M.C.A.,M.Phil.,Ph.D.,
brittorameshkumar_cs1@mail.sjctni.edu (Institution)
brittork@gmail.com (Personal)
Book Pubilished: 34
Published: 139
National: 13
International: 126
Year | Name of the award |
---|---|
2011-01-23 | Achiever Award, Samugapani Mandram |
3/2A, , Meyappan Ist Street,, Gnanaolivupuram,,
Madurai-625016
SNo | Book Title | Publisher | Edition | ISBN | Year |
---|---|---|---|---|---|
1 | Classic Data Structures and Algorithms | Heber Publications | 1 | 978-93-80767-1 | 2010 |
2 | An Architecture for Secure Mobile Payment System Using PKI | Lambert Academic Publicat | 1 | 9783659345425 | 2013 |
3 | Clickr for Standard IV | Maria Publishers Pvt Ltd | 1 | 0 | 2013 |
4 | Clickr for Standard VIII | Maria Publishers Pvt Ltd | 1 | 0 | 2013 |
5 | Clickr for Standard IX | Maria Publishers Pvt Ltd | 1 | 0 | 2014 |
6 | Cloud Computing | Charulatha Publication | 0 | 978-93-5577-371 | 2023 |
7 | EXTENDING SOCIAL PRIVACY PROTECTOR FOR TWITTER SOCIAL NETWORK | Google Scholar | null | null | 2012-13 |
8 | TWO FACTOR FRAMEWORK FOR WEB BASED SOCIAL NETWORK BASED ON PKI | Google Scholar | null | null | 2013-14 |
9 | SMIWBSN SECURITY MECHANISM IN WEB BASED SOCIAL NETWORK | Google Scholar | null | null | 2013-14 |
10 | CATEGORIZATION OF METABOLIC SYNDROME X AMONG ADULTS USING LEARNING TECHNIQUES | Google Scholar | null | null | 2013-14 |
11 | NET-CHK A SECURITY FRAMEWORK FOR SOCIAL NETWORK APPLICATIONS | Google Scholar | null | null | 2013-14 |
12 | A COMPARATIVE STUDY ON VARIANTS OF CLASSICAL PORTER STEMMER ALGORITHM | Google Scholar | null | null | 2013-14 |
13 | SECURITY & PRIVACY ISSUES IN SOCIAL NETWORK SERVICES AN OVERVIEW | Google Scholar | null | null | 2013-14 |
14 | SOCIAL NETWORK SERVICES AN OVERVIEW | Google Scholar | null | null | 2013-14 |
15 | VISUALIZING BIG DATA MINING ISSUES CHALLENGES AND OPPORTUNITIES | Scopus | null | null | 2016-17 |
16 | INTERNET OF THINGS DATA MANAGEMENT AND SECURITY | Scopus | null | null | 2016-17 |
17 | AN ENHANCED MULTI-LAYERED SECURITY FRAMEWORK FOR CONTEXT-AWARE MOBILE WEB SERVICES | Google Scholar | null | null | 2016-17 |
18 | DYNAMIC AND SCALABLE ARCHITECTURE FOR ACCESSING THE CLOUD DATABASES AND SECURING CLOUD SERVICES USING PUBLIC KEY INFRASTRUCTURE | Google Scholar | null | null | 2017-18 |
19 | AN EFFICIENT DEPTH 1 FIXED TREE CONSISTENCY (DIFTC) METHOD FOR DISTRIBUTED DATA TRANSACTIONS IN CLOUD ENVIRONMENT | Google Scholar | null | null | 2017-18 |
20 | EXTENDING SOCIAL PRIVACY PROTECTOR FOR TWITTER SOCIAL NETWORK | Google Scholar | null | null | 2012-13 |
21 | TWO FACTOR FRAMEWORK FOR WEB BASED SOCIAL NETWORK BASED ON PKI | Google Scholar | null | null | 2013-14 |
22 | SMIWBSN SECURITY MECHANISM IN WEB BASED SOCIAL NETWORK | Google Scholar | null | null | 2013-14 |
23 | CATEGORIZATION OF METABOLIC SYNDROME X AMONG ADULTS USING LEARNING TECHNIQUES | Google Scholar | null | null | 2013-14 |
24 | NET-CHK A SECURITY FRAMEWORK FOR SOCIAL NETWORK APPLICATIONS | Google Scholar | null | null | 2013-14 |
25 | A COMPARATIVE STUDY ON VARIANTS OF CLASSICAL PORTER STEMMER ALGORITHM | Google Scholar | null | null | 2013-14 |
26 | SECURITY & PRIVACY ISSUES IN SOCIAL NETWORK SERVICES AN OVERVIEW | Google Scholar | null | null | 2013-14 |
27 | SOCIAL NETWORK SERVICES AN OVERVIEW | Google Scholar | null | null | 2013-14 |
28 | VISUALIZING BIG DATA MINING ISSUES CHALLENGES AND OPPORTUNITIES | Scopus | null | null | 2016-17 |
29 | INTERNET OF THINGS DATA MANAGEMENT AND SECURITY | Scopus | null | null | 2016-17 |
30 | Computer, Communication, and Signal Processing | Springer Cham,Switzerland | 0 | 978-3-031-11633 | 2022 |
31 | A Beginning to Data Science with Python | Orange Books Publication | 0 | 978-93-5621-645 | 2023 |
32 | Conference Proceedings on Impact of Disruptive Technologies | SJC | 1 | 935891415-7 | 2024 |
33 | DYNAMIC AND SCALABLE ARCHITECTURE FOR ACCESSING THE CLOUD DATABASES AND SECURING CLOUD SERVICES USING PUBLIC KEY INFRASTRUCTURE | Google Scholar | null | null | 2017-18 |
34 | AN EFFICIENT DEPTH 1 FIXED TREE CONSISTENCY (DIFTC) METHOD FOR DISTRIBUTED DATA TRANSACTIONS IN CLOUD ENVIRONMENT | Google Scholar | null | null | 2017-18 |
International |
||||||
SNo | Title | Name of Journal / Vol. No. / Page Nos/ISSNO. | Impact Factor | H Index No. | C Index No. | Year |
---|---|---|---|---|---|---|
1 | Transmission Deviation?based Windowed Training for Intrusion Detection on Streaming Data | International Journal of Computer Trends and Technology / 72 / 40-47 / 2231-2803 | 0 | 0 | 0 | 2024 |
2 | Intrusion Detection System Using Ensemble LearningApproaches | International Journal of Advanced Research in Computer and Communication Engineering / 12 / 116-122 / 2278-1021/2319-5940 | 8.102 | 0 | 0 | 2023 |
3 | A Feature Selection Method using FSPSO | International Journal of Advanced Research in Computer and Communication Engineering / 12 / 362-366 / 2278-1021/2319-5940 | 8.102 | 0 | 0 | 2023 |
4 | SC-CVAR: Intrusion Detection Using Feature Selection and Machine Learning Techniques on UNSW-NB15 Dataset. | IJCSNS International Journal of Computer Science and Network / 22 / 0 / 1738-7906 | 0 | 0 | 0 | 2022 |
5 | Domain Specific ANN Heuristic Edge Detection Algorithm for CNN based MRI Classification [DAHEDA} | JOURNAL OF ALGEBRAIC STATISTIC / 13 / 447-454 / 1309-3452 | 0 | 0 | 0 | 2022 |
6 | A Comparative Study and Survey on Different Types of Methods in Edge Detection Algorithms | International Advanced Research Journal in Science, Engineering and Technology / 9 / 148-150 / 2393-8021 | 7.105 | 0 | 0 | 2022 |
7 | Intrusion detection on Cloud Computing | International journal of Advanced Research in Computer and communication Engineering / 11 / 0 / 2319-5940 | 0 | 0 | 0 | 2022 |
8 | Machine Learning Algorithm using AR for Intrusion detection system | IARJSET / 9 / 0 / 2393-802 | 0 | 0 | 0 | 2022 |
9 | An Effective Way of Cloud Intrusion Detection System Using Decision tree | NeuroQuantology / 20 / / 1303-5150 | 0 | 0 | 0 | 2022 |
10 | Intrusion Detection using Attribute Subset Selector Bagging (ASUB) to Handle Imbalance and Noise | IJCSNS International Journal of Computer Science and Network Security / 22 / 97-102 / 1738-7906 | 0 | 0 | 0 | 2022 |
11 | Sampling Integrated Boosting Classifier for Network Intrusion Detection | International Research Journal of Education and Technology / 4 Issue: 12 | Dec-2022 / 313-321 / 2581-7795 | - | - | - | 2022 |
12 | PREDICTION OF RHABDOMYOSARCOMAUSING TRANSFER LEARNING ON PATHOLOGY AND RADIOLOGY IMAGES | International Journal of Advanced Research in Computer and Communication Engineering / 11(8) / 161-167 / 2278-1021 | - | - | - | 2022 |
13 | Optimized Encryption Based Elliptical Curve Diffie- Hellman Approach for secure heart disease prediction | International Journal Advanced Technology and Engineering Exploration (IJATEE) / 8 / 0 / ISSN : 2394-5443 | 0 | 1 | 0 | 2021 |
14 | An Enhancing Canny Edge Detection using SUSAN Filter based on Deep Learning Algorithm for improved image Edge Detection | Webology / 6 / 4367-4375 / (ISSN : 1735-188X) | 0 | 0 | 0 | 2021 |
15 | Intrusion Detection on the UNSW-NB15 dataset using Feature Selection and Machine Learning Techniques | Webology / 18 / 4784-4802 / 1735-188X | 0 | 0 | 0 | 2021 |
16 | Biometric Security for Cloud Data Using Fingerprint | Science, Technology And Development Journal / IX / 58-67 / 0950-0707 | 6.1 | 0 | 0 | 2020 |
17 | Text-based Encryption (TBEnc) Technique to Secure Data in Cloud Storage Server | Journal of Shanghai Jiaotong University / 16, Issue 10 / 403-430 / 1007-1172 | 0 | 0 | 0 | 2020 |
18 | Survey: Web Security Services in Cloud Computing | International Journal for Scientific Research & Development / 8, Issue 8 / 437-438 / 2321-0613 | 4.396 | 0 | 0 | 2020 |
19 | Security Framework for Context Aware Mobile Web Services | Springer Lecture Notes on Data Engineering and Communication Technologies / 26 / 968-972 / 2367-4512 | 0 | 0 | 0 | 2019 |
20 | DORBRI: An Architecture for the DoD Security Breaches Through Quantum IoT | Springer Lecture Notes on Data Engineering and Communication Technologies / 26 / 491-496 / 2367-4512 | 0 | 0 | 0 | 2019 |
21 | A Security Architecture for a Smart Home Ecosystem using Permissioned Blockchain | International Journal of Research and Analytical Reviews (IJRAR) / 6(1) / 860-864 / 2348-1269 | 0 | 0 | 0 | 2019 |
22 | Security Threats in Cloud Computing | Asian Journal of Computer Science and Technology / 8 / 80-83 / 2249-0701 | 0 | 0 | 0 | 2019 |
23 | Dom_classi: An enhanced weighting mechanism for Domain Specific Words | International Journal of Applied Engineering Research / 14(1) / 140-148 / 0973-4562 | 0 | 0 | 0 | 2019 |
24 | An Architecture to Enable Secure Firmware Updates on a Distributed-Trust IoT Network Using Blockchain | Springer Lecture Notes on Data Engineering and Communications Technologies / 1 / 671-679 / 978-981-10-8681-6_61 | 0 | 0 | 0 | 2019 |
25 | A Security Framework for A Sustainable Smart Ecosystem using Permissioned Blockchain: Performance Evaluation | International Journal of Innovative Technology and Exploring Engineering (IJITEE) / 8(10) / 4247-4250 / 2278-3075 | 0 | 0 | 0 | 2019 |
26 | Performance Analysis Of Proposed D1FTBC Approach For Improving Consistency In Cloud Data Transactions | International Journal Of Scientific & Technology Research / 8(08) / 1803-1807 / 2277-8616 | 0 | 0 | 0 | 2019 |
27 | Performance of Proposed Architecture for Data Transactions in Cloud using D1FTBC | International Journal of Recent Technology and Engineering (IJRTE) / 8(02) / 5390-5395 / 2277-3878 | 0 | 0 | 0 | 2019 |
28 | Predicting Student Dropouts for Better Decision Making Using Sentiment Analysis | International Journal of Scientific Research in Computer Science Applications and Management Studies (IJSRCSAMS) / 8(04) / 0 / 2319-1953 | 0 | 0 | 0 | 2019 |
29 | NIC_LBA: Negations and Intensifier Classification of microblog data using Lexicon Based Approach | Journal of Emerging Technologies and Innovative Research (JETIR) / 6(06) / 753-759 / 2349-5162 | 0 | 0 | 0 | 2019 |
30 | SECON: Secured Confidentiality Framework To Protect Data Stored In Public Cloud Systems | International Journal Of Information And Computing Science / 6(05) / 406-417 / 0972-1347 | 0 | 0 | 0 | 2019 |
31 | Hybrid Text and Value Based Ncryption and Obfuscation (Tvbencobfus) To Safeguard Data in Cloud Storage Server | International Journal of Innovative Technology and Exploring Engineering (IJITEE) / 8(10) / 3446-3450 / 2278-3075 | 0 | 0 | 0 | 2019 |
32 | An Approach For IoT Security Using Quantum Key Distribution | International Journal Of Scientific & Technology Research / 8(08) / 1569-1574 / 2277-8616 | 0 | 0 | 0 | 2019 |
33 | A Survey on Web Service Prediction Techniques | INTERNATIONAL JOURNAL OF RESEARCH AND ANALYTICAL REVIEWS (IJRAR) / 6(02) / 0 / 2348-1269 | 0 | 0 | 0 | 2019 |
34 | Enhancing Channel Security By Error Detection And Correction During Quantum Key Distribution Using Hamming Code With Modified Elgamal | International Journal Of Scientific & Technology Research / 8(12) / 3428-3432 / 2277-8616 | 0 | 0 | 0 | 2019 |
35 | An Enhanced Multi-Layered Secured Architecture for Context-Aware Web Services | World Wide Journal of Multidisciplinary Research and Development / 4(2) / 168-172 / 2454-6615 | 4.25 | - | - | 2018 |
36 | Security Architecture of Cloud Computing | International Journal of Electrical Electronics & Computer Science Engineering / 1 / 58-61 / 2348-2273 | 0 | - | - | 2018 |
37 | An Architecture for Improving the QoS in Composite Web Service Selection | International Journal of Scientific Research in Computer Science, Applications and Management Studies (IJSRCSAMS) / 7(4) / 0 / 2319-1953 | 0 | 0 | 0 | 2018 |
38 | Survey on QoS Metrics in Web Services | International Journal of Science and Advance Research in Technology(IJSART) / 4(9) / 37-41 / 2395-1052 | 0 | 0 | 0 | 2018 |
39 | Comparative Study of Conflict Identification and Resolution in Heterogeneous Datasets | Springer Lecture Notes on Data Engineering and Communication Technologies / 26 / 1436-1441 / 2367-4512 | 0 | 0 | 0 | 2018 |
40 | A Study on various tools to overcome Security Issues in Big Data | International Journal of Scientific Research in Computer Science, Applications and Management Studies (IJSRCSAMS) / 7(4) / 0 / 2319-1953 | 0 | 0 | 0 | 2018 |
41 | Dictionary based Approach for improving the Accuracy of opinion mining on Big data | International Journal Of Research and Analytical Reviews / 5(4) / 836-844 / 2348-1269 | 0 | 0 | 0 | 2018 |
42 | Opinion Mining using Hybrid Approach on Big Data : A Perspective | International Journal of Scientific Research in Computer Science Applications and Management Studies / 7(5) / 0 / 2319 ? 1953 | 0 | 0 | 0 | 2018 |
43 | A Methodological Framework for Opinion Mining | International Journal of Computer Sciences and Engineering / 5(8) / 6-9 / 2347-2693 | 0 | 0 | 0 | 2018 |
44 | Security Architecture of Cloud Computing | International Conferece / 0 / 0 / 0 | 0 | 0 | 0 | 2018 |
45 | An Enhanced Multi-Layered Secured Architecture for Context-Aware Web Services | World Wide Jouranl of Multidisciplinary Research and Development / 04-02 / 168-172 / 2454-6615 | 0 | 0 | 0 | 2018 |
46 | Online Social Networking Services Impact on Big Data | International Journal of Computer Science / 5(17) / 1502-1506 / 2348-6600 | 0.326 | - | - | 2017 |
47 | Security BM Techniques using in Digital Image Processing | International Journal of Computer Science / 5(18) / 1524-1528 / 2348-6600 | 0.326 | - | - | 2017 |
48 | Ant Colony Model (AnCoMoDaS) for Data Security in Cloud | International Research Journal of Engineering and Technology (IRJET) / 4(5) / 1004-1007 / 2395 -0056 | 6.171 | - | - | 2017 |
49 | Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA) for Cloud Data Encoding, Encrypting and Forwarding | International e-Journal for Technology and Research / 1(6) / 1-8 / 2465-3289 | 3.023 | 0 | 0 | 2017 |
50 | Data Division in Cloud for secured Data Storage using RSA Algorithm | International Research Journal of Engineering and Technology (IRJET) / 4(6) / 455-460 / 2395 -0056 | 6.171 | 0 | 0 | 2017 |
51 | An Efficient Depth Fixed Tree Consistency (DIFTC) Method for Distributed Data Transactions in Cloud Environment | International Journal of Advanced Research in Computer science / 8(7) / 936-942 / 0976-5697 | 0.765 | 0 | 0 | 2017 |
52 | Dynamic and Scalable Architecture for Accessing the Cloud Databases and Securing Cloud Services Using Public Key Infrastructure | International Journal of Scientific Research in Computer Science, Engineering and Information Technology / 2(6) / 455-459 / 2456-3307 | 4.032 | 0 | 0 | 2017 |
53 | Proposed Architecture for Improving Security and Consistency of Data Transactions in Cloud Database using Tree-Based Consistency Approach | International Journal of Computer Science and Information Security (IJCSIS) / 15(12) / 118-126 / 1947-5500 | 0.553 | 0 | 0 | 2017 |
54 | Issues and Challenges in Big Data Security | International Conference on Newer Engineering Concepts and Technology / 1 / 62 / 0 | 0 | - | - | 2017 |
55 | Issues and Challenges In Big Data Security | International Conferece on Newer Engeneering concepts and Technology / 0 / 0 / 0 | 0 | 0 | 0 | 2017 |
56 | Ant Colony Model (AnCoMoDaS) for Data Security in Cloud | International Research Journal of Engineering and Technology (IRJET) / 04(05) / 1004-1007 / 2395-0056 | 0 | 0 | 0 | 2017 |
57 | Security BM Technique using in Digital Image Processing | International Journal of Computer Science (IJCS) / 5(1), 18 / 1524-1528 / 2348-6600 | 0 | 0 | 0 | 2017 |
58 | Online Social Networking Services Impact on Big Data | International Journal of Computer Science (IJCS) / 5(1), 18 / 1502-1506 / 2348-6600 | 0 | 0 | 0 | 2017 |
59 | An Innovative Security Architecture and Algorithm for Social Network Services | ARPN Journal of Engineering and Applied Sciences / 11(2) / 1101-1105 / 1819-6608 | 6.391 | - | - | 2016 |
60 | Internet of Things: Data Management and Security | International Journal of Computer Technology and Applications(IJCTA) / 9(26) / 115-120 / 0 | 2.804 | - | - | 2016 |
61 | Security Issues in Web Services | International Research Journal of Engineering and Technology (IRJET) / 3(5) / 909-914 / 2395-0072 | 5.181 | - | - | 2016 |
62 | Security Issues in Context-Aware System | International Research Journal of Engineering and Technology (IRJET) / 3(5) / 1-5 / 2395-0072 | 5.181 | - | - | 2016 |
63 | Visualizing Big Datamining: Issues, Challenges and Opportunities | International Journal of Computer Technology and Applications(IJCTA) / 9(27) / 455-460 / 0 | 2.804 | - | - | 2016 |
64 | An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services | International Journal of Computer Applications (IJCA) / 146(15) / 1-4 / 0975-8887 | 3.12 | - | - | 2016 |
65 | SECURITY ISSUES ON COMPOSITE WEB SERVICES | International Research Journal of Engineering and Technology (IRJET) / 3(6) / 2442-2446 / 2395-0072 | 4.45 | - | - | 2016 |
66 | IoT based Home Security through Digital Image Processing Algorithms | 2nd World Congress on Computing and Communication Technologies (WCCCT `16) / 1 / 20-23 / 978-1-5090-5573-9/16 | 0 | - | - | 2016 |
67 | PLIS: Proposed Language Independent Stemmer for Information Retrieval Systems Using Dynamic Programming | 2nd World Congress on Computing and Communication Technologies (WCCCT `16) / 5 / 132-135 / 978-1-5090-5573-9/16 | 0 | - | - | 2016 |
68 | An Approach For Analyzing The Factors Recorded In The Tree Rings Using Image Processing Techniques | 2nd World Congress on Computing and Communication Technologies (WCCCT `16) / 1 / 236-239 / 978-1-5090-5573-9/16 | 0 | - | - | 2016 |
69 | An Approach For Analyzing The Factors Recorded In The Tree Rings Using Image Processing Techniques | World Congress on Computing and Communication Technologies (WCCCT) / 0 / 236-239 / 978-1- 5090 -5573- 9 | 0 | 0 | 0 | 2016 |
70 | PLIS: Proposed Language Independent Stemmer for Information Retrieval Systems Using Dynamic Programming | World Congress on Computing and Communication Technologies (WCCCT) / 0 / 132-135 / 978-1- 5090 -5573- 9 | 0 | 0 | 0 | 2016 |
71 | An Enhanced Architecture For Feature Based Opinion Mining From Product Reviews | World Congress on Computing and Communication Technologies (WCCCT) / 0 / 89-92 / 978-1- 5090 -5573- 9 | 0 | 0 | 0 | 2016 |
72 | IoT based Home Security through Digital Image Processing Algorithms | World Congress on Computing and Communication Technologies (WCCCT) / 0 / 20-23 / 978-1- 5090 -5573- 9 | 0 | 0 | 0 | 2016 |
73 | Internet of Things: Data Management and Security | International Journal of Control Theory and Applications (IJCTA) / 9(10) / 115-120 / 0974-5572 | 0 | 0 | 0 | 2016 |
74 | An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services | International Journal of Computer Applications (IJCA) / 146(15) / 1-4 / 0975 ? 8887 | 0 | 0 | 0 | 2016 |
75 | Security Issues On Composite Web Services | International Research Journal of Engineering and Technology (IRJET) / 03(06) / 2442-2446 / 2395-0072 | 0 | 0 | 0 | 2016 |
76 | Security Issues in Web Services | International Research Journal of Engineering and Technology (IRJET) / 03(05) / 909-914 / 2395-0072 | 0 | 0 | 0 | 2016 |
77 | Security Issues in Context- Aware System | International Research Journal of Engineering and Technology (IRJET) / 03(05) / 1-5 / 2395-0072 | 0 | 0 | 0 | 2016 |
78 | A Security Framework for Social Network Services | International Journal of Applied Engineering Research / 10 / 307-314 / 0973-4562 | 0 | - | - | 2015 |
79 | Enhanced Elliptic Curve Cryptography | Indian Journal of Science and Technology / 8 / 1-6 / 0974-6846 | 0 | - | - | 2015 |
80 | An Implementation of Three Layered Net-Chk Two Factors Online Social Network Model for Privacy | International Conference on Electrical, Computer and Communication Technologies / 2 / 1-5 / 978-1-4799-608S-9 | 0 | 0 | 0 | 2015 |
81 | Learning Behavior Analysis Using Data Mining Techniques | International Journal of Applied Engineering Research / 10 / 532-537 / 0973-4562 | 1.8233 | - | - | 2015 |
82 | A Framework for Language Independent Stemmer Using Dynamic Programming | International Journal of Applied Engineering Research / 10 / 3900-3904 / 1087-1090 | 1.8233 | - | - | 2015 |
83 | Conflict Resolution and Duplicate Elimination in Heterogeneous Datasets using Unified Data Retrieval Techniques | Indian Journal of Science and Technology / 8 / 1-6 / 0974-5645 | 0 | - | - | 2015 |
84 | Feedback Based Conflict Identification and Resolution using Duplicate Elimination and Ranking Techniques | International Journal Of Computers & Technology / 14(9) / 22-27 / 227-3061 | 1.392 | - | - | 2015 |
85 | Proposed Hough Technique For Estimating Climatic Conditions Recorded In The Cross Section Of Tree Images | IOSR Journal Of Computer Engineering (IOSR-JCE) / 17 / 0 / 2278-8727 | 1.213 | - | - | 2015 |
86 | Semi-Automatic Techniquesfor Estimating Climatic Conditions Recorded In The Tree Rings | International Journal Of Computer Trends And Technology (IJCTT) / 29 / 19-22 / 2231-2803 | 1.517 | - | - | 2015 |
87 | Issues and Challenges of Data Transaction Management in Cloud Environment | International Research Journal of Engineering and Technology / 2 / 123-128 / 2395-0072 | 2.518 | - | - | 2015 |
88 | Cloud Computing Data Security Issues, Challenges, Architecture and Methods- A Survey | International Research Journal of Engineering and Technology / 2 / 848-857 / 2395-0056 | 2.518 | - | - | 2015 |
89 | Proposed Architecture for secure Distributed Data Transaction Management in Cloud Environment | International Journal of Applied Engineering Research / 10 / 489-497 / 0973-4562 | 1.8233 | - | - | 2015 |
90 | Enhanced Elliptical Curve Cryptography Based PKI for Secure Data Storage in a Cloud | International Journal of Applied Engineering Research / 10 / 65-71 / 0973-4562 | 1.8233 | - | - | 2015 |
91 | Security issues in Internet of Things using Next Generation Mobile Networks | International Journal of Applied Engineering Research / 10 / 528-531 / 0973-4562 | 1.8233 | - | - | 2015 |
92 | A Multi-Layered Secured Framework for Context-Aware Web services in Health care Industries | International Journal of Applied Engineering Research / 10 / 554-560 / 0973-4562 | 1.8233 | - | - | 2015 |
93 | Survey Paper On Mobile Social Networks | International Research Journal of Engineering and Technology / 2(6) / 637-649 / 2395-0056 | 2.518 | - | - | 2015 |
94 | Security on Mobile Social Networks | International Journal of Advance Research in Computer Science and Management Studies / 3(9) / 126-131 / 2321-7782 | 2.271 | - | - | 2015 |
95 | Context-Aware In PrivacyPreservation For Health Care Systems | International Journal of Advanced Computer Technology / 4 / 8-13 / 2319-7900 | 1.237 | 0 | 0 | 2015 |
96 | Conflict Identification and Resolution in Heterogeneous Datasets: A Comprehensive Survey | International Journal of Computer Applications / 14(9) / 22-27 / 0975- 8887 | 0.724 | - | - | 2015 |
97 | Security & Privacy issues in Social Network Services An Overview | International Journal of Innovative Research in Electrical, Electronics Instrumentation and Control Engineering(IJIREEICE) / 2(1) / 757-759 / 2278-1021 | 3.12 | 0 | 0 | 2014 |
98 | Social Network Services An Overview | International Journal of Innovative Research in Electrical, Electronics Instrumentation and Control Engineering(IJARCCE) / 3(1) / 4936-4939 / 2278-1021 | 3.12 | 0 | 0 | 2014 |
99 | Two Factor Framework for Web Based Social Network using PKI | International Journal on Advanced Computer Theory and Engineering(ACTE) / 3(1) / 56-64 / 2319-2526 | 0 | 0 | 2014 | |
100 | Systematic Optimization and Refinement of Stemmer Rule Set Using NLTK | International Conference on Contemporary Trends in Computer Science(CTCS) / 1 / 0 / 0 | 0 | 0 | 0 | 2014 |
101 | Rule Based Machine Translation System from English to Tamil | World Congress on Computing And Communication Technologies(WCCCT `14) / 1 / 158-163 / 978-1-4799-2877-4 | 0 | 0 | 0 | 2014 |
102 | Security analysis of future enterprise business intelligence | World Congress on Computing And Communication Technologies(WCCCT `14) / 1 / 191-194 / 978-1-4799-2876-7 | 0 | 0 | 0 | 2014 |
103 | Inconsistency Resolution and Joint Information Extraction from Multiple Data Sources | International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) / 3(7) / 7572-7575 / 2278-1021 | 1.770 | 0 | 0 | 2014 |
104 | Resolving Data Inconsistency in Data Integration | International Conference on Contemporary Computing and Informatics (IC3I) / 1 / 214-218 / 978-1-4799-6628-8 | 0 | 0 | 0 | 2014 |
105 | An Architecture for Securing Heterogeneous Web Services | International Journal of Advanced Research in Computer Science & Technology (IJARCST ) / 2(3) / 197-200 / 2347 - 8446 | 0.889 | - | - | 2014 |
106 | Context-Aware Architecture for User Access Control | International Journal of Advanced Research in Computer Science & Technology (IJARCST ) / 2(3) / 201-204 / 2347 - 8446 | 0.889 | - | - | 2014 |
107 | A Review on Privacy Control Techniques in Context-aware Web Services | International Journal of Advanced Research in Computer Science & Technology (IJARCST ) / 2(3) / 222-225 / 2347 - 8446 | 0.889 | - | - | 2014 |
108 | DESIGN OF A SECURE ARCHITECTURE FOR CONTEXT AWARE WEB SERVICES USING ACCESS CONTROL MECHANISM | International Conference on Contemporary Computing and Informatics (IC3I) (IEEE) / 1 / 780-784 / 978-1-4799-6628-8 | 0 | 0 | 0 | 2014 |
109 | An Improved Rule based Iterative Affix Stripping Stemmer for Tamil Language using K-Mean Clustering | International Journal of Computer Applications (IJCA) / 94(13) / 36-41 / 0975- 8887 | 0.821 | 0 | 0 | 2014 |
110 | A Novel Approach for Phonetic Based Stem Generation Using Edit Distance and Longest Common Subsequence | International Journal of Engineering Research and technology (IJERT) / 1 / 242 - 245 / 2278-0181 | 1.76 | 0 | 0 | 2014 |
111 | A Comprehensive Analyze of Stemming Algorithms for Indian and Non-Indian Languages | International Journal of Computer Engineering & Applications (IJCEA) / 7(3) / 1-8 / 2321-3469 | 2.849 | 0 | 0 | 2014 |
112 | Multilingual Phonetic Based Stem Generation | Second International Conference on Emerging Research in Computing, Information Communication and Applications (ERCICA-2014) / 1 / 242 - 245 / 9789351072607 | 0 | 0 | 0 | 2014 |
113 | A Study Of Image Processing In Analysing Tree Ring Structure | International Journal Of Research In Humanities, Arts And Literature / 90(19) / 0975 ? 88 / 2321-8878 | 0 | 0 | 0 | 2014 |
114 | An Approach For Dendroclimatology Using Image Processing Techniques | Proceedings of the IEEE World Congress on Computing and Communication Technologies (WCCCT?14 / 0 / 0 / 978-1-4799-2877-4 | 0 | 0 | 0 | 2014 |
115 | A Framework for Privacy Handler Mechanism in Context-aware Web Services | International Journal of Advanced Research in Computer Science & Technology (IJARCST) / 2 / 0 / 2347-8446 | 0.889 | 0 | 0 | 2014 |
116 | SMIWBSN: Security Mechanism in Web Based Social Network | International Journal of Emerging Trends in Computing and Communication Technology(IJETCCT) / 1 / 55-64 / 2348-4454 | 0 | 0 | 0 | 2014 |
117 | Comparison Of Various Edge Detection Techniques In Tree Ring Structure | International Journal of Computer Applications / 90?19 / - / 973-93-80880-89-1 | 0 | 0 | 0 | 2014 |
118 | Extending Social Privacy Protector for Twitter Social Network | CIIT International Journal of Networking and Communication Engineering / 1(1) / 34-39 / 0974 - 9713 | 0.44 | - | - | 2013 |
119 | A Context Aware System Based on Service Oriented Architecture | International Conference on Recent Trends In Computer Applications(ICRTICA) / 1 / 206-210 / 978-81208-25-0 | 0 | 0 | 2013 | |
120 | Net Chk A security Framework for Social Network Applications | Internation Journal of Advance Research in Computer and communication Engineering(IJARCCE) / 2(12) / 4866-4873 / 2319-5940 | 3.12 | 0 | 0 | 2013 |
121 | A Comparative Study on Variants of Classical Porter Stemmer Algorithm | International Journal of Scientific Transactions in Environment and Techrovention(IJSTET) / 6(4) / 185-188 / 0973 -9157 | 0 | 0 | 0 | 2013 |
122 | Categorization of Metabolic Syndrome X Among Adults Using Learning Techniques | CiiT - International Journal of Data Mining and Knowledge Engineering / 5(05) / 215-218 / 0974 ? 9683 | 0 | 0 | 0 | 2013 |
123 | Extending Social Privacy Protector for Twitter Social Network | International Journal of Networking and Communication Engineering / 5(01) / 27-32 / 0 | 0.569 | 0 | 0 | 2013 |
124 | Architecture for Integrated and Intelligent Security for Mobile Web Services | International Conference on Intelligent Infrastructure / 1 / 216-222 / 978-1-25-906170-7 | - | - | - | 2012 |
125 | A Comprehensive Study on Stemming Algorithms | International Conference on Semantic E-Business and Enterprise Computing(SEEC) / 1 / 33-40 / 978-93-82062-64-6 | 0 | 0 | 0 | 2012 |
126 | An End-to-End Secure Mobile Payment System using Public Key Infrastructure | Journal of Algorithms and Computational Technology (JACT) / 6 / 395-410 / 1748-3018 | - | - | - | 2012 |
National |
||||||
SNo | Title | Name of Journal / Vol. No. / Page Nos/ISSNO. | Impact Factor | H Index No. | C Index No. | Year |
---|---|---|---|---|---|---|
1 | An Efficient Britwari Technique to Enhance Canny Edge Detection Algorithm using Deep Learning | ICTACT Journal of Soft Computing / 12 / 2634-2639 / 2229-6956 | 0 | 0 | 2022 | |
2 | A COMPARATIVE STUDY ON VARIOUS EDGE DETECTION METHODS USING DEEP LEARNING | Journal of Fundamental & Comparative Research / VIII / 1-8 / 2277-7067 | 0 | 0 | 0 | 2022 |
3 | Sine Cosine Optimization Algorithm for Feature Selection | Journal of Fundamental & Comparative Research / VIII / 0 / 2277-7067 | 0 | 0 | 0 | 2022 |
4 | Semi-Supervised Intrusion Detection Based on Stacking and Feature-Engineering to Handle Data Imbalance | INDIAN JOURNAL OF SCIENCE AND TECHNOLOGY / 15(46) / 2548-2554 / 0974-5645 | - | - | - | 2022 |
5 | Cloud Computing Data Security using Hybrid | National Conference on INNOVATIONS IN COMPUTER TECHNOLOGY AND ITS APPLICATIONS / 1 / 151-155 / 978-93-87102-67-5 | 0 | - | - | 2018 |
6 | Cloud Network Security using Biometrics | Journal of Innovative Research and Solutions (JIRAS) / 4(1) / 5-13 / 2320-1932 | 0 | - | - | 2018 |
7 | Cloud Network Security using Biometrics | National Conference / 0 / 0 / 0 | 0 | 0 | 0 | 2018 |
8 | Cloud Computeing Data Security using Hybrid | National Conference on Innovations in Computer Technology and its Applications / 0 / 151-155 / 978-93-87102-67-5 | 0 | 0 | 0 | 2018 |
9 | A Survey on Big Data Security | National Conference on Big Data Analytics and Mobile Technologies (NCBM 2017) / 1 / 5 / 0 | 0 | - | - | 2017 |
10 | A Survey on Big Data Security | National Conference on Big Data Analytics and Mobile Technologies / 0 / 0 / 0 | 0 | 0 | 0 | 2017 |
11 | Survey on Privacy Preservation in context aware web services | Indian Journal of Computer Science and Engineering / 6(6) / 169-175 / 0976-5166 | 0 | - | - | 2016 |
12 | Hybrid Algorithm for Web based Social Network | National Conference on Information Technology Sustain Future (NCITSF) / 1 / 131-136 / 2278-0181 | 1.76 | 0 | 0 | 2014 |
13 | Security Challenges for Online Social Network using Multiparty Access Control | International Journal of Computer Science Management Research(NCITCS) / 1 / 169-174 / 2278-733x | 0.16 | 0 | 0 | 2014 |
Seminars(S) / Conferences(C) /Workshops(WS) attended and the source of funding (National (N) / International (IN)) with details of outstanding participants, if any
SNo | Title | Type | Organization Name | Place | Days | Date |
---|---|---|---|---|---|---|
1 | International Conference on the Impact of Disruptive Technologies | I | St. Joseph`s College | Tiruchirappalli | 2 | 2024-01-08 |
2 | FDP on Patents and Consultancy | O | St. Joseph`s College | Tiruchirappalli | 1 | 2023-11-20 |
3 | FDP on Intricacies of Writing for Research Publications and Projects | O | St. Joseph`s College | Tiruchirappalli | 1 | 2023-10-27 |
4 | Orientation Programme for the Teaching Faculty | O | St. Joseph`s College | Tiruchirappalli | 2 | 2023-06-15 |
5 | Refresher Course in Computer Science | R | Ramanujan College, Delhi. (FDP_269) | Online | 14 | 2023-03-13 |
6 | In-Service Teacher Training Program | R | TANSCHE & Government Arts College | Karur | 2 | 2022-05-05 |
7 | Uploading the Course Content on LMS | W | St. Joseph`s College | - | 1 | 2022-04-20 |
8 | Developing online courses in LMS | W | St. Joseph`s College | Trichy | 2 | 2021-11-22 |
9 | Refresher Course on Computer Science and Applications | R | Bharathidasan University, Tiruchirappalli | Trichy | 14 | 2021-09-22 |
10 | Virtual Teaching Environment | S | Idhaya College for Women, Sivagangai | Sivagangai | 1 | 2020-07-24 |
11 | Business Intelligence and Analytics | S | Francis Xavier Engineering College, Tirunelveli | Tirunelveli | 1 | 2020-07-22 |
12 | Real time Applications in Cloud and Fog Computing | S | Francis Xavier Engineering College, Tirunelveli | Tirunelveli | 1 | 2020-07-20 |
13 | Cloud Computing | S | Chikkanna Government College, Tiruppur | Tiruppur | 1 | 2020-07-20 |
14 | Contemporary Trends in Information Technology | S | JJ College of Arts and Science, Pudukottai | Pudukottai | 1 | 2020-07-19 |
15 | Webinar on Cyber Security Challenges during Covid-19 | S | Francis Xavier Engineering College, Tirunelveli | Tirunelveli | 1 | 2020-07-18 |
16 | Webinar on Cyber Security | S | PSG Institute of Technology and Applied Research with CSI, Coimbatore | Coimbatore | 3 | 2020-07-18 |
17 | Webinar on Quantum Computing and its applications | S | Francis Xavier Engineering College, Tirunelveli | Tirunelveli | 1 | 2020-07-13 |
18 | Webinar on Internet of Things (IoT), Robatics and Data Science | S | PSG Institute of Technology and Applied Research with CSI, Coimbatore | Coimbatore | 3 | 2020-07-10 |
19 | Webinar on Block Chain Technology | S | Palanisamy College of Arts, Perundurai | Perundurai | 1 | 2020-07-10 |
20 | Inclusive Procedures and Processes in Assessment and Accreditation by NAAC | W | St. Joseph`s College | Trichy | 5 | 2020-06-30 |
21 | National Webinar on Latest Trends in Information Technology | S | JJ College of Arts and Science, Pudukottai | Pudukottai | 1 | 2020-06-13 |
22 | Webinar on Containerization | S | Seethalakshmi Ramasamy College, Tiruchirappalli | Trichy | 1 | 2020-06-12 |
23 | A Webinar on Image Processing Techniques Using MATLAB | S | JJ College of Arts and Science, Pudukottai | Pudukottai | 1 | 2020-05-28 |
24 | International Webinar on Recent Trends in Information Technology 2020 | I | JJ College of Arts and Science, Pudukottai | Pudukottai | 1 | 2020-05-24 |
25 | Webinar - Basics of Quantum Computing | S | Agurchand Manmull Jain College, Chennai | Chennai | 1 | 2020-05-22 |
26 | Webinar - Joy of Python | S | Shri Shankarlal Sundarbai Shasun Jain College for Women, Chennai | Chennai | 1 | 2020-05-18 |
27 | International Webinar on Futuristic Information and Communication Technologies | I | Computer Society of India -Jaipur Chapter | Jaipur | 1 | 2020-05-10 |
28 | Webinar - Turnitin Online on campus | S | Guru Nanak Institute of Management Studies, Mumbai | Mumbai | 1 | 2020-05-04 |
29 | Webinar - Effective Presentation Skills-Using ICT Tools | S | Knowledge Publications and Chemtoons YouTube Channel | - | 1 | 2020-04-26 |
30 | Webinar on Recent Trends in Computer Science | Z | St. Joseph`s College | Trichy | 2 | 2020-04-24 |
31 | Refresher Course on Computer Applications & Information Technology | O | Madras University | Madras | 21 | 2018-11-09 |
32 | 2nd World Congress on Computing and Communication Technologies - WCCCT 2016 | C | St.Joseph`s College | Tiruchirappalli | 3 | 2017-02-02 |
33 | National Level Workshop on Big Data Analytics and Business Intelligence | W | St.Joseph`s College | Trichy | 2 | 2016-01-04 |
34 | 90th Orientation Program | O | UGC-HRDC, Bharathidasan University | Tiruchirappalli | 28 | 2015-11-15 |
35 | 1st World Congress on Computing and Communication Technologies (WCCCT 14) | Z | UGC, New Delhi DST-SERB | New Delhi | 3 | 2014-02-27 |
36 | Newly Recruited Staff | O | Jesuit Madurai Province Higher Education Commission | Dindigul | 7 | 2013-11-19 |
37 | Newly Recruited Staff | O | Jesuit Madurai Province Higher Education Commission | Loyola College, Chennai | 10 | 2013-05-10 |
38 | Smart Devices Programming Using Android (WSDPA) | W | St.Joseph`s College | Tiruchirappalli | 1 | 2012-12-08 |
(Special Lectures / Workshops / Seminars / Association Activities/ Alumni Meeting)
SNo | Type of Programme | Title | Beneficiaries | Days | Date |
---|---|---|---|---|---|
1 | Conference | 2nd International Virtual Conference on Intelligent and Computing Systems ( ICICS) | Bishop heber College ( Autonomous) | 1 | 2022-03-30 |
2 | Inaugural Address & Invited Talk | Zindagi | Bishop Heber College | 1 | 2020-02-28 |
3 | State Level Symposium | Emerging Technology Innovations in Computer Science | Shanmuga Industries Arts&Sci.College | 1 | 2020-02-21 |
4 | Guest Lecture | Data Communication and Networking | Annai College of Arts and Science | 1 | 2018-12-07 |
5 | Silver Jubilee Endowment Lecture | Service Computing | Fatima College(Autonomous), Madurai | 1 | 2018-02-23 |
6 | Special Lecture | What the Software Industry Expects & How to achieve them to get the Job | Government Arts College, Tiruchirappalli | 1 | 2017-03-22 |
7 | Invited Talk | Web Services and Security | Jamal Mohamed College, Tiruchirappalli | 1 | 2017-03-04 |
8 | SPECTRA Association - Special Lecture | Web Services | J.J. College of Arts and Science, Pudukottai | 1 | 2016-08-29 |
9 | Inter-Collegiate Meet | Recent Trends in IT | Theivanai Ammal College For Women, Villupuram | 1 | 2014-09-12 |
10 | AICTE Sponsored National seminar | Web Services & Security | Kings College of Engineering, Pudukkottai | 1 | 2013-04-25 |
11 | Special Lecture | Cryptography and Network Security | Theivanai Ammal College for Women, Villupuram | 1 | 2013-01-23 |
12 | International Conference | Enterprise Cloud Security Services | Raja Rajeswari College of Engineering, Bangaluru | 1 | 2012-04-13 |
13 | Seminar | Project Development and Paper Presentation | Holy Cross College, Trichirappalli | 1 | 2011-11-10 |
14 | Invited Lecture | Information and Cyber Security | Holy Cross College, Trichirappalli | 1 | 2011-08-16 |
15 | IT Association Inauguration | Information Security | St.Joseph`s College, Trichirappalli | 1 | 2011-07-14 |
(From National(N) / International(IN), funding agencies and Total grants received.)
SNo | Title of the Project | Type | Status | Finding Agency | Duration | Amount(in Rupees) | Year |
---|---|---|---|---|---|---|---|
1 | DEVELOPMENT OF INTELLIGENT ALGORITHMS FOR ANALYSIS REMOTELY SENSED TREE RING DATA USING ENHANCED IMAGE PROCESSING TECHNIQUES | MI | C | UNIVERSITY GRANTS COMMISSIONS | 2014-2016 | 100000 | 2015 |
SNo | Award Name | Organization Name |
---|---|---|
1 | Achiever Award | Samugapani Mandram |
2 | Best Researcher Award | Bishop Heber College |
3 | Bharat Ratna Mother Teresa Gold Medal Award | Global Economic Progress and Research Association (GEPRA), Chennai |
4 | Outstanding Scientist Award | VDGOOD Professional Association |
5 | Award for Best Young Research Supervisor | Chennai Softech |
Ph.D Awarded to |
||||
SNo | Scholar Code | Scholar Name | Date of ViVa | Title |
---|---|---|---|---|
1 | 08944/PT/APRIL 2012 | M. KASTURI | 2017 | AN APPROACH FOR STEMMING IN INFORMATION RETRIEVAL SYSTEMS |
2 | 08943/PT/APRIL 2012 | P. MEENAKSHI SUNDARI | 2017 | AN APPROACH FOR ANALYZING THE FACTORS RECORDED IN THE TREE RINGS USING IMAGE PROCESSING TECHNIQUES |
3 | 18982/FT/JULY 2012 | S. THIRAVIYA REGINA RAJAM | 2018 | A SECURITY FRAMEWORK FOR SOCIAL NETWORKING SERVICES |
4 | 34505/Ph.D./CS./FT/Oct 2012 | I. Carol | 2018 | An Approach for Conflict Identification and Resolution in Heterogeneous Datasets |
5 | 19098/PH.D./COMP.SCI./PART TIM | P.JOSEPH CHARLES | 2018 | SECURITY FRAMEWORK FOR CONTEXT AWARE MOBILE WEB SERVICES |
6 | 34506/Ph.D./CS/PT/Oct 2012 | George Gabriel Richard Roy | 2020 | A Security Framework for a Sustainable Smart Home Ecosystem Using Permissioned Blockchain |
7 | 47398/Ph.D./CS/PT/Jan 2013 | B. Rex Cyril | 2020 | Methodologies for Ensuring Data Confidentiality in Public Cloud Storage |
8 | 47397/Ph.D./ Comp.Sci./Part Ti | J. ANTONY JOHN PRABU | 2021 | An Integrated Architecture for Secured Cloud Data Transactions with Consistency Enhancements |
9 | 07395/Ph.D.K3/ Comp.Sci./PT | Ms. A.ANGELPREETHI | 2020 | Dictionary based Approach for Improving the Accuracy of Opinion Mining on Big Data |
10 | 07265/Ph.D.K3/ Comp.Sci./ FT | Mrs. A. BEATRICE DOROTHY | 2021 | MULTI-LEVEL SECURITY ARCHITECTURE FOR IoT DATA USING QUANTUM CRYPTOGRAPHY |
11 | 29338/Ph.D. K10 / Comp.Sci./PT | Mrs. J. VIMAL ROSY | 2023 | A MACHINE LEARNING APPROACH FOR INTRUSION DETECTION IN CLOUD ENVIRONMENT |
12 | 003769/Ph.D. K10/CS/FT/2019 | A. BHUVANESHWARI | 2023 | IMPROVING THE ACCURACY OF EDGE DETECTION IN MRI BRAIN TUMOR IMAGES USING CONVOLUTIONAL NEURAL NETWORK(CNN) |
M.Phil Awarded to |
||||
SNo | Scholar Code | Scholar Name | Date of ViVa | Title |
---|---|---|---|---|
1 | 13MCS106 | R.STEPHEN | 2014 | AN ARCHITECTURE FOR PRIVACY-AWARE SECURITY SYSTEM |
2 | 13MCS126 | D.RAMYA | 2014 | AN ARCHITECTURE FOR SECURITY CORPRATE SERVICES USING COMPOSITE WEB SERVICE |
3 | 13MCS128 | P.PRIYA | 2014 | CONTEXT AWARE ARCHITECTURE FOR USER ACCESS CONTROL |
4 | 13MCS129 | G.BHARATHY | 2014 | AN ARCHITECTURE FOR SECURING HETROGENOUS WEB SERVICES |
5 | 13MCS139 | R.VIJAYA LAKSHMI | 2014 | AN ENHANCED STEMMER ALGORITHM |
6 | 14MCS105 | I.RAMYA IMMACULATE | 2015 | AN Architecture for Agent Based Orchestration |
7 | 14mcs128 | A.Vijaya Lakshmi | 2015 | Security on Mobile social networks |
8 | 14mcs133 | R.Vengadeswari | 2015 | Context aware privacy preservation for healthcare system |
9 | 14mcs134 | M.Josephinemary | 2015 | A Framework for automated semantic web service composition |
10 | 14MCS141 | J. MARY AHINO | 2015 | Role Based Access Control Mechanism for Context Aware Web Services |
11 | 15MCS114 | T.JAYAPRIYA | 2016 | AUTOMATA-BASED VERIFICATION OF SECURITY REQUIREMENTS OF COMPOSITE WEB SERVICES |
12 | 15MCS117 | P.DINESH | 2016 | MODIFIED ELLIPTIC CURVE CRYPTOGRAPHY WITH TWO PASSWORD AUTHENTICATION SCHEME FOR SECURE NETWORK |
13 | 16MCS105 | R.SARANYA | 2017 | SECURITY FOR WEB SERVICES |
14 | 16MCS106 | J.KRISHNAVENI | 2017 | IMPROVING CHOREOGRAGHY FOR WEB SERVICES |
15 | 15MCS109 | W.M.VINITHA RAJAKUMARI | 2016 | A CONTEXT-AWARE TOURIST INFORMATION SYSTEM |
16 | 17MCS115 | Shahidul Islam | 2018 | An Approach for Web Service Selection Using Filtering and Skyline Methods |
17 | 17MCS119 | Subash K | 2018 | An Architecture for Improving the QoS in Composite Web Service Selection |
18 | 18MCS107 | K. Briticia | 2019 | Prediction Model For Web Service Recommender Systems |
19 | 19MCS101 | T. Iswarya | 2020 | Optimal Key Generation with ECC for Enhancing the Web Services Security in Cloud Computing |