MCA,M.Tech.,MBA,M.Phil,CSM,BLIS,Ph.D.,
arockiam_cs1@mail.sjctni.edu (Institution)
larockiam@yahoo.co.in (Personal)
Book Pubilished: 9
Published: 265
National: 28
International: 237
Year | Name of the award |
---|---|
2012-12-30 | Best Academic Researcher, ASDF Global Awards |
No. 23, Subbiah Garden,, Pandamangalam,, Woraiyur,,
Trichy.-620003
SNo | Book Title | Publisher | Edition | ISBN | Year |
---|---|---|---|---|---|
1 | Success through Soft Skills | Bharathidasan University | 1 | 9788190949095 | 2010 |
2 | Object Oriented Programming with C#.NET | India | 1 | 978-81-8465-121 | 2013 |
3 | Research in a Nutshell | IFCOT | 1 | 0 | 2011 |
4 | Computer literacy (Chapter-3) | Dept of Computer Science | 1 | 0 | 2013 |
5 | Data Mining Tool- A Step by Step Guide to Beginners | ICT | 2 | 0 | 2015 |
6 | STATISTICAL APPROACHES ON MULTIDISCIPLINARY RESEARCH VOLUME I(Chapter 19) | surragh | 1 | 0 | 2017 |
7 | Research in a Nutshell | IFCOT | 2 | 0 | 2016 |
8 | Advanced Engineering Research and Applications (Chapter - 14) | Research India Publicatio | 1 | 9789386138651 | 2017 |
9 | Research Methodology in a Nutshell | ACCA Printing Press | 1 | 9788192288284 | 2017 |
International |
||||||
SNo | Title | Name of Journal / Vol. No. / Page Nos/ISSNO. | Impact Factor | H Index No. | C Index No. | Year |
---|---|---|---|---|---|---|
1 | INTERNET OF THINGS BASED COAL MINE SAFETY MONITORING AND ALERTING SYSTEM | Journal of data acquisition and processing / 38(3) / 2207-2222 / 1004-9037 | 0 | 0 | 1 | 2023 |
2 | A Review on Intrusion Detection Systems to Secure IoT Networks | International Journal of Computer Networks and Applications (IJCNA) / 9 / 38-50 / 2395-0455 | 0.514 | 9 | 0 | 2022 |
3 | VeNADet: Version Number Attack Detection for RPL based Internet of Things | Solid State Technology / 64 / 2225-2237 / 0038-111X | 0 | 7 | 0 | 2021 |
4 | DAVmS: Distance Aware Virtual Machine Scheduling approach for reducing the response time in cloud computing | The Journal of Supercomputing / 0 / 1-12 / 0 | 0 | 0 | 0 | 2021 |
5 | ETLB: An Enhanced Throttled Load Balancing Approach for Reducing the Response Time in Cloud Computing | Solid State Technology / 64 / 706-715 / 0038-111X | 0 | 7 | 0 | 2021 |
6 | Location Based Rank Attack Detection Technique (LRADT) | Webology / 18 / 1305-1315 / 1735-188X | 1.57 | 9 | 0 | 2021 |
7 | The Security Challenges In The World Of Internet Of Things | Webology / 18 / 1574-1584 / 1735-188X | 1.57 | 9 | 0 | 2021 |
8 | IoT Data Preprocessing - A Survey | Webology / 18 / 2070-2080 / 1735-188X | 1.57 | 9 | 0 | 2021 |
9 | Blockchain Based Device Authentication For The Internet Of Things | Webology / 18 / 2199-2209 / 1735-188X | 1.57 | 9 | 0 | 2021 |
10 | Ada-IDS: AdaBoost Intrusion Detection System for ICMPv6 based Attacks in Internet of Things | IJACSA) International Journal of Advanced Computer Science and Applications / 12 / 499-506 / 2156-5570 | 1.09 | 9 | 0 | 2021 |
11 | CID: Central Tendency Based Noise Removal Technique for IoT Data | Webology / 18 / 2210-2217 / 1735-188X | 1.57 | 9 | 0 | 2021 |
12 | Promoting a Clean and Hygienic Environment using IoT | International Journal of Recent Technology and Engineering (IJRTE) / 8 / 4722-4726 / 2277-3878 | 5.92 | - | - | 2020 |
13 | Priority Intensed Meta Task Scheduling Algorithm for Multi Cloud Environment (PIMTSA) | Journal of Physics: Conference Series / 1427 / 1-8 / - | - | - | - | 2020 |
14 | MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage | International Journal of Information and Computer Security / 11,1 / 1-16 / 1744-1765 | 0.524 | 9 | 0 | 2019 |
15 | A survey on Nutrition Monitoring and Dietary Management System | International Journal of Research and Analytical Reviews (IJRAR) / 6 / 329-334 / 2348-1269 | 5.75 | 0 | 0 | 2019 |
16 | ANNIDS: Artificial Neural Network based Intrusion Detection System for Internet of Things | International Journal of Innovative Technology and Exploring Engineering (IJITEE) / 8 / 2583- 258 / 2348-1269 | 5.54 | - | - | 2019 |
17 | A Hybrid Method for Smart Irrigation System | International Journal of Recent Technology and Engineering (IJRTE) Scopus Indexed / 8 / 2277-3878 / 2278-3075 | 5.92 | - | - | 2019 |
18 | Prevalence of Diabetes Mellitus in Tiruchirappalli District using Machine Learning | International Journal of Recent Technology and Engineering (IJRTE) / 8 / 6400-03 / 2278-3075 | 5.92 | - | - | 2019 |
19 | Prevalence of Type-II Diabetics Association with PM 2.5 and PM 10 in Central Region of Tamil Nadu | International Journal of Recent Technology and Engineering (IJRTE) / 8 / 6440-6444 / 2277-3878 | 5.92 | 0 | 0 | 2019 |
20 | Nutrition Monitoring and Calorie Estimation using Internet of Things (IoT) | International Journal of Innovative Technology and Exploring Engineering (IJITEE) / 8 / 2669- 72 / 2278-3075 | 5.54 | 0 | 0 | 2019 |
21 | Entity Aware Association Rule Based Big Data Migration | International Journal of Emerging Technologies and Innovative Research (JETIR) / 6 / 373-383 / 2349-5162 | 5.87 | - | - | 2019 |
22 | A Novel Big Data Migration Framework with Reduced Database Downtime | International Journal of Engineering Research and Applications (IJERA) / 9 / 43-52 / 22489622 | 5.18 | - | - | 2019 |
23 | Intrusion Detection System for Detecting Rank Attacks in RPL based 6LoWPAN Networks | International Conference on Advances in Computer Science and Technology / 0 / 37-38 / 0 | 0 | 0 | 0 | 2018 |
24 | Non Adjacent Form based Scalar Multiplication Technique for Increasing Speed of ECC | International Conference on Advances in Computer Science and Technology / 0 / 38-39 / 0 | 0 | 0 | 0 | 2018 |
25 | A Model To Predict and Pre-Treat Diabetes Mellitus | International Conference on Advances in computer science and Technology / 0 / 25 / 0 | 0 | 0 | 0 | 2018 |
26 | Resource Based Load Balanced Min-Min Algorithm | International Conference on Advances in Computer Science and Technology / 0 / 30-31 / 0 | 0 | 0 | 0 | 2018 |
27 | ELT-EAPR: Expected Life Time of Energy Aware Parent Routing for IoT Networks | International Journal of Pure and Applied Mathematics (SCOPUS) / 118,8 / 243-249 / 1311-8080 | 7.19 | - | - | 2018 |
28 | ORBUA: An Effective Data Access Model for MobiCloud Environment | International Journal of Pure and Applied Mathematics (SCOPUS) / 118,8 / 79-86 / 1311-8080 | 7.19 | - | - | 2018 |
29 | Rate aware Meta task Scheduling Algorithm for multi cloud computing (RAMTSA) | Journal of Physics: Conference Series / 1142 / 1-9 / 1742-6596 | 1.963 | 59 | 0 | 2018 |
30 | Spell Aware Meta Task Scheduling Algorithm (SAMTSA) for Multicloud | International Journal of Scientific Research in Computer Science Applications and Management Studies / 7, 4 / 1-5 / 2319-1953 | 0.654 | 0 | 0 | 2018 |
31 | LAHUBMAX -Priority Based Meta Task Scheduling Algorithm in multicloud | International Journal of Computer Sciences and Engineering / 6, 10 / 650-655 / 2347-2693 | 3.022 | 009 | 0 | 2018 |
32 | Aro-Nims: A New-Fangled Framework for IoT Data Pre-processing | International Journal of Research in Advent Technology(IJRAT) / 6, 5 / 858-863 / 2321-9637 | 5.153 | 0 | 0 | 2018 |
33 | Aro-Pri: A New-Fangled Architecture for IoT Data Pre-Processing | International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) / 7, 3 / 1-5 / 2319-1953 | 0.654 | 0 | 0 | 2018 |
34 | A Novel Block Cipher for Enhancing Data Security in Healthcare Internet of Things | Journal of Physics: Conference Series / 1142, 1 / 1-12 / 1742-6596 | 1.963 | 59 | 0 | 2018 |
35 | Architecture for Secure Data Management in Healthcare Internet of Things | International Journal of Scientific Research in Computer Science Applications and Management Studies / 7, 3 / 1-5 / 2319-1953 | 1.654 | 0 | 0 | 2018 |
36 | ANNA: A Unified Framework for Data Security in Healthcare Internet of Things | ICTACT Journal on Communication Technology / 9, 2 / 1740-1748 / 2229-6948 | 0.788 | 0 | 0 | 2018 |
37 | An Algorithm to Detect Rank Attack in RPL based 6LoWPAN Networks | International Journal of Computer Sciences and Engineering (IJCSE) / 6, 2 / 460-463 / 2347-2693 | 3.022 | 009 | 0 | 2018 |
38 | RDAID: Rank Decreased Attack Identification Algorithm for Internet of Things | International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) / 7, 3 / 1-5 / 2319-1953 | 0.65 | 0 | 0 | 2018 |
39 | RIAIDRPL: Rank Increased Attack Identification Algorithm for Avoiding Loop in the RPL DODAG | International Journal of Pure and Applied Mathematics (IJPAM) / 119, 16 / 1203-1210 / 1311-8080 | 7.19 | 21 | 0 | 2018 |
40 | E2V: Techniques for Detecting and Mitigating Rank Inconsistency Attack (RInA) in RPL based Internet of Things | Journal of Physics: Conference Series (JPCS), IOP publishing / 1142 / 75-86 / 1742-6596 | 1.963 | 59 | 0 | 2018 |
41 | ARO_VID: A Unified Framework for Data Security in Internet of Things | Journal of Emerging Technologies and Innovative Research (JETIR) / 5, 7 / 685-690 / 2349-5162 | 5.87 | 0 | 0 | 2018 |
42 | ARO_EDGE: A Technique to Ensure Data Security in Internet of Things (IoT) | Asian Journal of Computer Science and Technology / 7, 2 / 52-56 / 2249-0701 | 0 | 0 | 0 | 2018 |
43 | Hybrid Security Techniques to Protect Sensitive Data in E-Healthcare Systems | IEEE Digital Explorer / 0 / 39-43 / 0 | 0 | 0 | 0 | 2018 |
44 | Key Generation Algorithm using Soft Set for data security in Internet of Things | Proceedings of International Conference on Internet of Things and Connected Technologies (ICIoTCT), ELSEVIER / 0 / 367-372 / 1556-5068 | 0 | 0 | 0 | 2018 |
45 | EALBA: Energy Aware Load Balancing Algorithm for IoT Networks | ACM Series , Scopus / 0 / 46-50 / 0 | 0 | 0 | 0 | 2018 |
46 | Energy Aware Routing Applications for Internet of Things | Proceeding of the International Conference on Computer Networks, Springer / 0 / 0 / 0 | 0 | 0 | 0 | 2018 |
47 | Performance Analysis of Classification Algorithms for Diabetic Prediction using Pima-Indian Dataset | Journal of Emerging Technologies and Innovative Research (JETIR) / 5,12 / 563-569 / 2349-5162 | 5.87 | 0 | 0 | 2018 |
48 | A Novel Technique to Enhance QoS using Location based Trust validation in 6LoWPAN for IoT Networks | International Journal of Computer Sciences and Engineering / 6,2 / 1-5 / 2347-2693 | 3.022 | 009 | 0 | 2018 |
49 | TNLIQ: Trust Validation in Ad-Hoc Networks using Dynamic Location Identification to ensure QoS | International Journal of Computer Sciences and Engineering / 6,2 / 21-24 / 2347-2693 | 3.022 | 009 | 0 | 2018 |
50 | Scheduling for Internet of Things Applications on Cloud: A Review. | Imperial Journal of Interdisciplinary Research / 3 (1 ) / 1649 -1653 / 2454-1362 | 3.75 | - | - | 2017 |
51 | EPCAMD: EPC Based Authentication for Secure Accessing of Medical Devices in the Smart Healthcare System | Lecture Series in Communications in Computer and Information Science (Springer - in Press) / - / 433-445 / 0 | 0 | - | - | 2017 |
52 | E2TR2: Energy efficient transmission range routing for IoT networks | Lecture Series in Communications in Computer and Information Science (Springer - in Press) / - / 0 / 0 | 0 | - | - | 2017 |
53 | An enhanced sinkhole attacker node identification technique using successful link ration in IoT | International Journal of Computer Science / 5(1) / 1439-1444 / 2348-6600 | 0.453 | 0 | 0 | 2017 |
54 | Role of Scheduling and Load Balancing Algorithms in cloud to improve the Quality of Services | International Journal of Computer Science / 5(1) / 1454-1462 / 2348-6600 | 0.453 | - | - | 2017 |
55 | A Novel Fuzzy based Energy Efficient Routing for Internet of Things | IEEE Explorer(in Press) / - / 0 / 0 | 0 | - | - | 2017 |
56 | Device Authentication Mechanism for IoT enabled Healthcare system | IEEE Explorer(in Press) / 0 / 0 / 0 | 0 | 0 | 0 | 2017 |
57 | Enhanced Encryption Algorithm(EEA) for protecting users credentials in Public Cloud | IEEE Explorer(in Press) / - / 0 / 0 | 0 | - | - | 2017 |
58 | USER AUTH Secure Two Tier User Authentication Mechanism for IoT Enabled Smart Healthcare System | International Conference on Newer engineering concepts and technology / - / 0 / 0 | 0 | - | - | 2017 |
59 | Hybrid One Time Password Mechanism for User Authentication in Internet of Things Environment | International Conference on Advanced Techniques in Engineering, Science Management / - / 96-104 / 0 | 0 | - | - | 2017 |
60 | Architectural Framework for Resource Management in Fog Computing | International Journal of Engineering Research & Technology (IJERT) / 5,13 / 151-154 / 2278-0181 | 0 | - | - | 2017 |
61 | An Enhanced Technique to Detect Sinkhole Attack in Internet of Things | International Journal of Engineering Research and Technology (IJERT) / 5,13 / 147-150 / 2278-0181 | 0 | - | - | 2017 |
62 | Secure Two-Tier User Authentication Mechanism For IoT Enabled Smart Healthcare System | International Journal of Recent Scientific Research / 8,7 / 59-63 / 0976-3031 | 6.86 | 0 | 0 | 2017 |
63 | Issues and Challenges in Minimizing the response time in cloud service | International Journal for Trends in Engineering and Technology / 25,01 / 13-17 / 2349-9303 | 0.765 | - | - | 2017 |
64 | E2TBR: Energy Efficient Transmission Based Routing for IoT | International Journal of Computer Science Engineering / 7,4 / 1-8 / 2249-6831 | 8.876 | - | - | 2017 |
65 | EPC Based Authentication of Devices in the Smart Healthcare System | International Journal of Electrical, Electronics & Computer Science Engineering / 8,7 / 6-11 / 2348-2273 | 4.255 | - | - | 2017 |
66 | Intrusion Detection System to detect sinkhole attack on RPL protocol in Internet of Things | International Journal of Electrical Electronics and Computer Science Engineering / 4,4 / 16-20 / 2454-1222 | 4.255 | - | - | 2017 |
67 | A Secured Public key Exchange Technique for Elliptic Curve Cryptography | International Journal of Engineering Research in Computer Science and Engineering / 4,9 / 72-77 / 2394-2320 | 4.890 | - | - | 2017 |
68 | ENNEGCC 3D Energy Efficient scheduling algorithm using 3-D Neural Network Predictor for Green Cloud Computing Environment | IEEE Digital Explorer / - / 0 / 0 | 0 | 0 | 0 | 2017 |
69 | Detection of outliers in the IoT data using the STCPOD model | International Journal of Engineering Research in Computer Science and Engineering / 4,10 / 1-6 / 2394-2320 | 4.890 | - | - | 2017 |
70 | A Pragmatic Study on Time Series Models for Big Data | International Journal of Emerging Research in Management &Technology / 6,8 / 67-78 / 2278-9359 | 3.962 | - | - | 2017 |
71 | PAFHWKM: An Enhanced Parallel Approach to Forecast Time Series Data Using Holt-Winters and K-Means Algorithm | International Journal on Future Revolution in Computer Science & Communication Engineering / 3,8 / 65-73 / 2454-4248 | 0 | - | - | 2017 |
72 | Device Authentication Mechanism For IoT Enabled Healthcare System | IEEE Digital Explorer / - / 1-6 / 0 | 0 | - | - | 2017 |
73 | Research Issues on Data Security in Cloud Computing: A Survey | International Journal of Scientific Research in Computer Science Applications and Management Studies / 6,5 / 1-6 / 2319-1953 | 0 | - | - | 2017 |
74 | A Unified Model for Cloud Data Confidentiality | International Journal of Scientific Research in Computer Science, Engineering and Information Technology / 2,6 / 256-261 / 2456-3307 | 4.032 | 0 | 0 | 2017 |
75 | Enhancing the Security of IoT Data using Multilevel Encryption | International Journal of Advanced Research in Computer Science / 8,9 / 841-845 / 0976-5697 | 0.765 | - | - | 2017 |
76 | A Technique to Enhance Quality of Service using weighted Path Mechanism | International Journal of Scientific Research in Computer Science, Engineering and Information Technology / 2,4 / 413-417 / 2456-3307 | 4.032 | - | - | 2017 |
77 | TOPQoS : TENSOR Based Optimum Path Selection in Internet of Things to Enhance Quality of Service | International Journal of Scientific Research in Computer Science, Engineering and Information Technology / 2,6 / 852-859 / 2456-3307 | 4.032 | - | - | 2017 |
78 | A Novel Fuzzy Based Energy Efficient Routing for Internet of Things | IEEE Digital Explorer / 0 / 1-4 / 0 | 0 | 0 | 0 | 2017 |
79 | Imputing the Missing Values in IoT Using ESTCP Model | International Journal of Advanced Research in Computer Science / 8,9 / 1-5 / 0976-5697 | 0.765 | - | - | 2017 |
80 | A Robust Architecture for Detecting Outliers in IoT Data using STCPOD Model | International Journal of Scientific Research in Computer Science, Engineering and Information Technology / 2,6 / 659 - 664 / 2456-3307 | 4.032 | - | - | 2017 |
81 | ARARO Framework for Confidentiality Techniques to Enhance Security of Numerical and Non-Numerical Data in Public Cloud Storage | IJIREEICE / 4(3) / 32-37 / 2321 - 2004 | 4.855 | - | - | 2016 |
82 | Key Based Mutual Authentication (KBMA) Mechanism for Secured Access in MobiCloud Environment | In Proceedings of International Conference on Mechanical Engineering and Electrical Systems (ICMES 2015) / 40 / 1-5 / 0 | 0 | 0 | 0 | 2016 |
83 | Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage | In Proceedings of International Conference on Mechanical Engineering and Electrical Systems (ICMES 2015) / 40 / 1-5 / 0 | 0 | - | - | 2016 |
84 | Confidentiality Technique using Data Obfuscation to Enhance Security of Stored Data in Public Cloud Storage | International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) / 5, No. 1 / 169-174 / 2278-909X | 4.295 | 0 | 0 | 2016 |
85 | A Novel Lexicon Based Approach to Enhance the Accuracy of Sentiment Analysis on Big Data | International Journal of Emerging Research in Management and Technology (IJERMT) / 5, No. 2 / 80-86 / 2278-9359 | 1.492 | - | - | 2016 |
86 | Combining Lexicon and Machine Learning Method to Enhance the Accuracy of Sentiment Analysis on Big Data | International Journal of Computer Science and Information Technologies (IJCSIT) / 7(1) / 306-311 / 0975-9646 | 3.32 | - | - | 2016 |
87 | Route Discovery Overhead Aware Routing Protocol for IoT to Enhance QoS | IJCTA (SCOPUS Indexed) / 9(27) / 249-254 / 0974-5572 | 2.804 | - | - | 2016 |
88 | Filling Fuel Quantity Measurement Systems Using Internet Of Things | International Journal of Innovative Research and Advanced Studies (IJIRAS) / 3(13) / 152-154 / 2394-4404 | 0 | - | - | 2016 |
89 | QRIC: QoS aware Routing for Internet of Things in College Management system | International Journal of Engineering Research & Technology (IJERT) / 4(29) / 37-39 / 2278-0181 | 1.76 | - | - | 2016 |
90 | Deist: Dynamic Detection of Sinkhole Attack for Internet of Things | International Journal of Engineering and Computer Science / 5(12) / 58-62 / 2319-7242 | 4.3098 | - | - | 2016 |
91 | A Neoteric Authentication Scheme for IoT Healthcare System | International Journal of Engineering Sciences & Research Technology (IJESRT) / 5(12) / 296-303 / 2277-9655 | 4.116 | - | - | 2016 |
92 | Authentication in IoT Environment: A Survey | International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE / 6(10) / 140-145 / 2277-128X | 2.5 | - | - | 2016 |
93 | A Novel Authentication Scheme for IoT enabled Smart Healthcare System | International Journal of Engineering Research & Technology(IJERT) / 4(29) / 174-179 / 2278-0181 | 1.76 | - | - | 2016 |
94 | Security in IoT Environment: A Survey | International Journal of Information Technology and Mechanical Engineering (IJITME) / 2(7) / 1-8 / 2349-2865 | 1.227 | - | - | 2016 |
95 | Applications of Big Data Analytics for Diagnosing Diabetic Mellitus: Issues and Challenges | International Journal of Resent Trends in Engineering and Research / 2(6) / 454 -461 / 2455-1457 | 3.344 | - | - | 2016 |
96 | A Study on Security Issues and Challenges in IoT | International Journal of Engineering Sciences and Management Research / 3(11) / 34-43 / 2349-6193 | 2.805 | - | - | 2016 |
97 | Accentuating the necessity for new-fangled IoT missing data imputation technique | International Journal of Computer Technology and Applications(I J C T A) (scopus indexed) / 9(27) / 1-4 / 0974-5572 | 2.804 | - | - | 2016 |
98 | Decode_HMM_MLCS: An efficient algorithm to identify Multiple Longest Common Subsequence (MLCS) in Large DNA Sequences by using Decoding HMM | Journal of Chemical and Pharmaceutical Sciences (JCHPS) / 9(1) / 59-64 / 0974-2115 | 0 | - | - | 2016 |
99 | A Survey on Noisy Data Elimination Using Clustering Techniques | International Journal of Information Technology and Mechanical Engineering (IJITME) / 2(8) / 11-17 / 2349-2865 | 1.227 | - | - | 2016 |
100 | Energy Efficiency in Internet of Things: An Overview | INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH / 2(6) / 475-482 / 2455-1457 | 3.344 | - | - | 2016 |
101 | EOCIPHER: A Hybrid Approach To Enhance Security Of Outsourced Data In Public Cloud Storage | Proceeding of the 4th International Conference on Artificial Intelligence and Computer Science (AICS2016),28 - 29 November 2016, Langkawi, MALAYSIA / 3 / 33-42 / 2289-5965 | 0 | - | - | 2016 |
102 | A framework for ensuring data confidentiality in smart home system | International conference on Emerging trends in Engineering & Technology / - / 0 / 0 | 0 | - | - | 2016 |
103 | Confidentiality technique to encrypt and Obfuscate non numerical and numerical data to enhance security in public cloud storage | IEEE Explorer / - / 0 / 0 | 0 | - | - | 2016 |
104 | Performance Improved Holt-Winter`s (PIHW) Prediction Algorithm for Big Data Environment | International Journal on Intelligent Electronic System / 10(2) / 23-31 / 0973-9238 | 0 | - | - | 2016 |
105 | EDSHA: An Efficient Data Skew Handling Approach For Mapreduce Model Using Time Series Data | I J C T A (SCOPUS Indexed) / 9(27) / 423-430 / 0974-5572 | 2.804 | - | - | 2016 |
106 | Lexicon Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets | International Journal of Computer Science and Information Technology & Security (IJCSITS) / 6 (3) / 33-38 / 2249-9555 | 3.765 | - | - | 2016 |
107 | Machine Learning Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets | International Journal of Advance Research in Computer Science and Management Studies / 4 (5) / 72-82 / 2321-7782 | 6.047 | - | - | 2016 |
108 | Hybrid Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets | IJCSET / 6 (6) / 185-190 / 2231-0711 | 0 | - | - | 2016 |
109 | Enhanced Authentication Mechanism for Securing the Cloud Services using AaaS | International Advanced Research Journal in Science, Engineering and Technology / 3 / null / null | null | - | - | 2016 |
110 | A Unified Cloud Authenticator for Mobile Cloud Computing Environment | IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) / 4 / 29-34 / 0975-8887 | 0.821 | 0 | 0 | 2015 |
111 | Cost Aware Dynamic Rule Based Auto-scaling of Infrastructure-as-a-Service in Cloud Environment | IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) / 4 / 35-40 / 0975-8887 | 0.821 | 0 | 0 | 2015 |
112 | A Novel Approach for Ensuring Data Confidentiality in Public Cloud Storage | IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) / 5 / 1-5 / 0975-8887 | 0.821 | 0 | 0 | 2015 |
113 | A Novel Edu-CloudSec Framework for E-Learning | IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) / 4 / 41-46 / 0975-8887 | 0.821 | 0 | 0 | 2015 |
114 | Big Data for Education in Students` Perspective | IJCA Proceedings of International Conference on Advanced Computing and Communication Techniques for High Performance Applications (ACCPTHA 2014) / 4 / 11-17 / 0975-8887 | 0.821 | 0 | 0 | 2015 |
115 | A Secure Authentication Scheme for MobiCloud | International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore / 0 / 35-40 / 0 | 0 | 0 | 0 | 2015 |
116 | Load Balancer Behavior Identifier (LoBBI) for Dynamic Threshold Based Auto-scaling in Cloud | International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore / 0 / 162-166 / 0 | 0 | 0 | 0 | 2015 |
117 | A Framework for Key Management for Data Confidentiality in Cloud Environment | International Conference on Computer Communication and Informatics (ICCCI -2015), IEEE Xplore / 0 / 167-170 / 0 | 0 | 0 | 0 | 2015 |
118 | AROMONcrypt: A Technique to Optimize the Security by Ensuring the Confidentiality of Outsourced Data in Cloud Storage | Elixir International Journal / 0 / 9535-2959 / 2229-712X | 5.09 | 0 | 0 | 2015 |
119 | Secure Sharing of E-Content in Cloud Environment for Educational Institutions | International Journal of Computer & Communication Engineering Research / 3 / 7-10 / 0 | 1.5024 | 0 | 0 | 2015 |
120 | Big Data Migration in the Cloud Environment - An Overview | IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications ICACCTHPA 2014 / 5 / 16-20 / 0975-8887 | 0.821 | 0 | 0 | 2015 |
121 | A Review on Big Data Integration | IJCA Proceedings on International Conference on Advanced Computing and Communication Techniques for High Performance Applications ICACCTHPA 2014 / 5 / 21-26 / 0975-8887 | 0.821 | 0 | 0 | 2015 |
122 | Data Integration in Big Data Environment | Bonfring International Journal of Data Mining / 5 / 1-5 / 2277-5048 | 0 | 0 | 0 | 2015 |
123 | AROcrypt A Confidentiality Technique for Securing Enterprises Data in Cloud | International Journal of Engineering and Technology (IJET) (Scopus) / 7 / 245-253 / 0975-4024 | 0.31 | 0 | 0 | 2015 |
124 | SequentialPR_FCP: BigData Pattern decomposing algorithm to Identify Frequent Contiguous Patterns (FCP) from Large DNA Sequence Database using Permutations with Repetition (PR) | International Journal of Applied Engineering and Research (IJAER) / 10 / 9477-9488 / 0 | 0 | - | - | 2015 |
125 | Analysis of Prediction Techniques in Time Series for Big Data using R | International Journal of Applied Engineering Research / 10 / 6712-6715 / 0973-4562 | 0 | - | - | 2015 |
126 | AROMO Security Framework to Enhance Security of Data in Public Cloud | International Journal of Applied Engineering Research / 10 / 6740-6746 / 1087-1090 | 0 | - | - | 2015 |
127 | SBCOHC: An Optimized Task Scheduling Approach for Public Cloud Environment | International Journal of Applied Engineering Research / 10 / 6807-6810 / 1087-1090 | 0 | - | - | 2015 |
128 | A Novel Architectural Framework to Enhance Scalability in a Federated Heterogeneous Cloud Environment | International Journal of Applied Engineering Research / 10 / 6854-6861 / 1087-1090 | 0 | - | - | 2015 |
129 | Performance Evaluation of Task Scheduling in Cloud Environment Using Soft Computing Algorithms | International Journal of Computer Science and Network (IJCSN) / 4 / 387-391 / 2277-5420 | 0.417 | - | - | 2015 |
130 | AUTOPRED: An Architectural Framework to Predict the Service Requests to Enhance Scalability in Federated Clouds | International Journal of Electronics Communication and Computer Technology (IJECCT) / 5 / 15-20 / 2249-7838 | 1.24 | - | - | 2015 |
131 | Enhanced Framework for Authentication as a Service to Ensure Security in Public Cloud Environment | International Journal of Engineering Research and Technology (IJERT) / 4 / 442-445 / 2278-0181 | 1.76 | - | - | 2015 |
132 | PBCOPSO: A Parallel Optimization Algorithm for Task Scheduling in Cloud Environment | Indian Journal of Science Technology / 8 / 1-5 / 0974-5645 | 0 | - | - | 2015 |
133 | An Improved Particle Swarm Optimization Algorithm for Meta Task Scheduling In Cloud Environment | International Journal of Computer Science Trends and Technology (IJCST) / 3 / 108-112 / 2347-8578 | 1.91 | - | - | 2015 |
134 | A Study of User Authentication Techniques in Cloud Computing | International Journal of Emerging Technologies and Innovative Research (IJETIR) / 2 / 3309-3314 / 2349-5162 | 2.57 | - | - | 2015 |
135 | EnBloAES: A Unified Framework to Preserve Confidentiality of Data in Public Cloud Storage | Indian Journal of Science Technology / 8 / 1-8 / 0974-5645 | 0 | - | - | 2015 |
136 | A Survey on User Authentication Mechanism in Mobile Cloud Environment | International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT) / 1 / 114-118 / 2348 4454 | 0 | 0 | 0 | 2015 |
137 | A Study on Basic Concepts of Big Data | International Journal of Emerging Trends in Computing and Communication Technology (IJETCCT) / 1 / 119-124 / 2348-4454 | 0 | - | - | 2015 |
138 | Align_MLCS: A Sequence Alignment based Efficient Algorithm to Identify Multiple Longest Common Subsequence (MLCS) for DNA Sequences | International Journal of Applied Engineering and Research (IJAER) / 10 / 4224-4227 / 0 | 0 | - | - | 2015 |
139 | Parallel Bottom-up Generalization Approach for Data Anonymization using Map Reduce for Security of Data in Public Cloud | Indian Journal of Science Technology / 8 / 1-9 / 0974-5645 | 0 | - | - | 2015 |
140 | Confidentiality Technique to Enhance Security of Data in Public Cloud Storage Using Data Obfuscation | Indian Journal of Science Technology / 8 / 1-10 / 0974-5645 | 0 | - | - | 2015 |
141 | Parallelized Contextual Valance Shifter Algorithm for Sentiment Analysis on Big Data | International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) / 5 / 590-595 / 2277 128X | 2.5 | - | - | 2015 |
142 | A Hybrid Approach for Aspect Based Sentiment Analysis on Big Data | International Research Journal of Engineering and Technology (IRJET) / 2 / 1-5 / 2395-0056 | 2.518 | - | - | 2015 |
143 | Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environment | International Journal of Computer and Communication System Engineering (IJCCSE) / - / 671-675 / 2312-7694 | 0.374 | - | - | 2015 |
144 | Virtual Machine Behavior Identifier (VMBI) for VM Level Auto-scaling in Cloud Environment | International Journal of Emerging Technology and Advanced Engineering (IJETAE) / 5 / 255-260 / 2250-2459 | 2.324 | - | - | 2015 |
145 | Improved Parallel Time Series Based Algorithm for Big Data using MapReduce Programming Model | International Journal of Applied Engineering Research (IJAER) / 10 / 791-796 / 0973-4562 | 0 | - | - | 2015 |
146 | Load Pattern Identifier (LoPI) for Threshold Based Auto-scaling in Cloud Environment | International Journal of Emerging Research and Technology (IJERT) / 10 / 460-466 / 2278-0181 | 1.76 | - | - | 2015 |
147 | HMM_MLCS: Hidden Markov Model (HMM) based algorithm to identify Multiple Longest Common Subsequence (MLCS) in DNA Sequences | Journal of Chemical and Pharmaceutical Sciences (JCHPS) / 8 / 881-886 / 0974-2115 | 0 | - | - | 2015 |
148 | A Predictive Model to Forecast and Pre-Treat Diabetes Mellitus using Clinical Big Data in Cloud | International Journal of Applied Engineering Research (IJAER) / 10 / 55-59 / 0973-4562 | 0 | - | - | 2015 |
149 | A Dynamic Two Stage Authentication Framework to Enhance Security in Public EduCloud | International Journal of Applied Engineering Research (IJAER) / 10 / 126-131 / 0973-4562 | 0 | - | - | 2015 |
150 | Issues and Challenges hampering the evolution of IoT big data analytics | International Journal of Applied Engineering Research (IJAER) / 10 / 247-251 / 0973-4562 | 0 | - | - | 2015 |
151 | Parallel Prediction Model for Big Data using MapReduce Programming Model | International Journal of Applied Engineering Research (IJAER) / 10 / 286-291 / 0973-4562 | 0 | - | - | 2015 |
152 | Confidentiality Framework to Enhance Data Security in Public Cloud Storage | International Journal of Applied Engineering Research (IJAER) / 10 / 484-488 / 0973-4562 | 0 | - | - | 2015 |
153 | AROMO Security Framework to Enhance Security of Data in Public Cloud | Proceedings of 2nd International Conference on Engineering, Technology and Science / 1 / 1054-1060 / 0 | 0 | - | - | 2015 |
154 | Confidentiality Technique to Enhance Security of Data in Public Cloud Storage Using Data Obfuscation | Proceedings of International Conference on Soft Computing in Applied Sciences & Engineering (ICSCASE-2015) / - / 46-53 / 0 | 0 | - | - | 2015 |
155 | DNA-DRUG_FCP: AN EFFICIENT COMPUTATIONAL METHOD FOR DNA-DRUG DESIGN USING FREQUENTLY REPEATED PATTERNS IN A LARGE HUMAN GENOME DATABASE | Journal of Chemical and Pharmaceutical Sciences / 8 / null / null | null | - | - | 2015 |
156 | FREQUENT CONTIGUOUS PATTERN (FCP) MINING IN GENOMIC SEQUENCE ANALYSIS AND PATTERN DISCOVERY | Journal of Chemical and Pharmaceutical Sciences / 8 / null / null | null | - | - | 2015 |
157 | Big Data Analytics and its Important Concepts: A Review | Proceedings of International Conference on Contemporary Trends in Computer Science (ICCTC 14) / 0 / 57-61 / 0 | 0 | 0 | 0 | 2014 |
158 | LASA HEU Heuristic Approach for Service Selection in Composite Web Services | Proceedings of World Congress on Computing and Communication Technologies (WCCCT 14), IEEE (CPS) / 0 / 256-259 / 978-1-4799-2876-7/14 | 0 | 0 | 0 | 2014 |
159 | Big Data Analytics and Cloud Based Solutions A Survey | International Conference on Research Trends in Computer Technologies (ICRTCT) / - / 0 / 0 | 0 | 0 | 0 | 2014 |
160 | Cognitive Complexity Metrics Analysis Tool(CCMAT) | International Journal of Emerging Trends in Computing and Communication Technology / 1 / 65-73 / 2348-4454 | 0 | 0 | 0 | 2014 |
161 | Enhanced User Access Control Architecture for Cloud Storage | International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) / 4 / 1111-1116 / 2277 128X | 2.080 | 0 | 0 | 2014 |
162 | An Innovative Solution for Cloud Security through Quantitative Analysis of Various Visual Cryptography Schemes | International Journal of Engineering and Innovative Technology (IJEIT) / 3 / 63-67 / 2277-3754 | 1.895 | 0 | 0 | 2014 |
163 | Securing Data with Authentication in Mobile Cloud Environment: Methods, Models and Issues | International Journal of Computer Application (IJCA) / 94 / 0 / 0975 - 8887 | 0.821 | 0 | 0 | 2014 |
164 | Security Framework to Ensure the Confidentiality of Outsourced Data in Public Cloud Storage | International Journal of Current Engineering and Technology (IJCET) / 4 / 1265-1270 / 2277 - 4106 | 2.552 | 0 | 0 | 2014 |
165 | Frequent Contiguous Pattern Mining Algorithms for biological Data Sequences | International Journal of Computer Application (IJCA) / 95 / 15-20 / 0975 - 8887 | 0.821 | 0 | 0 | 2014 |
166 | A Comparative Analysis of Encryption Techniques and Data Security Issues in Cloud Computing | International Journal of Computer Application (IJCA) / 96 / 1-6 / 0975 - 8887 | 0.821 | 0 | 0 | 2014 |
167 | A State-of-Art Load Balancing Algorithms in Cloud Computing | International Journal of Computer Application (IJCA) / 95 / 10-14 / 0975 - 8887 | 0.821 | 0 | 0 | 2014 |
168 | A Review on Dynamic Resource Allocation Strategies and Mechanisms in Cloud Computing | International Journal of Advanced Research in Computer Science & Technology (IJARCST) / 2 / 264-269 / 2347 - 8446 | 0.889 | 0 | 0 | 2014 |
169 | A Unified Architecture for Optimal Resource Utilization in a Heterogeneous Cloud Environment | International Journal of Machine Learning and Computing / 4 / 0 / 383-388 | 0 | 0 | 0 | 2014 |
170 | Performance Evaluation of Min-Min and Max-Min algorithms for job scheduling in federated cloud | International Journal of Computer Applications (IJCA) / 99 / 47-54 / 0975-8887 | 0.821 | 0 | 0 | 2014 |
171 | Authentication Mechanism to Enhance Security in the cloud environment | International Journal of Current Engineering and Technology (IJCET) / 4 / 3278-3281 / 2277-4106 | 1.274 | 0 | 0 | 2014 |
172 | A Framework to optimize task scheduling in cloud environment | International Journal of Computer Science and Information Technologies (IJCSIT) / 5 / 7060-7062 / 0975-7646 | 2.93 | 0 | 0 | 2014 |
173 | An extensive analysis on task scheduling Algorithms in cloud environment | International Journal of emerging technologies in computational and applied science(IJETCAS) / 10 / 310-313 / 0 | 0 | 0 | 0 | 2014 |
174 | General Aspect of (Big) Data Migration Methodologies | International Journal of Computer Science and Engineering (SSRG-IJCSE) / 1 / 37-40 / 2348 - 8387 | 0 | 0 | 0 | 2014 |
175 | Positional_nFCP Positions based Big Data algorithm to Identify n_length Frequent Contiguous Patterns FCP in a Large Human Genome Sequence Database | International Journal of Applied Engineering and Research (IJAER), (Scopus) / 9 / 771 - 780 / 0973-4562 | 0 | 0 | 0 | 2014 |
176 | Automated Data Validation Framework for Data Quality in Big Data Migration Projects | International Journal of Computer Science and Engineering (SSRG-IJCSE) / 1 / 24-27 / 2348 - 8387 | 0 | 0 | 0 | 2014 |
177 | IndexedFCP An Index based approach to identify Frequent Contiguous Patterns FCP in Big Data | IEEE International Conference on Intelligent Computing Applications (ICICA`14) / 0 / 27-31 / 0 | 0 | 0 | 0 | 2014 |
178 | An IoT Based Secured Smart Library System with NFC Based Book Tracking | International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) / 11 / 18-21 / 0976-1353 | 1.012 | 0 | 0 | 2014 |
179 | Enhanced Anonymization Algorithm to Preserve Confidentiality of Data in Public Cloud | International Conference on Information Society (i-Society 2014), IEEE / 0 / 86-91 / 978-1-908320-36-0 | 0 | 0 | 0 | 2014 |
180 | A Novel Framework for an Authentication as a Service in Public Cloud Environment | International Journal of Advanced Research in Computer and Communication Engineering / - / 61-66 / 9789351072942 | 0 | - | - | 2014 |
181 | Obfuscrypt: A Novel Confidentiality Technique for Cloud Storage | International Journal of Computer Applications / 88 / 17-21 / 0975 - 8887 | 0.821 | 0 | 0 | 2014 |
182 | A State of Art Scheduling Algorithms in Cloud | Advance Research in Computer Science & Technology (IJARSCT) / 2 / 476-481 / 2347 - 8446 | 0.889 | 0 | 0 | 2014 |
183 | A Security Service Algorithm to Ensure the Confidentiality of Data in Cloud Storage | International Journal of Engineering Research and Technology (IJERT) / 3 / 1053-1058 / 2278-0181 | 1.760 | 0 | 0 | 2014 |
184 | User Authentication Mechanism for Sharing E resource in Educational Clouds | International Journal of Networking and Communication Engineering / 0 / 0 / 0974-9713,0974-9616 | 0.569 | 0 | 0 | 2013 |
185 | Cognition Based user Interface Design Framework For E-Learning | International Journal of Advance Technology and Engineering Research (IJATER) / 3, Issue 1 / 135-140 / 2250-3536 | 0 | 0 | 0 | 2013 |
186 | User Interface Design for Effective E-Learning based on Personality Traits | International Journal of Computer Applications (IJCA) / 61, No. 14 / 28-32 / 0975-8887 | 0.814 | 0 | 0 | 2013 |
187 | Security Algorithms to Prevent Denial of Service (DoS) Attacks in WLAN | International Journal of Wireless Communications and Networking Technologies (IJWCNT) / 2 No. 1 / 1-7 / 2319-6629 | 0 | 0 | 0 | 2013 |
188 | A Quality of Service Performance Evaluation Strategy for Delay Classes in General Packet Radio Service | International Journal of Advanced Science and Technology / 50 / 91-98 / 0 | 0 | 0 | 0 | 2013 |
189 | Mathematical Modeling and Simulation Study of Delay-Sensitive Algorithm to Enhance Quality of Service in Mobile Networks | International Journal of Future Generation Communication and Networking / 5, No. 3 / 31-42 / 2233-7857 | 0 | 0 | 0 | 2013 |
190 | AAA Mechanism for Visiting Mobile Node in Network Mobility Environment | International Journal of Advanced Research in Computer Science and Software Engineering / 3, Issue 1 / 195-199 / 2277-128X | 0 | 0 | 0 | 2013 |
191 | Fuzzy Weighted Gaussian Mixture Model for Feature Reduction | International Journal of Computer Applications (IJCA) / 64, Issue 18 / 9-15 / 0975-8887 | 0.835 | 0 | 0 | 2013 |
192 | ArK Feature Selection Algorithm to resolve Small Sample Size Problem | International Journal of Artificial Intelligent Systems and Machine Learning / 0 / (Accepted) / 0974-9667,0974-9543 | 0.763 | 0 | 0 | 2013 |
193 | AAA Mechanism for Local Mobile Node in Network Mobility Environment | International Journal of Computer Networks and Wireless Communications (IJCNWC) / 3, No. 1 / 8-12 / 0 | 0 | 0 | 0 | 2013 |
194 | AROSA- Reliability Evaluation Framework | IET Software / 0 / (Accepted) / 1751-8806 | 0 | 0 | 0 | 2013 |
195 | An improved Feature Selection Algorithm using Modified Fisher Score and Principal Feature Analysis | Journal of Data Mining and Knowledge Discovery / 0 / Communi / 1384-5810 | 0 | 0 | 0 | 2013 |
196 | Modified Feature Selection algorithm to improve classification accuracy using MFS and PFA | International Journal of Data Mining and Bioinformatics / 0 / Communi / 1748-5673 | 0 | 0 | 0 | 2013 |
197 | Secure and Robust Cloud Storage with Cryptography and Access Control | International Journal of Computer Science and Engineering (Elixir) / 56 / 13481-134 / 229-712x | 0 | 0 | 0 | 2013 |
198 | Fuzzy Weighted Ordered Weighted Average Gaussian Mixture Model for Feature Reduction | International Journal of Computers & Technology / 4 / 694 - 712 / 2277-3061 | 0 | 0 | 0 | 2013 |
199 | Medium Access Control Spoof Detection and Prevention Algorithm (MAC SDP DoS) for Spoofing Attacks in WLAN | IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) / 3 / 165-171 / 2249-955 | 0 | 0 | 0 | 2013 |
200 | Framework to Detect and Prevent Medium Access Control Layer Denial of Service Attacks in WLAN | IRACST - International Journal of Computer Networks and Wireless Communications (IJCNWC) / 3 / 152-159 / 2250-3501 | 0 | 0 | 0 | 2013 |
201 | Pairwise Fuzzy Ordered Weighted Average Algorithm Gaussian Mixture Model for Feature Reduction | International Journal of Computers & Technology / 6 / 287-301 / 2277-3061 | 1.043 | 0 | 0 | 2013 |
202 | SOM ANN A novel approach to analyzing the Brown Plant Hopper | International Journal of Computer Science & Applications / 2 / 107-116 / 2278 - 1080 | 0 | 0 | 0 | 2013 |
203 | Auto Scaling in Cloud Computing An Overview | International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) / 2 / 2870-2875 / 2278- 1021 | 1.770 | 0 | 0 | 2013 |
204 | Mobile Cloud Security Issues and Challenges: A Perspective | International Journal of Electronics and Information Technology (IJEIT) / 3 / 401-406 / 2277- 3754 | 1.895 | 0 | 0 | 2013 |
205 | Cloud Service Tools State of the Art | International Journal of Electronics and Information Technology (IJEIT) / 3 / 102-108 / 2277- 3754 | 1.895 | 0 | 0 | 2013 |
206 | Enhancing Data Security During Transit in Public Cloud | International Journal of Electronics and Information Technology (IJEIT) / 3 / 486-491 / 2277- 3754 | 1.895 | 0 | 0 | 2013 |
207 | Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm | International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) / 2 / 3064-3070 / 2278- 1021 | 1.770 | 0 | 0 | 2013 |
208 | User Authentication Mechanism for Sharing E-resource in Educational Clouds | International Journal of Computer Science and Network Security (IJCSNS) / 13 / 58-62 / 0 | 0 | 0 | 0 | 2013 |
209 | An impact of learning behavior and creativity quotient in learning environment | International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) / 2 / 3807-3812 / 2278- 1021 | 1.770 | 0 | 0 | 2013 |
210 | Failure Management in Cloud An Overview | International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) / 2 / 4003-4008 / 2278-1021 | 1.770 | 0 | 0 | 2013 |
211 | Match Making Service MMS A Centralized Architecture to Enhance Scalability in a Heterogeneous Cloud | International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) / 3 / 1128-1135 / 2277 128X | 2.080 | 0 | 0 | 2013 |
212 | Enhancing the Interpretability of Soil Classification Data from a Neural Network System by Using Fuzzy Approaches | International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) / 3 / 459-465 / 2277 128X | 2.080 | 0 | 0 | 2013 |
213 | A Novel LAS Relief Feature Selection Algorithm for Enhancing Classification Accuracy in Data Mining | International Journal of Computers & Technology (IJCT) / 11 / 2921-2927 / 2277-3061 | 1.341 | 0 | 0 | 2013 |
214 | A Systematic Approach on Data Pre processing in Data Mining | International Journal of Advanced Computer Technology (IJACT) / 2 / 335-339 / 2320-0790 | 0 | 0 | 0 | 2013 |
215 | Maintenance Effort Prediction Model Using Cognitive Complexity Metrics | International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) / 3 / 1599-1608 / 2277 128X | 2.080 | 0 | 0 | 2013 |
216 | Applying Data Mining Techniques on Soil Fertility Prediction | International Journal of Computer Applications Technology and Research (IJCATR) / 2 / 660-664 / 2320-0790 | 0 | 0 | 0 | 2013 |
217 | MSDoT Memory Size and Depth of Tier Based Queuing Model for Scheduling a Multi-Tier Cloud | Proceedings of International Conference on Emerging Trends and Applications in Computer Science (ICETACS), IEEE Xplore / - / 119-124 / 978-1-4673-5249-9 | 0 | 0 | 0 | 2013 |
218 | Impact of Depression and Stress on the Programming Performance of the Students | International Journal of Data Mining Knowledge Engineering / 0 / 0 / 0974-9683,0974-9578 | 0.621 | 0 | 0 | 2012 |
219 | A Study on Feature Selection using Machine Learning Techniques | International Journal of Data Mining Knowledge Engineering / 0 / 0 / 0974-9683,0974-9578 | 0.621 | 0 | 0 | 2012 |
220 | MFSPFA: An Enhanced Filter based Feature Selection Algorithm | International Journal of Computer Applications / 51, No. 12 / 27-31 / 0975-8887 | 0.814 | 0 | 0 | 2012 |
221 | An Impact of Emotional Happiness in Students? Learning Environment | International Journal of Data Mining Knowledge Engineering / 0 / 0 / 0974-9683,0974-9578 | 0 | 0 | 0 | 2012 |
222 | Feature Selection: A New Perspective | International Journal of Data Mining Knowledge Engineering / 0 / 0 / 0974-9683,0974-9578 | 0.621 | 0 | 0 | 2012 |
223 | Vertical Scalability Issues and Challenges in Cloud Computing: An Overview | International Journal of Networking and Communication Engineering / 0 / 0 / 0974-9713,0974-9616 | 0.569 | 0 | 0 | 2012 |
224 | A Survey on Horizontal Scalability in Cloud Computing An Overview | International Journal of Networking and Communication Engineering / 0 / 0 / 0974-9713,0974-9616 | 0.569 | 0 | 0 | 2012 |
225 | Survey on User Authentication for Cloud Computing | International Journal of Networking and Communication Engineering / 0 / 0 / 0974-9713,0974-9616 | 0.569 | 0 | 0 | 2012 |
226 | SECURITY ISSUES CHALLENGES AND SOLUTIONS IN NETWORK MOBILITY A REVIEW | International Journal of Computer Networks and Wireless Communications (IJCNWC) / 2, No.2 / 0 / 2250-3501 | 0.274 | 0 | 0 | 2012 |
227 | FTM A Middle Layer Architecture for Fault Tolerance in Cloud Computing | IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies ICNICT / 0 / 12-16 / 0 | 0 | 0 | 0 | 2012 |
228 | AAA Mechanism for Mobile Router in Network Mobility Environment | International Journal of Advanced Research in Computer and Communication Engineering / 1, Issue 10 / 832-836 / 2278-1021 | 0 | 0 | 0 | 2012 |
229 | Enhanced Feature Selection Algorithm using Modified Fisher Criterion and Principal Feature Analysis | International Journal of Advanced Research in Computer Science / 3, No. 4 / 310-314 / 0976-5697 | 0 | 0 | 0 | 2012 |
230 | Outlook of ANN in Agriculture Data Mining | International journal of Soft Computing / 7, Issue 1 / 24-27 / 1816-9503 | 0 | 0 | 0 | 2012 |
231 | Clustering Methods and Algorithms in Data Mining :review | Asian Journal of information Technology / 11, Issue 1 / 40-44 / 1682-3915 | 0 | 0 | 0 | 2012 |
232 | Importance of Association Rules in Data Mining : A Review | International journal of Soft Computing / 7,Issue 3 / 135-140 / 1816-9503 | 0 | 0 | 0 | 2012 |
233 | A new methodology to overcome high dimensionality problem in data mining | International Journal of Data Warehousing and Mining / 0 / (Accepted) / 0 | 0 | 0 | 0 | 2012 |
234 | An Inverse Modified Fisher Criterion to solve under-sampled problem in Data Mining | IEEE Transactions on Knowledge and Data Engineering (TKDE) / 0 / Communi / 0 | 0 | 0 | 0 | 2012 |
235 | Privacy in Cloud Computing: A Survey | Proceedings of the International Conference of Advanced Computer Science & Information (ACSIT- 2012) / 0 / 231-330 / 0 | 0 | 0 | 0 | 2012 |
236 | Positional - LCS: A Position based algorithm to find Longest Common Subsequence (LCS) in Sequence Database (SDB) | IEEE International Conference on Computational Intelligence and Computing Research / 0 / 284-287 / 0 | 0 | 0 | 0 | 2012 |
237 | HeurisFCP-A Heuristic Approach to Identify Frequent Contiguous Patterns (FCP) in Sequence Database | Proceedings of the International Conference on Radar, Communication and Computing (ICRCC 2012) / 0 / 215?220 / 0 | 0 | 0 | 0 | 2012 |
National |
||||||
SNo | Title | Name of Journal / Vol. No. / Page Nos/ISSNO. | Impact Factor | H Index No. | C Index No. | Year |
---|---|---|---|---|---|---|
1 | Predictive Model for Diabetes Mellitus in Tamil Nadu Using IoT Data | National Conference on Transforming Technology / 0 / 0 / 0 | 0 | 0 | 0 | 2018 |
2 | A Survey of Algorithms for Scheduling in the cloud: In a metric basis | National Conference on Transforming Technology / 0 / 0 / 0 | 0 | 0 | 0 | 2018 |
3 | An Enhanced Architecture for Imputing Missing Data in IoT Data using FRBIS Model | Proceedings of the National Conference on Advanced Computing Technologies and Applications / 0 / 0 / 978-1-941505-83-0 | 0 | 0 | 0 | 2018 |
4 | FRND: False Rank Node Detection Algorithm in RPL Topology | Proceedings of National Conference on Advanced Computing Technologies and Applications / 0 / 0 / 978-1-941505-83-0 | 0 | 0 | 0 | 2018 |
5 | RESEARCH ISSUES ON WEB MINING | State-Of-The-Art and Research Issues In Cloud Computing / - / null / null | null | - | - | 2017 |
6 | A Unified Model for Cloud Data Confidentiality | Fifth National Conference on Intelligent computing(FNCIC) / - / 87-92 / 0 | 0 | - | - | 2016 |
7 | Parallel DBScan algorithm for removing noise in IoTBig data | Fifth National Conference on Intelligent computing(FNCIC) / - / 99-104 / 0 | 0 | - | - | 2016 |
8 | A Methodology for preprocessing and construction of Diabetic Mellitus Warehouse | Fifth National Conference on Intelligent computing(FNCIC) / - / 93-98 / 0 | 0 | - | - | 2016 |
9 | User Demand Forecasting UDF for Dynamic Schedule Based Auto-scaling in Cloud Environment | User Demand Forecasting (UDF) for Dynamic Schedule Based Auto-scaling in Cloud Environment / - / null / null | null | - | - | 2016 |
10 | A Framework for Cloud Confidentiality in Public Cloud Storage | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 8-14 / 0976-2523 | 0 | - | - | 2015 |
11 | A Study on Cloud Data Security Issues | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 15-25 / 00976-2523 | 0 | - | - | 2015 |
12 | An Enhanced Qualitative Framework for Data Integration with Multiple Data Sources using Parallel Processing | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 26-32 / 0976-2523 | 0 | - | - | 2015 |
13 | Enhanced Authentication Framework for Mobile Cloud Environment | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 41-46 / 0976-2523 | 0 | - | - | 2015 |
14 | Issues and Challenges in Sentiment Analysis: A Survey | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 55-62 / 0976-2523 | 0 | - | - | 2015 |
15 | EQOS-AODV: A Technique to Enhance Quality of Service using Half Transmission Area Towards Sender | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 47-54 / 0976-2523 | 0 | - | - | 2015 |
16 | Large Scale Sentiment Analysis on Cloud Environment | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 63-71 / 0976-2523 | 0 | - | - | 2015 |
17 | User Behavior Identifier (UBI) for Schedule Based Auto-scaling in Cloud Environment | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 105-114 / 0976-2523 | 0 | - | - | 2015 |
18 | A Survey on the Metamorphosis of IoT Big Data into Quality Data using Pre-processing Techniques | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 115-123 / 0976-2523 | 0 | - | - | 2015 |
19 | Enhanced Authentication Mechanism for Public Cloud | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 124-131 / 0976-2523 | 0 | - | - | 2015 |
20 | A Study on Aspect based Sentiment Analysis on Big Data | In Proceedings of National Seminar on Cloud Computing (NSCC `15), MISBAH Journal / 15 / 132-140 / 0976-2523 | 0 | - | - | 2015 |
21 | Enhanced Architecture for Data Confidentiality in Cloud Computing | National Conference on Data Science and Engineering (NCDS 2014) / 0 / 40-45 / 9789351072942 | 0 | 0 | 0 | 2014 |
22 | A Cluster Based Services for Load Balancing in Cloud Computing Environment | National Conference on Data Science and Engineering (NCDS 2014) / 0 / 46-52 / 9789351072942 | 0 | 0 | 0 | 2014 |
23 | A Cluster Based Task Scheduling in Cloud Computing | National Conference on Data Science and Engineering (NCDS 2014) / 0 / 53-60 / 9789351072942 | 0 | 0 | 0 | 2014 |
24 | A Framework to Ensure Data Security in Public Cloud Storage | National Conference on Data Science and Engineering (NCDS 2014) / 0 / 88-92 / 9789351072942 | 0 | 0 | 0 | 2014 |
25 | A Pioneering Approach on Cloud Data Security using Cryptography | National Conference on Data Science and Engineering (NCDS 2014) / 0 / 23-32 / 9789351072942 | 0 | 0 | 0 | 2014 |
26 | Combining Top-Down and Bottom-Up Scalable Multidimensional Anonymization over Big Data using Map reduce on Cloud | National Conference on Data Science and Engineering (NCDS 2014) / 0 / 75-87 / 9789351072942 | 0 | 0 | 0 | 2014 |
Regional |
||||||
SNo | Title | Name of Journal / Vol. No. / Page Nos/ISSNO. | Impact Factor | H Index No. | C Index No. | Year |
---|---|---|---|---|---|---|
1 | Cloud Computing : Opportunities and Challenges | Retell / 21 / 28-34 / ISSN 0973-404X | - | - | - | 2019 |
2 | Quality of Services in the Internet of Things (IOT) - A Survey | Retell / 21 / 35-43 / ISSN 0973-404X | - | - | - | 2019 |
Seminars(S) / Conferences(C) /Workshops(WS) attended and the source of funding (National (N) / International (IN)) with details of outstanding participants, if any
SNo | Title | Type | Organization Name | Place | Days | Date |
---|---|---|---|---|---|---|
1 | Faculty Development Program on Innovative practices in Teaching Learning Process | O | SND College of Engineering and Research Center | Babhulgaon, Yeola | 5 | 2024-03-18 |
2 | State Level Inter Collegiate Technical Symposium TECHX 24 | Y | St.Joseph`s College(A) | Tiruchirappalli | 1 | 2024-03-12 |
3 | Miles Education | R | Miles Education Private Limited | Bengaluru | 1 | 2024-01-27 |
4 | The Impact of Disruptive Technologies ICIDT - 2024 | I | St.Joseph`s College(A) | Tiruchirappalli | 2 | 2024-01-08 |
5 | Faculty Development Program on Recent Trends in Machine Learning | R | Mangalmay Institute of Engineering And Technology | Greater noida | 3 | 2024-01-02 |
6 | Faculty Development Programme on patents and Consultancy | R | Internal Quality Assurance Cell and Joseph start-up centre | St. Joseph`s College, Trichy | 1 | 2023-11-20 |
7 | Global Vision Towards AI: Research and Application Perspectives | C | SRM Institute of Science and Technology | Kattankulathur | 1 | 2023-11-14 |
8 | Faculty Development Program on Intricacies of Writing for Research Publications and Projects | O | IQAC, St.Joseph`s College(A) | Tiruchirappalli | 1 | 2023-10-26 |
9 | Edge cutting technologies in IT field | S | Rajapalayam Raju`s College | Rajaplayam | 5 | 2023-09-19 |
10 | Two day interdisciplinary national conference on technological advancement in computer science: Artificial intelligence, Machine Learning, and Data Science | C | Dr.S.C.Gulhane prerna college of commerce, science and arts | Nagpur | 2 | 2023-09-08 |
11 | Road Map to Research | W | IEEE sahrdaya SB andIEEE NPDD | - | 1 | 2023-08-16 |
12 | Orientation Programme for the Teaching Faculty | Z | St. Joseph`s College | Tiruchirappalli | 2 | 2023-06-15 |
13 | The Evolution of Digital Learning in higher Education | I | Courtyard by Marriott | Trichy | 1 | 2023-04-20 |
14 | Research areas in Data analytics and security | C | Holy Cross College(A) | Trichy | 1 | 2022-12-19 |
15 | FDP on "Open Educational Resources" - Search, Identify, Repurpose and Create your OER | S | St. Joseph`s College(Autonomous) | Trichy | 1 | 2021-09-25 |
16 | International Conference on Research and Development in Science , Engineering and Technology | I | St. Anne`s College of Engineering and Technology | Panruti | 1 | 2021-03-05 |
17 | IoT and it`s Application | S | SLS. MAVMM. AYIRA VAISYAR COLLEGE | Madurai | 1 | 2020-05-27 |
18 | Data Science and Visualization using Python | W | CSI Gwalior Chapter & the Institution of Engineers | - | 1 | 2020-05-24 |
19 | Recent Trends in Information Technology | S | J. J. College of Arts and Science | PudukKottai | 1 | 2020-05-24 |
20 | Trends and Scope in Robotics | S | AALIM MUHAMMED SALEGH COLLEGE OF ENGINEERING | Chennai | 1 | 2020-05-16 |
21 | FDP on Machine Learning Algorithms | S | Dwaraka Doss Goverdhan Doss Vaishnav College | Chennai | 1 | 2020-05-13 |
22 | Machine Learning Algorithms | W | Shasun Jain College for Women | Chennai | 1 | 2020-05-10 |
23 | International Conference on Computer Networks, Big Data and IoT | I | Vaigai College of Engineering | Madurai | 2 | 2019-12-19 |
24 | International Conference on Smart systems and Innovative Technology | I | Francis Xavier Engineering college | Tirunelveli | 3 | 2019-11-27 |
25 | International Conference on Inventive Communication and Computational technologies | I | Gnanamani College of Technology | Namakkal | 2 | 2019-04-29 |
26 | International Conference on Computer Networks Big Data and IoT (ICCBI - 2018) | I | Springer, Vaigai College of Engineering | Madurai | 2 | 2018-12-20 |
27 | International Conference on Smart Systems and Inventive Technology (ICSSIT 2018) | I | IEEE, Francis Xavier Engineering College | Tirunelveli | 2 | 2018-12-14 |
28 | International Conference on Advances in Computer Science and Technology | I | St. Francis de Sales College | Bengaluru | 1 | 2018-01-24 |
29 | National conference on transforming technology | C | Srimad Andavan Arts and Science college | Trichy | 2 | 2018-01-24 |
30 | International Conference on Intelligent Computing, Instrumentation and Control Technologies | I | Vimal Jothi Engg. College | Kannur, Kerala | 2 | 2017-07-06 |
31 | International Conference on Trends in Technology and Engineering | I | Arjun College of Technology | Coimbatore | 2 | 2017-04-06 |
32 | International Conference on Newer engineering concepts and technology | I | International Conference on Newer engineering concepts and technology | Trichy | 2 | 2017-03-28 |
33 | IT Skill show & International conference on Advancements in Computing Resources | I | Alagappa Institute of Skill Development & Computer Science | Karaikudi | 2 | 2017-02-15 |
34 | 2nd World Congress Computing and Communication Technology | I | Department of Computer Science & IT, St.Joseph`s college | Tiruchirappalli | 3 | 2017-02-02 |
35 | International conference on Emerging trends in engineering & Technology | I | Arunachala College of Engineering for women | Kanyakumari | 2 | 2016-12-09 |
36 | 4th International Conference on Artificial Intelligence & Computer Science | I | World Conferences.net | Adya Hotel Langkawi, Malaysia | 2 | 2016-11-28 |
37 | 2nd World Congress Computing and Communication Technology | I | Department of Computer Science, St.Jospeh`s College | Tiruchirappalli | 3 | 2016-02-02 |
38 | Big Data Analytics and Business Intelligence | W | Department of Computer Science, St. Josephs College (Autonomous) | Tiruchirappalli | 2 | 2016-01-04 |
39 | 1st International Conference on Modeling, Simulation and Control (ICMSC 15) | I | Karpagam University | Coimbatore | 2 | 2015-10-15 |
40 | 2nd International Conference on Engineering Technology and Science (ICETS 15) | I | Muthayammal College of Engineering | Rasipuram, Namakkal | 2 | 2015-03-05 |
41 | National Seminar on Ethical Hacking - An Inevitable Tool for a Secured Organization | S | Kakaraparti Bhavanarayana College (Autonomous) | Vijayawada, Andhra Pradesh | 2 | 2014-12-12 |
42 | International Conference on Intelligent Network and Computing (ICINC 2014) | I | Curtin University, Sarawak | Malaysia | 2 | 2014-06-07 |
43 | National Workshop on Research Issues in big Data | W | Computer Society of India (CSI) | Bharathidasn University Technology Park, Tiruchirappalli | 1 | 2014-03-27 |
44 | International Conference on Challenges & Opportunities of Information Communication Technology- ICCOICT14 | I | Bon Secour`s College for Women | Thanjavur | 1 | 2014-02-05 |
45 | Second International Conference on Research Trends in Computer Technologies (ICRTCT) | I | Dr.N.G.P College | Coimbatore | 1 | 2014-01-31 |
46 | First International Conference on Emerging Trends and Applications in Computer Science (ICETACS) | I | IEEE | Shilong | 2 | 2013-09-13 |
47 | Conference | C | College | - | 1 | 2010-01-01 |
48 | Conference | I | College | - | 1 | 2010-01-01 |
(Special Lectures / Workshops / Seminars / Association Activities/ Alumni Meeting)
SNo | Type of Programme | Title | Beneficiaries | Days | Date |
---|---|---|---|---|---|
1 | State Level Workshop, Idhaya College for Women, Sarugani | AI and Data Science Tools | Students | 1 | 2024-01-31 |
2 | Seminar | Recent trends in computer science | Sri Lakshmi college of arts & science, Kallakuruch | 1 | 2023-03-09 |
3 | One day Workshop | Data Science Tools and Techniques | Servite arts and science College for Women | 1 | 2023-02-18 |
4 | Workshop on Material Informatics | Data Science and Machine Learning | NIT Trichy | 1 | 2023-02-06 |
5 | Judge for International Conference | Scientific and Technological Advancements for Reliable and Sustainable-Future (STARS-2022) | Bishop Heber College, Trichy | 3 | 2022-11-16 |
6 | Faculty Development Programme | Writing Research grant proposals | Adhiyaman Arts and Science college for women | 7 | 2022-10-10 |
7 | Faculty Development Programme | Integrated data analytics tools and applications across industry verticals | Holy cross college(A), Tiruchirappalli | 5 | 2021-07-05 |
8 | Reviewer for the International Conference | Innovative Intelligence Computing and Applications | Dept. of CS, Idhaya College for Women | 1 | 2019-08-28 |
9 | Workshop | Intellectual Property Rights (IPR) & Research Proposal writing | PG & Research department of CS, Mass College | 1 | 2019-08-17 |
10 | National Level Seminar | IoT - The Next Technology | Adiyaman Arts & Science College for Women | 1 | 2019-08-14 |
11 | Orientation Programme | Life Coping Skills | St. Anne`s College of Engineering and Education | 1 | 2019-07-16 |
12 | Conference Chair | Recent Trends in Advanced Computing | PG and Research Scholars,SJC of arts and science | 1 | 2019-02-07 |
13 | Special Lecture | Internet of things basics, Applications: Issues and challenges | B.E. & MCA, Paavai Engineering College, Namakkal | 1 | 2019-01-24 |
14 | Special Lecture | External Funding for Major / Minor / Seminar / Conferences | Academicians and Researchers in CS, Sacred Heart | 1 | 2018-08-24 |
15 | Keynote Speaker | Internet of things(IoT) | UG & PG students, Syed Ammal Arts & science. | 1 | 2018-08-01 |
16 | Workshop | Cloud for Eductional Intitutions | UG & PG students, Mother Teresa, Kodaikanal. | 2 | 2018-06-23 |
17 | Special Lecture | Research Skill Develpment | Faculty, Shri Sakthikailassh Womens college, salem | 1 | 2018-05-15 |
18 | Keynote Speaker | Advanced Computing Technologies and Applications | UG & PG students, REVA university, Bangalore | 1 | 2018-04-06 |
19 | Training Programme | Proposal Writing | Staffs, Arul Anandar College, Madurai | 1 | 2018-02-08 |
20 | Workshop | Advanced Big Data Analytics using R | Staffs, Cauvery college for women, Trichy | 1 | 2018-01-25 |
21 | Moderator and Invited Speaker | International Conference on Advances in Computer science | Staffs & Students, St. Francis de Sales College | 1 | 2018-01-24 |
22 | Seminar | Internet of Things | MCA & PG, Ganesar college, Melasivapuri | 1 | 2017-12-29 |
23 | Special Lecture | Introduction to Internet of Things in the workshop on IoT and its applications | UG, PG & MCA Students, SJC, Trichy | 1 | 2017-12-15 |
24 | Seminar | The Internet of Things-The Next Technology | B.E. & MCA, Paavai Engineering College, Namakkal | 1 | 2017-10-11 |
25 | Workshop | Research Methodology and Project Writing | Staffs, K. Ramakrishnan col of tech, Trichy | 1 | 2017-10-07 |
26 | Session Chair | Viewpoints in Cloud Security | Staffs & Research, Christhu Raj Institute | 1 | 2017-09-28 |
27 | National Seminar | Emerging Trends in Information Technology | UG, PG, Idhaya college for women, Sarugani | 1 | 2017-09-20 |
28 | Seminar | Big Data Analytics | B.E., Adi Shankara Institute of Engineering Col | 1 | 2017-08-12 |
29 | Keynote Speaker | Efficient Research Proposal Writing | Staffs & Research, SJC, Trichy | 1 | 2017-08-01 |
30 | Seminar | Research Project Agencies and Project Proposal Writing | Staffs, Holy cross college, Trichy | 1 | 2017-07-17 |
31 | Seminar | Big Data Analytics | B.E. & MCA, Paavai Engineering College, Namakkal | 1 | 2017-07-07 |
32 | Workshop | IoT-The Next Technology Mega-Trend | MCA, St.Xavier`s college, Palayamkottai | 1 | 2017-03-06 |
33 | State Level Workshop | Wonders of IoT | PG Students, Jayaraj annapackiam col | 1 | 2017-03-04 |
34 | Conference Chair | International Conference on current trends in Advanced computing | Staffs&Students, Kristu Jayanti College, Bengaluru | 2 | 2017-03-02 |
35 | Special Lecture on Preparing Research Article | Srimad andavan arts & Science College, Tiruchirappalli | PG and Research Dept. of CS | 1 | 2017-01-30 |
36 | State Level Seminar | Innovative Researches in Computer Science | PG & Research students, Srimad Andavan College | 1 | 2017-01-30 |
37 | National Workshop | Data science research-Biological data management | Staffs & Research, Jamal Mohamed College, Trichy | 3 | 2017-01-23 |
38 | Resource Person on National level workshop on Data science Research | Jamal Mohamed College, Tiruchirappalli | PG and Research students | 3 | 2017-01-23 |
39 | Guest Lecture on ICT in Education and Research | St.Anne`s B.Ed College for Women, Periyakulam | B.Ed Students | 1 | 2016-09-22 |
40 | Lecture on Data Analytics using R | Jayaraj annapackiam college for women | M.Sc Maths and CS students | 2 | 2016-09-20 |
41 | Resource Person on National level workshop on Research Methodology and MATLAB | St.Joseph`s college of arts and science, Cuddalore. | PG and Research Dept. of CS | 2 | 2016-09-16 |
42 | Short Course on Relational Database Management System | St.Joseph`s Institute of Management, Tiruchirappllai | MBA Students | 2 | 2016-08-11 |
43 | Short Course on Software Engineering | St.Joseph`s Institute of Management, Tiruchirappllai | MBA students | 2 | 2016-08-06 |
44 | Lecture on Cloud Computing and IT Security | Mother Tersea Womens Univeristy, Kodaikanal | MCA and MPhil students | 1 | 2016-07-14 |
45 | Ph.D External Examinar (Viva-Voce) | Erode Arts and Science College | Bharathiyar University | 1 | 2016-07-04 |
46 | UGC Sponsored National Seminar on Emerging Trends in ICT-Enabled Teaching Learning Process | Pavanatma College, Murockassery, Iduki, Kerala | Students | 2 | 2016-02-11 |
47 | UGC Sponsored Three Days National Seminar | Cloud Computing | Students & Staffs, MES College, Kerala | 3 | 2015-09-15 |
48 | Special lecture | Successful Project Writing | Faculties,St. Mary`s College,Tuticorin | 1 | 2015-07-08 |
49 | Special lecture | Information Security and Be a Winner | Students, Vasavi Vidya Trust Group of Institutions | 1 | 2015-03-04 |
50 | UGC Sponsored Two Days Workshop | Data Mining and Research Methodology & Article Writing | M.phil. and Research Scholars | 2 | 2015-02-07 |
51 | Seminar | Recent Trends in IoT | Students | 1 | 2015-01-31 |
52 | Special Lecture | Big Data and Green Computing | Students | 1 | 2015-01-21 |
53 | Special Lecture | Ethical Hacking - An Inevitable Tool for a Secured Organization | Students | 2 | 2014-12-12 |
54 | Seminar | Cloud Computing and Big Data | Students and Teachers | 1 | 2014-12-09 |
55 | Special Lecture | Cloud and Big Data | Students | 1 | 2014-10-31 |
56 | Special Lecture | Big Data Analysis | Students | 1 | 2014-10-13 |
57 | National Level Workshop | Internet Security, Changes and Challenges | Students | 1 | 2014-09-26 |
58 | Keynote Speaker | Cloud Computing: Opportunities and Challenges | Students | 1 | 2014-09-17 |
59 | Special Lecture | Research methodology | Students | 1 | 2014-09-04 |
60 | Special Lecture | Cloud Computing & Big Data | Students | 1 | 2014-09-02 |
61 | workshop | Cloud Computing and Big Data | Students | 1 | 2014-08-21 |
62 | Seminar | Cloud Computing | Students | 1 | 2014-08-16 |
63 | Technical Chair | Drafting funded project proposal | Students | 1 | 2014-08-11 |
64 | Keynote Speaker and Session Chair | National Conference on Data Science NCDS-2014 | Students | 2 | 2014-08-07 |
65 | Workshop | WEKA | Students | 1 | 2014-04-12 |
66 | Technical Chair | National Conference on Mining, Internetworking and Data Security- MINDS 2014 | Students | 1 | 2014-03-28 |
67 | UGC Funded Workshop | Research in Data Mining using WEKA | Students | 1 | 2014-03-05 |
68 | UGC Funded Workshop | Big Data | Students | 1 | 2014-03-05 |
69 | Organizing Committee Member-Conference | World Congress on Computing and Communication Tech | Institution | 3 | 2014-02-27 |
70 | Ph.D. External Examiner (Viva-Voce) | Karpagam university, Coimbatore | University | 1 | 2014-02-24 |
71 | Two-Days National Level Workshop | WEKA | Students | 2 | 2014-02-14 |
72 | Special Lecture | Research Methodology and Scientific Writing | Ph.D Scholars and P.G. students | 1 | 2014-02-13 |
73 | National Level Seminar | Recent Trends in IT Field | Students | 1 | 2014-02-01 |
74 | Board of Studies | St.Xavier`s College (Autonomous) | Institution | 1 | 2014-01-11 |
75 | National Workshop | WEKA | Students | 1 | 2014-01-10 |
76 | National Level Faculty Development Programme | Research and Research Funding | Faculties | 1 | 2013-12-16 |
77 | Special Lecture | Interview and Soft Skills | Students | 1 | 2013-12-16 |
78 | Special Lecture | Project Proposal Writing and Funding | Faculties | 1 | 2013-12-12 |
79 | Board of Studies | Sri Sarada College for Women | Institution | 1 | 2013-11-30 |
80 | Special Lecture | Big Data in Business | Students | 1 | 2013-11-23 |
81 | Workshop | Modern Research Methodology | Students | 1 | 2013-10-28 |
82 | Member- Advisory Committee to the Editorial Board | Nehru Memorial College | Institution | 1 | 2013-10-01 |
83 | Academic Auditor | PSGR Krishnammal College for Women | Institution | 1 | 2013-09-30 |
84 | State Level Seminar | Cloud Computing | Students | 1 | 2013-09-28 |
85 | Subject Expert | Faculty Enhancement Programme | Faculties and Students | 1 | 2013-09-03 |
86 | Guest Lecture | Special interaction on Research | M. Tech. students and Faculty Members | 1 | 2013-07-19 |
87 | Special Lecture | To succeed in as Interview | Dept of Tamil, St. Joseph`s College | 1 | 2013-02-26 |
88 | National Seminar on Construction Project Management | Project Management | Civil Engineers, Oxford Engineering College | 1 | 2013-02-23 |
89 | Special Lecture | Cloud Computing Issues and Challenges | M.Phil and Final Year PG students, Nehru Memorial | 1 | 2013-02-13 |
90 | Special Lecture | Cloud Computing | MCA Students, SJC | 1 | 2013-02-13 |
91 | Seminar | Cloud Computing Issues and Challenges | M.Phil. & Ph.D. Research Scholars, St. Xaviers. | 1 | 2013-02-12 |
92 | Seminar | Cloud Computing Issues and Challenges | MCA students, Jayaram College of Engineering Tech | 1 | 2013-02-07 |
93 | Seminar | Research Opportunities and Challenges in Mobile Networks and Cloud Computing | M.Phil. & Ph.D. Research Scholars, Jain College. | 1 | 2013-02-02 |
94 | Workshop | Cloud Computing Issues and Challenges | M.Phil. & Ph.D. Research Scholars, Jamal Mohmad. | 1 | 2013-01-23 |
95 | Conference Chair | International Conference on Engineering Trends in Science and Engineering Technology | J. J College of Engineering and Technology | 1 | 2012-12-14 |
96 | Special Lecture | Research Methodology | M.Phil. & Ph.D. Research Scholars, BUTP. | 1 | 2012-11-06 |
97 | Chair Person for the Paper Presentation | WebFest 12 | Holy Cross College | 1 | 2012-10-19 |
98 | Special lecture | Cloud Computing Issues and Challenges | M.Phil. & Ph.D. Research Scholars, Sacred Heart. | 1 | 2012-08-31 |
99 | Special Lecture | Be a Winner | Students, Oxford Engineering College, Trichy. | 1 | 2012-08-03 |
100 | Workshop | Cloud Computing | M.Phil. & Ph.D. Research Scholars, KONGU, Erode. | 1 | 2012-08-01 |
(From National(N) / International(IN), funding agencies and Total grants received.)
SNo | Title of the Project | Type | Status | Finding Agency | Duration | Amount(in Rupees) | Year |
---|---|---|---|---|---|---|---|
1 | INTERNET OF THINGS BASED COAL MINE SAFETY MONITORING AND ALERTING SYSTEM | MI | C | St.Joseph's College(A) | 1 | 17,000 | 2022 |
2 | Developing predictive models to forecast and pre-treat Diabetes mellitus in Tamil Nadu using clinical | MI | C | UGC - SERO | 2 years | 1,90,000 | 2017 |
3 | A Framework to Enhance Security using Authentication, Authorization and Accounting (AAA) Mechanisms in NEtwork MObility (NEMO) Environment | MI | C | UGC | 2 | 1,80,000 | 2012 |
4 | Enhancing the Functional and Non-Functional Metrics of Reliability in a Dynamic Web Service Environment | MA | C | DST | 3 | 10,32,000 | 2011 |
5 | An investigation into the Cognitive Complexity of Component based System | MI | C | UGC | 2 | 1,35,000 | 2009 |
6 | A study on the impact of Emotional Competence on the Comprehension of Object Oriented Systems for Competitive Advantage | MI | C | UGC | 2 | 70,000 | 2007 |
7 | An investigation into the Cognitive Complexity of Object-oriented Systems | MI | C | UGC | 2 | 35,000 | 2007 |
SNo | Award Name | Organization Name |
---|---|---|
1 | Best Academic Researcher | ASDF Global Awards |
2 | Rev. Dr. A. Sebastian SJ Award for "Best Teacher in College" | St. Josephs College (Autonomous), Tiruchirappalli, India |
3 | Dr. Iruthaya Arockiasamy Award for "Best Research Publications in Science" | St. Josephs College (Autonomous), Tiruchirappalli, India |
4 | T.V. Antony Award for "Best Research Publications in Science" | St. Josephs College (Autonomous), Tiruchirappalli, India |
5 | T.V. Antony Award for "Best Research Publications in Science" | St. Josephs College (Autonomous), Tiruchirappalli, India |
6 | Rev. Dr. A. Sebastian SJ Award for "Best Teacher in College" | St. Josephs College (Autonomous), Tiruchirappalli, India |
7 | Rev. Dr. T. V. Antony Award for | St. Josephs College (Autonomous), Tiruchirappalli, India |
8 | College Management Cash Award for | St. Josephs College (Autonomous), Tiruchirappalli, India |
9 | Dr. D.I. Arockiasamy Cash Award for "Best Paper Published with Good Impact Factor" | St. Josephs College (Autonomous), Tiruchirappalli, India |
10 | Best Paper | International Journal of Computer Science Engineering and Information Technology Research |
11 | Book Writer | St. Josephs College (Autonomous), Tiruchirappalli, India |
12 | Best Teacher of the College | St. Josephs College (Autonomous), Tiruchirappalli, India |
13 | Best Teacher of the College | St. Joseph`s College |
14 | Senate Member | Bharathidasan University , Trichy |
15 | Best Researcher Award Science | Xavier Board of Higher Education In India, Bangalore. |
Ph.D Awarded to |
||||
SNo | Scholar Code | Scholar Name | Date of ViVa | Title |
---|---|---|---|---|
1 | BDU. Ref. No. 1663 | P. Calduwel Newton | 2012 | Routing Algorithms to Enhance the Quality of Service in Mobile Networks |
2 | BDU. Ref. No. 2329 | N. Sasikaladevi | 2013 | Reliability Enforced Service Selection Approaches for Composite Web Services |
3 | BDU. Ref. No. 4840 | A. Aloysius | 2013 | A Cognitive Complexity Metrics Suite for Object Oriented Design |
4 | BDU. Ref. No. 11161 | J. Isac Gnanaraj | 2014 | Authentication, Authorization and Accounting Mechanisms to Enhance Security in Network Mobility |
5 | BDU. Ref. No. 36852 | V. Arul Kumar | 2013 | Feature Selection Approaches to Enhance the Classification Accuracy |
6 | BDU. Ref. No. 5326 | J. Charles Selvaraj | 2014 | User Interface Design Framework based on Cognition for Effective E-learning |
7 | BDU. Ref. No. 22920 | S. Charles | 2014 | Feature Reduction Techniques to Enhance the Clustering Accuracy |
8 | BDU Ref. No. 34005 | S.S.Baskar | 2014 | Feature Selection Techniques to Enhance Classification Accuracy in Data Mining |
9 | MSU/RES/R1/REG NO.7809 | S. S. Manikandasaran | 2015 | Security Framework to Ensure the Confidentiality of Outsourced Data in Public Cloud Storage |
10 | BDU Ref. No. 7918 | R. Jemina Priyadarsini | 2016 | Optimized Meta Task Scheduling Algorithms for Cloud Environment |
11 | BDU Ref. No. 33312 | A. Stanislas | 2016 | Optimization of Virtual Machine Generation in a Scalable Heterogeneous Federated Cloud Environment |
12 | COSDEC11042 | S. Raja Sekaran | 2017 | Enhanced Algorithms for mining the complete-set of Frequent Contiguous Pattern(FCPS) in DNASequences |
13 | BDU Ref. No. 47564 | S. Arul Oli | 2017 | Confidentiality Techniques to Enhance Data Security in Public Cloud Storage |
14 | 12PHP1163 | I. Amalraj | 2017 | Enhanced Mechanisms for Privacy Preservation in Public Cloud using Data Anonymization |
15 | Ph.D.-CB-July2012-0228 | B. Devika Rubi | 2017 | Enhanced Longest Common Pattern Mining Algorithms for DNA Sequences |
16 | BDU Ref. No. 17949 | A. Cecil Donald | 2018 | An Identity Management Framework for Secured Data Access in Mobicloud Environment |
17 | BDU. Ref. No. 17948 | N.Veeraragavan | 2018 | A Novel Framework for Authentication as a Service (AaaS) to Enhance Security in Public Cloud Environ |
18 | BDU Ref. No. 45111 | G. Vaitheeswaran | 2018 | Approaches to Enhance the Accuracy of Sentiment Analysis on Big Data |
19 | BDU Ref. No. 34500 | M. Kriushanth | 2018 | Dynamic Rules for Effective Auto-Scaling in Cloud Environment |
20 | BDU Ref. No. 06755 | A. Jenifer Jothi Mary | 2019 | Techniques to Enhance the Accuracy of Aspect Level Sentiment Analysis in Big Data |
21 | BDU Ref. No .015873 | I.Priya Stella Mary | 2019 | Enhanced Data Pre-Processing Models for Internet of Things |
22 | BDU Ref. No. 26925 | R. Stephen | 2019 | Techniques for Secured Routing in Internet of Things |
23 | BDU Ref. No. 52138 | A. Dalvin Vinoth Kumar | 2019 | Quality of Service Enhanced Routing Algorithms for Internet of Things |
24 | BDU Ref. No. 16847 | A.Vithya Vijayalakshmi | 2019 | Framework for Data Security in Internet of Things |
25 | BDU Ref. No. 038782 | Sr. R.Shantha Mary Joshitta | 2019 | Lightweight Algorithms for Data Security in Healthcare Internet of Things |
26 | BDU. Ref. No. 32637 | S. Santiago | 2019 | Energy Aware Routing Algorithms for Internet of Things |
27 | BDU Ref. No. 39078 | B. J. Hubert Shanthan | 2020 | Meta Task Scheduling Algorithms for Multi Cloud Computing |
28 | Ph.D-CB-JUL.2014-0953 | G.Justy Mirobi | 2021 | Dynamic Scheduling Approach for Effective Minimization of Response Time in Cloud Environment |
29 | BDU Ref.No.04803 | K.Subash | 2022 | Mechanisms to enhance quality of service in routing for IoT |
30 | BDU Ref.No. 01050 | V.A.Jane | 2022 | Data Preprocessing Techniques for IoT Based Irrigation System |
31 | BDU Ref. No.01059 | S.Sathiya Priya | 2022 | IoT Semantic Based Deep Learning Models for Diabetes Disease Prediction |
32 | BDU Ref.No.06470 | A.Arul Anitha | 2022 | Techniques to detect resource attacks in RPL-Based Internet of Things |
33 | BDU Ref.No. 006358 | D.Janet Ramya | 2022 | Blockchain Based security Framework For The Internet of Things |
34 | BDU Ref.No. 01263 | A.Stephen | 2022 | Rank Attack Detection Techniques for The Internet of Things |
35 | Ref No.P10 | B.Vani | 2013 | Design of Medium Access Control Layer Security Algorithms to Detect And Prevent Denial of Service Attacks in WLAN |
36 | Reg No.PHDCS2013P146 | B.Arputhamary | 2018 | Development of Enhanced Parallel Processing Based Prediction Approaches For Time Series Data |
37 | - | R.Kalaichelvi | 2015 | Enhanced Encryption Techniques For Data Confidentiality in Cloud Storage |
38 | Ref No.PHDCS2013P147 | V.Rathika | 2020 | Downtime Reduction Techniques for Data Migration from Structured Database to Unstructured Database |
M.Phil Awarded to |
||||
SNo | Scholar Code | Scholar Name | Date of ViVa | Title |
---|---|---|---|---|
1 | R. Indra | null | 1999 | Network conferencing |
2 | R. John Xavier | null | 1999 | Distributed Environment on LAN |
3 | D. Chitra | null | 1999 | Building a Portal with lotus domino |
4 | S. Sagayaraj | null | 2003 | Distributed processing A comparative Analysis against sequential processing |
5 | J. Josephine Hillary | null | 2003 | Object Oriented Software Measurement Tools. |
6 | A. Aloyius | null | 0 | A Study of Cognitive complexity and Debugging in Object oriented system. |
7 | S. Lawrence | null | 0 | Code Quality analysis of Artificial Neural Network System. |
8 | J. Sasikumar | null | 0 | A study on Metric changes in Versioning |
9 | A. Ayubkhan | null | 0 | Comprehension in Object Oriented Systems |
10 | M. Badri Prasad | null | 0 | Halstead Metrics tool for object oriented systemHalstead Metrics tool for object oriented system |
11 | 11MCS | D. A. E. Rosaline | 2012 | Horizontally Scalable Architecture for Cloud Computing |
12 | 11MCS | M. Bala Vaishnavi | 2012 | Vertically Scalable Architecture for Cloud Computing |
13 | 11MCS117 | I. Arulmani | 2012 | User Authentication Mechanisms for Educational Clouds |
14 | 11MCS130 | P. Lakshmi | 2012 | Machine Level Authentication Mechanisms for Accessing E-Materials in Educational Clouds |
15 | 12MCS107 | S. Edel Josephine Rajakumari | 2013 | Secure Session Control in EDU-Cloud using OTP |
16 | 12MCS121 | A. Nallathambi | 2013 | Secure Financial Institution Data Transactions using RSA Encryption Algorithm in Mobile Cloud Comput |
17 | 12MCS128 | V. Rajeswari | 2013 | Secure Data Transfer in Medical Cloud using DES Algorithm |
18 | 09MCS114 | S.Manimozhi | 2010 | An Investigation into the Impact of Cognitive Factors in E-Learning Environment |
19 | 13MCS117 | A. Jenis | 2014 | An Authentication Mechanism to Enhance Security in Edu-Cloud |
20 | 13MCS113 | R. Ramya | 2014 | An Architecture for Clustered Services for Load Balancing in Cloud Environment |
21 | 13MCS119 | N. Hemalatha | 2014 | An Architecture for Data Confidentiality in MediCloud |
22 | 13MCS101 | V. R. Bithiah Blessie | 2014 | An Architecture for Cluster based Task Scheduling in Public Cloud |
23 | 13MCS114 | B. J. Hubert Shanthan | 2014 | A Novel Framework for Dynamic Resource Allocation in Cloud Based E-Learning |
24 | 14MCS136 | S. Maheswari | 2015 | Reversible N-Grams Stemmer Algorithm for Effective Classification of Text Data |
25 | 14MCS103 | A. Vithya Vijayalakshmi | 2015 | A Unified Model for Cloud Data Confidentiality |
26 | 14MCS114 | G. Kumaresan | 2015 | Authentication Architecture to Enhance Security in Public Edu-cloud |
27 | 14MCS154 | A. Nandhini | 2015 | A Hybrid Approach for Aspect Based Sentiment Analysis on Big Data |
28 | 14MCS135 | X. Jenie Arock | 2015 | Parallelized Contextual Valence Shifters Algorithm for Sentiment Analysis on Bigdata |
29 | 14MCS112 | M. A. Mary Priyanka | 2015 | Enhanced Authentication Mechanism for Public Cloud |
30 | 15MCS142 | S.Ayesha | 2016 | A new concept on sentiment analysis based on flattery sentiment |
31 | 15MCS107 | S.Shyni | 2016 | A framework for pre-processing and construction of diabetic mellitus warehouse |
32 | 15MCS123 | K.Rajarajeshwari | 2016 | A comparative study of ID3 and native bayes algorithm to extract opinion target and opinion word fro |
33 | 15MCS106 | A. Sagaya Priya | 2016 | Parallel DBSCAN Algorithm for removing noise in IoT Big Data |
34 | 16MCS111 | L. Benedict Carvin | 2017 | Energy Efficient Computing in Cloud Environment |
35 | 16MCS112 | W. Catherine Crasy | 2017 | A Framework for Data Security in Cloud Computing |
36 | 17MCS103 | V.A.Jane | 2018 | A Novel IoT Based Architecture for Banana Leaf Disease Prediction using Data Mining Technique |
37 | 18MCS108 | P. Kamakshi Priyaa | 2019 | An Internet of Things Based Calorie Estimation and Obesity Prediction System |