Vincent Antony Kumar.A

Professor & Head
Department of Information Technology

  1. Ilangovan, S., Vincent Antony Kumar, A., S, "Effective and efficient ranking and re-ranking feature selector for healthcare analytics" in Intelligent Automation and Soft Computing, https://www.techscience.com/iasc/v26n2/39946, WoS, Vol.26, No.2,2020, pp.261-268, doi:10.31209/2019. 100000154. Sep 2020 (Scopus)
  2. S. Bhuvaneshwari, R. Karuppathal, A. Vincent Antony Kumar, N. Pandeeswari (2019). Wireless Sensor Network Based Under Water Pipeline Monitoring for Using Autonomous Under Water Vehicles. International Journal of Recent Technology and Engineering,7(6),608-612. (Scopus)
  3. Ilangovan, S., Vincent Antony Kumar, A. (2019). A Hybrid Feature Selection Method for Effective Data Classification in Data Mining Applications. International Journal of Grid and High-Performance Computing, 11(1):1-16. (Scopus)
  4. Sangaiah, I., Vincent Antony Kumar, A. Improving medical diagnosis performance using hybrid feature selection via relieff and entropy based genetic search (RF-EGA) approach: application to breast cancer prediction. Cluster Computing. vol. 22, 6899–6906 (2019). https://doi.org/10.1007/s10586-018-1702-5.
  5. Sabeetha, K., Vincent Antony Kumar, A., Muneeshwari, P., & Jeevitha, J. K. (2018). ErasureCoding Dependent Storage Aware Routing. International Journal of Mechanical Engineering and Technology, 9(11), 2226-2231. (Scopus)
  6. Sivakami, R., Vincent Antony Kumar, A. (2018). Fuzzy and Ant Colony Optimization based Trust Evaluation System for Cloud Environment. International Journal of Engineering and Technology, 7(4), 4335-4340. (Scopus)
  7. Vincent Antony Kumar, A. (2018). Intrusion Detection in Mobile Database Using Sequence Alignment. International Conference Advancements in Engineering and Technology, 1-8. (Scopus)
  8. Jaiganesh, M., Sivakami, R., & Vincent Antony Kumar, A. (2018). Secure isolation of cloud consumers legitimacy using fuzzy analytical hierarchy process (AHP). Journal of Analysis, 1-16
  9. Ilangovan, S., & Vincent Antony Kumar, A. (2018). An Improving Medical Diagnosis
    Performance using Hybrid Feature Selection via Relief and Entrophy based Genetic Search (RF EGA) Approach: Application to Breast Cancer Prediction. Journal of Cluster Computing, 1-8. (SCI)
  10. Jaiganesh, M., Mercy, S., Anupama, K., & Vincent Antony Kumar, A. (2016). Neuro Fuzzy ART Based User Behaviour Trust in Cloud Computing. Asian Journal of Information Technology, 15(18), 3461-3473. (Scopus)
  11. PushpaLakshmi, R., & Vincent Antony Kumar, A. (2015). Parallel key management scheme for mobile ad hoc network based on traffic mining. IET Information Security, 9 (1), 14-23. (SCI) 10. Sabeetha, K., Vincent Antony Kumar, A., Wahidabanu, R. S., & Othman, W. A. (2015). Encounter based fuzzy logic routing in delay tolerant networks. Wireless Networks, 21 (1), 173-185. (SCI)
  12. Muthupandi, G., & Vincent Antony Kumar, A. (2015). Fuzzy Logic Based Morphological Transformation for Image Enhancement. Journal of Computational and Theoretical Nanoscience, 12 (11), 4467-4472. (SCI)
  13. Vincent Antony Kumar, A. (2015). PS Fault Node Recovery Management in a Wireless Sensor Networks. 2nd IEEE International Conference on Inovations in Information, Embedded and Communication Systems, 1-10. (Scopus)
  14. Jaiganesh, M., Aarthi, M., & Vincent Antony Kumar, A. (2015). Fuzzy ART-Based User Behavior Trust in Cloud Computing. Advances in Intelligent Systems and Computing, 324(1), 341-348. (Scopus)
  15. Sabeetha, K., & Vincent Antony Kumar, A. (2015). Markov Prediction dependent Routing in Delay Tolerant Network. International Journal of Applied Engineering Research, 10 (5), 4052- 4055. (Scopus)
  16. Muthupandi, G., & Vincent Antony Kumar, A. (2015). Analysis of Morphology Based Block by Block Image Enhancement. International Journal of Applied Engineering Research, 10 (7), 16463-16474. (Scopus)
  17. PushpaLakshmi, R., & Vincent Antony Kumar, A. (2014). A fuzzy based secure QoS routing protocol using ant colony optimization for mobile Ad hoc Network. Journal of Intelligent & FuzzySystems, 27, 317–329. (SCI)
  18. Gomathi, R., & Vincent Antony Kumar, A. (2014). A Multiresolution Image Completion Algorithm for Compressing Digital Color Images. Journal of Applied Mathematics, 1 (1), 1-13. (Scopus)
  19. Gomathi, R., & Vincent Antony Kumar, A. (2014). An efficient multi-resolution video compression approach with inpainting algorithm. Research Journal of Applied Sciences, Engineering and Technology, 7 (20), 4313-4318. (Scopus)
  20. Gomathi, R., & Vincent Antony Kumar, A. (2014). Inpainting for satellite imagery using thin plate spline radial basis function neural networks in shearlet domain. Journal of Intelligent and FuzzySystems, 27 (5), 2391-2398. (Scopus)
  21. Ashok kumar, C., Jaiganesh, M., Vincent Antony Kumar, A., Arunkumar, M., & Jeganathan, J. (2014). Isolation of Cloud Virtual Machine vulnerabilities using Fuzzy ART. International Journal of Digital Content Technology and its Applications , 8 (3), 65-71. (Scopus)
  22. Pradeepa, P., Jaiganesh, M., Vincent Antony Kumar, A., & Karthiha Devi, M. (2014). Fuzzy Based Reactive Resource Pricing in Cloud Computing. Journal of Convergence Information Technology , 9 (6), 130-142. (Scopus)
  23. Sabeetha, K., & Vincent Antony Kumar, A. (2014). Routing in Delay Tolerant Network using Ant Colony Optimization. International Journal of Applied Engineering Research , 9 (23), 22565- 22573. (Scopus)
  24. Malathi, D., Sabeetha, K., & Vincent Antony Kumar, A. (2014). Routing in Opportunistic Network based on Erasure codes with buffer management. International Journal of Scientific & Engineering Research , 5 (5), 132-137.
  25. Jaiganesh, M., & Vincent Antony Kumar, A. (2013). B3: Fuzzy-Based Data Center Load Optimization in Cloud Computing. Mathematical Problems in Engineering, 1(1), 1-12. (SCI)
  26. Pavalarajan, S., & Vincent Antony Kumar, A. (2013). Prediction Based Object Recovery Using Sequential Monte Carlo Method. International Journal of Engineering and Technology , 5 (5), 4206 - 4213. (Scopus)
  27. Sangaiah, P., & Vincent Antony Kumar, A. (2013). Object recovery in prediction based network using multidimensional optimization technique. Information , 16 (11), 8243-8252. (Scopus)
  28. Sangaiah, P., & Vincent Antony Kumar, A. (2013). Prediction based object recovery using sequential Monte Carlo method. International Journal of Engineering and Technology , 5 (5), 4206-4213. (Scopus)
  29. Pavalarajan, S., & Vincent Antony Kumar, A. (2013). Object Recovery in Prediction Based Multidimensional optimization technique. International Information Institute , 16 (11), 8243 - 8252.
  30. Pavalarajan, S., & Vincent Antony Kumar, A. (2013). Prediction Based Object Recovery Using Bayesian Iterative Estimation. International Journal of Scientific & Engineering Research , 4 (5), 929-935.
  31. PushpaLakshmi, R., & Vincent Antony Kumar, A. (2013). Mobile agent based clustering and maintenance using secure routing protocol for mobile ad hoc network. International Journal of Physical Sciences , 8 (17), 793-802.
  32. Jaiganesh, M., & Vincent Antony Kumar, A. (2012). JNLP Based Secure Software as a Service Implementation in Cloud Computing. Verlag Berlin Heidelberg, 1(1), 495-504. (Scopus)
  33. Gomathi, R., & Vincent Antony Kumar, A. (2012). Shearlet domain color image inpainting based on p- laplacian operator. European Journal of Scientific Research , 67 (3), 413-420. (Scopus)
  34. Jaiganesh, M., & Vincent Antony Kumar, A. (2012). SOV2C2: Secure Orthogonal View of Virtualization in Cloud Computing. Smart Computing Review, 2(4), 278-285.

Venkatesh.R

Professor
Department of Information Technology

  1. Poobalan. A, Uma Maheshwari. N, Venkatesh. R ,”Cloud Computing Security for Electronic Healthcare Records Using Block-chain Model” in European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 2007-2014,Oct 2020,Scopus
  2. Kavitha S, Uma Maheswari N, Venkatesh R”An Intrusion Detection System- Techniques and Algorithms of Machine and Deep Learning” in International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9 Issue-10, August 2020,Scopus
  3. A.Sangeetha, Uma Maheshwari. N, Venkatesh. R “UNDERSTANDING AND ENABLING THE BEST CLUSTERING ALGORITHM FOR 5G-V2X COMMUNICATIONS” in International Journal of Advanced Research in Engineering and Technology (IJARET),10/1/2020,Scopus,DOI: 10.34218/IJARET.11.10.2020.161
  4. B.Karthika , N.Umamaheswari, R.Venkatesh “Traffic Flow Prediction Using An Improved Fuzzy Convolutional LSTM Algorithm” in Turkish Journal of Computer and Mathematics Education, 5541-5549, Vol.12 No.10 (2021), online: 28 April 2021
  5. B.Karthika, N.UmaMaheswari, R.Venkatesh, 2019. International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue- 9S2, July 2019. Pp-725-728.
  6. Venkatesh, R., Uma Maheshwari, N., & Jeyanthi, S. (2018). Multiple Criteria Decision Analysis Based Overlapped Latent Fingerprint Recognition System Using fuzzy Sets. International Journal of Fuzzy Systems. 20(6), 2016-2042. (SCI)
  7. B.karthika,Dr.N.Umamaheswari, Dr.R.Venkatesh(2019),’ A Research of Traffic Prediction using Deep Learning Techniques’ International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-8, Issue- 9S2.(Scopus)
  8. Venkatesh, R., Uma Maheshwari, N., & Jeyanthi, S. (2018). Multiple Criteria Decision Analysis Based Overlapped Latent Fingerprint Recognition System Using fuzzy Sets. International Journal of Fuzzy Systems. 20(6), 2016-2042. (SCI)
  9. Barakkath Nisha, U., Uma Maheswari, N., Venkatesh, R., & Yasir Abdullah, R. (2017). Fuzzy Based Flat Anomaly Diagnosis and Relief Measures in Distributed Wireless Sensor Network. International Journal of Fuzzy Systems , 19 (5), 1528-1545. (SCI)
  10. Kirubasri, G., Uma Maheswari, N., & Venkatesh, R. (2017). A Robust Intra-Cluster Communication For Wireless Multimedia Sensor Networks Using Link Quality Analysis. International Journal of Pure and Applied Mathematics , 117 (8), 149-154. (Scopus)
  11. Vetrithangam, D., Uma Maheswari, N., & Venkatesh, R. (2017). Content Based Image Retrieval Based On Low Level Features Using Genetic Algorithm With k-means Clustering. International Journal of Pure and Applied Mathematics , 117 (8), 31-35. (Scopus)
  12. Punitha, A., Uma Maheshwari, N., & Venkatesh, R. (2017). Thermal-aware and low-power high level synthesis using intensive flow-graph algorithm. Journal of Computational and Theoretical Nanoscience , 14 (3), 1487-1492. (Scopus)
  13. Sasikala, V., UmaMaheswari, N., & Venkatesh, R. (2016). Fuzzy Logic Recursive Gaussian Denoising of Color Video Sequences via Shot Change Detection. Circuits and Systems, 7, 1560- 1568. (Scopus)
  14. Vetrithangam, D., Uma Maheswari, N., & Venkatesh, R. (2016). Dynamic Content - Based Image Search And Retrieval By Combining Low Level Features. International Journal of Advanced Engineering Technology , VII (II), 898 - 906.
  15. Jeyanthi, S., Uma Maheswari, N., & Venkatesh, R. (2015). An Efficient Automatic Overlapped Fingerprint Identification and Recognition Using ANFIS Classifier. International Journal of Fuzzy Systems , 1 - 16. (SCI)
  16. Jeyanthi, S., Uma Maheswari, N., & Venkatesh, R. (2015). Neural network based automatic fingerprint recognition system for overlapped latent images. Journal of Intelligent &Fuzzy Systems , 28, 2889 - 2899. (SCI)
  17. Barakkath Nisha, U., Uma Maheswari, N., Venkatesh, R., & Yasir Abdullah, R. (2015). Improving Data Accuracy Using Proactive Correlated Fuzzy System in Wireless Sensor Networks. KSII Transactions On Internet And Information Systems , 9 (9), 3515 - 3538. (Scopus)
  18. Jeyanthi, S., Uma Maheswari, N., & Venkatesh, R. (2015). An Efficient Adaptive Neuro-Fuzzy Inference System Based Overlapped Fingerprint Classification. International Journal of Applied Engineering Research, I , 10 (5), 3995-4000. (Scopus)
  19. Kirubasri, G., Uma Maheswari, N., & Venkatesh, R. (2015). A Cluster Based- Reliable Routing for Wireless Multimedia Sensor Network. International Journal of Applied Engineering Research, I , 10 (5), 4014-4020. (Scopus)
  20. Rama Subramanian, S., & Venkatesh, R. (2015). DOOR - Dynamic Opportunistic On Demand Routing for Cognitive Radio Self Organizing Networks. International Journal of Applied Engineering Research , 10 (20), 15802 - 15807. (Scopus)
  21. Anchitaalagammai, J. V., UmaMaheswari, N., & Venkatesh, R. (2015). Impact of Malicious Nodes in Mobile Adhoc Networks. International Journal of Applied Engineering Research , 10 (3), 7777-7788. (Scopus)
  22. Sasikala, V., UmaMaheswari, N., & Venkatesh, R. (2014). An Overview of Pixel Domain and Wavelet Domain Filters for Video Denoising. Asian Journal of Information Technology , 13 (5), 267-273.(SCI)
  23. Barakkath Nisha, U., Uma Maheshwari, N., Venkatesh, R., & Yasir Abdullah, R. (2014). Statistical Based Outlier Detection In Data Aggregation For Wireless Sensor Networks. Journal of Theoretical and Applied Information Technology , 59 (3), 770-780. (Scopus)
  24. Vetrithangam, D., Uma Maheswari, N., & Venkatesh, R. (2014). Signature Based Mining Framework For Event Sequences And Its Applications In Healthcare Data Using Language Model. Journal of Theoretical and Applied Information Technology , 59 (1), 167-171. (Scopus)
  25. Balasubramani, P., Sivakami, R., Uma Maheswari, N., & Venkatesh, R. (2014). Performance of Secure Selective Jamming System in Wireless Sensor Networks. International Journal of Advanced Research in Computer Science and Software Engineering , 4 (3), 852-857.
  26. Barakkath Nisha, U., UmaMaheswari, N., Venkatesh, R., & Yasir Abdullah, R. (2014). Robust Factor Based Anomaly Detection in Hierarchical Wireless Sensor Networks. Anale. Seria Informatică , 12 (2), 15-21.
  27. Hemalatha, A., & Venkatesh, R. (2014). Improving Reliability in Heterogeneous Wireless Sensor Networks. International Journal of Advanced and Innovative Research , 3 (4), 314-319.
  28. Priya, V., & Venkatesh, R. (2014). Mitigating Flood Attacks in Disruption Tolerant Networks. International Journal of Scientific Research in Computer Science Applications and Management Studies , 3 (2), 1 - 4.
  29. Krishnamoorthy, G., Uma Maheshwari, N., & Venkatesh, R. (2013). Hardware Based Security For Cloud Computing - A New Perspective. Jokull Journal , 63 (8), 12-15. (SCI)
  30. Jeyanthi, S., Uma Maheswari, N., & Venkatesh, R. (2013). Human Identification using Dental Biometrics. International Journal of Advanced Engineering and Global Technology , 1 (5), 317- 323.
  31. Mariammal, G., Uma Maheshwari, N., venkatesh, R., & Lakshmanan, P. (2013). Implementation of Secret Delegation for Secured Attribute Based Access Control In Cloud Computing. International Journal Of Engineering And Computer Science , 2 (4), 986-990.
  32. Raghini, M., Uma Maheshwari, N., & Venkatesh, R. (2013). Overview On Key Distribution Primitives In Wireless Sensor Network. Journal of Computer Science , 9 (5), 543-550.
  33. Jeyanthi, S., Uma Maheshwari, N., & Venkatesh, R. (2012). An Efficient Automatic Fingerprint Recognition System for Overlapped Images-Survey. International Journal of Soft Computing , 7 (5), 235-241. (SCI)
  34. Kumar, I. V., Jeyanthi, S., Uma Maheshwari, N., & Venkatesh, R. (2012). Vascular Segmentation of Interstitial Pneumonia Patterns in Lung using MDCT. International Journal of Computer Science and Information Technology & Security , 2 (1), 66-71.
  35. Jose, J. S., Sivakami, R., Uma Maheshwari, N., & Venkatesh, R. (2012). An Efficient Diagnosis of Kidney Images Using Association Rules. International Journal of Computer Technology and Electronics Engineering , 2 (2), 14-20.

Ganesh kumar.P

Professor
Department of Information Technology

Anandaraj, M., Selvaraj, K., Ganeshkumar, P., Rajkumar, K., Sriram, K.“Genetic Algorithm Based Resource Minimization in Network Code Based Peer-to-Peer Network” in Journal of Circuits Systems and Computers,11/1/2020,Wos,Doi.org/10.1142/S0218126621500924.

2.Vijayakumar, K. P., Ganeshkumar, P., Anandaraj, M., Selvaraj, K., & Sivakumar, P. (2018). Fuzzy Logic Based Jamming Detection Algorithm for Cluster based Wireless Sensor Network. International Journal of Communication Systems , 1-10. (SCI)

3.K.Selvaraj, D.Judson, P. Ganeshkumar, & Anandaraj, M(2020). Low Complexity Linear Detection for Uplink multiuser MIMO SC-FDMA Systems. Wireless Personal Communication, 112(8), DOI: 10.1007/s11277-020-07065-z

4.Anandaraj, M, Ganeshkumar, P, Vijayakumar, KP & Selvaraj (2019). An Efficient Framework for Network Code Based Multimedia Content Distribution in Hybrid P2P Network. Journal of Circuits, Systems, and Computers. Journal of Circuits, Systems and Computers Vol. 29, No. 10, 2050157 (2020)1-14. https://doi.org/10.1142/S0218126620501571

5.Rajkumar Krishnan, Ganeshkumar Perumal H2B2H protocol for addressing link failure in WSN, July 2019, Cluster Computing 22(7):1-10, DOI:10.1007/s10586-017-1355-9

6.Vijayakumar, K. P., Ganeshkumar, P., Anandaraj, M., Selvaraj, K., & Sivakumar, P. (2018). Fuzzy Logic Based Jamming Detection Algorithm for Cluster based Wireless Sensor Network. International Journal of Communication Systems, 1-10. (SCI)

7.Jaiganesh, M., Sivakami , R., & Vincent Antony Kumar, A. (2018). Secure isolation of cloud consumers legitimacy using fuzzy analytical hierarchy process (AHP). Journal of Analysis, 1-16.

8. Rajkumar, K., & Ganeshkumar, P. (2017). H2B2H protocol for addressing link failure in WSN. Cluster Computing (Springer) , 1-10. (SCI)

9. Sivakumar, P., & Ganeshkumar, P. (2017). An efficient automated methodology for detecting and segmenting the ischemic stroke in brain MRI images. International Journal of Imaging Systems and Technology , 27 (3), 265-272. (SCI)

10. Sivakumar, P., & Ganeshkumar, P. (2017). CANFIS based glioma brain tumor classification and retrieval system for tumor diagnosis. International Journal of Imaging Systems and Technology , 27 (2), 109-117. (SCI)

11. Ganeshkumar, P., Selvaraj, K., Anandaraj, M., & Vijayakumar, K. P. (2016). Iterative nonlinear detection for SFBC SC–FDMA uplink MIMO transmission systems. International Journal Of Communication Systems , 29 (6), 1568-1581. (SCI)

12. Ganeshkumar, P., Vijayakumar, K. P., & Anandaraj, M. (2016). A novel jammer detection framework for cluster-based wireless sensor networks. EURASIP Journal on Wireless Communications and Networking , 35 (1), 1-25. (SCI)

13. Selvaraj, K., Ganeshkumar, P., & Anandaraj, M. (2016). Iterative MMSE equalization and CFO compensation for the uplink SC-FDMA transmission. International Journal Of Communication Systems , 29 (9), 1323-1337. (SCI)

14. Pandeeswari, N., & Ganeshkumar, P. (2016). Adaptive neuro fuzzy based anomaly detection system in cloud. International journal of Fuzzy Systems , 18 (3), 367 - 378. (SCI)

15. Pandeeswari, N., & Ganeshkumar, P. (2016). Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mobile Networks and Applications , 21 (3), 494 - 505. (SCI)

16. Bhavithra, S. K., Vijayakumar, K. P., & Ganeshkumar, P. (2016). A Robust Approach for Jamming Attack Detection in VANET. Middle-East Journal of Scientific Research , 24 (1), 83-89. (Scopus)

17. Gokulakrishnan, P., & Ganeshkumar, P. (2015). . Road accident prevention with instant emergency warning message dissemination in vehicular ad-hoc network. PLOS ONE , 1 (1), 1- 36. (SCI)

18. Ganeshkumar, P., & Gokulakrishnan, P. (2015). Emergency Situation Prediction Mechanism: A Novel Approach for Intelligent Transportation System Using Vehicular Ad Hoc Networks. The Scientific World Journal , 1 (1), 1-13. (SCI)

19. Ganeshkumar, P., & Gokulakrishnan, P. (2015). Heavy Secured Routing Protocol: A Secured Routing Protocol for Wireless Networks. Journal of Computational and Theoretical Nanoscience , 12 (1), 1086–1095. (SCI)

20. Vijayakumar, K. P., Ganeshkumar, P., & Anandaraj, M. (2015). A Novel Jamming Detection Technique for Wireless Sensor Networks. KSII Transactions On Internet And Information Systems , 9 (10), 4223-4249. (SCI)

21. Anandaraj, M., Ganeshkumar, P., Vijayakumar, K. P., & Selvaraj, K. (2015). An Efficient Framework for Large Scale Multimedia Content Distribution in P2P Network: I2NC. The Scientific World Journal , 1 (1), 1-13. (Scopus)

22. Pandeeswari, P., & Ganeshkumar, P. (2015). Detection of denial of service attack in cloud using fuzzy time series analysis and EM algorithm. International Journal of Advancements in Computing Technology , 7 (5), 25-36. (Scopus)

23. Pandeeswari, N., & Ganeshkumar, P. (2015). A Neuro Fuzzy based Intrusion Detection System for a Cloud Data Center using Adaptive Learning. Cybernetics and Information Technologies , 15 (3), 88-103. (Scopus)

24. Rajkumar, K., Ganeshkumar, P., Nithya Prabha, G., & Sakthivelmurugan, V. (2015). Enhancing Performance of Localization Using SJFR Algorithm. ARPN Journal of Engineering and Applied Sciences , 10 (7), 2802-2807. (Scopus)

25. Rajkumar, K., Ganeshkumar, P., Sakthivelmurugan, V., & Nithya Prabha, G. (2015). Improving Performance of Localization Using EN-SJFR AlgorithmK. International Journal of Applied Engineering Research , 10 (17), 13503-13508. (Scopus)

26. Sivakumar, P., & Ganeshkumar, P. (2015). Privacy-Preserving Data Integrity checking by using Secured Public Auditing on Cloud Storage. Australian Journal of Basic and Applied Sciences , 9 (20), 640-643. (Scopus)

27. Backialakshmi, M., Sathya Sofia, A., & Ganeshkumar, P. (2015). A Novel Approach Towards Designing Framework And Scheduling Algorithm For Cloud Datacenters. International Journal of Applied Engineering Research , 10 (5), 3916-3921. (Scopus)

28. Prasanth, A., & Ganeshkumar, P. (2015). Enhancing The Network Lifetime Using Energy Based Gateway Patrolling In Wireless Sensor Networks. International Journal of Applied Engineering Research , 10 (1), 705-710. (Scopus)

29. Sathya Sofia, A., & Ganeshkumar, P. (2015). Implementation of energy efficient green computing in cloud computing. International Journal Enterprise Network Management , 6 (3), 1-16. (Scopus)

30. Sharanya, R., & Vijayakumar, K. P. (2015). Peer to Peer Privacy Preserving Content Distribution. International Journal of Engineering Research in Computer Science and Engineering , 2 (5), 103-105.

31. Gokulakrishnan, P., & Ganeshkumar, P. (2014). BEAM: Bandwidth Efficient Acknowledgement Based Multicasting Protocol For Sub-Urban Scenario in VANET. Journal of Theoretical and Applied Information Technology , 67 (1), 201-211. (Scopus)

32. Vijayakumar, K. P., Ganeshkumar, P., & Anandaraj, M. (2014). Jamming Detection System in Wireless Sensor Networks. International Journal of Advanced Research in Computer Engineering& Technology , 3 (4), 1369-1372.

33. Anandaraj, M., Ganeshkumar, P., & Vijayakumar, K. P. (2013). An Efficient QOS Based Multimedia Content Distribution Mechanism in P2P Network. International Journal of Advanced Research in Computer Science and Software Engineering , 3 (5), 452-457.

34. Vijayakumar, K. P., Ganeshkumar, P., & Anandaraj, M. (2013). Performance Improved Graph Based Scheduling Algorithm for Infrastructure based Cognitive Radio Networks. International Journal of Information Technology Infrastructure , 2 (2), 9-14.

35. Pandeeswari, N., Ganeshkumar, P., & Rubini, P. (2013). A Serial Based Encryption for Enhanced Access Control in Cloud Computing. International Journal of Engineering and Advanced Technology (IJEAT) , 2 (4), 1-3.

36. Pandeeswari, N., Ganeshkumar, P., & Sivakami, R. (2013). Data hiding knowledge by modestly extending database. International Journal of Advanced and Innovative Research , 2 (11), 760- 764.

37. Anandaraj, M., Ganeshkumar, P., & Vijayakumar, K. P. (2012). An Efficient Framework for QoS Based Multicasting for Large Scale Multimedia Content Distribution. International Journal of Electronics and Computer Science Engineering , 1 (3), 1781-1790.

38. Vijayakumar, K. P., Ganeshkumar, P., & Anandaraj, M. (2012). Review on Routing Algorithms in Wireless Mesh Networks. International Journal of Computer Science and Telecommunications , 3 (5), 87-92.

39. Pandeeswari, N., Ganeshkumar, P., & Sivakami, R. (2012). Data Integrity Maintenance in Dynamic Cloud Data Storage. International Journal of Computer Science Engineering and Technology , 2 (3), 929-932.


Pavalarajan.S

Professor
Department of Information Technology

1.Priyadharshini P, S Pavalarajan, K Suresh ”NOVEL ENERGY CONSUMPTION USING OPTIMIZED GENETIC MACHINE (OGA) LEARNING TECHNIQUES” in Journal of Critical Reviews, JCR. 2020; 7(13): 4474-4484, doi: 10.31838/jcr.07.13.681

2.Pavalarajan, S, Jeffin Gracewell, J,(2019). 'Fall detection based on posture classification for smart home environment', Journal of Ambient Intelligent Human Computing, 2019. pp 1-8. https://doi.org/10.1007/s12652-019-01600-y (Science Citation Indexed )

3.Pavalarajan.S and A. Prasanth , 'Implementation of Efficient Intra- and Inter-Zone Routing for Extending Network Consistency in Wireless Sensor Networks', Journal of Circuits, Systems and Computers, 2019. https://doi.org/10.1142/S0218126620501297. (Science Citation Indexed)

4. A. Prasanth, S.Pavalarajan, M.Karthihadevi, G.Sasi.(2019),’Particle Swarm Optimization Algorithm Based Zone Head Selection In Wireless Sensor Networks’,INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH ,8(9),1594-1597. (Scopus)

5. Pavalarajan.S, Prasanth.A, " Zone-based sink mobility in wireless sensor networks", Sensor Review, Vol. 39 No. 6, pp. 874-880,2019. https://doi.org/10.1108/SR-11-2018-0310 (Science Citation Indexed )

6. Pavalarajan.S,Kiruthikka.D. C.,Kalaiarasan.C,'A novel approach on transport information system for pre-defined routes using traffic estimation framework and open layer JS 'International Journal of Engineering &Technology, Vol.8 (3 ),pp.230 -239, 2019. (Scopus Indexed)

7. Prasanth, A., Pavalarajan, S., & Karthiha Devi, M. (2018). Sink Mobility Analysis in Wireless Sensor Networks. Journal of Advanced Research in Dynamical and Control Systems.9(17), 2097-2108. (Scopus)

8. Sasikala, N., Pavalarajan, S., Prasanth, A., & Karuppathal, R. (2018). Current Research Impacts in Wireless Sensor Networks . International Journal of Engineering and Technology, 7(3.20), 579-583. (Scopus)

9. Prasanth, A., & Pavalarajan, S. (2017). Energy Optimization Analysis in Wireless Sensor Network. Journal of Advances in Natural and Applied Sciences.11(7), 642-648.

10. Karthiha Devi, M., & Pavalarajan, S.,(2017). Sleep Schedule Strategies in Wireless Sensor Networks. Journal of Advances in Natural and Applied Sciences. 11(7), 635-641.

11. Aanandhadurgadevi, T., & Pavalarajan, S. (2016). Addressing Data Aggregation Issues in Wireless Sensor Network. Middle-East Journal of Scientific Research , 158 - 165. (Scopus)

12. Pavalarajan, S., & Thirumurugan, P. (2016). Prediction Based Location Estimation in Wireless Sensor Network. Asian Journal of Information Technology , 15 (2), 191 - 198. (Scopus)
13. Manojitha, K., & Pavalarajan, S. (2015). Mobile Target Tracking Using EETT Algorithm in Wireless Sensor Network. International Journal of Applied Engineering Research , 10 (20), 16367 - 16371. (Scopus)

14. Pavalarajan, S., & Krishna moorthy, R. (2014). Swarm intelligence based on locaiton estimation for wireless sensor network. Applied Mechanics and Materials Research , 1 (1), 1-6. (Scopus)

15. Krishnamoorthy, R., & Pavalarajan, S. (2014). Energy Consumption Analysis Using Optimization Technique in Cluster Based Wireless Sensor Network. International Journal of Research in Information Technology , 2 (4), 564-569.

16. Pavalarajan, S., & Vincent Antony Kumar, A. (2013). Prediction Based Object Recovery Using Sequential Monte Carlo Method. International Journal of Engineering and Technology , 5 (5), 4206 - 4213. (Scopus)

17. Pavalarajan, S., & Vincent Antony Kumar, A. (2013). Object Recovery in Prediction Based Multidimensional optimization technique. International Information Institute , 16 (11), 8243 - 8252.

18. Pavalarajan, S., & Vincent Antony Kumar, A. (2013). Prediction Based Object Recovery Using Bayesian Iterative Estimation. International Journal of Scientific & Engineering Research , 4 (5), 929-935.


Muthumayil.K

Professor
Department of Information Technology

1.K.Muthumayil, R.Karuppathal, T.Jayasankar,B.Aruna devi, NB Prakash, S.Sudhakar “A big data Analytical Approach for Prediction of Cancer Using Modified KNN Algorithm” in Journal of Medical Imaging and health informatics,9/1/2020,Scopus,SCI

2.Krishnan Muthumayil, Thangaiyan Jayasankar , Nagappan Krishnaraj , Mohamed Yacin Sikkandar , Prakash Nattanmai Balasubramanian and Chokkalingam Bharatiraja “Maximizing Throughput in Wireless Multimedia Sensor Network using Soft Computing Techniques” in Intelligent Automation and Soft Computing ,IASC, 2021, vol.27, no.3,DOI:10.32604/iasc.2021.012462,10/1/2020,Scopus

3.Muthumayil K, Jayasankar T, Krishnaraj N, Mohamed Yacin Sikkandar, Prakash N B, Bharatiraja C,Maximizing Throughput in Wireless Multimedia Sensor Network using soft computing techniques. Intelligent Automation and Soft Computing, Vol 27, No.3, pp 771-784, 2021. (SCI)

4.M Buvana, K Muthumayil and T.Jayasankar,"Content Based Image Retrieval based on Hybrid Feature Extraction and Feature Selection Technique Pigeon Inspired based Optimization. Annals of the Romanian Society for Cell Biology. Vol 25, Issue 1, pp. 424-443, 2021. (Scopus)

5. K.Muthumayil,R.Bhaskaran,R.Sudha,.J.V.Anchita Alagammai,(2020), SERA: A Circular Path Clustering Approach for Wireless Sensor Network, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 01, JANUARY 2020.(Scopus)

6. Muthumayil, K., Manikandan, S., Rajamani, V., & Buvana, M. (2018). A Multipath Low Overhead Routing Protocol for Healthcare Industry ubder Wireless Sensor Networks. Journal of Web Engineering , 17 (6), 2270-2299. (SCI)

7. Buvana, M., Suganthi, M., & Muthumayil, K. (2016). Linear discriminant analysis-based service discovery algorithm in MANET. International Journal of Internet Protocol Technology , 9 (2/3), 90-99. (SCI)

8. Revathi, V., Buvana, M., Satheesh Kumar, R., & Muthumayil, K. (2015). Survey of Load Balancing and Service Discovery for Mobile Ad hoc Networks. International Journal of Advanced and Innovative Research , 4 (3), 33 - 36.

9. Muthumayil, K., Manikandan, S., & Rajamani, V. (2014). NCBEERP: A New Clustering Protocol For Improving Energy Efficiency For Wireless Sensor Networks. Journal of Theoretical and Applied Information Technology , 67 (1), 228 - 235. (Scopus)

10. Muthumayil, K., Manikandan, S., & Rajamani, V. (2014). Detection and Prevention of Malicious Nodes ON and OFF the Route in Wireless Sensor Networks. International Journal of Applied Engineering Research , 9 (23), 22523 - 22538. (Scopus)

11. Muthumayil, K., & Buvana, M. (2014). A Cross Layered Energy based On-Demand Routing Protocol for MANETs. International Journal of Engineering Associates , 3 (10), 64 - 69.

12. Muthumayil, K., & Buvana, M. (2014). Energy Efficient Security Framework and Mitigation of Black Hole Attack for Mobile Ad- Hoc Networks. International Journal of Engineering Research & Technology , 3 (6), 654 - 661.

13. Buvana, M., Suganthi, M., & Muthumayil, K. (2014). Effective Load Balancing Method In Ad Hoc Network Using PSO. International Journal of Mobile Network Communications & Telematics , 4 (5), 45 - 54.

14. Buvana, M., Suganthi, M., & Muthumayil, K. (2013). Secured position based Grid Location Service for MANET Using SGF. International Journal of Scientific Research in Network Security and Communication , 1 (1), 16 - 21.

15. Muthumayil, K., Chitty Babu, M., & Senthil Kumar, P. (2013). Modified Secure Associativity Based Routing. International Journal of Advanced and Innovative Research , 2 (5), 35 - 45.

16. Muthumayil, K., Rajamani, V., Manikandan, S., & Buvana, M. (2012). Performance analysis of reference point group mobility model, random mobility models in associativity based Long Lived Routing(ABR) Protocol. Elixir , 1 (46), 8494 - 8497.

17. Antony, B., & Muthumayil, K. (2012). Ad Hoc Cross Layered Energy based Multihop Routing Protocol. International Journal of Computer Applications , 6-11.

18. Buvana, M., & Muthumayil, K. (2012). A Novel Architecture of Heterogeneity based Dynamic Load Balancing for DHT Based P2P System. International Journal of Advanced Research in Computer Science , 3 (5).


Karuppathal.R

Professor
Department of Information Technology

1.K.Muthumayil, R.Karuppathal, T.Jayasankar,B.Aruna devi, NB Prakash, S.Sudhakar “A big data Analytical Approach for Prediction of Cancer Using Modified KNN Algorithm” in Journal of Medical Imaging and health informatics,9/1/2020,Scopus,SCI

2.R. KARUPPATHAL”Impact of Augmented Reality Education on Students Interactivity” in International Journal of Pharmaceutical Research,0975-2366,https://doi.org/10.31838/ijpr/2021.13.02.126,1/1/2021,Scorpus.

3.N Pandeeswari, R Sivakami, R Karuppathal, N Sasikala, J Suhashini(2020) Discovering Malicious Insiders In And Around Cloud Systems Based On Hypervisor Technology. Journal of Critical Reviews. Vol. 7, Issue. 19, 2020 ( Scopus)

4.Pandeeswari N, Sivakami R & Karuppathal (2020). Developing Secure Cloud Storage Through Quantum Secure Socket Layer Protocol. International Journal for Research in Engineering Application & Management, 5(12), 57-162.

5.S. Bhuvaneshwari, R. Karuppathal, A. Vincent Antony Kumar, N. Pandeeswari (2019). Wireless Sensor Network Based Under Water Pipeline Monitoring For Using Autonomous Under Water Vehicles. International Journal of Recent Technology and Engineering,7(6),608-612.(Scopus)

6. Sasikala, N., Pavalarajan, S., Prasanth, A., & Karuppathal, R. (2018). Current Research Impacts in Wireless Sensor Networks . International Journal of Engineering and Technology, 7(3.20), 579-583. (Scopus)

7. Pandeeswari, N., & Karuppathal, R. (2017). Hypervisor Based Anomaly Detection System in Cloud Computing Using ANFIS. Journal of Internet Technology , 18 (6), 1335-1344. (SCI)

8. Karuppathal, R., & Palanisamy, V. (2015). An Automotive Approach for Brain Tumor Segmentation Based on Gaussian Distribution and Level Set Method. Current Medical Imaging Reviews , 10 (1), 1-7. (SCI)

9. Karuppathal, R., & Palanisamy, V. (2014). Brain Tumor Detection And Classification Of Normal, Abnormal In MRI Images. Journal of Theoretical and Applied Information Technology , 68 (3), 541-550. (Scopus)

10. Karuppathal, R., & Palanisamy, V. (2014). Fuzzy Based Automatic Detection And Classification Approach For MRI-Brain Tumor. ARPN Journal of Engineering and Applied Sciences , 9 (12), 2770-2779. (Scopus)

11. Karuppathal, R., & Palanisamy, V. (2013). Hybrid GA- SVM for feature selection to improve Automatic Bayesian classification of Brain MRI Slice. Life Science Journal , 10 (2), 2273-2280. (SCI)


ushpalakshmi.R

Professor
Department of Information Technology

1.L. Amudha, R.Pushpalakshmi. ”Security enhancement in open and closed environment with Video analytics and Deep learning” in International Journal of Advanced Science and Technology, 29(7), 3499-3502.

2.Amudha L and Pushpalakshmi R “Applications, Analytics, and Algorithms—3 A’s of Stream Data: A Complete Survey” in Intelligence in Big Data Technologies—Beyond the Hype,Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1167).

3.M.Hemalatha , V.Malini , C.P.Thamilselvi , R.Pushpalakshmi, R.Ganesh “Cloud Based Secured Health Care Monitoring With Prompt Notification Using Connected Devices” in European Journal of Molecular&ClinicalMedicine,ISSN 2515-8260, Volume 07, Issue 06, 2020.
4.Pradeepa, P., PushpaLakshmi, R. Violation Detection in Service Level Agreement to Ensure the Privacy in Cloud Community using Chicken Spider Monkey Optimization-Based Deep Belief Network. Wireless Pers Commun 117, 1659–1683 (2021).

5.P.Pradeepa, R. PushpaLakshmi (2021). Violation Detection in Service Level Agreement to Ensure the Privacy in Cloud Community using Chicken Spider Monkey Optimization.Based Deep Belief Network.Wireless Personal Communications, 117 ,1659-1683

6.L. Amudha, R. Pushpalakshmi, “Scalable and Reliable Deep Learning Model to handle real-time Streaming Data” , International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-9 Issue-3, February, 2020.pp-3840-3844

7.B Mathan Kumar, and R PushpaLakshmi, (2020), “An Approach for Image Search and Retrieval by Cluster-Based Indexing of Binary MKSIFT Codes”, The Computer Journal, (https://doi.org/10.1093/comjnl/bxz145) (Scopus)

8. Pradeepa Parthiban, and R PushpaLakshmi, (2019), “Multi-objective constraint and hybrid optimisation-based VM migration in a community cloud”, IET Computers & Digital Techniques, 14(1), 37-45.

9. J. Arul Sindiya, and R. Pushpalakshmi, (2019), “Job Scheduling In Cloud Computing Based On Adaptive Job Size Based Queuing Process”, International Journal of Advanced Science and Technology, 28(9).

10. Mathan Kumar, B., & Pushpalakshmi, R. (2018). Multiple kernel scale invariant feature transform and cross indexing for image search and retrieval. Imaging Science Journal , 66 (2), 84-97. (SCI)
11. Arul Sindiya, J., & Pushpalakshmi, R. (2018). Different Types of Review Approaches in Load Balancing Techniques in Cloud Computing Environment. International Journal of Engineering & Technology , 7 (3.1), 106-109. (Scopus)

12. Castro, S., & Pushpalashmi, R. (2018). A Review on Latest Technologies in Big Data Analysis. International Journal of Engineering &Technology , 7 (3.1), 93-97. (Scopus)

13. Pradeepa, P., & Pushpalashmi, R. (2018). A Novel Model for Optimal Selection of Resource Providers for Outsourcing in Communal Cloud. International Journal of Pure and Applied Mathematics, 119 (7), 653-662. (Scopus)

14. Castro, S., & Pushpalakshmi, R. (2017). A Survey on Big Data Security and Related Techniques to Improve Security. Journal of Applied Science and Technology , 1 (5), 113-116.

15. Mathankumar, M., & Pushpalakshmi, R. (2017). Redundant bit based classification for large scale images. Advances in Natural and Applied Sciences , 11 (3), 211-215.

16. Nithya lakshmi, K., Keerthana, A., & Puspalakshmi, R. (2017). Handwriting Analysis Based Human Personality Prediction Using Sugeno Fuzzy Model. International Journal of Scientific & Engineering Research , 8 (5), 105-110.

17. PushpaLakshmi, R. (2016). Data Security in Cloud computing using Fuzzy Logic and Mining. International Journal of Advanced and Innovative Research , 5 (12), 1-5.

18. PushpaLakshmi, R., & Vincent Antony Kumar, A. (2015). Parallel key management scheme for mobile ad hoc network based on traffic mining. IET Information Security , 9 (1), 14-23. (SCI)

19. PushpaLakshmi, R., & Vincent Antony Kumar, A. (2014). A fuzzy based secure QoS routing protocol using ant colony optimization for mobile Ad hoc Network. Journal of Intelligent & Fuzzy Systems , 27, 317–329. (SCI)

20. John, J., & PushpaLakshmi, R. (2014). A Load Balancing Energy Efficient and Optimized Clustering in Mobile Ad hoc Network using Ant Colony Optimization. International Journal of Information Technology and Electrical Engineering , 3 (1), 34-39.

21. Achankunju, M., & PushpaLakshmi, R. (2013). Quality Of Service Based Secure Clustering For Mobile Adhoc Networks. International Journal of Information Technology and Electrical Engineering , 2 (3), 7-12.

22. PushpaLakshmi, R., & Vincent Antony Kumar, A. (2013). Mobile agent based clustering and maintenance using secure routing protocol for mobile ad hoc network. International Journal of Physical Sciences , 8 (17), 793-802.

23. Firthouse, S., & PushpaLakshmi, R. (2012). A Supporting Efficient and Dynamic Multicasting Over Multiple Regions. International Journal of Computer Science & Communication Networks , 2 (1), 65-73.


Selvaraj.K

Professor
Department of Information Technology

1.Anandaraj, M., Selvaraj, K., Ganeshkumar, P., Rajkumar, K., Sriram, K.“Genetic Algorithm Based Resource Minimization in Network Code Based Peer-to-Peer Network” in Journal of Circuits Systems and Computers,11/1/2020,Wos,Doi.org/10.1142/S0218126621500924

2.K. Selvaraj, M. Anandaraj, K. Ramesh,and Rajkumar Krishnan, "Iterative SIC algorithm based detection for multiuser MIMO SC-FDMA uplink system," in Materials Today: Proceedings,2021, (online) https://doi.org/10.1016/j.matpr.2021.02.190, impact factor 0.576 February2021 (Scopus Indexed)

3.Subramaniam. G ,P.Vidhyalakshmi, S Allirani ,S.Sivaranjani , B.Gunapriya ,K Selvaraj . (2021). Policy Approximations toward PV-Storage Energy Management Systems Using Machine Learning. Annals of the Romanian Society for Cell Biology, 2769–2781,Volume 25: Issue 3, Retrieved from http://annalsofrscb.ro/index.php/journal/article/view/1744,3/1/2021,Scopus.

4. Rajkumar Krishnan, Ganeshkumar Perumal, K, Selvaraj, Anandaraj, M, A.Sangeetha April 2020 Energy-Efficiency in WSN Based on SCMC Protocol, In book: Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies p.123-131.

5.K.Selvaraj, Judson, D., P.Ganeshkumar and M.Anandaraj (2020) “Low Complexity Linear Detection for Multiuser MIMO SC-FDMA Uplink System ”,Wireless Personal Communication (Springer), published online, doi.org/10.1007/s11277-020-07065-z.(SCI)

6.Anandaraj, M, Ganeshkumar, P, Vijayakumar, KP & Selvaraj (2019). An Efficient Framework for Network Code Based Multimedia Content Distribution in Hybrid P2P Network. Journal of Circuits, Systems, and Computers. Journal of Circuits, Systems and Computers Vol. 29, No. 10, 2050157 (2020)1-14. https://doi.org/10.1142/S0218126620501571

7. Judson, D., Bhaskar, V., & Selvaraj, K. (2018). Pre-equalization Schemes for MIMO CC-CDMA Systems Over Frequency-Selective Fading Channels. Wireless Personal Communication (Springer) , 98 (1), 1587-1603.(SCI)

8. Vijayakumar, K. P., Ganeshkumar, P., Anandaraj, M., Selvaraj, K., & Sivakumar, P. (2018). Fuzzy Logic Based Jamming Detection Algorithm for Cluster based Wireless Sensor Network. International Journal of Communication Systems, 1-10. (SCI)

9. Selvaraj, K., Ganeshkumar, P., & Anandaraj, M. (2016). Iterative MMSE equalization and CFO compensation for the uplink SC-FDMA transmission. International Journal Of Communication Systems , 29 (9), 1323-1337. (SCI)

10. Ganeshkumar, P., Selvaraj, K., Anandaraj, M., & Vijayakumar, K. P. (2016). Iterative nonlinear detection for SFBC SC–FDMA uplink MIMO transmission systems. International Journal Of Communication Systems , 29 (6), 1568-1581. (SCI)

11. Anandaraj, M., Ganeshkumar, P., Vijayakumar, K. P., & Selvaraj, K. (2015). An Efficient Framework for Large Scale Multimedia Content Distribution in P2P Network: I2NC. The Scientific World Journal , 1 (1), 1-13. (Scopus)

12. Senthil kumar, P., Chitty babu, M., & Selvaraj, K. (2015). Measure of image enhancement by parameter controlled histogram distribution using color image. International Journal of Innovative Science, Engineering & Technology , 2 (4), 268-272.

13. Pritika, P., & Selvaraj, K. (2015). Energy Efficient Data Gathering In Cluster Based Wireless Sensor Networks. International Journal of Applied Engineering Research , 10 (20), 18843- 18848.

14. Selvaraj, K., Alice Margaret, M., & Ganeshkumar, P. (2014). Low Complexity CFO Compensation Scheme for SC-FDMA Uplink System. International Journal of Innovative Research in Science, Engineering and Technology , 3 (3), 2411-2416.


Anandaraj.M

Professor
Department of Information Technology

1.Anandaraj, M., Selvaraj, K., Ganeshkumar, P., Rajkumar, K., Sriram, K.“Genetic Algorithm Based Resource Minimization in Network Code Based Peer-to-Peer Network” in Journal of Circuits Systems and Computers,11/1/2020,Wos,Doi.org/10.1142/S0218126621500924

2.K. Selvaraj, M. Anandaraj, K. Ramesh,and Rajkumar Krishnan, "Iterative SIC algorithm based detection for multiuser MIMO SC-FDMA uplink system," in Materials Today: Proceedings,2021, (online) https://doi.org/10.1016/j.matpr.2021.02.190, impact factor 0.576 February2021 (Scopus Indexed)

3.Selvaraj, Judson, D., P.Ganeshkumar and M.Anandaraj(2020) “Low Complexity Linear Detection for Multiuser MIMO SC-FDMA Uplink System ”,Wireless Personal Communication (Springer), published online, doi.org/10.1007/s11277-020-07065-z.(SCI)

4.Rajkumar Krishnan, Ganeshkumar Perumal, K, Selvaraj, Anandaraj, M, A.Sangeetha April 2020 Energy-Efficiency in WSN Based on SCMC Protocol,In book: Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies p.123-131.

5.Anandaraj, M, Ganeshkumar, P, Vijayakumar, KP & Selvaraj (2019). An Efficient Framework for Network Code Based Multimedia Content Distribution in Hybrid P2P Network. Journal of Circuits, Systems, and Computers. Journal of Circuits, Systems and Computers Vol. 29, No. 10, 2050157 (2020)1-14. https://doi.org/10.1142/S0218126620501571

6. Vijayakumar, K. P., Ganeshkumar, P., Anandaraj, M., Selvaraj, K., & Sivakumar, P. (2018). Fuzzy Logic Based Jamming Detection Algorithm for Cluster based Wireless Sensor Network. International Journal of Communication Systems , 1-10. (SCI)

7. Selvaraj, K., Ganeshkumar, P., & Anandaraj, M. (2016). Iterative MMSE equalization and CFO compensation for the uplink SC-FDMA transmission. International Journal Of Communication Systems , 29 (9), 1323-1337. (SCI)

8. Ganeshkumar, P., Selvaraj, K., Anandaraj, M., & Vijayakumar, K. P. (2016). Iterative nonlinear detection for SFBC SC–FDMA uplink MIMO transmission systems. International Journal Of Communication Systems , 29 (6), 1568-1581. (SCI)

9. Ganeshkumar, P., Vijayakumar, K. P., & Anandaraj, M. (2016). A novel jammer detection framework for cluster-based wireless sensor networks. EURASIP Journal on Wireless Communications and Networking , 35 (1), 1-25. (SCI)

10. Anandaraj, M., Muthupandi, G., & Sivakumar, P. (2016). A Survey, Study and Review on Performance Improvements in P2P Content Distribution Network. Journal of Network Communications and Emerging Technologies , 6 (12), 30-34.

11. Karthika, R., Anandaraj, M., & Vijayakumar, K. P. (2015). Efficient Content Distribution Mechanism In Peer To Peer Networks. International Journal of Applied Engineering Research , 49 (10), 1-6. (Scopus)

12. Anandaraj, M., Ganeshkumar, P., Vijayakumar, K. P., & Selvaraj, K. (2015). An Efficient Framework for Large Scale Multimedia Content Distribution in P2P Network: I2NC. The Scientific World Journal , 1 (1), 1-13. (Scopus)

13. Vijayakumar, K. P., Ganeshkumar, P., & Anandaraj, M. (2014). Jamming Detection System in Wireless Sensor Networks. International Journal of Advanced Research in Computer Engineering& Technology , 3 (4), 1369-1372.

14. Anandaraj, M., Ganeshkumar, P., & Vijayakumar, K. P. (2013). An Efficient QOS Based Multimedia Content Distribution Mechanism in P2P Network. International Journal of Advanced Research in Computer Science and Software Engineering , 3 (5), 452-457.

15. Vijayakumar, K. P., Ganeshkumar, P., & Anandaraj, M. (2013). Performance Improved Graph Based Scheduling Algorithm for Infrastructure based Cognitive Radio Networks. International Journal of Information Technology Infrastructure , 2 (2), 9-14.

16. Anandaraj, M., Ganeshkumar, P., & Vijayakumar, K. P. (2012). An Efficient Framework for QoS Based Multicasting for Large Scale Multimedia Content Distribution. International Journal of Electronics and Computer Science Engineering , 1 (3), 1781-1790.

17. Vijayakumar, K. P., Ganeshkumar, P., & Anandaraj, M. (2012). Review on Routing Algorithms in Wireless Mesh Networks. International Journal of Computer Science and Telecommunications , 3 (5), 87-92.


Bhaskaran.R

Associate Professor
Department of Information Technology

1. S.C. Dharmadhikari, Veerraju Gampala, Ch. Mallikarjuna Rao, Syed Khasim, Shafali Jain, R. Bhaskaran” A smart grid incorporated with ML and IoT for a secure management system” Microprocessors and Microsystems, Vol.83, June 2021.

2. K.Muthumayil,R.Bhaskaran,R.Sudha,.J.V.Anchita Alagammai, (2020), SERA: A Circular Path Clustering Approach for Wireless Sensor Network, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 01, JANUARY 2020. (Scopus)

3.R.Adhi Lakshmi, P.Priyadharshini, R.Bhaskaran (2019),’ Research on Achieving Data Security with the Cloud Computing Adoption Framework’, International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-8, Issue- 6S4

4.Bhaskaran, R., Muthupandi, G., & Senthilkumar, P. (2018). A Mathematical Model to Predict and Optimize the Gas Metal Arc Hardfaced Stelite 6 Weldbead on Low Carbon Steel. International Journal of Mechnanical Engineering and Technology, 9 (12), 1-8. (Scopus)

5.Bhaskaran, R., & Saranraj, S. (2016). LOS Based Link Classification for UWSN using Binary Evalution Theorm. Asian Journal of Information Technology , 15 (20), 3938-3942.

6.Sudha, R., & Bhaskaran, R. (2013). Proxy Server Based Data and Service Accessing In Mobile Devices. International Journal of Emerging Research in Management &Technology , 2 (11), 46- 51.

7.Bhaskaran, R., & Parthasarathy, V. (2012). An Improved Performance Analysis Of Priority Scheduling Algorithm In Modified Ad Hoc Grid Layer. International Journal of Distributed and Parallel Systems , 3 (1), 241-248.


Sivakami.R

Associate Professor
Department of Information Technology

1.Sivakami Raja, S Gokul Pran, N Pandeeswari, P Kiruthiga, D Nithya, G Muthupandi “Contemporary PCA and NBA based Cloud Intrusion Detection System” in EAI Endorsed Transactions on Energy Web Received 2021-01-27,Accepted 2021-02-07,Published 2021-02- 19,Publisher EAI,http://dx.doi.org/10.4108/eai.19-2-2021.168727

2.N.Pandeeswari, K,Sridar, Sivakami Raja, R.Revathi, P.Rajalakshmi, T.Anand kumar “Discovery of Malicious Intruders in Cloud environment violating service level agreements” in Annals of the romanian society for cell biology,ISSN:1583-6258,Vol. 25, Issue 4, 2021, Pages.200-211, http://annalsofrscb.ro/index.php/journal/article/view/2453

3.Sivakami Raja, N.Pandeeswari, C.Kotteeswari, M.Mohanasundari, K.Mohanapriya (2021). Trust Appraisal of Cloud Services using Cloud - Analytic Hierarchy Process. Annals of the Romanian Society for Cell Biology, 8375–8385. Retrieved from http://annalsofrscb.ro/index.php/journal/article/view/3547

4. N Pandeeswari, R Sivakami, R Karuppathal, N Sasikala, J Suhashini(2020) Discovering Malicious Insiders In And Around Cloud Systems Based On Hypervisor Technology. Journal of Critical Reviews. Vol. 7, Issue. 19, 2020 ( Scopus)

5.Pandeeswari N, Sivakami R & Karuppathal (2020). Developing Secure Cloud Storage Through Quantum Secure Socket Layer Protocol. International Journal for Research in Engineering Application & Management, 5(12), 57-162.

6. Sivakami, R., Vincent Antony Kumar, A. (2018). Fuzzy and Ant Colony Optimization based Trust Evaluation System for Cloud Environment. International Journal of Engineering and Technology, 7(4), 4335-4340. (Scopus)

7. Jaiganesh, M., Sivakami , R., & Vincent Antony Kumar, A. (2018). Secure isolation of cloud consumers legitimacy using fuzzy analytical hierarchy process (AHP). Journal of Analysis, 1-16.

8. Sivakami, R., & Saravanan, R. (2017). An Efficient Fuzzy-based Hybrid System to Cloud
Intrusion Detection. International Journal of Fuzzy Systems , 19 (1), 62-77. (SCI)

9. Sivakami, R., Jaiganesh, M., & Saravanan, R. (2017). An Efficient Fuzzy Self-Classifying Clustering based Framework for Cloud Security. International Journal of Computational Intelligence Systems , 10 (1), 495-506. (SCI)

10. Sivakami, R., & Saravanan, R. (2016). Performance Comparison of Neuro-Fuzzy Cloud Intrusion Detection Systems. The International Arab Journal of Information Technology , 13 (1A), 142- 149. (SCI)

11. Sivakami, R., & Saravanan, R. (2016). 2S-FAT based DLS Model for Cloud Environment. Arabian Journal for Science and Engineering , 41 (8), 3099-3112. (Scopus)

12. Sivakami, R., & Saravanan, R. (2016). CCDEA: Consumer and Cloud – DEA Based Trust Assessment Model for the Adoption of Cloud Services. Cybernetics and Information Technologies , 16 (3), 52-69. (Scopus)

13. Feby, C., & Sivakami, R. (2014). A Cost Effective Approach for Privacy Preservation in Cloud. International Journal of Engineering Research and Technology , 3 (2), 1738-1741.

14. Saravanan, R., Sivakami, R., & Feby, C. (2014). A Novel Approach for Ensuring Cost Effective Privacy in Cloud. International Journal of Computer Science, Information Technology &Security , 4 (3), 61-66.

15. Pandeeswari, N., Ganesh Kumar, P., & Sivakami, R. (2013). Data hiding knowledge by modestly extending database. International Journal of Advanced and Innovative Research , 2 (11), 760- 764.

16. Sivakami, R., & Saravanan, R. (2013). Deployment of Computing Clusters in MultiCloud Environment for MTC Applications. International Journal of Computer Trends and Technology , 4 (4), 519-522.

17. Sivakami, R., Saravanan, R., & Pandeeswari, N. (2012). Ensuring Privacy and Preventing Silent Data Corruptions in Cloud. International Journal of Computer Science Engineering and Technology , 2 (2), 903-907.

18. Pandeeswari, N., Ganesh Kumar, P., & Sivakami, R. (2012). Data Integrity Maintenance in Dynamic Cloud Data Storage. International Journal of Computer Science Engineering and Technology , 2 (3), 929-932.


Sabeetha.K

Associate Professor
Department of Information Technology

1.K.SABEETHA, M.Saleem “Machine Learning and Echocardiogram” in Journal of Critical Reviews, JCR 2020;7(15):5879-5882,http://dx.doi.org/10.31838/jcr.07.15.760

2.K.Sabeetha, P. Pradeepa, P. Muneeshwari(2019),’A Study On Research Trends In Deep Learning In Various Engineering Fields’, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH ,8(9),1591-1593.(Scopus)

3. Sabeetha, K., Vincent Antony Kumar, A., Muneeshwari, P., & Jeevitha, J. K. (2018). Erasure Coding Dependent Storage Aware Routing. International Jour nal of Mechanical Engineering and Technology, 9(11), 2226-2231. (Scopus)

4. Saleem, M., Priya, S., Pradeep, M., & Sabeetha, K. (2017). A study on the prevalence of chronic obstructive pulmonary disease among adults in Madurai, Tamil Nadu. International Journal of Community Medicine and Public Health , 4 (11), 4113-4119.

5. Saleem, M., Shankar, K., & Sabeetha, K. (2016). A population-based cross-sectional study on consanguineous marriages in rural Tamil Nadu, India. International Journal of Medical Science and Public Health , 5 (4), 730-734.

6. Sabeetha, K., Vincent Antony Kumar, A., Wahidabanu, R. S., & Othman, W. A. (2015). Encounter based fuzzy logic routing in delay tolerant networks. Wireless Networks , 21 (1), 173-185. (SCI)

7. Benasir, H., & Sabeetha, K. (2015). Evaluation Of Communication Overhead In IDDR Using Interference Aware Path Selection In WSN. International Journal of Applied Engineering Research , 10 (5), 3964-3968. (Scopus)

8. Sabeetha, K., & Vincent Antony Kumar, A. (2015). Markov Prediction dependent Routing in Delay Tolerant Network. International Journal of Applied Engineering Research , 10 (5), 4052- 4055. (Scopus)

9. Saleem, M., Shankar, K., & Sabeetha, K. (2015). Socio-economic profile and risk factors among pulmonary tuberculosis patients in Madurai, India: a cross sectional study. International Journal of Research in Medical Sciences , 3 (12), 3490-3498.

10. Sabeetha, K., & Vincent Antony Kumar, A. (2014). Routing in Delay Tolerant Network using Ant Colony Optimization. International Journal of Applied Engineering Research , 9 (23), 22565- 22573. (Scopus)

11. Malathi, D., Sabeetha, K., & Vincent Antony Kumar, A. (2014). Routing in Opportunistic Network based on Erasure codes with buffer management. International Journal of Scientific & Engineering Research , 5 (5), 132-137.

12. Geetha, K., Sabeetha, K., & Sangeetha, A. (2013). A Power-Aware Cooperative Caching Technique for MANET. International Journal of Advanced and Innovative Research , 2 (11), 351-356.

13. Pradeepa, S., Satheesbabu, K., & Sabeetha, K. (2012). Automation of Template and Data Extraction from Dynamic Web Documents. CiiT International Journal of Data Mining Knowledge Engineering , 4 (12), 664-669.

14. Sabeetha, K., & Sheela Angeline, P. (2012). Call Admission Control to improve QoS in MANETs. International Journal of Computer Science & Engineering Technology , 2 (3), 943-948.


Pandeeswari.N

Associate Professor
Department of Information Technology

1.Sivakami Raja, S Gokul Pran, N Pandeeswari, P Kiruthiga, D Nithya, G Muthupandi “Contemporary PCA and NBA based Cloud Intrusion Detection System” in EAI Endorsed Transactions on Energy Web Received 2021-01-27,Accepted 2021-02-07,Published 2021-02- 19,Publisher EAI,http://dx.doi.org/10.4108/eai.19-2-2021.168727

2.N.Pandeeswari, K,Sridar, Sivakami Raja, R.Revathi, P.Rajalakshmi, T.Anand kumar “Discovery of Malicious Intruders in Cloud environment violating service level agreements” in Annals of the romanian society for cell biology,ISSN:1583-6258,Vol. 25, Issue 4, 2021, Pages.200-211, http://annalsofrscb.ro/index.php/journal/article/view/2453

3. Sivakami Raja, N.Pandeeswari, C.Kotteeswari, M.Mohanasundari, K.Mohanapriya (2021). Trust Appraisal of Cloud Services using Cloud - Analytic Hierarchy Process. Annals of the Romanian Society for Cell Biology, 8375–8385. Retrieved from http://annalsofrscb.ro/index.php/journal/article/view/3547

4. N Pandeeswari, R Sivakami, R Karuppathal, N Sasikala, J Suhashini(2020) Discovering Malicious Insiders In And Around Cloud Systems Based On Hypervisor Technology. Journal of Critical Reviews. Vol. 7, Issue. 19, 2020 ( Scopus)

5.Pandeeswari N, Sivakami R & Karuppathal (2020). Developing Secure Cloud Storage Through Quantum Secure Socket Layer Protocol. International Journal for Research in Engineering Application & Management, 5(12), 57-162.

6. S. Bhuvaneshwari, R. Karuppathal, A. Vincent Antony Kumar, N. Pandeeswari(2019). Wireless Sensor Network Based Under Water Pipeline Monitoring For Using Autonomous Under Water Vehicles. International Journal of Recent Technology and Engineering,7(6),608-612.(Scopus)

7. Pandeeswari, N., & Karuppathal, R. (2017). Hypervisor Based Anomaly Detection System in Cloud Computing Using ANFIS. Journal of Internet Technology , 18 (6), 1335-1344. (SCI)

8. Pandeeswari, N., & Ganeshkumar, P. (2016). Adaptive neuro fuzzy based anomaly detection system in cloud. International journal of Fuzzy Systems , 18 (3), 367 - 378. (SCI)

9. Pandeeswari, N., & Ganeshkumar, P. (2016). Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mobile Networks and Applications , 21 (3), 494 - 505. (SCI)

10. Pandeeswari, P., & Ganeshkumar, P. (2015). Detection of denial of service attack in cloud using fuzzy time series analysis and EM algorithm. International Journal of Advancements in Computing Technology , 7 (5), 25-36. (Scopus)

11. Pandeeswari, N., & Ganeshkumar, P. (2015). A Neuro Fuzzy based Intrusion Detection System for a Cloud Data Center using Adaptive Learning. Cybernetics and Information Technologies , 15 (3), 88-103. (Scopus)

12. Pandeeswari, N., Ganeshkumar, P., &Jeyaseelan, R. (2014). Resolving large and Complex Matrix Factorization Problem using Cloud Platform as a Service. International Journal of Engineering Sciences & Research Technology , 3 (4), 1-6.

13. Pandeeswari, N., Ganeshkumar, P., & Rubini, P. (2013). A Serial Based Encryption for Enhanced Access Control in Cloud Computing. International Journal of Engineering and Advanced Technology (IJEAT) , 2 (4), 1-3.

14. Pandeeswari, N., Ganeshkumar, P., & Sivakami, R. (2013). Data hiding knowledge by modestly extending database. International Journal of Advanced and Innovative Research , 2 (11), 760- 764.

15. Pandeeswari, N., Ganeshkumar, P., & Sivakami, R. (2012). Data Integrity Maintenance in Dynamic Cloud Data Storage. International Journal of Computer Science Engineering and Technology , 2 (3), 929-932.

16. Sivakami, R., Saravanan, R., & Pandeeswari, N. (2012). Ensuring Privacy and Preventing Silent Data Corruptions in Cloud. International Journal of Computer Science Engineering and Technology , 2 (2), 903-907.


Sudha.R

Associate Professor
Department of Information Technology

1.K.Muthumayil, R.Bhaskaran, R.Sudha,. J.V.Anchita Alagammai,(2020), SERA: A Circular Path Clustering Approach for Wireless Sensor Network. INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 01, JANUARY 2020. (Scopus)

2.R.SUDHA, ”E-Commerce Production Profit Enhancement by Customer Behavior Analysis on Social Network data” in Solid State Technology, Vol 63 No 6 (2020), 12/1/2020 .Scopus

3.R.SUDHA “A Reliable Energy Efficient Data Aggregation Algorithm for Wireless Sensor Network” in International Journal of Innovative Technology and Exploring Engineering (IJITEE) Jul -2020,DOI: 10.35940/ijitee.J7429.079920 ,Scopus

4.Sudha R, Sasikala N, Senthil Kumar P, Jeganathan J “A Reliable Energy Efficient Data Aggregation Algorithm for Wireless Sensor Network" in International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9 Issue-9, July 2020,DOI: 10.35940/ijitee.J7429.079920

5. Raihana, A., & Sudha, R. (2016). AFDGA: Defect Detection and Classification of Apple Fruit Images using the Modified WatershedSegmentation Method. International Journal of Science Technology& Engineering , 3 (6), 75-85.

6. Saranya, K., & Sudha, R. (2015). Secure And Energy Efficient Wireless Transmission In Big Data. International Journal of Applied Engineering Research , 10 (5), 3939-3944. (Scopus)

7. Sudha, R., & Jeyanthi, S. (2014). An Efficient Automatic Cross Document Text Summarization using Genetic Algorithm. International Journal of Advanced and Innovative Research , 3 (11), 287-290.

8. Vanishree, M., & Sudha, R. (2014). Retrieving Information using Context Based Indexing Approach. International Journal of Advanced and Innovative Research , 3 (4), 129-132.

9. Sudha, R., & Bhaskaran, R. (2013). Proxy Server Based Data and Service Accessing In Mobile Devices. International Journal of Emerging Research in Management &Technology , 2 (11), 46- 51.

10. Lloyd Singh, G., Melbern Parthido, M., & Sudha, R. (2012). Embedded based Implementation: Controlling of Real Time Traffic Light using Image Processing. International Journal of Computer Applications , 1 (1), 20-23.

11. Suchitra, A., & Sudha, R. (2012). Extraction of Semantic Biomedical Relations from Medline Abstracts using Machine Learning Approach. International Journal of Computer Applications , 1 (1), 1-4.


Rajkumar.K

Assistant Professor
Department of Information Technology

1.Anandaraj, M., Selvaraj, K., Ganeshkumar, P., Rajkumar, K., Sriram, K.“Genetic Algorithm Based Resource Minimization in Network Code Based Peer-to-Peer Network” in Journal of Circuits Systems and Computers,11/1/2020,Wos,Doi.org/10.1142/S0218126621500924

2.K. Selvaraj, M. Anandaraj, K. Ramesh,and Rajkumar Krishnan, "Iterative SIC algorithm based detection for multiuser MIMO SC-FDMA uplink system," in Materials Today: Proceedings,2021, (online) https://doi.org/10.1016/j.matpr.2021.02.190, impact factor 0.576 February2021 (Scopus Indexed)

3.Rajkumar Krishnan, Ganeshkumar Perumal, K, Selvaraj, Anandaraj, M, A.Sangeetha April 2020 Energy-Efficiency in WSN Based on SCMC Protocol,In book: Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies p.123-131.

4.Babu P, Rajkumar N, Palaniappan S, Pushparaj T, Development Of RBF Image Processing Techniques For Graves’ Disease, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 03, MARCH 2020 pp. 2038-2041

5.Rajkumar Krishnan, Ganeshkumar Perumal H2B2H protocol for addressing link failure in WSN, July 2019, Cluster Computing 22(7):1-10, DOI:10.1007/s10586-017-1355-9

6. M. Robinson Joel, V. Ebenezer, N. Karthik, K. Rajkumar, Advance Dynamic Network System of Internet of Things, International Journal of Recent Technology and Engineering (IJRTE) ISSN:

7.Sakthivelmurugan, V., Vimala, R., & Rajkumar, K. (2017). Thershold Max Method for Load Balancing in Cloud Computing. Asian Journal of research in social sciences and Humanities , 7 (2), 640-650

8. Rajkumar, K., & Ganeshkumar, P. (2017). H2B2H protocol for addressing link failure in WSN. Cluster Computing (Springer) , 1-10. (SCI)

9. Sakthivelmurugan, V., Rajkumar, K., & Jancyrani Malli, M. (2016). Romino in Android. International Journal of Recent Trends in Engineering &Research , 2 (12), 69-73.

10. Rajkumar, K., Ganeshkumar, P., Nithya Prabha, G., & Sakthivelmurugan, V. (2015). Enhancing Performance of Localization Using SJFR Algorithm. ARPN Journal of Engineering and Applied Sciences , 10 (7), 2802-2807. (Scopus)

11. Rajkumar, K., Ganeshkumar, P., Sakthivelmurugan, V., & Nithya Prabha, G. (2015). Improving Performance of Localization Using EN-SJFR AlgorithmK. International Journal of Applied Engineering Research , 10 (17), 13503-13508. (Scopus)

12. Sakthivelmurugan, V., & Rajkumar, K. (2015). SAKTHI: Scheduling Algorithm K to Hybrid in Cloud Computing. International Journal for Research in Applied Science &Engineering Technology , 3 (5), 124-128.

13. Ashokkumar, C., Muneeshwari, P., & Rajkumar, K. (2014). Design And Performance Analysis Of Fault Secure Network-On-Chip Using FPGA. International Journal of Advanced Research in Computer Engineering & Technology , 3 (2), 534-539.

14. Rajkumar, K., Ganeshkumar, P., & Senthilkumar, P. (2013). Identification and Isolation of Replica Attack using Risk Aware Response Mechanism. International Journal of Advanced Research in Computer and Communication Engineering , 2 (1), 1-7.


Nithya.S

Assistant Professor
Department of Information Technology

1.P.Chitra, T.S.Karthik, S.Nithya, J.Jacinth Poornima J.Srinivas Rao Makarand Upadhyaya K.Jayaram Kumar R.Geethamani T.C.Manjunath “Sentiment Analysis of Product feedback using Natural Language Processing” in Materials Today: Proceedings, https://doi.org/10.1016/j.matpr.2020.12.1061 Scopus

2.Nithya, S., & Meena, K. (2017). Genetic Algorithm Based Bacterial Foraging Optimization with Three-pass Protocol Concept for Heterogeneous Network Security Enhancement. Journal of Computational Science , 1-8. (SCI)

3. Nithya, S. (2016). Detail Analysis of MANET and Heterogeneous Routing Protocols. International Journal of Engineering Research &Technology , 4 (34), 15-21.

4. JeyaPandi, I., & Nithya, S. (2015). QoS based Network Selection for Wireless Heterogeneous Networks. International Journal of Applied Engineering Research , 10 (5), 3928-3933.

5. Nithya, S., & Amala, P. (2013). Interference Cancellation in Heterocell Configuration using Channel Allocation Mechanism. International Journal of Advanced Research in Computer Science and Software Engineering , 3 (4), 87-92.


Arun Kumar.M

Assistant Professor
Department of Information Technology

1.M. Arun Kumar, R. Vimala, K.R. Aravind Britto, A cognitive technology based healthcare monitoring system and medical data transmission, (Journal of the International Measurement Confederation) Measurement, Volume 146, 2019, Pages 322-332, ISSN 0263-2241, https://doi.org/10.1016/j.measurement.2019.03.017.

2.Priya Dharshini, P., Adhilakshmi, R., Arunkumar, M., & Jeganathan, J. (2018). A Model with Cloud Computing putting Adoption Framework to Enhance Data Security in Heterogeneous Data Storage Environment. International Journal of Engineering & Technology. 7(4.35), 848- 851. (Scopus)

3. Arunkumar, M., Vimala, K., & Aravind Britto, K. R. (2018). A Potential Promise on Big Data Analytics in Healthcare. International Journal of Printing, Packaging & Allied Sciences. 4(1), 497-505.

4. Princy Pushpa, P., & Arunkumar, M. (2015). Performance Evaluation of Content Based Information Retrieval Schemes for DTN. International Journal of Applied Engineering Research , 10 (5), 4182-4186. (Scopus)

5. Ashok kumar, C., Jaiganesh, M., Vincent Antony Kumar, A., Arunkumar, M., & Jeganathan, J. (2014). Isolation of Cloud Virtual Machine vulnerabilities using Fuzzy ART. International Journal of Digital Content Technology and its Applications , 8 (3), 65-71. (Scopus)

6. Arunkumar, M., & Prabu, S. (2014). Implementation of Encrypted Image Compression Using Resolution Progressive Compression Scheme. International Journal of Computer Science and Mobile Computing , 3 (6), 585 – 590. (Scopus)


Muthupandi.G

Assistant Professor
Department of Information Technology

1.Bhaskaran, R., Muthupandi, G., & Senthilkumar, P. (2018). A Mathematical Model to Predict and Optimize the Gas Metal Arc Hardfaced Stelite 6 Weldbead on Low Carbon Steel. International Journal of Mechnanical Engineering and Technology, 9 (12), 1-8. (Scopus)

2.Anandaraj, M., Muthupandi, G., & Sivakumar, P. (2016). A Survey, Study and Review on Performance Improvements in P2P Content Distribution Network. Journal of Network Communications and Emerging Technologies , 6 (12), 30-34.

3. Muthupandi, G., & Vincent Antony Kumar, A. (2015). Fuzzy Logic Based Morphological Transformation for Image Enhancement. Journal of Computational and Theoretical Nanoscience , 12 (11), 4467-4472. (SCI)

4. Muthupandi, G., & Vincent Antony Kumar, A. (2015). Analysis of Morphology Based Block By Block Image Enhancement. International Journal of Applied Engineering Research , 10 (7), 16463-16474.(Scopus)


Senthil Kumar.P

Assistant Professor
Department of Information Technology

1.Sudha R, Sasikala N, Senthil Kumar P, Jeganathan J “A Reliable Energy Efficient Data Aggregation Algorithm for Wireless Sensor Network" in International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9 Issue-9, July 2020,DOI: 10.35940/ijitee.J7429.079920

2.Bhaskaran, R., Muthupandi, G., & Senthilkumar, P. (2018). A Mathematical Model to Predict and Optimize the Gas Metal Arc Hardfaced Stelite 6 Weldbead on Low Carbon Steel. International Journal of Mechnanical Engineering and Technology, 9 (12), 1-8. (Scopus)

3. Chitty Babu, M., Senthil Kumar, P., & Sangeetha, A. (2016). Search Engine Optimization Strategies Using Big Data Keyword Research. International Journal of Recent Trends in Engineering& Research , 2 (11), 495-498.

4. Senthil kumar, P., Chitty babu, M., & Selvaraj, K. (2015). Measure of image enhancement by parameter controlled histogram distribution using color image. International Journal of Innovative Science, Engineering & Technology , 2 (4), 268-272.

5. Senthil Kumar, P. (2014). High Level Security Implementation In Data Sharing On Social Websites. International Journal of Computer Technology &Applications , 5 (2), 568-572.

6. Rajkumar, K., Ganeshkumar, P., & Senthilkumar, P. (2013). Identification and Isolation of Replica Attack using Risk Aware Response Mechanism. International Journal of Advanced Research in Computer and Communication Engineering , 2 (1), 1-7.

7. Muthumayil, K., Chitty Babu, M., & Senthil Kumar, P. (2013). Modified Secure Associativity Based Routing. IJAIR , 2 (5), 35 - 45.


Jeganathan.J

Assistant Professor
Department of Information Technology

1.Sudha R, Sasikala N, Senthil Kumar P, Jeganathan J “A Reliable Energy Efficient Data Aggregation Algorithm for Wireless Sensor Network" in International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9 Issue-9, July 2020,DOI: 10.35940/ijitee.J7429.079920

2.Priya Dharshini, P., Adhilakshmi, R., Arunkumar, M., & Jeganathan, J. (2018). A Model with Cloud Computing putting Adoption Framework to Enhance Data Security in Heterogeneous Data Storage Environment. International Journal of Engineering & Technology. 7(4.35), 848- 851. (Scopus)

3. Jeganathan, J., Jaiganesh, M., & Muneeshwari, P. (2016). Dynamic Load Balancing In Distributed Environment Using Rate Adjustment Policies. International Journal of Advanced and Innovative Research , 5 (11), 157-166.

4. Jaiganesh, M., Muneeswari, P., Jeganathan, J., & Sangeetha, A. (2015). A Perspective View of Hypervisor Architecture Functions and Issues In Cloud Computing. International Journal of Applied Engineering Research , 10 (9), 22437-22447. (Scopus)

5. Jaiganesh, M., Vincent Antony Kumar, A., Ashok Kumar, C., Arunkumar, M., & Jeganathan, J. (2015). Isolation of Cloud Virtual Machine vulnerabilities using Fuzzy ART. International Journal of Digital Content Technology and its Applications , 8 (3), 65-71.


Saravanan.S

Assistant Professor
Department of Information Technology

1.S.Saravanan, R.Karthigaivel,”A fuzzy and spline based dynamic histogram equalization for contrast enhancement of brain images.” in International journal of Imaging systems and Technology,Sep 2020, https://doi.org/10.1002/ima.22483

2.S.Saravanan, R.Karthigaivel (2020). A fuzzy and spline based dynamic histogram equalization for contrast enhancement of brain images. International journal of Imaging systems and Technology, https://doi.org/10.1002/ima.22483.

3.S.Saravanan, R.Karthigaivel, V.Magudeeswaran(2020). A brain tumor image segmentation technique in image processing using ICA-LDA algorithm with ARHE model. Journal of Ambient Intelligence and humanized computing, DOI:10.1007/s12652-020-01875-6

4. Saravanan, S., Karthigaivel, R., & Thiagarajan, K. (2018). Analysis of Image Stodgy in Cloud Ordered Topology-Fixed Point Theorem. International Journal of Pure and Applied Mathematics , 119 (10), 1001-1011.(SCI)

5. Dhasarathapandian, S., & Saravanan, S. (2016). VMM System Power Saving Algorithm in Cloud. International Journal of Engineering Associates , 5 (11), 9-21.

6. Sivakumar, P., Saravanan, S., & Anandaraj, M. (2015). A survey in Wireless Sensor Networks based on Key Management Schemes. et al., International Journal of Advanced Trends in Computer Science and Engineering , 4 (2), 22-27.

7. Saravanan, S., & Sivakumar, P. (2014). Image Contrast Enhancement Using Histogram Equalization Techniques: Review. International Journal of Advances in Computer Science and Technology , 3 (3), 163-172.

8 Sivakumar, P., & Saravanan, S. (2014). Performance Enhancement and Efficiency Evaluation for Large VANET Application based on RLSMP Tool. International Journal of Advanced Research in Computer Engineering & Technology , 3 (4), 1307-1310.


Sangeetha.A

Assistant Professor
Department of Information Technology

1.Rajkumar K., Sangeetha A., Ebenezer V., Ramesh G., Karthik N “Designing Parallel Operation for High-Performance Cloud Computing Using Partition Algorithm” in Advances in Intelligent Systems and Computing,July 2020,Scopus,https://doi.org/10.1007/978-981-15-5285-4_45

2.A.Sangeetha, Uma Maheshwari. N, Venkatesh. R “UNDERSTANDING AND ENABLING THE BEST CLUSTERING ALGORITHM FOR 5G-V2X COMMUNICATIONS” in International Journal of Advanced Research in Engineering and Technology (IJARET),10/1/2020,Scopus,DOI: 10.34218/IJARET.11.10.2020.161

3.Rajkumar Krishnan, Ganeshkumar Perumal, K, Selvaraj, Anandaraj, M, A.Sangeetha April 2020 Energy-Efficiency in WSN Based on SCMC Protocol,In book: Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies p.123-131.

4. K.Suresh, A.Sangeetha, P.Pradeepa, S.Vijayprasath(2019),’Experimental Study On Eog Signal Processing For Drowsiness Divination’,INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, 8(10),582-585. (Scopus)

5. Chitty Babu, M., Senthil Kumar, P., & Sangeetha, A. (2016). Search Engine Optimization Strategies Using Big Data Keyword Research. International Journal of Recent Trends in Engineering& Research , 2 (11), 495-498.

6. Jaiganesh, M., Muneeswari, P., Jeganathan, J., & Sangeetha, A. (2015). A Perspective View of Hypervisor Architecture Functions and Issues In Cloud Computing. International Journal of Applied Engineering Research , 10 (9), 22437-22447. (Scopus)

7. Kalyankumar, P., & Sangeetha, A. (2015). A Synchronization Algorithm For Mobile Databases Using SAMD. International Research Journal of Engineering and Technology , 2 (2), 393-402.

8. Sangeetha, A., & Devipriya, E. (2014). A Reliable Routing Algorithm in Wireless Multihop Networks. International Journal Of Scientific Progress And Research , 5 (1), 26-30.

9. Geetha, K., Sabeetha, K., & Sangeetha, A. (2013). A Power-Aware Cooperative Caching Technique for MANET. International Journal of Advanced and Innovative Research , 2 (11), 351-356.

10. Sangeetha, A., & Santhanakrishnan, R. (2013). Capacity Optimization in MANET using RID. International Journal of Advanced Research in Electronics and Communication Engineering , 2 (4), 433-436.


Jeevitha.J.K

Assistant Professor
Department of Information Technology

1.Jeevitha, J.K., Athisha, G. A novel scheduling approach to improve the energy efficiency in cloud computing data centers. Journal of Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-02283-6

2.Jeevitha J.K ,G.Athisha “Energy-Efficient Virtualized Scheduling and Load balancing algorithm” International Journal of Information Retrieval Research (IJIRR), https://www.igiglobal.com/journal/international-journal-information-retrieval-research/1178, November 2020,WOS.

3.Jeevitha J.K ,G.Athisha (2020). A novel scheduling approach to improve the energy efficiency in cloud computing data centers. Journal of Ambient Intelligence and humanized computing, DOI - 10.1007/s12652-020-02283-6

4. Subhashini.R., Jeevitha. J.K, Keerthi Samhitha.B(2019) “Application of Data Mining Techniques to Examine Quality of Water”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-5S.(Scopus)

5. Tatikonda.Bhavana, J.padmavathy ,R.Sethuraman and J.K Jeevitha,(2019),” ANALYSIS OF KNN ALGORITHM WITH MAPREDUCE TECHNIQUE ON BIG DATA”, Materials Science and Engineering IOP Publishing doi:10.1088/1757-899X/590/1/012028. (Scopus)

6. Sabeetha, K., Vincent Antony Kumar, A., Muneeshwari, P., & Jeevitha, J. K. (2018). Erasure Coding Dependent Storage Aware Routing. International Journal of Mechanical Engineering and Technology, 9(11), 2226-2231. (Scopus)

7. Karthika, B., Jeevitha, J. K., & Devipriya, E. (2016). Privacy-Preserving Public Auditing Protocol In Cloud Storage Security Using Fractal Hash Tree. International Journal of Recent Trends in Engineering& Research , 2 (11), 450-459.

8. Jeevitha, J. K., & Karthika, B. (2015). Face Recognition Using LDN Code. International Research Journal of Engineering and Technology , 2 (1), 198-203.

9. Jeevitha, J. K., & Karthika, B. (2014). A Priority Enhanced MAC Protocol Using CSMA/CA For Wireless Sensor Networks. International Journal of Computer Technology &Applications , 5 (2), 655-661.

10. Jeevitha, J. K., & Karthika, B. (2013). Global Load Distribution Using Skip Graph, Baton And Chord. International Journal of Researchonline , 1 (3), 407-413.

11. Karthika, B., & Jeevitha, J. K. (2013). A Privacy-Preserving in Wireless Sensor Networks using generalization and suppression methods. International Journal Of Advanced And Innovative Research , 2 (4), 120-124.

12. Karthika, B., & Jeevitha, J. K. (2012). A Safe And Secure Banking With Bluetooth. International Journal of Advanced Research in Electronics and Communication Engineering , 1 (4), 94-99.


Sivakumar.P

Assistant Professor
Department of Information Technology

1.Vijayakumar, K. P., Ganeshkumar, P., Anandaraj, M., Selvaraj, K., & Sivakumar, P. (2018). Fuzzy Logic Based Jamming Detection Algorithm for Cluster based Wireless Sensor Network. International Journal of Communication Systems , 1-10. (SCI)

2.Sivakumar, P., & Ganeshkumar, P. (2017). An efficient automated methodology for detecting and segmenting the ischemic stroke in brain MRI images. International Journal of Imaging Systems and Technology , 27 (3), 265-272. (SCI)

3. Sivakumar, P., & Ganeshkumar, P. (2017). CANFIS based glioma brain tumor classification and retrieval system for tumor diagnosis. International Journal of Imaging Systems and Technology , 27 (2), 109-117. (SCI)

4. Anandaraj, M., Muthupandi, G., & Sivakumar, P. (2016). A Survey, Study and Review on Performance Improvements in P2P Content Distribution Network. Journal of Network Communications and Emerging Technologies , 6 (12), 30-34.

5. Sivakumar, P., & Ganeshkumar, P. (2015). Privacy-Preserving Data Integrity checking by using Secured Public Auditing on Cloud Storage. Australian Journal of Basic and Applied Sciences , 9 (20), 640-643. (Scopus)

6. Sivakumar, P., Saravanan, S., & Anandaraj, M. (2015). A survey in Wireless Sensor Networks based on Key Management Schemes. et al., International Journal of Advanced Trends in Computer Science and Engineering , 4 (2), 22-27.

7. Saravanan, S., & Sivakumar, P. (2014). Image Contrast Enhancement Using Histogram Equalization Techniques: Review. International Journal of Advances in Computer Science and Technology , 3 (3), 163-172.

8. Sivakumar, P., & Saravanan, S. (2014). Performance Enhancement and Efficiency Evaluation for Large VANET Application based on RLSMP Tool. International Journal of Advanced Research in Computer Engineering & Technology , 3 (4), 1307-1310.


Karthika.B

Assistant Professor
Department of Information Technology

1.B.Karthika , N.Umamaheswari, R.Venkatesh “Traffic Flow Prediction Using An Improved Fuzzy Convolutional LSTM Algorithm” in Turkish Journal of Computer and Mathematics Education, 5541-5549, Vol.12 No.10 (2021), online: 28 April 2021

2.B.karthika,Dr.N.Umamaheswari, Dr.R.Venkatesh(2019),’ A Research of Traffic Prediction using Deep Learning Techniques’ International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-8, Issue- 9S2.(Scopus)

3. Karthika, B., Jeevitha, J. K., & Devipriya, E. (2016). Privacy-Preserving Public Auditing Protocol In Cloud Storage Security Using Fractal Hash Tree. International Journal of Recent Trends in Engineering& Research , 2 (11), 450-459.

4. Jeevitha, J. K., & Karthika, B. (2015). Face Recognition Using LDN Code. International Research Journal of Engineering and Technology , 2 (1), 198-203.

5. Jeevitha, J. K., & Karthika, B. (2014). A Priority Enhanced MAC Protocol Using CSMA/CA For Wireless Sensor Networks. International Journal of Computer Technology &Applications , 5 (2), 655-661.

6. Jeevitha, J. K., & Karthika, B. (2013). Global Load Distribution Using Skip Graph, Baton And Chord. International Journal of Resarchonline , 1 (3), 407-413.

7. Karthika, B., & Jeevitha, J. K. (2013). A Privacy-Preserving in Wireless Sensor Networks using generalization and suppression methods. International Journal Of Advanced And Innovative Research , 2 (4), 120-124.

8. Karthika, B., & Jeevitha, J. K. (2012). A Safe And Secure Banking With Bluetooth. International Journal of Advanced Research in Electronics and Communication Engineering , 1 (4), 94-99.


Muneeshwari.P

Assistant Professor
Department of Information Technology

1.P.Muneeshwari,G.Athisha (2020). Extended Artificial immune system based optimized access control for bigdata on cloud environment. International Journal of Communication system, 33(13), https://doi.org/10.1002/dac.3947.

2.K. Sabeetha, P. Pradeepa, P. Muneeshwari(2019),’A Study On Research Trends In Deep Learning In Various Engineering Fields’, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH ,8(9),1591-1593.(Scopus)

3. Sabeetha, K., Vincent Antony Kumar, A., Muneeshwari, P., & Jeevitha, J. K. (2018). Erasure Coding Dependent Storage Aware Routing. International Journal of Mechanical Engineering and Technology, 9(11), 2226-2231. (Scopus)

4. Jegananthan, J., Jaiganesh, M., & Muneeshwari, P. (2016). Dynamic Load Balancing In Distributed Environment Using Rate Adjustment Policies. International Journal of Advanced and Innovative Research , Volume 5 (11), (2278-7844).

5. Jaiganesh, M., Muneeswari, P., Jeganathan, J., & Sangeetha, A. (2015). A Perspective View of Hypervisor Architecture Functions and Issues In Cloud Computing. International Journal of Applied Engineering Research , Volume 10, 22437-22447. (Scopus)

6. Ashok kumar, C., Muneeshwari, P., & Rajkumar, C. (2014). Design And Performance Analysis Of Fault Secure Network-On-Chip Using FPGA. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) , 3 (2), 534-539.

7. AshokKumar, C., Muneeshwari, P., & Manikandaraja, J. (2013). Scalability of Multi-Timeslot Allocation Protocol for WSN. International Journal of Advanced Research in Computer and Communication Engineering , 2(4), 1779-1784.

8. Gnana Jeyaraman, R., & Muneeshwari, P. (2013). Performance Analysis of Low Power Low Cost Signal Detection of MIMO- OFDM using NSD. International Journal Innovative Technology and Exploring Engineering, 2(5), 61-65.


Ashok Kumar.C

Assistant Professor
Department of Information Technology

1.C.Ashok kumar, R. Lakshmi Priy, Rajesh Kannan K “Propagation of Situational Information about Covid-19 and Detection with Ranking-Based Diversity Reduction Strategy” European Journal of Molecular and Clinical Medicine ; 7(5):1159-1171, 2020.Article in English | WHO COVID | ID: covidwho-1001222 https://ejmcm.com/article_3722.html

2.Shafali Jain; Ravi Prasad. B; Dr. C. Ashok kumar ” A Pilot Survey Of Machine Learning Techniques In Smart Grid Operations Of Power Systems “European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 7, Pages 203-210 https://ejmcm.com/article_2830.html,Nov 2020, Scopus.

3. Ashok Kumar and R. Vimala (2019). C-FDLA: Crow Search with Integrated Fractional Dragonfly Algorithm for Load Balancing in Cloud Computing Environments. Journal of Circuits, Systems and Computers, 28(7), 1950115.

4. C. Ashok Kumar, R. Vimala, K. R. Aravind Britto & S. Sathya Devi (2019). FDLA: Fractional Dragonfly based Load balancing Algorithm in cluster cloud model. Cluster Computing, 22 (suppl 1): 1401-1414.

5. Ashok kumar, C., Vimala, R., Aravind Britto, K.R., & Sathyadevi, S. (2018). FDLA: Fractional Dragonfly based Load Balancing Algorithm in Cluster Cloud Model. Journal of Cluster Computing , 1-12. (SCI)

6. Ashok kumar, C., & Sathyadevi, S. (2016). A Secured Framework For Cloud Repository With Clustered Servers. International Journal Of Research In Computer Applications And Robotics , 4 (11), 18-24.

7. Ashok kumar, C., & Sathyadevi, S. (2015). A Guarded Cloud Repository with Collective Servers. International Journal for Research in Applied Science & Engineering Technology, 3 (4), 767- 772.

8. Ashok kumar, C., Jaiganesh, M., Vincent Antony Kumar, A., Arunkumar, M., & Jeganathan, J. (2014). Isolation of Cloud Virtual Machine vulnerabilities using Fuzzy ART. International Journal of Digital Content Technology and its Applications , 8 (3), 65-71. (Scopus)

9. Ashok Kumar, C., Muneeswari, P., & Rajkumar, K. (2014). Design And Performance Analysis Of Fault Secure Network-On-Chip Using FPGA. International Journal of Advanced Research in Computer Engineering & Technology , 3 (2), 534-539.

10. Ashokkumar, C., Muneeshwari, P., & Manikandaraja, J. (2013). Scalability of Multi-Timeslot Allocation Protocol for WSN. International Journal of Advanced Research in Computer and Communication Engineering , 2 (4), 1779-1784.


Karthiha Devi.M

Assistant Professor
Department of Information Technology

1.S. Jayachitra, M. Karthihadevi, G. Mariammal, T. Pushparaj.(2020) ‘Implementation of Morphological Operation through Intercept Based Euclidean Distance Algorithm’, International Journal of Innovative Technology and Exploring Engineering (IJITEE),9(4),2472- 2475. (Scopus)

2.A. Prasanth, S.Pavalarajan, M.Karthihadevi, G.Sasi.(2019),’Particle Swarm Optimization Algorithm Based Zone Head Selection In Wireless Sensor Networks’,INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH ,8(9),1594-1597. (Scopus)

3. Prasanth, A., Pavalarajan, S., & Karthiha Devi, M. (2018). Sink Mobility Analysis in Wireless Sensor Networks. Journal of Advanced Research in Dynamical and Control Systems.9(17), 2097-2108. (Scopus)

4.Karthiha Devi, M., & Pavalarajan, S.,(2017). Sleep Schedule Strategies in Wireless Sensor Networks. Journal of Advances in Natural and Applied Sciences. 11(7), 635-641.

5. Pradeepa, P., & Karthihadevi, M. (2016). An Effective Firewall Framework with optimized cost in Cloud Computing. International Journal of Recent Trends in Engineering &Research , 2 (11), 460-466.

6. Pradeepa, P., Karthiha Devi, M., Adhi Lakshmi, R., & Mohananagalakshmi, B. (2015). Reactive Resource Allocation Based On Duality Theory In Cloud Computing. International Journal of Applied Engineering Research , 10 (23), 43713-43715. (Scopus)

7. Pradeepa, P., Jaiganesh, M., Vincent Antony Kumar, A., & Karthiha Devi, M. (2014). Fuzzy Based Reactive Resource Pricing in Cloud Computing. Journal of Convergence Information Technology , 9 (6), 130-142.


Pradeepa.P

Assistant Professor
Department of Information Technology

1.Pradeepa, P., PushpaLakshmi, R. Violation Detection in Service Level Agreement to Ensure the Privacy in Cloud Community using Chicken Spider Monkey Optimization-Based Deep Belief Network. Wireless Pers Commun 117, 1659–1683 (2021). https://doi.org/10.1007/s11277-020- 07940-9

2.P.Pradeepa, R. PushpaLakshmi (2021). Violation Detection in Service Level Agreement to Ensure the Privacy in Cloud Community using Chicken Spider Monkey Optimization.Based Deep Belief Network.Wireless Personal Communications, 117 ,1659-1683.

3. K. Sabeetha, P. Pradeepa, P. Muneeshwari(2019),’A Study On Research Trends In Deep Learning In Various Engineering Fields’, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH ,8(9),1591-1593.(Scopus)

4. K.Suresh, A.Sangeetha, P.Pradeepa, S.Vijayprasath(2019),’Experimental Study On Eog Signal Processing For Drowsiness Divination’,INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, 8(10),582-585. (Scopus)

5. Pradeepa Parthiban, and R PushpaLakshmi, (2019), “Multi-objective constraint and hybrid optimisation-based VM migration in a community cloud”, IET Computers & Digital Techniques, 14(1), 37-45.(SCI)

6. Pradeepa, P., & Pushpalashmi, R. (2018). A Novel Model for Optimal Selection of Resource Providers for Outsourcing in Communal Cloud. International Journal of Pure and Applied Mathematics, 119 (7), 653-662. (Scopus)

7. Pradeepa, P., & Karthihadevi, M. (2016). An Effective Firewall Framework with optimized cost in Cloud Computing. International Journal of Recent Trends in Engineering &Research , 2 (11), 460-466.

8. Pradeepa, P., Karthiha Devi, M., Adhi Lakshmi, R., & Mohananagalakshmi, B. (2015). Reactive Resource Allocation Based On Duality Theory In Cloud Computing. International Journal of Applied Engineering Research , 10 (23), 43713-43715. (Scopus)

9. Pradeepa, P., Jaiganesh, M., Vincent Antony Kumar, A., & Karthiha Devi, M. (2014). Fuzzy Based Reactive Resource Pricing in Cloud Computing. Journal of Convergence Information Technology , 9 (6), 130-142.


Adhi Lakshmi.R

Assistant Professor
Department of Information Technology

1.R.Adhi Lakshmi, P.Priyadharshini, R.Bhaskaran (2019),’ Research on Achieving Data Security with the Cloud Computing Adoption Framework’, International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-8, Issue- 6S4

2.Priya Dharshini, P., Adhilakshmi, R., Arunkumar, M., & Jeganathan, J. (2018). A Model with Cloud Computing putting Adoption Framework to Enhance Data Security in Heterogeneous Data Storage Environment. International Journal of Engineering & Technology. 7(4.35), 848- 851. (Scopus)

3. Mohananagalakshmi, B., & Adhi Lakshmi, R. (2016). Cost-Efficient Clouds With High Performance Computing Using. International Journal of Recent Trends in Engineering & Research , 11 (2455-1457), 506-516.

4. Pradeepa, P., Karthiha Devi, M., Adhi Lakshmi, R., & Mohananagalakshmi, B. (2015). Reactive Resource Allocation Based On Duality Theory In Cloud Computing. International Journal of Applied Engineering Research , 10 (23), 43713-43715. (Scopus)


Sakthivelmurugan.V

Assistant Professor
Department of Information Technology

1.Sakthivelmurugan, V., Vimala, R., & Aravind Britto, K.R. (2018). Magnum Opus of an Efficient Hospitality Load Balancing in Cloud Computing. Journal of Concurrency and Computation Practices and Experience , 1-12. (SCI)

2.Sakthivelmurugan, V., Vimala, R., & Aravind Britto, K.R. (2018). Star Hotel Hospitality Load Balancing Technique in Cloud Computing Environment. Journal of Advances in Big Data and Cloud Computing , 119-126. (Scopus)

3. Sakthivelmurugan, V., Vimala, R., & Rajkumar, K. (2017). Thershold Max Method for Load Balancing in Cloud Computing. Asian Journal of research in social sciences and Humanities , 7 (2), 640-650.

4. Sakthivelmurugan, V., Rajkumar, K., & Jancyrani Malli, M. (2016). Romino in Android. International Journal of Recent Trends in Engineering &Research , 2 (12), 69-73.

5. Sakthivelmurugan, V., Balasubramanian, P., & Shahana, R. (2015). Secure Data Sharing Without Key Leakage In Cloud Storage Using Hybrid Algorithm. Australian Journal of Basic and Applied Sciences , 9 (10), 211-216. (Scopus)

6. Rajkumar, K., Ganeshkumar, P., Nithya Prabha, G., & Sakthivelmurugan, V. (2015). Enhancing Performance of Localization Using SJFR Algorithm. ARPN Journal of Engineering and Applied Sciences , 10 (7), 2802-2807. (Scopus)

7. Rajkumar, K., Ganeshkumar, P., Sakthivelmurugan, V., & Nithya Prabha, G. (2015). Improving Performance of Localization Using EN-SJFR AlgorithmK. International Journal of Applied Engineering Research , 10 (17), 13503-13508. (Scopus)

8. Sakthivelmurugan, V., & Rajkumar, K. (2015). SAKTHI: Scheduling Algorithm K to Hybrid in Cloud Computing. International Journal for Research in Applied Science &Engineering Technology , 3 (5), 124-128.


Priyadharshini.P

Assistant Professor
Department of Information Technology

1.Priyadharshini P, S Pavalarajan, K Suresh ”NOVEL ENERGY CONSUMPTION USING OPTIMIZED GENETIC MACHINE (OGA) LEARNING TECHNIQUES” in Journal of Critical Reviews, JCR. 2020; 7(13): 4474-4484, doi: 10.31838/jcr.07.13.681

2.R.Adhi Lakshmi, P.Priyadharshini, R.Bhaskaran (2019),’ Research on Achieving Data Security with the Cloud Computing Adoption Framework’, International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-8, Issue- 6S4

3. Priya Dharshini, P., Adhilakshmi, R., Arunkumar, M., & Jeganathan, J. (2018). A Model with Cloud Computing putting Adoption Framework to Enhance Data Security in Heterogeneous Data Storage Environment. International Journal of Engineering & Technology. 7(4.35), 848- 851. (Scopus)

4. Sasikala, N., & Priyadharshini, P. (2016). Web Service Recommendation System. International Journal of Engineering Associates , 5 (11), 22-28.


Sasikala.N

Assistant Professor
Department of Information Technology

1.N Pandeeswari, R Sivakami, R Karuppathal, N Sasikala, J Suhashini(2020) Discovering Malicious Insiders In And Around Cloud Systems Based On Hypervisor Technology. Journal of Critical Reviews. Vol. 7, Issue. 19, 2020 ( Scopus)

2.Sudha R, Sasikala N, Senthil Kumar P, Jeganathan J “A Reliable Energy Efficient Data Aggregation Algorithm for Wireless Sensor Network" in International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9 Issue-9, July 2020,DOI: 10.35940/ijitee.J7429.079920

3. Sasikala, N., Pavalarajan, S., Prasanth, A., & Karuppathal, R. (2018). Current Research Impacts in Wireless Sensor Networks . International Journal of Engineering and Technology, 7(3.20), 579-583. (Scopus)

4. Sasikala, N., & Priyadharshini, P. (2016). Web Service Recommendation System. International Journal of Engineering Associates , 5 (11), 22-28.


Babu.P

Assistant Professor
Department of Information Technology

1.Babu P, Rajkumar N, Palaniappan S and Pushparaj T ( 2020) , ‘ Development of RBF Image Processing Techniques for Graves Disease’, International Journal of Scientific & Technology Research, Vol. 9(3), pp. 2038 – 2041. (Scopus)


Palaniappan.S

Assistant Professor
Department of Information Technology

1.Babu P, Rajkumar N, Palaniappan S and Pushparaj T ( 2020) , ‘ Development of RBF Image Processing Techniques for Graves Disease’, International Journal of Scientific & Technology Research, Vol. 9(3), pp. 2038 – 2041. (Scopus)


Mathan Kumar.B

Assistant Professor
Department of Information Technology

1.B Mathan Kumar, and R PushpaLakshmi, (2020), “An Approach for Image Search and Retrieval by Cluster-Based Indexing of Binary MKSIFT Codes”, The Computer Journal, (https://doi.org/10.1093/comjnl/bxz145) (SCI)

2.Mathan Kumar, B., & Pushpalakshmi, R. (2018). Multiple kernel scale invariant feature transform and cross indexing for image search and retrieval. Imaging Science Journal , 66 (2), 84-97.