SJC Press
Quick Links
CoE | Reporting Issues to
Library
Certificate Verifi.
Drone View
Downloads
SJC ERP Account
Administrators
Faculty
Ph.D
Student
Parent
About us
Introducing SJC
Jesuits
Founder
College Church
Society Office
Jesuit curia
Jesuit Colleges
Administrators
Rector
Secretary
Principal
Deputy Principal
Vice Principals S-I
Vice Principals S-II
Deans
Directors
Profile of the College
Autonomy
Board of Management
Statutory Committees
NAAC
NIRF
CPE
DST FIST
DBT STAR Status
Heritage Status
Awards
Infrastructure
Illustrious alumni/ae
Annual Reports
Why St. Joseph's
Admission
Prospectus 2025 - 26
Streams
MBA
MCA
MBA Twinning Programme
CA Foundation course - ICAI
Transfer Programs
International Students
Academics
Research
Rapinat Herbarium
Schools
Departments
Faculty
Staff
Aided
Management
Technical
Programmes
Under Graduate
Post Graduate
M.Phil.
Ph.D.
Diploma
Certificate
Vocational
Course Pattern
Syllabus
Programme outcomes
Programme Specific Outcomes
Centers and Institutes
Library
Physical Education
Calendar
Examinations
Office of the CoE
Examinations
CIA
Semester
Rules and Regulations
CoE Down the Years
IQAC
NIRF
Services
IAS Academy
Committees
College Office
Shepherd
Training and Placement
Capability Enhancement Schemes
Hostels
Campus Ministry
JASS
Fine Arts
Counsellor
Students Council
Student Clubs
Scholarships
Committee for PwD
Alumni/ae
Contact us
About us
Introducing SJC
Jesuits
Founder
College Church
Society Office
Jesuit curia
Jesuit Colleges
Administrators
Rector
Secretary
Principal
Deputy Principal
Vice Principals S-I
Vice Principals S-II
Deans
Directors
Profile of the College
Autonomy
Board of Management
Statutory Committees
NAAC
NIRF
CPE
DST FIST
DBT STAR Status
Heritage Status
Awards
Infrastructure
Illustrious alumni/ae
Annual Reports
Why St. Joseph's
Admission
Prospectus 2025 - 26
Streams
MBA
MCA
MBA Twinning Programme
CA Foundation course - ICAI
Transfer Programs
International Students
Academics
Research
Rapinat Herbarium
Schools
Departments
Faculty
Staff
Aided
Management
Technical
Programmes
Under Graduate
Post Graduate
M.Phil.
Ph.D.
Diploma
Certificate
Vocational
Course Pattern
Syllabus
Programme outcomes
Programme Specific Outcomes
Centers and Institutes
Library
Physical Education
Calendar
Examinations
Office of the CoE
Examinations
CIA
Semester
Rules and Regulations
CoE Down the Years
IQAC
NIRF
Services
IAS Academy
Committees
College Office
Shepherd
Training and Placement
Capability Enhancement Schemes
Hostels
Campus Ministry
JASS
Fine Arts
Counsellor
Students Council
Student Clubs
Scholarships
Committee for PwD
Alumni/ae
Contact us
SJC ERP Account
Administrators
Faculty
Student
Parent
Ph.D
Online Payment
Shift I
Shift II
Exam
PU-SJC MBA Exam Fees
TC and Alumni Fees
COMPUTER SCIENCE
Profile
Vision & Mission
Programmes
Programme Specific Outcomes
Faculty
Syllabus
Doctoral Degree Awarded
Association
Endowments
Publications
Awards
Alumni
Placement
Projects
Research Advisors
Book Publications
Retired Faculty
Papers Published by the Faculty
Author(s) & Title
Publications
Year
Rev.Dr. T. Francis Thamburaj S.J
On Validating Cognitive Weighted Attribute Hidiing Factor Complexity Metric
International Journal of Control Theory and Application (IJCTA) Vl.No. 9
2016
Cognitive Weighted Cohesion Complexity Metric
International Journal of Control Theory and Application (IJCTA) Vl.No. 9
2016
Models for Maintenance Effort Prediction with Object-Oriented Cognitive Complexity Metrics
IEEE CPS Vl.No. 54
2016
Validation of Cognitive Weighted Method Hiding Factor Complexity Metric
International Conference on Advanced Computing (ICAC 2015) Vl.No. 10
2015
Cognitive Weighted Polymorphism Factor: A Comprehension Augmented Complexity Metric
International Journal of Computer, Electrical, Automation, Control and Information Engineering (IJCEACIE) Vl.No. 9
2015
A Survey on Cohesion Metrics for Object-Oriented Software Systems
National Conference on Recent Advancements in Software Development (NCRASD 2015) Vl.No. 0
2015
Cognitive Perspective of Attribute Hiding Factor Complexity Metric
International Journal of Engineering and Computer Science (IJECS) Vl.No. 4
2015
Cognitive Weighted Method Hiding Factor Complexity Metric
International Journal of Computer Science and Software Engineering (IJCSSE) Vl.No. 4
2015
Classification of Corona Viruses using Self-Organizing Maps
RETELL-An Inter-disciplinary Research Journal Vl.No. 11(2)
2011
Comparative Study of Random and Linear Initialization of Self-organizing Maps
RETELL,St. Joseph`s College, Trichy Vl.No. 6(2)
2006
Neighbourhood Study of Self-Organizing Maps
Proc. Parallel and Distributed Computing,Cauvery College, Trichy Vl.No. 16-17
2006
Artificial Neural Networks for Software Quality Assessment
Proc. Nat. Conf. on Software Engineering,Sacred Heart College, Tirupattur Vl.No. 14-16
2006
Similarity Metrics for Self-Organizing Neural Networks
Proc. Nat. Conf. Frontier Research Area in Computer Science, BARD, Trichy Vl.No. 17-18
2006
The Initialization Problem of Self-Organizing Maps
Proc. Recent Trends in Info. Tech.Jamal Mohamed College, Trichy Vl.No. -
2006
Genomic Patterns of Adeno Viruses : Nucleotide Based Classification using Self -Organizing Maps
RETELL-An Inter-disciplinary Research Journal Vl.No. 5(2)
2005
Artificial Neural Network for Plant Taxonomy
National Conference on the Frontiers of Research and Development in Medicinal Plants Vl.No. 0
2004
A Methodology to Analyze the Quality of Artificial Neural Network
ReTICA, Recent Trends in Computing Advances Vl.No. 0
2003
Comparative Study of Self-organizing maps neighbourhoods
Proc. Nat. Conf. Comp. Sci. & Commu. Tech.,St. Joseph`s College, Trichy Vl.No. 16-17
0
Analysis of Classification of Coding and Random Sequences using Organizing Maps
RETELL,St. Joseph`s College, Trichy Vl.No. 8(1): 23-27
0
Mr.D.S.RAVI
A SURVEY ON FAKE ACCOUNT DETECTION IN SOCIAL MEDIA USING AI
INTERNATIONAL JOURNAL OF RESEARCH AND ANALYTICAL REVIEW Vl.No. 6
2019
An Architecture for avoiding repeated messages in Whatsapp messenger
IJSRCSAMS Vl.No. 7
2018
EXPLORATION ON THE ALGORITHMS IN DATA MINING USING AI TECHNIQUES
International Journal of Computer Sciences and Engineering Vl.No. 5
2018
An Architecture for detecting the Camera and Jamming the Frequency using Artificial Neural Network
IJSRCSAMS Vl.No. 7
2018
A Study of Artificial Intelligence analytics in E-Learning
National conference on Emerging Trends in Software Development Vl.No. -
2016
A Study of Learning Standards in E-Learning using Artificial Intelligence
International Journal of Advanced Research Trends in Engg. and Technology Vl.No. 3
2016
A study of learning methodology based on learner's in E-Learning using Artificial Intelligence
Internation conference on Innovations in Computer Science & Technology Vl.No. 0
2016
Dr.D.P.JEYAPALAN
Agent based Parallelized Intrusion Detection System using Ant Colony Optimization
International Journal of Computer Applications(0975-8887) Vl.No. Vol-105-No_10
2014
A Co-operative Game Theoretic Approach to Improve the Intrusion Detection System in a Network using Ant Colony Clustering
International Journal of Computer Applications(0975-8887) Vl.No. Vol-87, No-14
2014
High Performance Network Intrusion Detection Model Using Graph Databases
International Journal of Computational Intelligence and Information Security Vl.No. Vol 5, No. 9
2014
Performance Analysis of Intrusion Detection System on WSN Based on Euler Graph
International Journal of Advanced Research in Computer Science & Technology Vl.No. Vol 2, Issue 3
2014
A Novel Graph Based Clustering Approach for Network Intrusion Detection
International Journal of Computational Intelligence and Information Security Vl.No. Vol-4, No-4
2013
Dr.S.BRITTO RAMESH KUMAR
Transmission Deviation?based Windowed Training for Intrusion Detection on Streaming Data
International Journal of Computer Trends and Technology Vl.No. 72
2024
Machine Learning Techniques For Effective Cloud Anomaly Detection -A Comprehensive Review
Fuzzy Systems and Soft Computing Vl.No. 19(02)
2024
Viability Assessment about Applicability of Machine Learning in Cloud Anomaly Detection
Journal of Computational Analysis and Applications Vl.No. 33(07)
2024
Intrusion Detection System Using Ensemble LearningApproaches
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 12
2023
A Feature Selection Method using FSPSO
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 12
2023
SC-CVAR: Intrusion Detection Using Feature Selection and Machine Learning Techniques on UNSW-NB15 Dataset.
IJCSNS International Journal of Computer Science and Network Vl.No. 22
2022
An Efficient Britwari Technique to Enhance Canny Edge Detection Algorithm using Deep Learning
ICTACT Journal of Soft Computing Vl.No. 12
2022
Domain Specific ANN Heuristic Edge Detection Algorithm for CNN based MRI Classification [DAHEDA}
JOURNAL OF ALGEBRAIC STATISTIC Vl.No. 13
2022
A COMPARATIVE STUDY ON VARIOUS EDGE DETECTION METHODS USING DEEP LEARNING
Journal of Fundamental & Comparative Research Vl.No. VIII
2022
A Comparative Study and Survey on Different Types of Methods in Edge Detection Algorithms
International Advanced Research Journal in Science, Engineering and Technology Vl.No. 9
2022
Intrusion detection on Cloud Computing
International journal of Advanced Research in Computer and communication Engineering Vl.No. 11
2022
Sine Cosine Optimization Algorithm for Feature Selection
Journal of Fundamental & Comparative Research Vl.No. VIII
2022
Machine Learning Algorithm using AR for Intrusion detection system
IARJSET Vl.No. 9
2022
An Effective Way of Cloud Intrusion Detection System Using Decision tree
NeuroQuantology Vl.No. 20
2022
Intrusion Detection using Attribute Subset Selector Bagging (ASUB) to Handle Imbalance and Noise
IJCSNS International Journal of Computer Science and Network Security Vl.No. 22
2022
Sampling Integrated Boosting Classifier for Network Intrusion Detection
International Research Journal of Education and Technology Vl.No. 4 Issue: 12 | Dec-2022
2022
Semi-Supervised Intrusion Detection Based on Stacking and Feature-Engineering to Handle Data Imbalance
INDIAN JOURNAL OF SCIENCE AND TECHNOLOGY Vl.No. 15(46)
2022
PREDICTION OF RHABDOMYOSARCOMAUSING TRANSFER LEARNING ON PATHOLOGY AND RADIOLOGY IMAGES
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 11(8)
2022
Optimized Encryption Based Elliptical Curve Diffie- Hellman Approach for secure heart disease prediction
International Journal Advanced Technology and Engineering Exploration (IJATEE) Vl.No. 8
2021
An Enhancing Canny Edge Detection using SUSAN Filter based on Deep Learning Algorithm for improved image Edge Detection
Webology Vl.No. 6
2021
Intrusion Detection on the UNSW-NB15 dataset using Feature Selection and Machine Learning Techniques
Webology Vl.No. 18
2021
Biometric Security for Cloud Data Using Fingerprint
Science, Technology And Development Journal Vl.No. IX
2020
Text-based Encryption (TBEnc) Technique to Secure Data in Cloud Storage Server
Journal of Shanghai Jiaotong University Vl.No. 16, Issue 10
2020
Survey: Web Security Services in Cloud Computing
International Journal for Scientific Research & Development Vl.No. 8, Issue 8
2020
Security Framework for Context Aware Mobile Web Services
Springer Lecture Notes on Data Engineering and Communication Technologies Vl.No. 26
2019
DORBRI: An Architecture for the DoD Security Breaches Through Quantum IoT
Springer Lecture Notes on Data Engineering and Communication Technologies Vl.No. 26
2019
A Security Architecture for a Smart Home Ecosystem using Permissioned Blockchain
International Journal of Research and Analytical Reviews (IJRAR) Vl.No. 6(1)
2019
Security Threats in Cloud Computing
Asian Journal of Computer Science and Technology Vl.No. 8
2019
Dom_classi: An enhanced weighting mechanism for Domain Specific Words
International Journal of Applied Engineering Research Vl.No. 14(1)
2019
An Architecture to Enable Secure Firmware Updates on a Distributed-Trust IoT Network Using Blockchain
Springer Lecture Notes on Data Engineering and Communications Technologies Vl.No. 1
2019
A Security Framework for A Sustainable Smart Ecosystem using Permissioned Blockchain: Performance Evaluation
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 8(10)
2019
Performance Analysis Of Proposed D1FTBC Approach For Improving Consistency In Cloud Data Transactions
International Journal Of Scientific & Technology Research Vl.No. 8(08)
2019
Performance of Proposed Architecture for Data Transactions in Cloud using D1FTBC
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8(02)
2019
Predicting Student Dropouts for Better Decision Making Using Sentiment Analysis
International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) Vl.No. 8(04)
2019
NIC_LBA: Negations and Intensifier Classification of microblog data using Lexicon Based Approach
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 6(06)
2019
SECON: Secured Confidentiality Framework To Protect Data Stored In Public Cloud Systems
International Journal Of Information And Computing Science Vl.No. 6(05)
2019
Hybrid Text and Value Based Ncryption and Obfuscation (Tvbencobfus) To Safeguard Data in Cloud Storage Server
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 8(10)
2019
An Approach For IoT Security Using Quantum Key Distribution
International Journal Of Scientific & Technology Research Vl.No. 8(08)
2019
A Survey on Web Service Prediction Techniques
INTERNATIONAL JOURNAL OF RESEARCH AND ANALYTICAL REVIEWS (IJRAR) Vl.No. 6(02)
2019
Enhancing Channel Security By Error Detection And Correction During Quantum Key Distribution Using Hamming Code With Modified Elgamal
International Journal Of Scientific & Technology Research Vl.No. 8(12)
2019
An Enhanced Multi-Layered Secured Architecture for Context-Aware Web Services
World Wide Journal of Multidisciplinary Research and Development Vl.No. 4(2)
2018
Cloud Computing Data Security using Hybrid
National Conference on INNOVATIONS IN COMPUTER TECHNOLOGY AND ITS APPLICATIONS Vl.No. 1
2018
Security Architecture of Cloud Computing
International Journal of Electrical Electronics & Computer Science Engineering Vl.No. 1
2018
Cloud Network Security using Biometrics
Journal of Innovative Research and Solutions (JIRAS) Vl.No. 4(1)
2018
An Architecture for Improving the QoS in Composite Web Service Selection
International Journal of Scientific Research in Computer Science, Applications and Management Studies (IJSRCSAMS) Vl.No. 7(4)
2018
Survey on QoS Metrics in Web Services
International Journal of Science and Advance Research in Technology(IJSART) Vl.No. 4(9)
2018
Comparative Study of Conflict Identification and Resolution in Heterogeneous Datasets
Springer Lecture Notes on Data Engineering and Communication Technologies Vl.No. 26
2018
A Study on various tools to overcome Security Issues in Big Data
International Journal of Scientific Research in Computer Science, Applications and Management Studies (IJSRCSAMS) Vl.No. 7(4)
2018
Dictionary based Approach for improving the Accuracy of opinion mining on Big data
International Journal Of Research and Analytical Reviews Vl.No. 5(4)
2018
Opinion Mining using Hybrid Approach on Big Data : A Perspective
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 7(5)
2018
A Methodological Framework for Opinion Mining
International Journal of Computer Sciences and Engineering Vl.No. 5(8)
2018
Cloud Network Security using Biometrics
National Conference Vl.No. 0
2018
Cloud Computeing Data Security using Hybrid
National Conference on Innovations in Computer Technology and its Applications Vl.No. 0
2018
Security Architecture of Cloud Computing
International Conferece Vl.No. 0
2018
An Enhanced Multi-Layered Secured Architecture for Context-Aware Web Services
World Wide Jouranl of Multidisciplinary Research and Development Vl.No. 04-02
2018
Online Social Networking Services Impact on Big Data
International Journal of Computer Science Vl.No. 5(17)
2017
Security BM Techniques using in Digital Image Processing
International Journal of Computer Science Vl.No. 5(18)
2017
Ant Colony Model (AnCoMoDaS) for Data Security in Cloud
International Research Journal of Engineering and Technology (IRJET) Vl.No. 4(5)
2017
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA) for Cloud Data Encoding, Encrypting and Forwarding
International e-Journal for Technology and Research Vl.No. 1(6)
2017
Data Division in Cloud for secured Data Storage using RSA Algorithm
International Research Journal of Engineering and Technology (IRJET) Vl.No. 4(6)
2017
An Efficient Depth Fixed Tree Consistency (DIFTC) Method for Distributed Data Transactions in Cloud Environment
International Journal of Advanced Research in Computer science Vl.No. 8(7)
2017
Dynamic and Scalable Architecture for Accessing the Cloud Databases and Securing Cloud Services Using Public Key Infrastructure
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2(6)
2017
Proposed Architecture for Improving Security and Consistency of Data Transactions in Cloud Database using Tree-Based Consistency Approach
International Journal of Computer Science and Information Security (IJCSIS) Vl.No. 15(12)
2017
Issues and Challenges in Big Data Security
International Conference on Newer Engineering Concepts and Technology Vl.No. 1
2017
A Survey on Big Data Security
National Conference on Big Data Analytics and Mobile Technologies (NCBM 2017) Vl.No. 1
2017
Issues and Challenges In Big Data Security
International Conferece on Newer Engeneering concepts and Technology Vl.No. 0
2017
A Survey on Big Data Security
National Conference on Big Data Analytics and Mobile Technologies Vl.No. 0
2017
Ant Colony Model (AnCoMoDaS) for Data Security in Cloud
International Research Journal of Engineering and Technology (IRJET) Vl.No. 04(05)
2017
Security BM Technique using in Digital Image Processing
International Journal of Computer Science (IJCS) Vl.No. 5(1), 18
2017
Online Social Networking Services Impact on Big Data
International Journal of Computer Science (IJCS) Vl.No. 5(1), 18
2017
An Innovative Security Architecture and Algorithm for Social Network Services
ARPN Journal of Engineering and Applied Sciences Vl.No. 11(2)
2016
Internet of Things: Data Management and Security
International Journal of Computer Technology and Applications(IJCTA) Vl.No. 9(26)
2016
Security Issues in Web Services
International Research Journal of Engineering and Technology (IRJET) Vl.No. 3(5)
2016
Security Issues in Context-Aware System
International Research Journal of Engineering and Technology (IRJET) Vl.No. 3(5)
2016
Visualizing Big Datamining: Issues, Challenges and Opportunities
International Journal of Computer Technology and Applications(IJCTA) Vl.No. 9(27)
2016
An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services
International Journal of Computer Applications (IJCA) Vl.No. 146(15)
2016
SECURITY ISSUES ON COMPOSITE WEB SERVICES
International Research Journal of Engineering and Technology (IRJET) Vl.No. 3(6)
2016
Survey on Privacy Preservation in context aware web services
Indian Journal of Computer Science and Engineering Vl.No. 6(6)
2016
IoT based Home Security through Digital Image Processing Algorithms
2nd World Congress on Computing and Communication Technologies (WCCCT `16) Vl.No. 1
2016
PLIS: Proposed Language Independent Stemmer for Information Retrieval Systems Using Dynamic Programming
2nd World Congress on Computing and Communication Technologies (WCCCT `16) Vl.No. 5
2016
An Approach For Analyzing The Factors Recorded In The Tree Rings Using Image Processing Techniques
2nd World Congress on Computing and Communication Technologies (WCCCT `16) Vl.No. 1
2016
An Approach For Analyzing The Factors Recorded In The Tree Rings Using Image Processing Techniques
World Congress on Computing and Communication Technologies (WCCCT) Vl.No. 0
2016
PLIS: Proposed Language Independent Stemmer for Information Retrieval Systems Using Dynamic Programming
World Congress on Computing and Communication Technologies (WCCCT) Vl.No. 0
2016
An Enhanced Architecture For Feature Based Opinion Mining From Product Reviews
World Congress on Computing and Communication Technologies (WCCCT) Vl.No. 0
2016
IoT based Home Security through Digital Image Processing Algorithms
World Congress on Computing and Communication Technologies (WCCCT) Vl.No. 0
2016
Visualizing Big Data Mining: Issues, Challenges and Opportunities
International Journal of Control Theory and Applications (IJCTA) Vl.No. 9(10)
2016
Internet of Things: Data Management and Security
International Journal of Control Theory and Applications (IJCTA) Vl.No. 9(10)
2016
An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services
International Journal of Computer Applications (IJCA) Vl.No. 146(15)
2016
Security Issues On Composite Web Services
International Research Journal of Engineering and Technology (IRJET) Vl.No. 03(06)
2016
Security Issues in Web Services
International Research Journal of Engineering and Technology (IRJET) Vl.No. 03(05)
2016
Security Issues in Context- Aware System
International Research Journal of Engineering and Technology (IRJET) Vl.No. 03(05)
2016
A Security Framework for Social Network Services
International Journal of Applied Engineering Research Vl.No. 10
2015
Enhanced Elliptic Curve Cryptography
Indian Journal of Science and Technology Vl.No. 8
2015
An Implementation of Three Layered Net-Chk Two Factors Online Social Network Model for Privacy
International Conference on Electrical, Computer and Communication Technologies Vl.No. 2
2015
Learning Behavior Analysis Using Data Mining Techniques
International Journal of Applied Engineering Research Vl.No. 10
2015
A Framework for Language Independent Stemmer Using Dynamic Programming
International Journal of Applied Engineering Research Vl.No. 10
2015
Conflict Resolution and Duplicate Elimination in Heterogeneous Datasets using Unified Data Retrieval Techniques
Indian Journal of Science and Technology Vl.No. 8
2015
Feedback Based Conflict Identification and Resolution using Duplicate Elimination and Ranking Techniques
International Journal Of Computers & Technology Vl.No. 14(9)
2015
Proposed Hough Technique For Estimating Climatic Conditions Recorded In The Cross Section Of Tree Images
IOSR Journal Of Computer Engineering (IOSR-JCE) Vl.No. 17
2015
Semi-Automatic Techniquesfor Estimating Climatic Conditions Recorded In The Tree Rings
International Journal Of Computer Trends And Technology (IJCTT) Vl.No. 29
2015
Issues and Challenges of Data Transaction Management in Cloud Environment
International Research Journal of Engineering and Technology Vl.No. 2
2015
Cloud Computing Data Security Issues, Challenges, Architecture and Methods- A Survey
International Research Journal of Engineering and Technology Vl.No. 2
2015
Proposed Architecture for secure Distributed Data Transaction Management in Cloud Environment
International Journal of Applied Engineering Research Vl.No. 10
2015
Enhanced Elliptical Curve Cryptography Based PKI for Secure Data Storage in a Cloud
International Journal of Applied Engineering Research Vl.No. 10
2015
Security issues in Internet of Things using Next Generation Mobile Networks
International Journal of Applied Engineering Research Vl.No. 10
2015
A Multi-Layered Secured Framework for Context-Aware Web services in Health care Industries
International Journal of Applied Engineering Research Vl.No. 10
2015
Survey Paper On Mobile Social Networks
International Research Journal of Engineering and Technology Vl.No. 2(6)
2015
Security on Mobile Social Networks
International Journal of Advance Research in Computer Science and Management Studies Vl.No. 3(9)
2015
Context-Aware In PrivacyPreservation For Health Care Systems
International Journal of Advanced Computer Technology Vl.No. 4
2015
Conflict Identification and Resolution in Heterogeneous Datasets: A Comprehensive Survey
International Journal of Computer Applications Vl.No. 14(9)
2015
Security & Privacy issues in Social Network Services An Overview
International Journal of Innovative Research in Electrical, Electronics Instrumentation and Control Engineering(IJIREEICE) Vl.No. 2(1)
2014
Social Network Services An Overview
International Journal of Innovative Research in Electrical, Electronics Instrumentation and Control Engineering(IJARCCE) Vl.No. 3(1)
2014
Two Factor Framework for Web Based Social Network using PKI
International Journal on Advanced Computer Theory and Engineering(ACTE) Vl.No. 3(1)
2014
Systematic Optimization and Refinement of Stemmer Rule Set Using NLTK
International Conference on Contemporary Trends in Computer Science(CTCS) Vl.No. 1
2014
Rule Based Machine Translation System from English to Tamil
World Congress on Computing And Communication Technologies(WCCCT `14) Vl.No. 1
2014
Security analysis of future enterprise business intelligence
World Congress on Computing And Communication Technologies(WCCCT `14) Vl.No. 1
2014
Inconsistency Resolution and Joint Information Extraction from Multiple Data Sources
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 3(7)
2014
Resolving Data Inconsistency in Data Integration
International Conference on Contemporary Computing and Informatics (IC3I) Vl.No. 1
2014
Hybrid Algorithm for Web based Social Network
National Conference on Information Technology Sustain Future (NCITSF) Vl.No. 1
2014
Security Challenges for Online Social Network using Multiparty Access Control
International Journal of Computer Science Management Research(NCITCS) Vl.No. 1
2014
An Architecture for Securing Heterogeneous Web Services
International Journal of Advanced Research in Computer Science & Technology (IJARCST ) Vl.No. 2(3)
2014
Context-Aware Architecture for User Access Control
International Journal of Advanced Research in Computer Science & Technology (IJARCST ) Vl.No. 2(3)
2014
A Review on Privacy Control Techniques in Context-aware Web Services
International Journal of Advanced Research in Computer Science & Technology (IJARCST ) Vl.No. 2(3)
2014
DESIGN OF A SECURE ARCHITECTURE FOR CONTEXT AWARE WEB SERVICES USING ACCESS CONTROL MECHANISM
International Conference on Contemporary Computing and Informatics (IC3I) (IEEE) Vl.No. 1
2014
An Improved Rule based Iterative Affix Stripping Stemmer for Tamil Language using K-Mean Clustering
International Journal of Computer Applications (IJCA) Vl.No. 94(13)
2014
A Novel Approach for Phonetic Based Stem Generation Using Edit Distance and Longest Common Subsequence
International Journal of Engineering Research and technology (IJERT) Vl.No. 1
2014
A Comprehensive Analyze of Stemming Algorithms for Indian and Non-Indian Languages
International Journal of Computer Engineering & Applications (IJCEA) Vl.No. 7(3)
2014
Multilingual Phonetic Based Stem Generation
Second International Conference on Emerging Research in Computing, Information Communication and Applications (ERCICA-2014) Vl.No. 1
2014
A Study Of Image Processing In Analysing Tree Ring Structure
International Journal Of Research In Humanities, Arts And Literature Vl.No. 90(19)
2014
An Approach For Dendroclimatology Using Image Processing Techniques
Proceedings of the IEEE World Congress on Computing and Communication Technologies (WCCCT?14 Vl.No. 0
2014
A Framework for Privacy Handler Mechanism in Context-aware Web Services
International Journal of Advanced Research in Computer Science & Technology (IJARCST) Vl.No. 2
2014
SMIWBSN: Security Mechanism in Web Based Social Network
International Journal of Emerging Trends in Computing and Communication Technology(IJETCCT) Vl.No. 1
2014
Comparison Of Various Edge Detection Techniques In Tree Ring Structure
International Journal of Computer Applications Vl.No. 90?19
2014
Extending Social Privacy Protector for Twitter Social Network
CIIT International Journal of Networking and Communication Engineering Vl.No. 1(1)
2013
A Context Aware System Based on Service Oriented Architecture
International Conference on Recent Trends In Computer Applications(ICRTICA) Vl.No. 1
2013
Net Chk A security Framework for Social Network Applications
Internation Journal of Advance Research in Computer and communication Engineering(IJARCCE) Vl.No. 2(12)
2013
A Comparative Study on Variants of Classical Porter Stemmer Algorithm
International Journal of Scientific Transactions in Environment and Techrovention(IJSTET) Vl.No. 6(4)
2013
Categorization of Metabolic Syndrome X Among Adults Using Learning Techniques
CiiT - International Journal of Data Mining and Knowledge Engineering Vl.No. 5(05)
2013
Extending Social Privacy Protector for Twitter Social Network
International Journal of Networking and Communication Engineering Vl.No. 5(01)
2013
Architecture for Integrated and Intelligent Security for Mobile Web Services
International Conference on Intelligent Infrastructure Vl.No. 1
2012
A Comprehensive Study on Stemming Algorithms
International Conference on Semantic E-Business and Enterprise Computing(SEEC) Vl.No. 1
2012
An End-to-End Secure Mobile Payment System using Public Key Infrastructure
Journal of Algorithms and Computational Technology (JACT) Vl.No. 6
2012
Dr.S.ALBERT RABARA
Integrated Architecture to Enhance the Security in IoT Cloud Using ECC DNA
Proceedings Intelligent Computing Systems Vl.No. 0
2021
An Integrated Secure Cloud Storage Architecture for Ensuring Integrity of Data using Hybrid Encryption Schemes in Cloud IoT Environment
Journal of Shanghai Jiaotong University Vl.No. 16
2020
Secured Architecture for Internet of Things (IoT) Based Smart Healthcare
Fifth International Conference on Inventive Computation Technologies (ICICT-2020), IEEE Explore Vl.No. 0
2020
ENHANCED TPA BASED DATA INTEGRITY MECHANISM FOR OBJECT STORAGE ARCHITECTURE ON INTEGRATEDIOT CLOUDSMART ENVIRONMENT
Journal of Shanghai Jiaotong University Vl.No. 16
2020
End-to-End Secured Architecture for Internet of Things Information Kendra (IoT_IK) Integrating IoT-Enabled Smart Services and Applications
International Conference on Mobile Computing and Sustainable Informatics (ICMCSI) Vl.No. 0
2020
TECHNIQUES AND NUANCES OF TEACHING TAMIL LANGUAGE USING INFORMATION COMMUNICAITON TECHNOLOGY (ICT) IN HIGHER LEARNING INSTITUTION
INTERNATIONAL CONFERENCE ON TECHNIQUES AND NUNACES TEACHING TAMIL LANGUAGE IN HIGHER EDUCATION Vl.No. 0
2020
Shield Advanced Mitigation System of Distributed Denial of Service Attack in integration of Internet of Things and Cloud Computing Environment
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 9
2019
Taxonomy of Distributed Denial of Service Attacks and Popular Defense Mechanism using Integration of IoT and Cloud Environment
International Journal of Innovative Research in Science, Engineering and Technology Vl.No. 8
2019
Mitigation Of Distributed Denial Of Service Attack Using Dynamic Captcha With Equal Probability Algorithm In Integration Of Internet Of Things And Cloud Environment
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vl.No. 8
2019
An Effective Distributed Denial Of Service Attack Detection Model In Integration Of Internet Of Things And Cloud Computing Using Binary Fire Fly Optimization Algorithm
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vl.No. 8
2019
An Integrated Architecture For Iot Based Data Storage In Secure Smart Monitoring Environment
International Journal of Scientific & Technology Research Vl.No. 8
2019
ENHANCED CLOUD IDENTITY MANAGEMENT ENABLING SECURE ACCESS IN CROSS CLOUD ENVIRONMENT
ADALYA JOURNAL Vl.No. 8
2019
Integrated Device Cloud Architecture for a Secure Cloud of Things Environment
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8
2019
Secure Data Transaction using ECC in Corporate Environment
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8
2019
Secure Smart Card Based Parking System (SSCPS) for IOT-Smart Cities
IEEE Conference Proceedings Vl.No. 0
2018
An Integrated IPv6 Architecture for smart environment using IoT and Cloud Computing
Journal of Emerging Technologies and Innovative Research Vl.No. 5
2018
Elliptic Curve Cryptography based Security Framework for Internet of Things (IoT) Enabled Smart Card
IEEE INTERNATIONAL CONFERENCE WCCCT-2017 Vl.No. -
2017
A Secure Architecture for Mobile Web Service (SAMWS)
IEEE INTERNATIONAL CONFERENCE WCCCT-2017 Vl.No. -
2017
Enhanced Security Architecture for IPv6 Transition
IEEE INTERNATIONAL CONFERENCE WCCCT-2017 Vl.No. -
2017
Algorithmic Approach to security Architecture for Integrated IoT Smart Services Environment
IEEE INTERNATIONAL CONFERENCE WCCCT-2017 Vl.No. -
2017
An Integrated Inter-Mobility IPv4/IPv6 Address Translation Architecture for Corporate Networks
IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO 2015) in association with National University of Kaohsiung-Taiwan, Oakland University-USA, IEEE Computational Intel Vl.No. 10
2015
An Integrated Seamless Mobility and IPv4/IPv6 Address Translation Architecture between IPv4 and IPv6 Networks
Journal of Recent Research in Engineering and Technology (JRRET) Vl.No. Vol.2, Issue. 4
2015
An Integrated Security Architecture for Next Generation Networks
International Journal of Computer Applications (IJCA) Vl.No. Vol.1
2015
Design and Development of Integrated, Secured and Intelligent Architecture for Internet of Things and Cloud Computing
IEEE IEEE Xplore Digital Library Pages: 2015 Vl.No. DoI: 10.1109/FiCloud.2015.23
2015
An Architecture For Secure Mobile Database Transaction For Corporate Environment
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
Elliptic Curve Cryptography based Security Framework for Internet of Things and Cloud Computing
International Journal of Computer Science and Technology (IJCST) Vl.No. Vol. 6, Issue 3
2015
Quality of Service Architecture for Internet of Things and Cloud Computing
International Journal of Computer Applications (IJCA) Vl.No. Vol.128,Issue.7
2015
An Integrated Secure Inter-Mobility IPv4/IPv6 Address Translation Architecture for Corporate Networks
International Journal of Future Computer and Communication (IJFCC) Vl.No. Vol. 4, Issue: 5
2015
An Integrated Secure Architecture for IPv4/IPv6 Address Translation Between IPv4 and IPv6 Networks
Advances in Intelligent Systems and Computing, Springer Vl.No. Vol. 380
2015
Internet of Things (IoT) Architecture for Smart Services
International Journal of Applied Engineering Research (IJAER) Vl.No. Vol.10
2015
Internet of Things (IoT) based Smart Environment Integrating various Business Applications
International Journal of Computer Applications (IJCA) Vl.No. Vol.128
2015
An Integrated IP-MPLS Architecture for Next Generation Networks
International Journal of Computer Applications(0975-8887) Vl.No. Vol.104, No.3
2014
A Framework for Secure Mobile Database Transactions using Cryptographic Co-processor
International Journal of Computer Applications (0975-8887) Vl.No. Vol.105
2014
An Integrated IP-MPLS Mobility Framework For Next Generation Networks
International Journal of Computer Science and Technology Vl.No. Vol.5, No.4
2014
An Integrated and Intelligent Secure Architecture for Mobile Web Services
International Journal of Computer Science and Technology Vl.No. Vol.5, No.3, July-Sept
2014
Multi Level Secure Architecture for Mobile Web Services using Intelligent Mobile Agents and Intelligent Content Filter
ACM International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), Kaohsiung City, Taiwan Vl.No. 0
2014
An Integrated Next Generation IP-MPLS Hybrid Architecture for Seamless Mobility
Recent Advances in Electrical Engineering, WSEAS, Lisbon, Portugal Vl.No. 0
2014
An Intelligent Content Filter based framework for Mobile Web Services
Recent Advances in Electrical Engineering Series, WSEAS, Lisbon, Portugal Vl.No. 0
2014
Financial Transactions Over Wired and Wireless Networks: Technical Perspective
Lecture Notes in Mechanical Engineering, Springer Vl.No. -
2012
Performance Analysis of Addressing, Interoperability and Inter-Mobility Management Architecture Between IPv4 and IPv6 Networks (AIMM-I46)
Springer Series: Advances in Computer Science, Engineering & Applications AISC Vl.No. Vol.167/2012
2012
Architecture for Integrated and Intelligent Security for Mobile Web Services
Conference on Intelligent Infrastructure Vl.No. 1
2012
A Security Architecture for Cloud Data Using Hybrid Security Scheme
IEEE Xplore & Proceedings 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) Vl.No. 0
202
Novel Hybrid Technique Enhancing Data Privacy and Security
Springer IFIP and Proceedings 6th International Conference on Computer, Communication, and Signal Processing Vl.No. 651
202
Reducing Delay during Handoff in Multi-Layered Security Architecture for Wireless LANs in the Corporate Network
Proceedings of the IEEE Internat. Conference on Wireless Communica-tion - Networking and Mobile Computing, Wuhan, China Vl.No. 2: 1038 - 1043
0
Modeling and Performance study of MPLS VPN
Proceedings of the Internat. Conference on communications in Computing, Las Vega, Nevada, USA Vl.No. pp. 91-96
0
Multi-Layer Security architecture for Wireless LANs in the Corporate Network
Proceedings of World Wireless Congress, Palo Alto, USA Vl.No. pp. 202-08
0
Multi-Layer Security architecture for Wireless LANs in the Corporate Environment
International Journal of Network Security, IJNS-2006-01-25-2. Vl.No. -
0
SIM-Based Authentication for the integrated GPRS.
WLAN Networks (USA)-World Wireless Congress Vl.No. -
0
A Model for Transaction Management with Concurrency Control for Multi-Level Secure Distributed Real-time Database systems.
Proceedings of the WSEAS International Conference on Applied Computer Science, Italy. Vl.No. 2: 127-133
0
Public Key Infrastructure for Mobile Banking Security.
Proceedings of the World Wireless Congress, WWC`2008, San Francisco Bay Area. Vl.No. ISSN 1558-7835, pp.70-75
0
SIM-Based Authentication for the Integrated GPRS-WLAN Networks.
Affordable Computing Tata McGraw-Hill Publishing Co. Ltd., New Delhi. Vl.No. ISBN-0-07-062171-3,pp. 41-45
0
Improving Route Optimiza-tion in Mobile IP
Proc. of International Conference of Emerging Applications of Infor-mation Technology, Kolkatta Vl.No. pp. 235-38
0
Multi-Level Secure Concurrency Control Model for Financial Applications
Affordable Computing Tata McGraw-Hill Publishing Co. Ltd., New Delhi. Vl.No. ISBN-0-07-062171-3,pp. 95-99
0
Security Framework Architecture for Mobile Banking, In: Mobile Ubiquitous and Pervasive Computing
Macmillan India Punlications Ltd., New Delhi. Vl.No. ISBN 10:0230-63011-1, 2: 114-120
0
Evolving a Model of Transaction Management with Concurrency Control for Multilevel Secure Distributed Real-time Database Systems.
Proceedings of the 7th WSEAS International Conference on Applied Computer Science –Computer Science Challenges Vl.No. ISBN: 978-960-6766-15-2,pp.127-133
0
Secured User Interface Algorithm for Mobile Banking Framework - In: Affordable Computing
Affordable Computing Tata McGraw-Hill Publishing Co. Ltd., New Delhi. Vl.No. ISBN-0-07-062171-3,pp. 87-90
0
Dr. A. ALOYSIUS
Advancing IoT Security through Blockchain-Driven Dynamic Trust Evaluation
INDIAN JOURNAL OF SCIENCE AND TECHNOLOGY Vl.No. 18
2025
Data Reduction Based Truth Discovery Analysis by Resolving the Conflicts in Big Data Using Continuous Data
Internatonal Journal for Innovative Engineering and Management Research Vl.No. 12
2023
SENTIMENT ANALYSIS IN MELANOMA CANCER DETECTION USING ENSEMBLE LEARNING MODEL
ICTACT JOURNAL ON SOFT COMPUTING Vl.No. VOLUME: 13
2023
Task Scheduling with Altered Grey Wolf Optimization (AGWO) in Mobile Cloud Computing using Cloudlet
Journal of Communications Software and Systems Vl.No. 19
2023
Mobility and Execution Time Aware Task Offloading in Mobile Cloud Computing
The International Journal of Interactive Mobile Technologies (iJIM) Vl.No. 16
2022
Sentiment Analysis Using Voting Base Unsupervisied Ensemble Machine Learning in Cancer Detection
ICTACT Journal on Image and Video Processing Vl.No. 13
2022
Textual Sentiment Analysis using Lexicon Based Approaches
Annals of the Romanian Society for Cell Biology Vl.No. 25
2021
Hybrid Approaches Based Emotion Detection in Memes Sentiment Analysis
International Journal of Engineering Research and Technology Vl.No. 14
2021
Multi-Modal Sentiment Analysis To Improve The Techniques In Lexicon Based Approach And Machine Learning Approach
Webology Vl.No. 18
2021
Empirical Study on Distance Based Data Reduction for Truth Discovery using Conflicted Data
Mukt Shabd Journal Vl.No. 9
2020
HADOOP BASED PARADIGM USING HYBRID FEATURE SELECTION APPROACH TO ENHANCE PERFORMANCE IN SUPERVISED LEARNING CLASSIFICATION
International Journal of Advanced Science and Technology Vl.No. 20
2020
Mobility Aware Offloading and Scheduling of Tasks using Cloudlet in Mobile Cloud Computing: A Survey
International Journal of Advanced Science and Technology Vl.No. 20
2020
Applications, Approaches, and Challenges in Sentiment Analysis (AACSA)
International Research Journal of Modernization in Engineering Technology and Science Vl.No. 2
2020
Emotion Detection for Memes Sentiment Analysis Using Hybrid Approaches (EMSA-HAP
Alochana Chakra Journal Vl.No. 9
2020
A Survey on Fake Data Identification in Big Data using Artificial Intelligence Techniques
International Journal of Multidisciplinary Educational Research Vl.No. 9
2020
Distance Based Measurement Approach for Truth Discovery by Resolving the Conflicts in Big Data
Journal of Physics: Conference Series Vl.No. 0
2019
DATA PREPROCESSING IN SENTIMENT ANALYSIS USING TWITTER DATA
INTERNATIONAL EDUCATIONAL APPLIED RESEARCH JOURNAL (IEARJ) Vl.No. 3
2019
A Comparative study of Lexicon based and Machine learning based classifications in Sentiment analysis
International Journal of Data Mining Techniques and Applications INT Vl.No. 8
2019
A SURVEY ON MOBILE COMPUTING SECURITY
International Journal of Research and Analytical Reviews (IJRAR) Vl.No. 6
2019
Analysis of Various Machine Learning Algorithms to Predict the Type II Diabetes Disease
International Journal of Computing Algorithm Vl.No. 8
2019
An Enhanced Preprocessing Algorithms And Accuracy Prediction Of Machine Learning Algortihms
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vl.No. 8
2019
A NOVEL HADOOP MAP REDUCE PARADIGM USING AN EFFECTIVE EPCA APPROACH
Journal of Analysis and Computation (JAC) Vl.No. 8
2019
DATA SECURITY ON HADOOP DISTRIBUTED FILE SYSTEM USING RSA ENCRYPTION
"International Journal of Research and Analytical Reviews (IJRAR) " Vl.No. 6
2019
Architecture Design for Hadoop No-SQL and Hive
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 3
2018
Maintenance Effort Prediction Model using Aspect-Oriented Cognitive Complexity Metrics
International Journal of Advanced Research in Computer Science (IJARCS) Vl.No. 8
2018
Aspect Oriented Programming Cognitive Complexity Metric Analysis Tool
International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT) Vl.No. 3
2018
Empirical Validation Of Object Oriented Cognitive Complexity Metrics Using Maintenance Effort Prediction
nternational Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 7
2018
Quality Enhancement by Resolving Conflict using Optimization in Big data
International Journal of Computer Sciences and Engineering Vl.No. 6
2018
Big Data: Challenges and Opportunities
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 03
2018
An Approach for Truth Discovery by Resolving the Conflicts on Categorical Data
Journal of Physics: Conference Series Vl.No. 0
2018
Concept of MapReduce Scheduling and Processing Techniques
JETIR Vl.No. 05
2018
ISSUES & CHALLENGES FOR HDFS & MAPREDUCE
IJRAR Vl.No. 05
2018
An Architecture Design and concept of Security in Hadoop Environment
IJRAR Vl.No. 05
2018
An Enchanced Data Cleaning Algorithm for Twitter Data
International Journal of Research in Computer Science Application and Managemetn Studies Vl.No. 7
2018
Sentiment Analysis using Mode Measure
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 6
2017
Statistical Analysis on Social media Usage in Students Education
SSICACR-2017 Vl.No. -
2017
A survey on Complexity Metrics in Object Oriented System
SSICACR-2017 Vl.No. 0
2017
Sentiment Analysis A Review
International Journal of Engineering Technology and Computer Research (IJETCR) Vl.No. 5
2017
An Analysis of Object Oriented Complexity Metrics
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2
2017
A Heuristics on Interface Complexity
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Vl.No. 6
2017
Lexicon based Acronyms and Emoticons Classification of Sentiment Analysis (SA) on Big Data
International Journal of Database Theory and Application Vl.No. 10
2017
Polarity Detection of Lexicon based Sentiment Analysis with Negation Handling
Journal of Advanced Research in Dynamical & Control Systems Vl.No. 13
2017
Pre-Processing Concepts and Techniques for Sentiment Analysis
International Journal of Scientific Research in Computer Science, Engineering and Information Technology (UGC) Vl.No. 2
2017
A SURVEY ON TRUTH DISCOVERY METHODS FOR BIG DATA
International Journal of Engineering Technology and Computer Research (IJETCR) Vl.No. 5
2017
PREDICTIVE ANALYTICS CONCEPTS IN BIG DATA- A SURVEY
International Journal of Advanced Research in Computer Science Vl.No. 8
2017
Social Network Prediction Measurement in Education
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2
2017
Cognitive Weighted Inherited Class Complexity Metric
Procedia Computer Science Vl.No. 125
2017
Survey of MapReduce on BigData
International Journal of Engineering and Computer Science Vl.No. 6
2017
Usage and impact of social media in students education
IJCRT Vl.No. 5
2017
Sentiment Analysis Using Measuring Modes
International Journal of Engineering and Computer Science Vl.No. 6
2017
Pre-Processing Concepts and Techniques for Sentiment Analysis
International Journal of Scientific Research in Computer Science, Engineering , and Information Technology Vl.No. 02
2017
Cognitive Weighted Polymorphism Factor: A New Cognitive Complexity Metric
International Journal of Computer and Information Engineering Vl.No. 2
2016
Concepts and Methods of Sentiment Analysis on Big Data
International Journal of Innovative Research in Science, Engineering and Technology Vl.No. 5
2016
Big Data Prediction Using Evolutionary Techniques: A Survey
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 3
2016
Models for Maintenance Effort Prediction with Object-Oriented Cognitive Complexity Metrics
World Congress on Computing and Communication Technologies Vl.No. -
2016
DESIGN AND ANALYSIS OF ASPECT ORIENTED METRIC CWCoAR USING COGNITIVE APPROACH
World Congress on Computing and Communication Technologies Vl.No. -
2016
A Metric for identifying incoming outgoing interactions Complexitya of a Component
Emerging Treands in software Denelopment Vl.No. -
2016
A Survey on Complexity Metric OOD
Advances in Computing resource Vl.No. -
2016
An Enhanced Sinkhole Attacker Node Identification Technique using Successful Link Ratio in IoT Environment
IT Skills Show & International Conference on Advancements in Computing Resources (SSICACR-2017) Vl.No. 5
2016
CONCEPTS AND METHODS OF SENTIMENT ANALYSIS ON BIG DATA
INTER NATIONAL JOURNAL INNOVATIVE RESEARCH IN SCIENCE ENGINEERING AND TECHNOLOGY Vl.No. 5
2016
A Survey on User Authentication Mechanism in Mobile Cloud Computing
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 1
2015
A Review on Component Based Software Metrics
International Journal of Fuzzy Mathematical Archive Vl.No. 7
2015
Cognitive Weighted Polymorphism Factor: A Comprehension Augmented Complexity Metric
International Journal of Computer, electrical, Automation, Control Vl.No. 9
2015
Aspect oriented Programming Metrics - A Survey
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 1, 3
2015
Analysis of Measuring the Complexity of Advice Using a Cognitive Approach
International Journal of Applied Engineering Research Vl.No. 10 , 82
2015
Cognitive Perspective Of Attribute Hiding Factor Complexity Metric
International Journal of Engineering And Computer Science Vl.No. 4
2015
Cognitive Weighted Method Hiding Factor Complexity Metric
International Journal of Computer Science and Software Engineering Vl.No. 4
2015
Validation of Cognitive Weighted Methods Hiding Factor Complexity Metric
International journal of Applied Engineering Research Vl.No. 10 no 82
2015
A Survey on User Authentication Mechanism in Mobile Cloud Computing
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 3
2015
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environment
International Journal of Computer and Communication System Engineering (IJCCSE) Vl.No. 2
2015
Cognitive Weighted Polymorphism Factor: A New Cognitive Complexity Metric
International Journal of Computer and Information Engineering Vl.No. 02
2015
cognitive Weighted Polymorphism Factor: A Comprehension Augmented Complexity Metric
International Journal of Computer and Information Engineering Vl.No. 9
2015
Analysis of Measuring the complexity of Advice using a Cognitive Approach
International Journal of Applied Engineering Research Vl.No. 10
2015
Aspect Oriented Programming Metrics - A Survey
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 01
2015
Cognitive Complexity Metrics Analysis Tool (CCMAT)
International Journal of Emerging Trends in Computing and Communication Technology Vl.No. 01
2014
Cognitive Complexity Metrics Analysis Tool (CCMAT)
International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT), Vl.No. 1
2014
Maintenance Effort Prediction Model Using Cognitive Complexity Metrics
International Journal of Advanced Research in Computer Science and Software Engineering Vl.No. Volume 3, Issue 11,
2013
An Investigation into the Relationship between Intelligence Quotient and Debugging Ability of Component Based System
International Journal of Software Engineering and Technology Vl.No. 4
2012
Coupling Complexity Metric: A Cognitive Approach
International Journal of Information Technology and Computer Science Vl.No. 4
2012
Cognitive Weighted Response For a Class: A New Metric for Measuring Cognitive Complexity of OO Systems
International Journal of Advanced Research in Computer Science Vl.No. volume 3 no 4
2012
A Survey on Metrics of Software Cognitive Complexity for OO Design,
on International Conference on Computational Intelligence and Cognitive Informatics Vl.No. 58
2011
Attribute Weighted Class Complexity: A New Metric For Measuring Cognitive Complexity Of OO Systems
International Conference on Computational Intelligence and Cognitive Informatics Vl.No. 58
2011
An Analysis of Dependency between Personality Traits and Debugging Ability in Component Based System
International Journal of Software Engineering and Technology Vl.No. 0
2011
Attribute Weighted Class Complexity : A New Metric For Measuring Cognitive Complexity Of Oo Systems
Proceedings of International Conference on Computational Intelligence and Cognitive Informatics, Vl.No. 0
2011
A Survey on Metrics of Software Cognitive Complexity for OO Design
Proceedings of International Conference on Computational Intelligence and Cognitive Informatics Vl.No. 0
2011
An Investigation into the Impact of OO Design on Program Debugging with Individual and Collaborative Approaches
International Journal of Software Engineering and Technology Vl.No. 0
2010
On Validating Class Level Cognitive Complexity Metrics
International Journal of Software Engineering and Technology Vl.No. 0
2010
A Study on Impact of Emotional Quotient on Program Comprehension
, Proceedings of International Conference on Communication and Computational Intelligence Vl.No. 0
2010
, A Survey on the Complexity Metrics for Component Based System
Proceeding of National Conference on Computer Science and Engineering (NCCSE-2010) Vl.No. 0
2010
An Investigation into the impact of OO Design on Program Comprehension with individual and Collaborative Approach
Proceeding of National Conference on Emerging Trends in Advance Computing, Vl.No. 0
2010
A Survey on the Complexity Metrics for Component Based System
Proceeding of National Conference on Computer Science and Engineering (NCCSE-2010) Vl.No. 0
2010
An Investigation into the impact of OO Design on Program Comprehension with individual and Collaborative Approach
Proceeding of National Conference on Emerging Trends in Advance Computing (NCETAC 2010) Vl.No. 0
2010
Extended Weighted Class Complexity: A new of software complexity for objected oriented systems,
, Proceedings of International Conference on Semantic E-business and Enterprise computing SEEC Vl.No. 0
2009
, A Comparison of Proposed Cognitive weights for control structures and object oriented programming languages
Proceedings of International Conference on Advanced Computing Vl.No. 0
2009
An Investigation into the Relationship between Personality traits and Recollection & Retention ability in object oriented Systems
Proceedings of International Conference on Advanced Computing (ICAC) Vl.No. 0
2009
A Comparison of Proposed Cognitive weights for control structures and object oriented programming languages
Proceedings of International Conference on Advanced Computing (ICAC) Vl.No. 0
2009
A study on the impact of Style elements in Recollection & Retention of Object oriented System
Proceedings of International Conference on Semantic E-business and Enterprise computing (SEEC 2009) Vl.No. 0
2009
A Study on the Impact of Personality traits in program debugging of object oriented System
proceeding on the National Conference on Advance Computing (NCAC) Vl.No. 0
2009
Using Gender Differences to Link Intelligent Quotient and Program Debugging of Object Oriented Systems
Proceedings of National Conference on Software Engineering and Applications Vl.No. 0
2008
Using Gender Differences to Link Intelligent Quotient and Program Debugging of Object Oriented Systems
Proceedings of National Conference on Software Engineering and Applications, Vl.No. 0
2008
Dr.V.JUDE NIRMAL
Hierarchical Attention and Contextual Embedding for Robust Sarcasm Detection
Indian Journal of Science and Technology Vl.No. Vol:17(40)
2024
A Profit-Driven Stacking Model for Effective Churn Prediction
International Journal on "Technical and Physical Problems of Engineering" (IJTPE) Vl.No. 14
2022
Minimax Probability based Churn Prediction for Profit Maximization
ICTACT Journal on Soft Computing Vl.No. 12
2021
A survey on Big Data Tools and Applications
International Journal of Research and Analytical Reviews (IJRAR) Vl.No. 6
2019
Mobile Learning with Social Media: Next Paradigm Shift in Education
National Conference on Higher Education in the Knowledge Age: Techno-Pedagogical Perspectives and Innovations Vl.No. 0
2016
Real-time Sentiment Prediction on Streaming Social Network Data using In-Memory Processing
IEEE Explore (WCCCT 2016) Vl.No. 0
2016
Emoticon Based Sentiment Analysis using Parallel Analytics on Hadoop
Indian Journal of Science and Technology (IJST) Vl.No. 9 (33)
2016
Real-Time Sentiment Prediction on Streaming Social Network Data Using In-Memory Processing
World Congress on Computing and Communication Technologies (WCCCT Vl.No. -
2016
Parallel Implementation of Big Data Pre-processing Algorithims for Sentiment Analysis of Social Networking Data
International Journal of Fuzzy Mathematical Archive Vl.No. 6, Number 1 & 2
2015
Parallelization Techniques in Pre-processing Phase for Sentiment Analysis in Big Data: A Comparative Analysis
International Journal of Applied Engineering And Research (IJAER) Vl.No. 10
2015
Fast and Effective Real time Sentiment analysis on Streaming Big Data using Distributed Caching Techniques
International Journal of Applied Engineering And Research (IJAER) Vl.No. 10
2015
SECCON: A Framework for Applying Access Control Policies in Context-Aware Wireless Networks
World Congress on Computing and Communication Technologies (IEEE Xplore) Vl.No. -
2014
Sentiment and Emotion Analysis for Context Sensitive Information Retrieval of Social Networking Sites: A Survey
International Journal of Computer Applications (IJCA) Vl.No. 100, No. 10
2014
Context-Aware Data Retrieval using Mobile Social Network
National Conference on Advanced Computing Vl.No. 0
2013
Rev.Dr.S.ARUL OLI SJ
Confidentiality Technique to Encrypt Non-Numerical Data to Enhance Security in Public Cloud Storage
Institute of Electrical and Electronics Engineers (IEEE) Vl.No. 0
2017
Confidentiality Technique to Obfuscate the Numerical Data to Enhance Security in Public Cloud Storage
Institute of Electrical and Electronics Engineers (IEEE) Vl.No. -
2017
Confidentiality Technique to Encrypt and Obfuscate Non-Numerical and Numerical Data to Enhance Security in Public Cloud Storage
Institute of Electrical and Electronics Engineers (IEEE) Vl.No. -
2017
Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage
MATEC Web of Conferences Vl.No. 40
2016
Confidentiality Technique for Data Stored in Public Cloud Storage
International Journal of Engineering Research & Technology (IJERT) Vl.No. 5
2016
Confidentilaity Technique using Data Obfuscation to Enhance Security of Stored Data in Public Cloud Storage
International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Vl.No. 5
2016
Confidentiality Technique for Enhancing Data Security using Encryption and Obfuscation in Public Cloud Storage
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Vl.No. 5
2016
ARARO Framework for Confidentiality Techniques to Enhance Security of Numerical and Non-Numerical Data in Public Cloud Storage
INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN ELECTRICAL, ELECTRONICS, INSTRUMENTATION AND CONTROL ENGINEERING (IJIREEICE) Vl.No. 4
2016
A Novel Approach for Ensuring Data Confidentiality in Public Cloud Storage
International Journal of Computer Applications Vl.No. 0975 ? 8887
2015
A Framework for Key Management for Data Confidentiality in Cloud Environment
Institute of Electrical and Electronics Engineers (IEEE) Vl.No. 15
2015
A Framework for Data Confidentiality in Public Cloud Storage
MISBAH Journal Vl.No. 15
2015
Confidentiality Framework to Enhance Data Security in Public Cloud Storage
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
A Framework to Ensure Data Security in Public Cloud Storage
ELSEVIER India Vl.No. 0
2014
Mobile Cloud Security Issues and Challenges A Perspective
International Journal of Engineering and Innovative Technology (IJEIT) Vl.No. 3
2013
Dr.A.VIMAL JERALD
End to End Secured Architecture for Internet of Things Information Kendra (IoT_IK) Integrating IoT Enabled Smart Services and Applications
International Conference on Mobile Computing and Sustainable Informatics - ICMCSI 2020 Vl.No. 0
2021
End-to-End Secured Architecture for Internet of Things Information Kendra (IoT_IK) Integrating IoT-Enabled Smart Services and Applications
International Conference on Mobile Computing and Sustainable Informatics (ICMCSI) Vl.No. 0
2021
Secured Architecture for Internet of Things (ioT) Enabled Smart Agriculture
International Journal of Scientific & Technology Research (IJSTR) Vl.No. 9
2020
Techniques and Nuances of Teaching Tamil Language Literature using Information Communication Technology (ICT) in Higher Education
International Seminar on the methods and techniques of Teaching Tamil in Higher Education Vl.No. 0
2020
?Secured Architecture for Internet of Things (IoT) Based Smart Health Care?
5th International Conference on Inventive Computation Technologies [ICICT 2020] Vl.No. 0
2020
Secured Architecture for Internet of Things (IoT) Based Smart Healthcare
Fifth International Conference on Inventive Computation Technologies (ICICT-2020) Vl.No. 0
2020
TECHNIQUES AND NUANCES OF TEACHING TAMIL LANGUAGE USING INFORMATION COMMUNICAITON TECHNOLOGY (ICT) IN HIGHER LEARNING INSTITUTION
INTERNATIONAL CONFERENCE ON TECHNIQUES AND NUNACES TEACHING TAMIL LANGUAGE IN HIGHER EDUCATION Vl.No. 0
2020
Taxonomy of Distributed Denial of Service Attacks and Popular Defense Mechanism using Integration of IoT and Cloud Environment
International Journal of Innovative Research in Science, Engineering and Technology Vl.No. 8
2019
Secured Architecture for Integrated IoT Enabled Smart Services
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8
2019
A Review on Security Issues Arise During Integration of Cloud Computing and Internet of Things
International Journal of Scientific Research in Computer Science Application and Management Studies Vl.No. 7
2018
Algorithmic Approach to Security Architecture for Integrated IoT Smart Services Environment
IEEE CPS - Computing and Communication Technologies (WCCCT), 2017 World Congress Vl.No. 0
2017
Secure IoT Architecture for Integrated Smart Services Environment
Proceedings of the 10th INDIACom -2016, 3rd International Conference on Vl.No. 5
2016
AN ADAPTABLE SECURE SMART CARD ARCHITECTURE FOR INTERNET OF THINGS AND CLOUD COMPUTING
IJRET (International Journal of Research in Engineering and Technology Vl.No. 05
2016
Secure IoT Architecture for Smart Services Environment
IEEE Digital Library Vl.No. 0
2016
Algorithmic Approach to security Architecture for Integrated IoT Smart Services Environment
IEEE Digital Library Vl.No. -
2016
AN ADAPTABLE SECURE SMART CARD ARCHITECTURE FOR INTERNET OF THINGS AND CLOUD COMPUTING
IJRET: International Journal of Research in Engineering and Technology Vl.No. 5 - 5
2016
Green Computing, a Remedy for Global Warming
Proceedings of National Conference on Emerging Trends in Software Development by Alagappa University Vl.No. 0
2016
Internet of Things (IoT) based Smart Environment integrating various Business Applications
International Journal for Computer Application Vl.No. 128
2015
Internet of Things for Smart Services
International Journal Applied Engineering Research Vl.No. 10-82
2015
Elliptic Curve Cryptography based Security Framework for Internet of Things and Cloud Computing
International Journal of Computer Science and Technology (IJCST) Vl.No. 6.3
2015
Quality of Service Architecture for Internet of Things and Cloud Computing
International Journal of Computer Application Vl.No. 128-7
2015
An Adoptable and Secure Intelligent Smart Card Framework for Internet of Things and Cloud Computing
50th Golden Jubilee Annual Convention on "Digital Life", CS_-2015 to be published by AISC Springer Vl.No. 0
2015
Elliptic Curve Cryptography based Security Framework for Internet of Things and Cloud Computing
Recent Advances on Computer Engineering Vl.No. 0
2015
Internet of Things (IoT) based Smart Environment integrating various Business Applications
International Journal of Computer Applications Vl.No. 128
2015
Quality of service architecture for internet of things and cloud computing
International Journal of Computer Applications Vl.No. 128-8
2015
Elliptic curve cryptography based security framework for internet of things and cloud computing
International Journal of Computer Science and Technologies Vl.No. 6 issue 3
2015
A Framework for User Oriented Content Dissemination for E-Learning
Proceedings of The Role of ICT in Higher Education: Quality, Accessibility and Security Vl.No. 0
2010
Dr. George Gabriel Richard Roy
A Security Architecture for a Smart Home Ecosystem using Permissioned Blockchain
International Journal of Research and Analytical Reviews Vl.No. 6
2019
A Security Framework for a Sustainable Smart Ecosystem using Permissioned Blockchain: Performance Evaluation
International Journal of Innovative Technology and Exploring Engineering Vl.No. 8
2019
A Security Framework for a Sustainable Smart Ecosystem using Permissioned Blockchain
Journal of Emerging Technologies and Innovative Research Vl.No. 6
2019
A Survey on Threats and Challenges in Blue Eyes Technology
Journal of Emerging Technologies and Innovative Research Vl.No. 5
2018
An Overview of Threats and Challenges in Smart Wi-Fi Ad-Hoc Networks
Internation Journal for Research in Applied Science and Engineering Technology Vl.No. 6
2018
An Architecture to Enable Secure Firmware Updates on a Distributed-Trust IoT Network Using Blockchain
Lecture Notes on Data Engineering and Communications Technologies book series Vl.No. 15
2018
Security Issues in Internet of Things using Next Generation Mobile Networks
International Journal of Applied Engineering Research Vl.No. 10 Number 82
2015
A Cloud Model for Effective E-Learning
IEEE - CPS Vl.No. 10
2014
Security analysis of future Enterprise Business Intelligence
IEEE-CPS Vl.No. 0
2014
Dr.A.ANGELPREETHI
Improved Moth Flame Optimization with Deep Convolutional Neural Network for Colorectal Cancer Classification using Biomedical Images
IEEE Xplore Vl.No. 1
2024
Lexicon and Machine Learning Based Comparative Analysis to Classify the Students Opinions on Covid-19 Pandemic
International Journal for Innovative Engineering and Management Research Vl.No. 12
2023
Dom_classi: An enhanced weighting mechanism for Domain Specific Words
International Journal of Applied Engineering Research Vl.No. 14
2019
NIC_LBA: Negations and Intensifier Classification of microblog data using Lexicon Based Approach
Journal of Emerging Technologies and Innovative Research (JETIR) Vl.No. 6
2019
Predicting Student Dropouts for Better Decision Making Using Sentiment Analysis
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 8
2019
Traffic Redundancy and Elimination Approach to Reduce Cloud Bandwidth and Costs
International Journal of Computer Sciences and Engineering (UGC approved Journal) Vl.No. 6
2018
A Methodological Framework for Opinion Mining
International Journal of Computer Sciences and Engineering (UGC approved Journal) Vl.No. 2
2018
PHYCHOLOGICAL ANALYSIS OF EMOTICONS AND EMOJI IDEOGRAMS IN SENTIMENT ANALYSIS
Proceedings of the National conference Vl.No. 0
2018
Opinion Mining using Hybrid Approach on Big Data : A Perspective
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 7
2018
Dictionary based Approach for improving the Accuracy of opinion mining on Big data
International Journal Of Research and Analytical Reviews Vl.No. 5
2018
An Enhanced Architecture for Feature Based Opinion Mining From Product Reviews
IEEE Xplore Vl.No. -
2017
Visualizing Big Datamining: Issues, Challenges and Opportunities
International Journal of Control Theory and Applications Vl.No. 9
2016
An Impact of Intelligent Quotient and Learning Behavior of Students in Learning Environment
CIIT International Journal of Artificial Intelligent System and Machine Learning Vl.No. Vol 7 (1) Vl.No. 7
2015
A survey on big data and its charactristics using 3v`s
IJERT International Journal of Engineering Research and Technology proceedings of the conference 3rd National Conference On Innovation In Computing And Communication Technology Vl.No. 3
2015
Green computing
Proceedings of the national conference on recent trends in computing Vl.No. 0
2012
Dr. G AROCKIA SAHAYA SHEELA
Predictive Modeling of the Impact of Smartphone Addiction on Students? Academic Performance Using Machine Learning
Next Generation Technologies for Sustainable Computing Vl.No. 1
2025
Survey of Machine Learning Techniques in Pancreatic Disease Diagnosis and Prediction
Emerging Trends in Research Frontiers in Information Technology Vl.No. 0
2025
Exploring Machine Learning Algorithms for Early Prediction of Hypothyroidis m Diagnosis
Emerging Trends in Research Frontiers in Information Technology Vl.No. 1
2025
Improving Academic Performance through Machine Learning- Driven Personalized Tutoring Systems
Emerging Trends in Research Frontiers in Information Technology Vl.No. 1
2025
Kinded Pointcut Complexity Metric: A Cognitive Approach
Webology Vl.No. 0
2021
An Estimation Of Measuring The Complexity Of Advice Using Fuzzy Logic Technique,
Webology Vl.No. 9
2021
E-Illegal Voting Detector
Journal of MultiDimensional Research and Review (JMRR) Vl.No. 0
2021
Coal Mine Workers Smart Safety Nursing Security System
International Research Journal of Modernization in Engineering Technology and Science (IRJMETS) Vl.No. 0
2020
Study on Advancement on Android and its Versions
International Research Journal of Modernization in Engineering Technology and Science (IRJMETS) Vl.No. 0
2020
Aspect Oriented Programming - Cognitive Complexity Metric Analysis Tool
International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT) Vl.No. 3
2018
Design and Analysis of Aspect Oriented Metric CWCoAR using Cognitive Approach
Computing and Communication Technologies - IEEE Vl.No. 9
2017
Maintenance Effort Prediction Model using Aspect- Oriented Cognitive Complexity Metrics
International Journal of Advanced Research in Computer Science (IJARCS) Vl.No. 8
2017
Empirical Validation of DAAOMT using Maintenance Effort Prediction
International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) Vl.No. 7
2017
Design and Analysis of Aspect Oriented Metric CWCAE using Cognitive Approach
International Journal of Engineering Research &Technology (IJERT) Vl.No. 5
2016
Statistical Analysis of Pointcut Complexity Metric using Cognitive Approach
International Journal of Control Theory and Applications (IJCTA) Vl.No. 9
2016
Aspect Oriented Metrics A survey
International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT) Vl.No. 2
2015
Analysis of Measuring the Complexity of Advice using a Cognitive Approach
International Journal of Applied Engineering Research (IJAER) Vl.No. 10
2015
Dr.P.JOSEPH CHARLES
survey Analysis on Secured User Authentication through Biometric Recognition
International Conference on Disruptive Technologies Vl.No. 1
2024
A Study on SDN Based Load Balancing Techniques in IoT Network
International Conference on Disruptive Technologies Vl.No. 1
2024
Prediction of Learning Disabilities in School-Going Children Using Deep Learning Technique
International Conference on Disruptive Technologies Vl.No. 1
2024
DNASecured EdgeComputing for Heterogeneous IoT
Journal of Electrical Systems. Vl.No. 1
2024
Multi-objective nature inspired hybrid optimization algorithm to improve prediction accuracy on imbalance medical datasets
The scientific Temper Vl.No. 15(3)
2024
Comparative Analysis of Convolutional Neural Network Transfer Learning Models for Predicting Learning Diaability
Journal of Electrical Systems Vl.No. 1
2024
Homomorphic DNA Security in IoT EdgeData
International Research Journal of Multidiscipilinary Scope Vl.No. 0
2024
Survey Analysis on Secured User authentication Through Biometric Recognition
International Journal on Recent and Innovation Trends in Computing and Communication Vl.No. Volume: 11 Issue: 9
2023
A study on emerging approaches for cyber physical system security
International journal for innovative engineering and management research Vl.No. 12
2023
A Survey on Big Data Analytics: Tools, Issues and Challenges
Chinese Journal Of Computational Mechanics Vl.No. 5
2023
Secure Virtual Machine Migration using ANT colony Algorithm
IEEE Vl.No. 0
2021
Experimental Analysis Of Securing Context Aware Web Services
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vl.No. VOLUME 9, ISSUE 01
2020
STUDY ON SECURITY MANAGEMENT FOR PATIENT HEALTH RECORDS IN HEALTH CLOUD
The International journal of analytical and experimental modal analysis Vl.No. Volume XII, Issue I
2020
Semantic Survey on 6th Generation of Wireless Mobile Communication
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. Vol. 9, Issue 1, J
2020
Dynamic Resource Allocation For Cloud Computing Using Live Migration Of Virtual Machines
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 5 Issue 2
2019
INTRUSION DETECTION Mechanism in Data Mining
INTERNATIONAL JOURNAL FOR RESEARCH & DEVELOPMENT IN TECHNOLOGY Vl.No. 11(2)
2019
Proposed Multilevel Architecture for Securing Context Aware Mobile Web Services
The International journal of analytical and experimental modal analysis Vl.No. Volume XI, Issue IX
2019
BIG DATA CONCEPTS ANALYTICS ARCHITECTURES OVERVIEW
International Research Journal of Engineering and Technology Vl.No. 05
2018
Big Data Security an Overview
International Research Journal of Engineering and Technology (IRJET Vl.No. 05
2018
A Study on Three Service Model of Cloud Computing?, International Journal of Electrical Electronics & Computer Science Engineering
International Journal of Electrical Electronics & Computer Science Engineering Vl.No. 1
2018
Security Issues in Hybrid Cloud Computing
International Journal of Electrical Electronics & Computer Science Engineering Vl.No. 1
2018
Research Issues on Web Mining
International Journal of Computer Sciences and Engineering Vl.No. Volume-6, Special Issue-2
2018
Traffic Redundancy and Elimination Approach to Reduce Cloud Bandwidth and Costs
International Journal of Computer Sciences and Engineering Vl.No. Volume-6, Special Issue-2
2018
Towards Secure and Dependable Storage Services in Cloud Computing
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 4 Issue 3
2018
Implications of Big Data Analytics
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 3 Issue 5
2018
Private Cloud Computing Security Issues
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 4 Issue 6
2018
Data Security Using Authentication And Authorization In Cloud Computing
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 4 Issue 6
2018
An Architecture for Improving the QoS in Composite Web Service Selection
International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) Vl.No. Volume 4 Issue 9
2018
Survey on QoS Metrics in Web Services
International Journal of Science and Advance Research in Technology (IJSART) Vl.No. Volume 4 Issue 9
2018
Security Framework for Context Aware Mobile Web Services
International Conference on Computer Networks and Communication Technologies, Lecture Notes on Data Engineering and Communications Technologies Springer Nature Vl.No. 1
2018
IoT- New Perspectives and its Security
International Journal of Computer Sciences and Engineering (IJCSE) Vl.No. Vol.6, Special Issue.11
2018
Security Issues in Cloud Computing
International Journal of Emerging Trends in Science and Technology Vl.No. 04||Issue||06|
2017
Survey on Privacy Preservation in context aware web services
Indian Journal of Computer Science and Engineering (IJCSE) Vl.No. vol 6 Issue 6
2016
A CONTEXT-AWARE MULTI-AGENT SYSTEM AS A MIDDLEWARE FOR AMBIENT INTELLIGENCE
Roots International Journal of Multidisciplinary Researches Vl.No. 2
2016
An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services
International Journal of Computer Applications Vl.No. 146-15
2016
Security Issues in Web Services
International Research Journal of Engineering and Technology Vl.No. 3(5)
2016
Security Issues in Context Aware System
International Research Journal of Engineering and Technology Vl.No. 2(6)
2016
Security Issues on Composite Web Services
International Research Journal of Engineering and Technology Vl.No. 3(6)
2016
A Novel Security FAN SHAPECO Password on Social Networking Services
International Journal of Advent Research in Computer and Electronics (IJARCE Vl.No. 3(4)
2016
A Multi-Layered Secured Framework for Context-Aware Web Services in Health Care Industries
International Journal of Applied Engineering Research Vl.No. vol 10 Issue 82
2015
SURVEY PAPER ON MOBILE SOCIAL NETWORKS
International Research Journal of Engineering and Technology (IRJET) Vl.No. vol 2 Issue 6
2015
Security on Mobile Social Networks
International Journal of Advance Research in Computer Science and Management Studies Vl.No. vol 3 Issue 9
2015
CONTEXT-AWARE IN PRIVACY PRESERVATION FOR HEALTH CARE SYSTEMS
International Journal of Advanced Computer Technology (IJACT) Vl.No. vol 4 Issue 5
2015
SMIWBSN Security Mechanism in Web Based Social Network
IJETCCT2014 Vl.No. 1
2014
Automated Secured Disaster Recovery with Hyper-V Replica and PoweShell
IEEE CPS -- WCCCT2014 Vl.No. -
2014
Design of a secure architecture for context aware web services using access control mechanism
International conference on contemporary computing and informatics(IC3I) IEEE Vl.No. -
2014
A review on privacy control techniques in context-aware web services
International journal of advanced research in computer science & technology (IJARCST) Vl.No. vol 2 Issue 3
2014
Context-aware architecture for user access control
International journal of advanced research in computer science & technology (IJARCST) Vl.No. vol 2 Issue 3
2014
An architecture for securing hetrogeneous web services
International journal of advanced research in computer science & technology (IJARCST) Vl.No. vol 2 Issue 3
2014
A framework for privacy handler mechanism in context-aware web services
International journal of advanced research in computer science & technology (IJARCST) Vl.No. vol 2 Issue 3
2014
Extending Social Privacy protector for Twitter Social Network
CIIT Vl.No. 1
2013
A Context Aware System Based on Service Oriented Architecture
ICRTICA`13 Vl.No. 1
2013
Dr.K.MAHESWARAN
Maintainability Index Computation Based on Cyclomatic Complexity and Halstead Measure for Python
Mukt Shabd Journal Vl.No. IX Issue X
2020
Empirical Validation of CWICC and ICWCC Metrics using Maintenance Effort Estimation Model
Mukt Shabd Journal Vl.No. IX Issue XII
2020
Theoretical Validation of the Cognitive Complexity Metrics CWICC and ICWCC
International Conference on Advances in IoT, High Performance and Edge Computing (ICIHPE), Vl.No. -
2020
An interface based cognitive weighted class complexity measure for object oriented desigin
International Conference on Advances in Computer Science, Engineering and Technology, ICACSET-18 Vl.No. -
2018
Empirical Validation Of Object Oriented Cognitive Complexity Metrics Using Maintenance Effort Prediction
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. Vol. 7 Issue 4
2018
A Survey on Complexity Metrics in Object Oriented Design
SSICACR-2017 Vl.No. 1
2017
Predicting Maintainability with Object Oriented Metrics An Empirical Comparison
International Journal of Advanced Engineering and Global Technology Vl.No. 5
2017
Software Cognitive Complexity Metrics for OO Design: A Survey
International Journal of Scientific Research in Science, Engineering and Technology Vl.No. 3
2017
A Software Cohesion Metrics Survey
International Journal of Advanced Engineering and Global Technology Vl.No. 5
2017
An Analysis of Object Oriented Complexity Metrics
International Journal of Scientific Research in Computer Science, Engineering and Information Technology Vl.No. 2
2017
A Heuristics on Interface Complexity
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Vl.No. 6
2017
Cognitive Weighted Inherited Class Complexity Metric
Procedia Computer Science Vl.No. 125
2017
A Review on Component Based Software Metrics
International Journal of Fuzzy Mathematical Archive Vl.No. 7
2015
Dr.B.REX CYRIL
TEXT-BASED ENCRYPTION (TBEnc) TECHNIQUE TO SECURE DATA IN CLOUD STORAGE SERVER
Journal of Shanghai Jioatong University Vl.No. 16 issues10, October 2020
2020
SECON: SECURED CONFIDENTIALITY FRAMEWORK TO PROTECT DATA STORED IN PUBLIC CLOUD SYSTEMS
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTING SCIENCE Vl.No. Volume 6
2019
Hybrid Text and Value Based Ncryption and Obfuscation (Tvbencobfus) To Safeguard Data in Cloud Storage Server
International Journal of Innovative Technology and Exploring Engineering (IJITEE) Vl.No. 8
2019
Ant Colony Model (AnCoMoDaS) for Data Security in Cloud
International Research Journal of Engineering and Technology (IRJET Vl.No. 04 Issue
2017
DATA DIVISION IN CLOUD FOR SECURED DATA STORAGE USING RSA ALGORITHM
International Research Journal of Engineering and Technology (IRJET) Vl.No. 04 Issue
2017
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA) For Cloud Data Encoding, Encrypting and Forwarding
International e-Journal For Technology And Research Vl.No. 1
2017
Dynamic and Scalable Architecture for Accessing the Cloud Databases and Securing Cloud Services Using Public Key Infrastructure
International journal of scientific research in computer science, Engineering information technology(IJSRCSEIT) Vl.No. 2 ISSUE 6
2017
ENHANCED ELLIPTICAL CURVE CRYPTOGRAPHY BASED PKI FOR SECURE DATA STORAGE IN A CLOUD
International Journal of Applied Engineering Research,(IJAER) Vl.No. Vol. 10
2015
Cloud Computing Data Security Issues, Challenges, Architecture and Methods - A Survey
International Research Journal of Engineering and Technology (IRJET) Vl.No. 02
2015
Dr.J.ANTONY JOHN PRABU
D1FTBC FRAMEWORK FOR CLOUD DATA TRANSACTIONS
International Journal of Applied Engineering & Technology Vl.No. Vol. 5 No.4,
2023
An Integrated Architecture For Secured Cloud Data Transactions With Consistency Enhancements
Annals of R.S.C.B Vl.No. 25
2021
Performance of Proposed Architecture for Data Transactions in Cloud using D1FTBC
International Journal of Recent Technology and Engineering (IJRTE) Vl.No. 8
2019
Performance Analysis Of Proposed D1FTBC Approach For Improving Consistency In Cloud Data Transactions
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH Vl.No. 8
2019
Proposed Architecture for Improving Security and Consistency of Data Transactions in Cloud Database using Tree-Based Consistency Approach
International Journal of Computer Science and Information Security (IJCSIS) Vl.No. Vol. 15, No. 12,
2017
AN EFFICIENT DEPTH 1 FIXED TREE CONSISTENCY D1FTC METHOD FOR DISTRIBUTED DATA TRANSACTIONS IN CLOUD ENVIRONMENT
International Journal of Advanced Research in Computer Science Vl.No. Volume 8, No. 7,
2017
Issues and Challenges of Data Transaction Management in Cloud Environment
International Research Journal of Engineering and Technology (IRJET) Vl.No. Volume:02 Issue:04
2015
Proposed Architecture for Secure Distributed Data Transaction Management in Cloud Environment
International Journal of Applied Engineering Research - (IJAER) Vl.No. Vol. 10 No.82
2015
Dr.A.JENIFER JOTHI MARY
Machine Learning Algorithms for Predictive Maintenance in Industrial Internet of Things (IoT) Systems: A Case Study in Anomaly Detection
The Indian Journal of Technical Education Vl.No. 47
2024
Natural Language Processing for Sentiment Analysis on Social Media: Techniques and Applications in Brand Reputation Management
The Indian Journal of Technical Education Vl.No. 47
2024
Utilizing Finite Element Analysis for Structural Integrity Assessment in Bridge Design
The Indian Journal of Technical Education Vl.No. 47
2024
A novel approach for detection of diabetes patients using machine learning techniques
IEEE Explorer Vl.No. 0
2023
An Analysis On School Dropouts During Covid-19 Using Machine Learning Algorithms
Journal of Harbin Engineering University Vl.No. 44(11)
2023
Development of hybrid technology using Machine Learning and Block chain Technology to prevent from COVID 19 through the proper information gathering
IEEE Xplore Vl.No. 0
2023
Drowsiness Detection System Using the Movement of the Eye of A Human Through Machine Learning Algorithms in Order to Avoid Accidents
IEEE Xplore Vl.No. 0
2023
Efficiency of online classes in Tamil Nādu during Covid-19 lockdown: A statistical analysis
AIP Conference Proceedings Vl.No. 2418
2022
Security analysis of hybrid one time password generation algorithm for IoT data
AIP Conference Proceedings Vl.No. 2418(1)
2022
Aspect Based Sentiment Analysis of Students? Opinion Using Big Data Analytics
Our Heritage Journal Vl.No. 68
2020
An Analysis of The Status of The Women?s Career After Marriage Using Big Data Analytics
Our Heritage Journal Vl.No. 68
2020
A Survey on Data Analytics in Higher Education
International Journal of Scientific Research in Computer Science Applications and Management Studies Vl.No. 8(1)
2019
A FRAMEWORK FOR ASPECT BASED SENTIMENT ANALYSIS USING FUZZY LOGIC
ICTACT JOURNAL ON SOFT COMPUTING Vl.No. 8(2)
2018
KNOWLEDGE BASED IMPUTATION TECHNIQUE FOR NON OPINIONATED SENTENCES IN SENTIMENT ANALYSIS
International Journal of Current Advanced Research Vl.No. 7(3)
2018
FDSS: Fuzzy Based Decision Support System for Aspect Based Sentiment Analysis in Big Data
Advances in Computing and Data Sciences. ICACDS 2018. Communications in Computer and Information Science, Springer Vl.No. 906
2018
IMS: Imputation of Missing Sentiment in the Aspect Based Sentiment Analysis
Lecture Series in Communications in Computer and Information Science (Springer - in Press) Vl.No. 1
2017
ASFuL: Aspect based Sentiment Summarization using Fuzzy Logic
Proceedings of ICAMMAET? 2017 Vl.No. -
2017
A Methodology to Enhance the Accuracy of Aspect Level Sentiment Analysis using Imputation of Missing Sentiment
International Journal of Recent Scientific Research (IJRSFP) Vl.No. 8(7)
2017
Aspect based Parsing for Sentiment Analysis in Big Data
International Journal of Computer Science and Mobile Applications Vl.No. 5(12)
2017
Aspect Based Sentiment Analysis of Twitter Product Reviews Using Imputation of Missing Sentiment
Proceedings of International Conference on Advanced Techniques in Engineering, Science & Management (Advanced Techniques - 2017) Vl.No. 19
2017
Jen-Ton: A Framework to enhance the Accuracy of Aspect level Sentiment Analysis in Big Data
Proceedings of the International Conference on Inventive Computing and Informatics Vl.No. -
2017
ASFuL: Aspect based Sentiment Summarization using Fuzzy Logic
ICAMMAET Vl.No. 1
2017
A METHODOLOGICAL FRAMEWORK TO IDENTIFY THE STUDENTS` OPINION USING ASPECT BASED SENTIMENT ANALYSIS
International Journal of Engineering Research & Technology (IJERT) Vl.No. 5
2016
A Framework for Aspect level Sentiment Analysis of Academic Results Data
International Journal of Recent Trends in Engineering & Research (IJRTER) Vl.No. 2(7)
2016
Survey on Aspect Level Opinion Targets and Opinion Words from Online Reviews
International Journal of Information Technology and Mechanical Engineering IJITME Vl.No. 2-8
2016
A newfangled IoT big data parallel preprocessing framework to facilitate quality IoT big data analytics
IJERT Vl.No. 4(29)
2016
A methodology for identification on Flattery sentences in Sentence Level Classification
Fifth National Conference on Intelligent computing(FNCIC) Vl.No. -
2016
A Study on Basic Concepts of Big Data
ijetcct Vl.No. 1
2015
Issues and Challenges in Sentiment Analysis : A Survey
Misbah Niche of Knowledge Vl.No. 15
2015
Dr.S.JOSEPHINE THERESA
Class Based Oversampling with Integrated Bagging For Handling Data Imbalance In Sensitive Data
International Journal of Applied Engineering Research Vl.No. 06
2021
Feature Sub spacing Based Stacking For Effective Imbalance Handling In Sensitive Data
ICTACT -SOFT COMPUTING Vl.No. 12
2021
Classification of Diabetes Milletus Using Naive Bayes Algorithm
Springer Vl.No. 2021, Volume 1167
2020
A survey on Insight of Big Data
IJETAE Vl.No. volume 8
2018
Mrs.S.THULASI BHARATHI
Hybrid attention network-based students behavior data analytics framework with enhanced capuchin search algorithm using multimodal data
Social Network Analysis and Mining Vl.No. 13
2023
Survey on Online Shopping Websites Using Sentiment Analysis
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN COMPUTER AND COMMUNICATION ENGINEERING Vl.No. 9
2020
CLASSIFICATION LEVELS, APPROACHES,TOOLS,APPLICATIONS AND CHALLENGES IN SENTIMENTAL ANALYSIS- A SURVEY
INTERNATIONAL JOURNAL OF COMPUTER SCIENCES AND ENGINEERING Vl.No. 6
2018
A STUDY OF BIG DATA CHALLENGES AND ITS TECHNOLOGIES
Proceeding of National Conference on MOBILE TECHNOLOGIES, BIG DATA & DATA ANALYTICS Vl.No. -
2018
BIG DATA ? CONCEPTS, ANALYTICS, ARCHITECTURES ? OVERVIEW
International Research Journal of Engineering and Technology Vl.No. 05
2018
Dr.S.SATHYAPRIYA
Prediction of Heart Disease using AI?Enhanced Naive Ensemble Decision Classifier
International Journal of Business and Economics Research (IJBER): Vl.No. special issue
2025
Ms.M.MERLA AGNES MARY
Prediction of Rhabdomyosarcoma Using Transfer Learning on Pathology and Radiology Images
International Journal of Advanced Research in Computer and Communication Engineering Vl.No. 11(8)
2022
Heart Disease Prediction using Machine Learning Techniques: A Survey
International Journal for Research in Applied Science and Engineering Technology Vl.No. 8
2020
A Study on Three Service Model of Cloud Computing
International Journal of Electrical Electronics and Computer Science and Engineering Vl.No. 0
2018
IOT- New Perspectives and its Security
International Journal of Computer Sciences and Engineering Vl.No. 6
2018
Dr.J.HIRUDHAYA MARY ASHA
ExclusiveOR-Discrete Cosine Transform-A Chaotic Algorithm for Image Encryption and Decryption
Image Processing and Capsule Networks: ICIPCN 2020 Vl.No. 0
2022
The Appraised Structure for Improving Quality in the Compressed Image Using EQI-AC Algorithm
Image Processing and Capsule Networks: ICIPCN 2020 Vl.No. 1200
2022
Fuzzy probability based person recognition in smart environments
Journal of Intelligent & Fuzzy Systems Vl.No. 40
2021
Interoperability in smart living network?a survey
International Conference on Communication, computing and Electronics systems Vl.No. 0
2020
The internet of things (IoT) routing security?a study
International Conference on Communication, Computing and Electronics Systems Vl.No. 0
2020
Hiding Methods for Preventing Jamming attacks on wireless Networks
Intermational Journal of Scientific Research Publications Vl.No. 4
2014
Dr. K. SUBASH
Blockchain based Security Management of Internet of Medical Things (IoMT) using Homomorphic Encryption using Metaheuristics with a Deep Learning Model
International Conference on Trends in Quantum Computing and Emerging Business Technologies Vl.No. 0
2024
Oral Cancer Detections and Classification Using Region Based Convolutional Neural Network
International Conference on Trends in Quantum Computing and Emerging Business Technologies Vl.No. 0
2024
Predicting Cervical Cancer Using Deep Learning Mutation-based Atom Search Optimization (MASO) Algorithm
International Conference on Trends in Quantum Computing and Emerging Business Technologies Vl.No. 0
2024
Dr. SUNIL RAJ Y
Integrated Architecture to Enhance the Security in IoT Cloud Using ECC DNA
International Conference on Intelligent Computing Systems Vl.No. 0
2021
Security Enhancing Techniques for Data in IoT Cloud : Analysis
International Journal of Advances in Engineering and Management Vl.No. 3
2021
A Security Architecture for Cloud Data Using Hybrid Security Scheme
IEEE Xplore & Proceedings 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) Vl.No. 1
2021
An Integrated Secure Cloud Storage Architecture for Ensuring Integrity of Data using Hybrid Encryption Schemes in Cloud IoT Environment
Journal of Shanghai Jiaotong University Vl.No. 16
2020
DNA Based Hybrid Approach for Data Integrity on Integrated Cloud Based Smart Environment: An Analysis
International Journal of Scientific Development and Research Vl.No. 10
2020
ENHANCED TPA BASED DATA INTEGRITY MECHANISM FOR OBJECT STORAGE ARCHITECTURE ON INTEGRATEDIOT CLOUDSMART ENVIRONMENT
Journal of Shanghai Jiaotong University Vl.No. 16
2020
Taxonomy of Distributed Denial of Service Attacks and Popular Defense Mechanism using Integration of IoT and Cloud Environment
INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN SCIENCE, ENGINEERING AND TECHNOLOGY Vl.No. 8
2019
AN INTEGRATED ARCHITECTURE FOR IoT BASED DATA STORAGE IN SECURE SMART MONITORING ENVIRONMENT
International Journal of Scientific & Technology Research Vl.No. 8
2019
AN EFFECTIVE DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION MODEL IN INTEGRATION OF INTERNET OF THINGS AND CLOUD COMPUTING USING BINARY FIRE FLY OPTIMIZATION ALGORITHM
International Journal of Scientific & Technology Research Vl.No. 8
2019
Classification Based Analysis on Cancer Datasets Using Predictor Measures
Computer Engineering and Intelligent Systems Vl.No. 10
2019
Integrated Device Cloud Architecture for a Secure Cloud of Things Environment
International Journal of Recent Technology and Engineering Vl.No. 8
2019
ENHANCED CLOUD IDENTITY MANAGEMENT ENABLING SECURE ACCESS IN CROSS CLOUD ENVIRONMENT
ADALYA JOURNAL Vl.No. 8
2019
Predictive Analytics On Facebook Data
IEEE Vl.No. -
2016
Classification Analysis on Corpus Data
CiiT Data Mining and Knowledge Engineering Vl.No. 8, 5
2016
CLASSIFICATION ANALYSIS ON Medical Data
CiiT International Journal of Data Mining and Knowledge Engineering. Vl.No. 7
2015
Clustering methods and algorithms in data mining: Concepts and a study
JOURNAL OF COMPUTING TECHNOLOGIES Vl.No. 4, 7
2015
Novel Hybrid Technique Enhancing Data Privacy and Security
Springer IFIP and Proceedings 6th International Conference on Computer, Communication, and Signal Processing Vl.No. 651
22
Ms.SHERINE DOMINICK
Enhancing Moving Object Detection Through Frame Differential Summation for Efficient Analysis of Dynamic Scenes
IJCEE Vl.No. 12
2024
Artificial Intelligence enabled Traffic Monitoring System
Special Issue: International Journal of Business and Economics Research (IJBER) Vl.No. Special issue
2024
Video Analytics: A Quick Review
Journal of Emerging Technologies and Innovative Research Vl.No. 10
2023