyse the Dynamics of Epidemic Disease.

International Journal of Intelligent Engineering & Systems, 9(4), 167-178.

166.

Bhushan, S. B., & CH, P. R. A QoS Aware Cloud Service Composition Algorithm for Geo-Distributed Multi Cloud Domain.

International Journal of Intelligent Engineering & Systems, 9(4), 147-156.

167.

Lakshmanna, K., & Khare, N. (2016). FDSMO: frequent DNA sequence mining using FBSB and optimization.

International Journal of Intelligent Engineering & Systems, 9(4), 157-166.

168.

LawanyaShri, M., Balusamy, B., & Subha, S. (2016). Threshold-Based Workload Control for an Under-Utilized Virtual Machine

in Cloud Computing. International Journal of Intelligent Engineering & Systems, 9(4), 234-241.

169.

Anusha, K., & Sathiyamoorthy, E. (2016). A decision tree-based rule formation with combined PSO-GA algorithm for intrusion

detection system. International Journal of Internet Technology and Secured Transactions, 6(3), 186-202.

170.

Rajganesh, N., & Ramkumar, T. (2016). A Review on Broker Based Cloud Service Model. CIT. Journal of Computing and

Information Technology, 24(3), 283-292.

171.

Aarthy, S. L., & Prabu, S. (2016). A computerized approach on breast cancer detection and classification.

IIOAB JOURNAL, 7(5), 157-169.

172.

P J Kumar, Suganya P., (2016). Variable Replica allocation in VANET using node failure probability.

International Journal of Pharmacy & Technology, 8(4), 25990-25994.

173.

Sankar S., Srinivasan P., (2016). Internet of Things (IOT): A survey of empowering technologies, research opportunities and applications.

International Journal of Pharmacy & Technology, 8(4), 26117-26141.

174.

Srinivasan P., Nagamuthu Krishnan S.S., (2016). A recent survey on trust models for wireless sensor networks.

International Journal of Pharmacy & Technology, 8(4), 26163-26168.

175.

Vijaya C., Srinivasan P., (2016). A survey on resource scheduling in cloud computing.

International Journal of Pharmacy & Technology, 8(4), 26142-26162.

176.

Padmapriya, S., Kirubakaran, E., & Elango, N. M. (2016). Medical Image Classification using Hybrid classifier

by Extending the Attributes. Indian Journal of Science and Technology, 9(6).

177.

Uma, K., & Bangalore Morarji, A. R. Comparative Analysis of Current Engineering Education in Majority Countries.

Journal of Chemical and Pharmaceutical Sciences, 10(1), 293-296.

178.

Navaneethan C., Meenatchi S., Kumar P J., Suganya P., (2016). Comparison of RSA and MD5 algorithm.

International Journal of Pharmacy & Technology, 8(4), 26609-26615.

179.

Kumar P J., Suganya P., Navaneethan C., Meenatchi S., (2016). BigData social media analysis using R and Hadoop.

International Journal of Pharmacy & Technology, 8(4), 26616-16620.

180.

Divya Udayan J., HyungSeok Kim, (2016). Constrained Procedural Modeling of Real Buildings from single façade layout.

International Journal of Computer Vision and Signal Processing, 6(1), 33-46.

181.

Udayan, J. D. (2016). An Analysis of Reconstruction Algorithms Applied to 3D Building Modeling.

Indian Journal of Science and Technology, 9(33).

182.

Iyapparaja M., (2016). Coupling and Cohesion metrics based measurement of software reusable component strength.

International Journal of Pharmacy & Technology, 8(4), 21515-21526.

183.

Kumaran, U., & Khare, N. (2016). A Review on Privacy Preserving Data Mining using Secure Multiparty Computation.

Indian Journal of Science and Technology, 9(48).

184.

Ravi, C., & Khare, N. (2016). BGFS: Design and Development of Brain Genetic Fuzzy System for Data Classification.

Journal of Intelligent Systems.

185.

Ravi, C., & Khare, N. (2016). Review of Fuzzy Rule Based Classification systems. Research Journal of Pharmacy

and Technology, 9(8), 1299-1302.

186.

Deepa, N., & Ravi, C. (2016). Dimension Reduction Using Principal Component Analysis for Pharmaceutical

Domain. Research Journal of Pharmacy and Technology, 9(8), 1169-1173.

187.

Kaluri, R., & Reddy, C. P. (2016). A framework for sign gesture recognition using improved genetic algorithm and

adaptive filter. Cogent Engineering, 3(1), 1251730.

188.

Deepa, N., & Ganesan, K. (2016). A Brief Survey of Decision Making Methods and its Applications in Various

Domains. Research Journal of Pharmacy and Technology, 9(8), 1079-1082.

189.

Deepa, N., & Ganesan, K. (2016). Aqua Site Classification Using Neural Network Models. AGRIS on-line Papers

in Economics and Informatics, 8(4), 51.

190.

Deepika S., Ushadevi G., (2016). Performance analysis of topology based Ad-hoc wireless routing protocols using

Qualnet. International Journal of Pharmacy & Technology, 8(4), 25527-25533.

191.

Raman, I. (2016). Certain height-balanced subtrees of hypercubes. International Journal of Computer Mathematics:

Computer Systems Theory, 1(1), 32-41.

192.

Kuppusamy, L., Raman, I., & Krithivasan, K. (2016). On succinct description of certain context-free languages by

ins-del and matrix ins-del systems. International Journal of Foundations of Computer Science, 27(7), 775-786.

193.

Bhattacharya, S. (2016). A review of the application of automation technologies in healthcare domain. Research

Journal of Pharmacy and Technology, 9(12), 2343-2348.

194.

Singh, B., Bhattacharya, S., Chowdhary, C. L., & Jat, D. S. A review on internet of things and its applications in

healthcare. Journal of Chemical and Pharmaceutical Sciences. 10(1), 447-452.

195.

Srinivasa Gupta N., Valarmathi B., (2016). Opinion mining using intuitive scoring approach. International Journal

of Pharmacy & Technology, 8(4), 21527-21546.

196.

Sivashankari R., Valarmathi B., (2016). A Literature survey on entity extraction techniques in Bio-medical datasets.

International Journal of Pharmacy & Technology, 8(4), 5055-5066.

197.

Raghavan, R., & Singh, K. J. (2016). Necessity of different patterns of fingerprint and its applications: A study.

International Journal of Applied Engineering Research, 11(8), 5787-5790.

198.

Brindha, K., & Jeyanthi, N. (2016). DOVC: Data Obfuscation Visual Cryptography to Protect Cloud Storage.

International Journal of Soft Computing, 11(6), 374-381.

199.

Sundaresan, Y. B., & Kumaresan, P. (2016). A Comparative Analysis of Low Cost Solutions for Quiz Controller

and Classroom Access Control Systems. Research Journal of Pharmacy and Technology, 9(9), 1357-1362.

200.

Sundaresan, Y. B., Kumaresan, P., & Prabu, A. S. (2016). Anamolized Based Security for Private Information

Attacks on Social Network. International Journal of Applied Engineering Research, 11(13), 7914-7919.

201.

Ramya, G. (2016). Survey on various Classes of Picture Languages. International Journal of Applied Engineering

Research, 11(8), 5376-5381.

202.

Geraldine Bessie Amali D., Dinakaran M., (2016). Solution of the non linear least squares problem using a new gradient

based genetic algorithm, ARPN Journal of Engineering and Applied Sciences, 11(21), 12876-12882.

203.

Priya, R. S., Prabu, S., & Dharun, V. S. (2016). F-SIFT and FUZZY-RVM based efficient multi-temporal image

segmentation approach for remote sensing applications. Automatic Control and Computer Sciences, 50(3), 151-164.

204.

Senthilkumar M., Ilango P., (2016). Big data optimization for social networking tweet. International Journal

of Soft Computing, 11(5), 305-311.

205.

Rani, B. S. (2016). A Novice’s Perception of Partial Homomorphic Encryption Schemes. Indian Journal of

Science and Technology, 9(37).

206.

Pandiyan, S., & Perumal, V. (2016). A Survey on Various Problems and Techniques for Optimizing Energy

Efficiency in Cloud Architecture. Walailak Journal of Science and Technology (WJST), 14(10), 749-758.

207.

Sanjeevi, P., Balamurugan, G., & Viswanathan, P. (2016). The improved DROP security based on hard AI problem

in cloud. International Journal of Internet Protocol Technology, 9(4), 207-217.

208.

Sumathi, D., Velmurugan, T., Nandakumar, S., & Renugadevi, S. (2016). Dynamic Weight Assignment based

Vertical Handoff Algorithm for Load Optimization. Indian Journal of Science and Technology, 9(37).

209.

Ramaiah, M., & Ray, B. K. (2016). An iterative point elimination technique to retain significant vertices on

digital planar curves. International Journal of Computational Vision and Robotics, 6(4), 354-368.

210.

Shini, S. N. (2016). A survey on population based meta-heuristic techniques. International Journal of Chemical

and Pharmaceutical Analysis, 4(1), 7.

211.

Vanitha, M. (2016). Survey on Secured Password Authentication for IOT. Advances in Systems Science and

Applications, 16(3), 21-32.

212.

Thandeeswaran, R., & Durai, M. S. (2016). DPCA: Dual Phase Cloud Infrastructure Authentication.

International Journal of Communication Networks and Information Security, 8(3), 197.

213.

Pounambal, M. (2016). Survey on channel allocation techniques for Wireless Mesh Network to reduce

contention with Energy Requirement. Indian Journal of Science and Technology, 9(32).

214.

Gopal, D. G., & Saravanan, R. (2016). Selfish node detection based on evidence by trust authority and

selfish replica allocation in DANET. International Journal of Information and Communication Technology, 9(4), 473-491.

215.

Seetha, H., Murty, M. N., & Saravanan, R. (2016). Classification by majority voting in feature partitions.

International Journal of Information and Decision Sciences, 8(2), 109-124.

216.

Nirmala, M., Vidyavathi, M., Nivash, J. P., & Kumar, C. P.(2016). Scalable cloud computing based

healthcare application. International Journal of Pharmacy & Technology, 8(4), 25891-25901.

217.

Nirmala M., Pavan Kumar C S., Ansu Miriam Varghese, Neethu Santhosh. (2016). Text Encryption and

Decryption strategy using matrix operations. International Journal of Pharmacy & Technology, 8(4), 25910-25917.

218.

Thathera, H., Shashi, H., & Rajput, D. S. (2016). Green Computing: An Earth Friendly System,

International Journal of Pharmacy and Technology, 8(4):25540 – 25550.

219.

Gupta, S., AkashKataria, S. R., & Rajput, D. S. (2016). Information security issues in big data: solution

using ppdm (privacy preserving data mining), International Journal of Pharmacy & Technology, 8(4): 25551 – 25568.

220.

C. Ranichandra and B.K. Tripathy, 2016. A Study on Non Java Options for Mapreduce Programming with Hadoop.

Asian Journal of Information Technology, 15(16): 2999-3003.

221.

Nithya S., Asha Jerlin M., Jayakumar C. (2016). A Survey of software defined network. International

Journal of Pharmacy & Technology, 8(4), 25944-25958.

222.

Asha Jerlin, M., Nithya S., Coker Oswald, Jayakumar C., (2016). Layer two firewall in software defined network.

International Journal of Pharmacy & Technology, 8(4), 25365-25372.

223.

Asha Jerlin M., Jayakumar C., Prabhu J., (2016).EFE:Efficient feature extraction algorithm for dynamic

malware analysis in windows executables using API call sequence. International Journal of Pharmacy & Technology,

8(4), 25373-25383.

224.

Asha Jerlin M., Nithya S., Jayakumar C., Robin Rohit. (2016). A case study on advanced evasion techniques.

International Journal of Pharmacy & Technology, 8(4), 26599-26608.

225.

Alagiri I., (2016). Multipath life time prediction of node-to-node communication using multipoint relays

in OLSR protocol for mobile adhoc networks. International Journal of Pharmacy & Technology, 8(4), 26584-26598.

226.

Devendiran S., Manivannan K., Arun tom Mathew, Rajeswari C., (2016). Vibration signal based fault

diagnosis of gears using ensemble empirical mode decomposition and linguistic hedges neural fuzzy classifier with

selected features.

Journal of Chemical and Pharmaceutical Sciences, Special Issue 3, 47-57.

227.

Singh, B. (2016). Nurse’s attitude towards computerization in private hospitals of Tamil Nadu, India.

Research Journal of Pharmacy and Technology, 9(12), 2205-2210.

228.

Charanya, R., Aramudhan, M., & Saravananaguru, R. K. (2016). A Review on Access Control Issues in EHealth

Application in Cloud Computing. Indian Journal of Science and Technology, 9(42).

229.

Dharmendra Singh Rajput, Ramjeevan Singh Thakur, Ghanshyam Singh Thakur, (2016). A Computational model for

knowledge extraction in uncertain textual data using karnaugh map technique.

International Journal of Computing Science and Mathematics, 7(2).

230.

Ikram, S. T., & Cherukuri, A. K. (2016). Improving accuracy of intrusion detection model using PCA and optimized

SVM.

Journal of computing and information technology, 24(2), 133-148.

231.

Thaseen, S., & Kumar, C. A. (2016). Intrusion Detection Model using PCA and Ensemble of Classifiers.

Advances in Systems Science and Applications, 16(2), 15-38.

232.

Ramalingam, S. P., & Mouli, P. C. (2016). Two-level dimensionality reduced local directional pattern for

face recognition. International Journal of Biometrics, 8(1), 52-64.

233.

Priya V., Subha S., Balamurugan B., (2016). Quality-of-service in cloud computing: A Survey.

International Journal of Pharmacy & Technology, 8(4), 25742-25753.

234.

Singh, P. K., & Kumar, C. A. (2016). Analysis of composed fuzzy contexts through projection.

International Journal of Data Analysis Techniques and Strategies, 8(3), 206-219.

235.

Dinakaran M., Belgacem F.B.M. (2016). An experimental study to prevent packet hiding over wireless

networks using AONTS and swarm intelligent algorithm. International Journal of Pharmacy & Technology, 8(4),

25596-25605.

236.

Geraldine Bessie Amali D., Dinakaran M., (2016). A review of heuristic global optimization based

artificial neural network training approaches. International Journal of Pharmacy & Technology, 8(4), 21670-21679.

237.

Jayanthi, M. Prabadevi B., (2016). Multi-keyword ranked search over encrypted data supporting

synonym query. The IIOAB Journal, 7(1), 1.

238.

Susmita Subhadarshini Panda, Saravanan R., (2016). A secure approach to Spatial Image Steganography.

International Journal of Pharmacy & Technology, 8(2), 13384-13400.

239.

Harish H S., Vijayan R., (2016). A Secured and Reliable routing in opportunistic network in MANET

using Trust management scheme based on behaviour feedback. International Journal of Pharmacy &

Technology, 8(2), 12514-12522.

240.

Nagendramani P., Vijayan R., (2016). An analysis on the performance of various replica allocation

algorithms in cloud using Matlab. International Journal of Pharmacy & Technology, 8(2), 3892-3902.

241.

Hemavathi E., Srinivasa Perumal R., (2016). An approach for automatic vehicle plate recognition in

unconstrained environment. International Journal of Pharmacy & Technology, 8(2), 4013-4025.

242.

Ajay Mummadisetti, Rajeshwar Reddy Kadari, Rajeev Sushmanth Dammu, Durai Raj Vincent P M., (2016).

An effective approach of RSA & impact of wieners attack: Survey. International Journal of Pharmacy &

Technology, 8(2), 13093-13099

243.

Gopika D., Kumar P J., (2016). An innovative approach for user validation system using keylog and Sudoku

algorithm.

International Journal of Pharmacy & Technology, 8(2), 11732-11739.

244.

Ashutosh Sharma, Vijayan R., (2016). Correlative study of Video compression techniques – H.264/AVC.

International Journal of Pharmacy & Technology, 8(2), 12638-12646.

245.

Kaushik Roy, Brindha K., Sudha Senthil Kumar, (2016). Optimizing the executing time of compiler optimization

using code segmentation technique. International Journal of Pharmacy & Technology, 8(2), 12537-12551.

246.

Pavithra S., Lawanya Shri M., (2016). Privacy Preserving the Electronic Health Record using Encryption Protocol

in Cloud Computing. International Journal of Pharmacy & Technology, 8(2), 13261-13268.

247.

Sathiyamoorthy E., Jagadeesh G., Vaibhav Mahajan, (2016). Home Automation system over mobile network.

International Journal of Pharmacy & Technology, 8(3), 16352-16362.

248.

E. Vijayan, N.C. SenthilKumar, Siddhant Agnihotry, Mehaboob Subuhani, (2016). Effective Clustering in

Big Data for efficient knowledge discovery using parallel K-means and enhanced K-means algorithm.

International Journal of Pharmacy & Technology, 8(3), 18646-18652.

249.

Salman Ahmed G., (2016). A Framework for classification of medical data using Bijective soft set.

International Journal of Pharmacy & Technology, 8(3), 16559-16568.

250.

Vijayan E., Senthil Kumar N C., Navneet Shukla, Rudra Prasad Dwivedi, (2016). Architecture of parallel

database to make future database processing high. International Journal of Pharmacy & Technology, 8(3),

18640-18645.

251.

Navaneethan C., Ramkesh, (2016). Advanced Rail Fence Cipher Algorithm. International Journal

of Pharmacy & Technology, 8(3), 16539-16545.

252.

Akshay Gaikwad, Pradeep Reddy Ch., Bharath Bhushan S., (2016). A Keyed Hash message authentication

code technique for secure communication in VANETs. International Journal of Pharmacy & Technology, 8(3),

15620-15632.

253.

Vijayan E., SenthilKumar K., Shalini A.M., Suganya N., (2016). Image Segmentation and classification.

International Journal of Pharmacy & Technology, 8(3), 18325-18334.

254.

Thandeeswaran R., Ankita Vinod Mandekar, Jeyanthi N., (2016). Securing service set identifier of wireless

network. International Journal of Pharmaccy & Technology, 8(3), 16605-16610.

255.

Jidhesh R, Indusree J R, Sumathy S., (2016). Survey on congestion aware and adaptive routing protocols

in mobile ad hoc networks. International Journal of Pharmacy & Technology, 8(3), 16521-16538.

256.

Yuvan Shankar R K., Ramaprabha K P., Jayanthi R., (2016). Discovery against node isolation attack on

MANET and its node removal. International Journal of Pharmacy & Technology, 8(3), 16391-16398.

257.

Priya V., Sindhupaarkavi V., (2016). Convolution based Image Enhancement in unique finger impression.

International Journal of Pharmacy & Technology, 8(3), 15611-15619.

258.

Rajan Slathia, Jeyanthi N., (2016). Internet of Things in mobile health care (IOT-m Health). International

Journal of Pharmacy & Technology, 8(3), 15901-15916.

259.

Vijayan E., S., Hemalatha., S., Shweta Shaw, Alokananda Ghoshal, (2016). A new approach for collision free,

energy efficient, hybrid routing algorithm with the use of progressive adaptive concept.

International Journal of Pharmacy & Technology, 8(3), 18604-18610.

260.

Shakthi D.S., Prabadevi B., (2016). An approach to detect selfish and malicious node in Adhoc – MANETs.

International Journal of Pharmacy & Technology, 8(3), 16107-16117.

261.

Vijayan E., Senthilkumar K., Prernakumari, Sourabh Tolani, Prasenjeet Bhadra, (2016).

Convergence from SQL, NoSQL to NewSQL. International Journal of Pharmacy & Technology, 8(3), 18351-18355.

262.

Akshay Narayan Hegde, Vinay Kumar E., Vijayan R., (2016). Self-Routing: A Novel approach for

context based trust evaluation and malicious node detection in MANET. International Journal of Pharmacy &

Technology, 8(3), 15589-15599.

263.

Vijayan E., Senthil kumar K., Aishwarya Singh, Yasmeen Khatoon, (2016). Approach on big data using Hybrid cloud.

International Journal of Pharmacy & Technology, 8(3), 18344-18350.

264.

Shynu P.G., Lakshmipriya S., Pavithra J., (2016). A Novel Decentralised scheme for identity preserved access

control in cloud.

International Journal of Pharmacy & Technology, 8(3), 18141-18148.

265.

Sathya Sankaran, Sneha Ambhore, P.M. Durai Raj Vincent, (2016). Modified advanced encryption standard

with additional row transformation.

International Journal of Pharmacy & Technology, 8(3), 16436-16440.

266.

Koteswara Rao E., Vijayan R., (2016). Context based access optimizing system for Android mobile devices.

International Journal of Pharmacy & Technology, 8(3), 19071-19079.

267.

Manivannan S.S., Dhanashree P., Chandrasekaran C., (2016). Transport Plane [TP] simulator in

E-Utran LTE for Control Plane (CP).

International Journal of Pharmacy & Technology, 8(3), 16242-16253.

268.

Himanshu Dewangan, Angulakshmi M., Nagarajan I., (2016). Multiprocessing optimization –

parallel quick sort using OpenMp.

International Journal of Pharmacy & Technology, 8(3), 15633-15639.

269.

Harsha Sarah Thomas, Nancy Victor, (2016). An approach for Incremental frequent pattern mining

using modified Apriori Algorithm.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(6), 1049-1055.

270.

Uma, K., Radhakrishnan, P., & Vinoth, R. (2016). Compression of Compound Images using Fuzzy

Clustering Technique.

Indian Journal of Science and Technology, 9(S1).

271.

Uma, K., Vignesh, B., & Reynold, L. R. (2016). Encoding of Multifaceted Images using Pattern Matching Techniques.

Indian Journal of Science and Technology, 9(S1).

272.

Uma, K., Akram, K. W., & Vignesh, R. (2016). A Novel Method for Segmentation of Compound Images

using the Improved Fuzzy Clustering Technique.

Indian Journal of Science and Technology, 9(S1).

273.

Uma, K., Geetha, P., & Kannan, A. (2016). A novel segmentation of scanned compound images using fuzzy logic.

Journal of Medical Imaging and Health Informatics, 6(3), 763-768.

274.

Uma, K., & Kavitha, E. (2016). Comparison of Various Fingerprint Analysis Techniques.

Indian Journal of Science and Technology, 9(S1).

275.

Uma, K., & Reddy, G. R. (2016). Predicting Analysis of Data Mining Extraction Technique in

Secondary Education.

Indian Journal of Science and Technology, 9(S1).

276.

Uma, K., Pallavi, A. R., & Srilatha, S. (2016). Comparision of Blur Detection and Segmentation Techniques.

Indian Journal of Science and Technology, 9(S1).

277.

Aniket Sen, Prasun Jaiswal, Vikram, Prabadevi B. (2016). Improved K-Means clustering algorithm –

working with labelled datasets.

International Journal of Pharmacy & Technology, 8(4), 27091-27096.

278.

Mohamed Fahad M., Simama Hassan Mottur, Prasanna M., Mohammed Fazeel K., (2016). Prediction of

Life cycle models for software.

International Journal of Pharmacy & Technology, 8(4), 25763-25778.

279.

Girish Paul, Abhishek Chandan, Prasanna M., Abhishek Yadav, (2016). Voice based mail system for blind.

International Journal of Pharmacy & Technology, 8(4), 25754-25762.

280.

Shivam Kapil, Ashwini Kumar, Rishav Bansal, Nancy Victor, (2016). Social Network Forensics.

International Journal of Pharmacy & Technology, 8(4), 25843-25849.

281.

Ashish Gupta, Nancy Victor. (2016). Machine unlearning – An approach to make machine learning algorithms

forget data and authenticates ML level security. International Journal of Pharmacy & Technology, 8(4), 25807-25818.

282.

Ashish Gupta, Nancy Victor (2016). Real Time analysis of mobile GPS data. International Journal of Pharmacy &

Technology, 8(4), 25827-25834.

283.

Lokesh Sharma, Nancy Victor (2016). A Technique for classifying massive dataset using parallel ID3 approach.

International Journal of Pharmacy & Technology, 8(4), 25819-25826.

284.

Beryl Joylin A., Aswathi T., Nancy Victor, (2016). Sentiment analysis based on word-emoticon clusters.

International Journal of Pharmacy & Technology, 8(4), 25288-25296.

285.

Beryl Joylin A., Aswathi T., Suma P., Nancy Victor, (2016). Sentiment analysis on “Ebola” outbreak using twitter data.

International Journal of Pharmacy & Technology, 8(4), 25835-25842.

286.

Kumaran, U., Khare, N., & Suraj, A. S. (2016). Privacy preserving in data mining technical: A review. Research

Journal of Pharmacy and Technology, 9(11), 2023-2026.

287.

Sharathbabu B., Ayesha Banu S., Naveen Kumar S., Deepika S., (2016). Denoising ultrasound scan image from

speckle noise. International Journal of Pharmacy & Technology, 8(4), 26306-26311.

288.

Thanikaiselvan, V., Shastri, S., Ahmad, S., & Subashanthini, S. (2016). A New Pixel Value Based Steganography

Method for Data Security. Indian Journal of Science and Technology, 9(37).

289.

Kanugo, S., & Mekala, A. M. (2016). Particle Swarm Optimization based Edge Detection Algorithms for Computer

Tomography Images. Indian Journal of Science and Technology, 9(37).

290.

Shah, R., Subramaniam, S., Dasarathan, L., & Babu, D. (2016). Mitigating Malicious Attacks Using Trust Based

Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks. CIT. Journal of Computing and Information

Technology, 24(3), 237-252.

291.

Shubham D., Mithil P., Sumathy S., (2016). Fair resource allocation schemes for resource constrained cloud

computing environment. International Journal of Pharmacy & Technology, 8(4), 26260-26268.

292.

Shashank Joseph, Calvin Mugauri, Chunduru Anilkumar, Sumathy S., (2016). Access Control using attribute based

encryption in cloud computing: A survey. International Journal of Pharmacy & Technology, 8(4), 26282-26291.

293.

Meesala Shobha Rani, Sumathy S., (2016). Analysis of KNN, C5.0 and one class SVM for intrusion detection

system. International Journal of Pharmacy & Technology, 8(4), 26251-26259.

294.

Lawanya Shri M., Benjula Anbu Malar M B., Santhi K., Deepa M., Feslin Anish Mon., (2016). Threshold-based

virtual machine allocation in cloud environment. International Journal of Pharmacy & Technology, 8(4), 21547-21559.

295.

Nirmala M., Anshumati Gaikwad, Nittin Choudhary, Swati Bathla, (2016). A study on improving the

cloud security by virtualization. International Journal of Pharmacy & Technology, 8(4), 25885-25890.

296.

Nirmala M., Sharon Moses, Ankisetty Ramya, Ghanta Krishna Chaitanya., (2016). Managing and

Mitigating risks in Pharmaceutical supply chain management systems. International Journal of Pharmacy &

Technology, 8(4), 25864-25875.

297.

Nirmala M., Preethi E., Spoorti S Doddamani, Sharon Moses J, Chitturi Satya Pavan Kumar, (2016).

An approach to ensuring security in cloud-based social networks. International Journal of Pharmacy &

Technology, 8(4), 25918-25926.

298.

Tanu Maheshwari, Nirmala M., Dhinesh Babu L.D., Sharon Moses J., (2016). Extension of Rough set

K-Means using parallel mapreduce algorithm. International Journal of Pharmacy & Technology, 8(4), 25876-25884.

299.

Malge, A., Muthamil Selvan, T. (2016). A hybrid cloud approach for secure authorized deduplication.

International Journal of Pharmacy and Technology, 8(4), 25262-25272

300.

Hemanth, R.B., Vijayan, R. (2016). An enhanced ford-fulkerson algorithm to determine max-flow in large

mesh network using hadoop, International Journal of Pharmacy and Technology, 8(4), 25210-25220

301.

Das, S.K., Patil, M.D., Sumathy, S. (2016). Review On Neural Network Based Approaches For Intrusion

Detection System. International Journal of Pharmacy and Technology, 8(4), 26269-26281

302.

Ananya, Dutta, A., Sandhu, P.S., Thandeeswaran, R. (2016). A graph based message encryption algorithm.

International Journal of Pharmacy and Technology, 8(4), 26339-26345

303.

Benjula anbu Malar, M.B., Lawanya Shri, M., Deepa, M., Santhi, K., Mon, F.A. , (2016)Efficient system for

finding solution to recover bugs in software projects, International Journal of Pharmacy and Technology, 8(4), 21571-21579

304.

Khandelwal, R., Ellappan, V., Ajay, Hamsadhvani, A. (2016). Comparative study of algorithms to solve travelling

salesman problem. International Journal of Pharmacy and Technology,8(4), 25624-25631

305.

Kumar, P.J., Ellappan, V., Badala, P. (2016). Image duplication detection. International Journal of Pharmacy

and Technology, 8(4), 25632-25639

306.

Ellappan, V., Upadhayay, D., Yadav, R., Vandana (2016). Hand gesture recognition for physically disabled people.

International Journal of Pharmacy and Technology, 8(4), 25640-25647

307.

Dubey, A.K., Ellappan, V., Paul, R., Chopra, V. (2016). Comparative analysis of backtracking and genetic

algorithm in n queen’s problem. International Journal of Pharmacy and Technology, 8(4), pp. 25618-25623

308.

Aswini S., Kavya R S., Senthil kumaran U., (2016). Application of Internet of things and cloud computing for

health care – A survey. International Journal of Pharmacy & Technology, 8(4), 22009-22017.

309.

Aarthi B., Saranya R., Vaishnavi M., Senthil kumaran U., (2016). Agriculture facilitation using cloud computing

– survey. International Journal of Pharmacy & Technology, 8(4), 22028-22035.

310.

KV. Krishna, KV. Ganesh, Ashwini S., Senthil Kumaran U., (2016). A Survey on security methods in public id system.

International Journal of Pharmacy & Technology, 8(4), 21915-21922

311.

Suhasini K., Yamuna M., Senthil kumaran U., (2016). A review on various event management techniques.

International Journal of Pharmacy & Technology, 8(4), 5142-5149.

312.

Shreyas Kadu, Saryu Chugh, Nidhiben Bhatt, Nadesh R.K. (2016). Superintending of cloudlets in versatile

Ad-hoc ambience utilizing Qualnet – A review on performance analysis of routing mechanisms. International Journal

of Pharma and Bio sciences; Special issue SP02 “Healthcare Technology and management” 260-264.

313.

Keerthana A., Abirami B., Selva Kumar P., Rajaprabha M N., (2016). Dry eye monitors in computers & Mobiles –

Via Webcams & Front CAMs. International Journal of Pharmacy & Technology, 8(4), 26006-26012.

314.

Aman Shrivastav, Bharat Nalwaya, Sudish Kumar, Rajaprabha M N., (2016), Improvement on initial seed

selection for K-means algorithm.

International Journal of Pharmacy & Technology, 8(4), 26000-26005.

315.

Sunil Sigar, Senthil Kumar N., (2016). Effective processing of question generation from text. International

Journal of Pharmacy & Technology, 8(4), 25974-25980.

316.

Akshit Bhandari, Lavish Chhatwani, Shivali Chauhan, Senthil Kumar N., (2016).

An effective load balancing approach for handling big data.

International Journal of Pharmacy & Technology, 8(4), 25967-25973.

317.

Ayushi Jain, Saumya Bajpai, Shivali Jain, Uma Maheswari G., Jasmine Norman. (2016).

Providing and detecting steganographic content communication security.

International Journal of Pharmacy & Technology, 8(4), 26370-26375.

318.

Saurav K. Shaw, Mudit Jain, Jitesh Shaw, Durai Raj Vincent P M.,(2016).

A proposed design for secure hash algorithm-2 (SHA-2) using 640 bits.

International Journal of Pharmacy & Technology, 8(4), 26515-26523.

319.

Sudhir G., Lokesh S., Sathish Kumar K., Malathy E. (2016). Sharing file over cloud with privacy key generation.

International Journal of Pharmacy & Technology, 8(4), 25691-25698.

320.

Arjun Biyani, Ramya G., (2016). Recommendation engine for web products.

International Journal of Pharmacy & Technology, 8(4), 26019-26025.

321.

Prerna Kumari, Prasenjeet Bhadra, Ramya G., (2016). Study on performance issues in mobile application.

International Journal of Pharmacy & Technology, 8(4), 26292-26305.

322.

Shashi H., Honey Thathera, Ramya G., (2016). The Safeguarding concerns for mobile applications.

International Journal of Pharmacy & Technology, 8(4), 26032-26038.

323.

Himanshu Ewangan, Ramya G., (2016). Cross-platform mobile application development using Apache Cordova.

International Journal of Pharmacy & Technology, 8(4), 26026-26031.

324.

Nitish Chawla, Ramya G., (2016). Lookout Android Application. International Journal of

Pharmacy & Technology, 8(4), 26013-26018.

325.

Aditya Shivhare,Saurabh Kumar Pradhan, Manivannan S.S,(2016). Survey on Issues and Challenges in

biometric based authentication, International Journal of Pharmacy and Technology,4(8),26188-26192.

326.

E.Ragavan., C.Hariharan,N.Aravindraj, S.S.Manivannan., (2016). Real Time Water Quality Monitoring System,

International Journal of Pharmacy and Technology, 8(4), 26199-26205

327.

Ashwani Gupta, Nitin Katiyar, Brijendra Singh, Sweta Bhattacharya, (2016). Comparitive study on big data

architectures proposed for smart cities context, International Journal of Pharmacy and Technology,8(4), 25440-25451

328.

Yoginder Singh, Sweta Bhattacharya, Brijendra Singh, (2016). IoT: Framework for Smart City.

International Journal of Pharmacy and Technology, 8(4), 25432-25439.

329.

Pinaki Bhattacharjee, Sweta Bhattacharya, Govern Scholar Assessment Apparatus Employing Perusal Of Statistics,

International Journal of Pharmacy and Technology,8(4), 26312-26322

330.

Raju Kumar, Vijayan Ellappan, Kumar P.J, (2016), A Survey On Face Detection And Recognition Techniques

In Different Application Domain, International Journal of Pharmacy & Technology, 8(4), 25606 – 25610.

331.

Payal Nemade, Aarti Sharma, Eklendra Jadam, C.L.Chowdhary (2016), Survey On Grid Clustering Approach

With Intuitionistic Fuzzy Histogram, International Journal of Pharmacy & Technology, 8(4), 25475 – 25482.

332.

S. Kausal, V.K. Shukla, Eklendra Jadam, C.L.Chowdhary (2016), Learning Work On Online Educational Data

With Bi-Directional Mapping, International Journal of Pharmacy & Technology, 8(4), 25511 – 25520.

333.

Payal Nemade, Aarti Sharma, C.L.Chowdhary (2016), Study On Level Set Segmentation Based Classification

Using Mammograms, International Journal of Pharmacy & Technology, 8(4), 25483 – 25490.

334.

Gitanjali, J.,Abdul Khanadar, Bhanupriya Sharma, Shambhavi Srivastava (2016). Data mining from smart card

data using data clustering. International Journal of Applied Engineering Research, 11(1), 347-352.

335.

Hemalatha S., Giridharan L., (2016). A Steganographic Technique based region level sparse representation for

high density data hiding, International Journal of Pharmacy & Technology, 8(2), 12940-12949.

336.

Ajay, V. K., Desai, R., Gawannavar, M., & Nadesh, R. K. (2006). HGD: a rescue system for an alive human

gesture detection in disasters management-an experimental study. ARPN Journal of Engineering and

Applied Sciences, 11(11), 6826-6831.

337.

Hemalatha S., Santhosh Kumar S., (2016). Image Forgery Detection using Key-point Extraction and Segmentation.

International Journal of Pharmacy & Technology, 8(2), 13219-13229.

338.

Hemalatha S., Prasanna G., (2016). Robust Remote Authentication of Video Object through Steganographic mechanism.

International Journal of Pharmacy & Technology, 8(2), 12691-12700.

339.

Thanapal P, Muhammad Faizan M, (2016). Parental control for android smart phones. International Journal of

Pharmacy & Technology, 8(3), 16581-16589.

340.

Bharat Khatavkar, Nadesh R.K., (2016). A Comparative study and performance evaluations for using reactive

and hybrid routing approaches in intra and inter communication in VANET. International Journal of

Pharmacy & Technology, 8(3), 17776-17783.

341.

Priya V., Divya Vandana S., (2016). Chennai Rains Sentiment – An analysis of opinion about youngsters reflected

in tweets using Hadoop. International Journal of Pharmacy & Technology, 8(3), 16172-16180.

342.

Nadesh R.K., Akshaya Narayan Hegde, Vinay Kumar E., (2016). PANAS: A Personal Area Network for an

effective monitoring of an event in a pharmacy institute – An Empirical Study. International Journal of Pharmacy &

Technology, 8(3), 15932-15938.

343.

Priya V., Anupama Bhimnath, Sanjay M., (2016). Movement and motion modelling visitors of shopping mall.

International Journal of Pharmacy & Technology, 8(3), 16230-16241.

344.

Vijayan E., Senthilkumar N.C., Nirmal Kumar J., Mandakini Rastogi, Himika I., (2016). Cipher and Decipher of Image.

International Journal of Pharmacy & Technology, 8(3), 18653-18663.

345.

Vijayan E., Senthil kumar K., Aishwarya Singh, Yasmeen Khatoon, (2016). Approach on big data using Hybrid cloud.

International Journal of Pharmacy & Technology, 8(3), 18344-18350.

346.

Shynu P.G., Lakshmipriya S., Pavithra J., (2016). A Novel Decentralised scheme for identity preserved access control

in cloud. International Journal of Pharmacy & Technology, 8(3), 18141-18148.

347.

Baby C., Thippa Reddy G., (2016). Heart Disease prediction using Rule based Fuzzy Logic. International Journal of

Pharmacy & Technology, 8(3), 15471-15479.

348.

Nadesh, R. K., Arivuselvan, K., & Pathanjali, S. (2016). A Quantitative Review on Introducing the Election Process

with Cloud Based Electronic Voting and Measuring the Performance using Map Reduce. Indian Journal of Science

and Technology, 9(39).

349.

Bhavani S., Malathy E., Dorothy S., (2016). Prevailing parameters by Lease using Ant Colony Optimization.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(6), 1211-1219.

350.

Hardik Pandey, P J Kumar, Suganya P., (2016). Performance analysis of RBG Encryption algorithm.

International Journal of Pharmacy & Technology, 8(4), 25995-25999.

351.

Sundaresan, Y. B., Jaiswal, A. K., & Kumaresan, P. (2016). A Low Cost Prototype for Multiple Access Security System.

International Journal of Applied Engineering Research, 11(13), 7907-7913.

352.

Girish V K, Madhan R, Jagadeesh Gopal (2016). Sensor Detection Of Trains For National Train Enquiry System,

International Journal of Pharmacy & Technology, 8(4), 22182 – 22185.

353.

Suryapal singh, Ashish Singh and Arjun Lamba (2016) , GLCM and Gabor Wavelet Feature Extraction based Brain

Tumour Detection Using Medical Images, International Journal of Pharmacy and Technology, 8(4), 25505-25510.

354.

Ellappa, V., Kamalakannan, J., Babel, H., Dhamarikar, A. (2016). Access control mechanism in cloud. International

Journal of Pharmacy and Technology, 8(4), 25611-25617

355.

Vanmathi, C., Prabu, S. (2016). Steganography: A comparative study,analysis of key issues and current trends.

International Journal of Pharmacy and Technology,8(3), 4696-4715

356.

Vani M.P (2016).Incorporation Of Internet of Things with Cloud Auditing, International Journal of Pharmacy &

Technology, 8(4), 25779-25786

357.

Senthilkumaran U., Balamurugan B., Eswaran G., Mageswari U., (2016). Sentiment analysis of twitter data using

intelligent related word identification. International Journal of Pharmacy & Technology, 8(4), 26393-26401.

358.

Shreelekhya G., Yazhini, Senthilkumaran U., Manikandan N., (2016). Methods for evaluating software

architecture-A Survey. International Journal of Pharmacy & Technology, 8(4), 25720-25733.

359.

Sivaranjini V., Senthilkumaran U., Manikandan N., (2016). Optimizing the location deployment for

emergency meeting scheduling in disaster relief management. International Journal of Pharmacy & Technology, 8(4), 25714-25719.

360.

Deni Avinash A.B., SenthilKumaran U., Manikandan N., (2016). Automated summarization of academic

papers and generation of presentation slides. International Journal of Pharmacy & Technology, 8(4), 25710-25713.

361.

Manikandan N., Senthilkumaran U., Kumar P.J., (2016). Effective use of multiple cores for face recognition

in personal computers. International Journal of Pharmacy & Technology, 8(4), 25734-25741.

362.

Senthilkumar M., Manikandan N., Senthilkumaran U., Samy R., (2016). Weather data analysis using hadoop.

International Journal of Pharmacy & Technology, 8(4), 21827-21834.

363.

Thirumalai C.S., Senthil Kumar M., (2016). Secured e-mail system using base 128 encoding scheme.

International Journal of Pharmacy & Technology, 8(4), 21797-21806.

364.

Thirumalai C.S., Senthil Kumar M., (2016). Spanning tree approach for error detection and correction.

International Journal of Pharmacy & Technology, 8(4), 5009-5020.

365.

Chandrasegar T., Senthilkumar M., Silambarasan R., Westphall, C.B., (2016). Analyzing the strength of Pell’s RSA.

International Journal of Pharmacy & Technology, 8(4), 21869-21874.

366

Uma, K., Ashwini, S., & Kiruthika, S. (2016).Survey on Machine learning algorithms, International Journal

of Computer Science & Wireless Security (IJCSWS), 3(5):225-228.

367

Mishra, Sangeet, Asis Kumar Tripathy, and Pallavi Joshi. (2016).Making a Cloud Data Secure and Effective

for Better Performance of Services. Indonesian Journal of Electrical Engineering and Computer Science. 2(3): 695- 702

368

S. Sinduja, Dharmendra Singh Rajput, (2016). Analysis Of Imbalance Dataset Using Classification Techniques,

International Journal of Advanced Research Trends in Engineering and Technology, 4(19):517 – 522.

369

Rajput, D. S., & Gour, R. (2016). An IoT Framework for healthcare monitoring systems. International Journal

of Computer Science and Information Security, 14(5):451-455.

370

Sruthi, M., & Kavitha, B. R. (2016). A Survey on IoT Platform. International Journal of Scientific Research and

Modern Education.1(1): 468 – 473

371

Chowdhary, C. L., Sai, G. V. K., & Acharjya, D. P. (2016). Decreasing False Assumption for Improved Breast

Cancer Detection. Journal of Science And Arts, 2(35):157-176.

372

K.Santhi., M.Deepa.,M.Lawanya Shri.,M. B. BenjulaAnbu Malar,(2016). A Novel Method for Key

Aggregation On data Sharing in Cloud Storage Environment, International journal of Advanced Research

in Science and Engineering, 5(special issue no:1):142-148.

373

Santra, A. K. (2016). Stochastic Multifacility Location Problem under Triangular Area Constraint with

Euclidean Norm. International Journal on Recent and Innovation Trends in Computing and Communication

(IJRITCC), 4(3):111-116.

374

Mohan Vamsi M., Shantharajah S.P. (2016). Adaptive Neural Fuzzy Interface System for Cloud Computing,

International Journal of Advanced Research in Computer Science and Software Engineering, 6(10):92-96.

375

Sara Archana R, Prabadevi B, (2016).Social Network for Allocating and Sharing Cloud Resources using Trust Relationship.

International Journal of Computer Systems, 3(5): 394 – 396.

376

Deepika A, Prabadevi. (2016). A Decentralized Framework for Cloud Resources Provisioning with Malware

Detection, International journal of Computer Systems, 3(5):388-390.

377

Ananthy E, Prabadevi B, (2016).Gain Factor Trust - A Trust Evaluation Framework in Online Social Networks,

International Journal of Computer Systems, 3(5):391-393.

378

Rajput, D. S., & Khare, N. (2016). Fuzzy soft set decision-making model for social networking sites.

International Journal of Social Network Mining, 2(3): 256-266.

379

Kaavya, S., & Priya, G. L. (2016). Static Shot based Keyframe Extraction for Multimedia Event Detection.

International Journal of Computer Vision and Image Processing (IJCVIP), 6(1): 28-40.

380

Prasanna, M., & Iyapparaja, M. (2016). Optimistic Investigation on Open Source Testing Tools for Testing Applications.

International Research Journal of Engineering and Technology (IRJET), 3(12):633 – 635.

381

Prasanna, M., Iyapparaja, M., Dhenesh V Subramanian, (2016). Certain Investigations on Testing Tools for Regressing

Testing, International Research Journal of Engineering and Technology (IRJET), 3(12):630 – 632.

382

Rama Prabha K.P, Jayanthi R. (2016). Performance Issues of TCP in Wireless Networks and Performance

Enhancement Using TCP Vegas, Global Journal of Engineering Science and Researches, 3(7):72-80.

383

Jagadeesh,G., Ramaprabha,K., MohanVamsi P.M. (2016). Enhancing Software Quality in Web Applications using

Fault Tree Algorithm (FTA). International Journal of Advanced Research in Computer Science and Software

Engineering.6(4):448 – 452

384

Victor, N., Lopez, D., & Abawajy, J. H. (2016). Privacy models for big data: a survey. International Journal of

Big Data Intelligence, 3(1), 61-75.

385

Neelu Khare, Kumaran U,Mohan Vamsi M, (2016). Knowledge Acquisition and Privacy Preserving in Cloud using

Simultaneous Diagonalization Algorithm, International Journal of Advanced Research in Computer

Science and Software Engineering.6(9): 137 – 140.

386

Kaluri, R., & Li, G. (2016). A review on how to do the research in an effective way. International Journal of

Engineering Science Invention Research & Development.2 (9): 633 – 635.

387

Asha Jerlin. M, Jayakumar Sadhasivam, Nithya. S, (2016). Intelligent Interior Mapping using Wall Following

Behaviour, International Journal of Trend in Research and Development.3(6):112-114.

388

Swarna Priya, RM., Aarthy S. L.,Sujatha , R., Srinivas Koppu, Madhusudhana Rao, (2016). Reconstruction of

3D Realistic Models from Multiple Images – A Survey, International Journal of Advanced Research in Electrical,

Electronics and Instrumentation Engineering,5(12):8886 – 8891

389

Asha Joseph, John Singh K (2016). A Survey on Latest Trends and Challenges in Cyber Forensics,

International Journal of Advances in Electronics and Computer Science, Special Issue, 75-78.

390

Kunal Gagneja, K., John Singh, (2016). Quantum Encryption using Lattice on Streaming Video in VLSI.

International Journal of Advances in Electronics and Computer Science, Special Issue, 118-121.

391

M.Prabukumar.L., Agilandeeswari., Srinivas Koppu., Madhusudhana Rao., Geethanajali, S. (2016).

Vehicle License Plate Recognition Based on Concentric Windows and Deep Neural Networks, International J

of Advanced Research in Electrical, Electronics and Instrumentation Engg, 5(12):8950 – 8956

392

Agilandeeswari, L., & Ganesan, K. (2016). False-positive free Hilbert and multi-resolution-based image

watermarking technique using firefly optimisation algorithm. International Journal of Information Privacy,

Security and Integrity, 2(4): 257-280.

393

M P Gopinath, S Prabu, Srinivas Koppu, Madhusudhana Rao, Kamalakannan J. (2016). Automatic Region Growing

Algorithm based on Combined Filtering Technique to Detect Breast Cancer, International J of Advanced Research in

Electrical, Electronics and Instrumentation Engg 5(12):8878 – 8885.

394

S Ramani, P., Swarnalatha, L., Ramanathan., Srinivas Koppu., Madhusudhana Rao. (2016).Symmetric Private Key

Encryption and Decryption based on Matrix, International J of Advanced Research in Electrical, Electronics and

Instrumentation Engg, 5(12):8985 – 8991.

395

Venugopal P., Rajeev Pankaj N., Satheesh Kumar., Srinivas Koppu .,Madhusudhana Rao. (2016). Detection of Enemy

Intervention in Border and Battle Fields Using Smart Dust Technology, International J of Advanced Research in Electrical,

Electronics and Instrumentation Engg, 5(12):8833 – 8843

   

396

Ramya, G., Priya, G., & Mon, F. A. (2016). Isolating Tainted Nodule. Imperial Journal of Interdisciplinary Research,

2(11):1870-1973.

397

Bandaru Venkata Hemanth Kumar., Ramya, G.(2016). Clustered Information Retrieval Using Image Query,

International Journal of Innovative Research in Computer

 

and Communication Engineering, 3(6):5503 – 5507.

398

Devi, G. U., Sowmitha, M. K., Jidhesh, R., & Jangir, A.(2016).Improved Eaack For Intrusion Detection System.

International Journal of Research in Engineering and Technology, 5(5): 28 – 33.

399

Prathamesh Vijay Tarare ,AnurajMalav,G., Usha Devi. (2016). Modified Ant Colony System Algorithm For IP-

Traceback Problem, International Journal of Research in Engineering and Technology, 5(5):19-23

400

Judith Nita, M., Rajaprabha. MN. (2016). Implementation of Shared Authority Based Privacy Preserving Authentication

Protocol in Cloud Computing, International Journal of Innovative Research in Computer and Communication

Engineering, 4(4):6780 – 6785.

401

Thenmozhi B., Rajaprabha, MN.(2016). Automatic Averting From Cyberbullying Using Efficient Polarity Count Algorithm,

International Journal of Innovative Research in Computer and Communication Engineering, 4(4): 6834 – 6840.

402

Bimal Kumar Ray, (2016). A technique for piecewise linear approximation of 2D digital curve, International Journal of

Computer Graphics, 7(1):1-16.

403

V. Shanthi., Godithi Ramya Sree., Senthil Kumaran. (2016). Confidential Communication and Secret Data Storing by

Embedding Files–Survey, International Journal of Research in Engineering and Technology, 3(11): 459 – 465.

404

Mangayarkarasi, R.,Vanitha, M.(2016). A Survey of suboptimal polygonal approximation methods, International Journal

of Communication and Computer Technologies, 4(16):4083 – 4090.

405

M. Lawanya Shri., M.B.Benjula Anbumalar., K. Santhi, Deepa. M., (2016).Task Scheduling Based On Efficient

Optimal Algorithm In Cloud Computing Environment, International Journal of Advanced Technology in Engineering

and Science, 4(special issue no:1):306-310.

406

Subha, S. (2006). A Literature Survey of CPU Exclusive Caches, International Journal of Advanced Scientific Technologies,

Engineering and Management, 2(7):9-10.

407

Tamizharasi, G. S., Manjula, R., Monisha, K., & Balamurugan, B. (2016). A Secure and Efficient Framework for Health

Data Management in E-Health Clouds. International Journal of Computer Science and Information Security, 14(9):1078-1085.

408

Vasumathy, M., Thirugnanam, M., & Sumathy, S. (2016). A framework for automatic intrude object identification in

paediatric foreign body aspired radiography images. International Journal of Image Mining, 2(1): 57 – 67.

409

Elavarassi M, Elango N.M, (2016). A Review On Recovering And Examining Computer Forensics Evidences.

Asian Journal of Computer Science Engineering, 1(2):22 – 24.