School of Computer Science Engineering and Information Systems (SCORE)
Publications
2023
SL. NO. | TITLE OF PAPER | NAME OF THE AUTHOR/S | NAME OF JOURNAL |
---|---|---|---|
1 | FLPK-BiSeNet: Federated Learning Based on Priori Knowledge and Bilateral Segmentation Network for Image Edge Extraction | Teng L., Qiao Y., Shafiq M., Srivastava G., Javed A.R., Gadekallu T.R., Yin S. | IEEE Transactions on Network and Service Management |
2 | The Metaverse for Cognitive Health: A Paradigm Shift | Ramu S.P., Srivastava G., Chengoden R., Victor N., Maddikunta P.K.R., Gadekallu T.R. | IEEE Consumer Electronics Magazine |
3 | A Generalizable Deep Neural Network Method for Detecting Attacks in Industrial Cyber-Physical Systems | Sakhnini J., Karimipour H., Dehghantanha A., Yazdinejad A., Gadekallu T.R., Victor N., Islam A. | IEEE Systems Journal |
4 | Cluster-Based Protocol for Prioritized Message Communication in VANET | Saha S., Kumar V.V., Niveditha V.R., Kannan V.A., Gunasekaran K., Venkatesan K. | IEEE Access |
5 | Digital Twin: Exploring the Intersection of Virtual and Physical Worlds | Menon D., Anand B., Chowdhary C.L. | IEEE Access |
6 | From Assistive Technologies to Metaverse - Technologies in Inclusive Higher Education for Students with Specific Learning Difficulties: A Review | Yenduri G., Kaluri R., Rajput D.S., Lakshmanna K., Gadekallu T.R., Mahmud M., Brown D.J. | IEEE Access |
7 | Plant and Salamander Inspired Network Attack Detection and Data Recovery Model | Sharma R.K., Issac B., Xin Q., Gadekallu T.R., Nath K. | Sensors |
8 | GAN with CCSO: generative adversarial network-driven CAViaR competitive swarm optimizer for medical video super resolution | Nathiya S., Sujatha R. | Multimedia Tools and Applications |
9 | Exponential Chimp Optimization Algorithm based Deep Neuro-Fuzzy Network with MapReduce framework for fake news detection in big data analytics | Kanchanamala P., Selva Rani B., Vairamuthu S. | International Journal of Adaptive Control and Signal Processing |
10 | RetU-Net: An Enhanced U-Net Architecture for Retinal Lesion Segmentation | Sundar S., Sumathy S. | International Journal on Artificial Intelligence Tools |
11 | A Multi-channel Convolutional Neural Network for Multilabel Sentiment Classification Using Abilify Oral User Reviews | Trueman T.E., Jayaraman A.K., Jasmine S., Ananthakrishnan G., Narayanasamy P. | Informatica (Slovenia) |
12 | A Survey on Soft Computing Techniques for Federated Learning- Applications, Challenges and Future Directions | Supriya Y., Gadekallu T.R. | Journal of Data and Information Quality |
13 | Blind nonlinear unmixing using nonnegative matrix factorization based bi-objective autoencoder | Bhakthan S.M., Loganathan A., Bansal A. | Indonesian Journal of Electrical Engineering and Computer Science |
14 | Customer churning analysis using machine learning algorithms | Prabadevi B., Shalini R., Kavitha B.R. | International Journal of Intelligent Networks |
15 | Deep Learning Perspectives to Detecting Intrusions in Wireless Sensor Networks | Abhale A.B., Jayaram Reddy A. | International Journal of Intelligent Systems and Applications in Engineering |
16 | From Fake Reviews to Fake News: A Novel Pandemic Model of Misinformation in Digital Networks | Govindankutty S., Gopalan S.P. | Journal of Theoretical and Applied Electronic Commerce Research |
17 | Maximizing network efficiency by optimizing channel allocation in wireless body area networks using machine learning techniques | Rao V.C.S., Shanmathi M., Rajkumar M., Haleem S.L.A., Amirthalingam V., Vanathi A. | Internet Technology Letters |
18 | Multi-image Feature Map-Based Watermarking Techniques Using Transformer | Palani A., Loganathan A. | International Journal of Electrical and Electronics Research |
19 | Performance analysis of smart optimization antenna for wireless networks | Abraham J., Suriyan K., Jackson B., Natarajan M., Lakshmanaperumal T.M. | International Journal of Electrical and Computer Engineering |
20 | Artificial Intelligence for Cognitive Health Assessment: State-of-the-Art, Open Challenges and Future Directions | Javed A.R., Saadia A., Mughal H., Gadekallu T.R., Rizwan M., Maddikunta P.K.R., Mahmud M., Liyanage M., Hussain A. | Cognitive Computation |
21 | Internet of things in Healthcare: a conventional literature review | Singh B., Lopez D., Ramadan R. | Health and Technology |
22 | Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses | Muhammad Z., Anwar Z., Javed A.R., Saleem B., Abbas S., Gadekallu T.R. | Technologies |
23 | Integrating forest cover change and carbon storage dynamics: Leveraging Google Earth Engine and InVEST model to inform conservation in hilly regions | Kafy A.-A., Saha M., Fattah M.A., Rahman M.T., Duti B.M., Rahaman Z.A., Bakshi A., Kalaivani S., Nafiz Rahaman S., Sattar G.S. | Ecological Indicators |
24 | Design and Development of IoT and Deep Ensemble Learning Based Model for Disease Monitoring and Prediction | Venkatachala Appa Swamy M., Periyasamy J., Thangavel M., Khan S.B., Almusharraf A., Santhanam P., Ramaraj V., Elsisi M. | Diagnostics |
25 | Brain Tumor Class Detection in Flair/T2 Modality MRI Slices Using Elephant- Herd Algorithm Optimized Features | Rajinikanth V., Vincent P.M.D.R., Gnanaprakasam C.N., Srinivasan K., Chang C.-Y. | Diagnostics |
26 | Remora Namib Beetle Optimization Enabled Deep Learning for Severity of COVID-19 Lung Infection Identification and Classification Using CT Images | Shanthi A., Koppu S. | Sensors |
27 | Optimization algorithms in security and privacy-preserving data disturbance for collaborative edge computing social IoT deep learning architectures | Boopathi M., Gupta S., Zabeeulla A.N.M., Gupta R., Vekriya V., Pandey A.K. | Soft Computing |
28 | Pest Detection and Classification in Peanut Crops Using CNN, MFO, and EViTA Algorithms | Venkatasaichandrakanthan d P., Iyapparaja M. | IEEE Access |
29 | Breast Cancer Classification In Histopathological Images Using Federated Learning Framework | Peta J., Koppu S. | IEEE Access |
30 | Optimization using Internet of Agent based Stacked Sparse Autoencoder Model for Heart Disease Prediction | Baviskar V., Verma M., Chatterjee P., Singal G., Gadekallu T.R. | Expert Systems |
31 | Metamaterial Inspired Quad-Port Multi- Antenna System for Millimeter Wave 5G Applications | Krishnamoorthy R., Kumar U.S., Swathi G., Begum M.A., Nancharaiah B., Sagar K.V.D. | Journal of Infrared, Millimeter, and Terahertz Waves |
32 | Digital image and video watermarking: methodologies, attacks, applications, and future directions | Aberna P., Agilandeeswari L. | Multimedia Tools and Applications |
33 | Data Rate Aware Reliable Transmission Mechanism in Wireless Sensor Networks using Bayesian Regularized Neural Network approach | Pundir M., Sandhu J.K., Gupta D., Gadekallu T.R., Juneja A., Gulzar Y., Nauman A. | Physical Communication |
34 | Context-Aware Emotion Detection from Low-resource Urdu Language Using Deep Neural Network | Bashir M.F., Javed A.R., Arshad M.U., Gadekallu T.R., Shahzad W., Beg M.O. | ACM Transactions on Asian and Low- Resource Language Information Processing |
35 | A Decision Model for Ranking Asian Higher Education Institutes Using an NLP-Based Text Analysis Approach | Prabadevi B., Deepa N., Ganesan K., Srivastava G. | ACM Transactions on Asian and Low- Resource Language Information Processing |
36 | Scene Graph Semantic Inference for Image and Text Matching | Pei J., Zhong K., Yu Z., Wang L., Lakshmanna K. | ACM Transactions on Asian and Low- Resource Language Information Processing |
37 | Multimodal Biometrics Authentication in Healthcare Using Improved Convolution Deep Learning Model | Balaji S., Rahamathunnisa U. | International Journal on Artificial Intelligence Tools |
38 | Early Predictive Model for Detection of Plant Leaf Diseases Using MobileNetV2 Architecture | Mahesh T.R., Vinoth Kumar V., Sivakami R., Manimozhi I., Krishnamoorthy N., Swapna B. | International Journal of Intelligent Systems and Applications in Engineering |
39 | Intrusion Detection System in Industrial Cyber-Physical System Using Clustered Federated Learning | Jayagopal V., Elangovan M., Singaram S.S., Shanmugam K.B., Subramaniam B., Bhukya S. | SN Computer Science |
40 | Smart farming using cloud-based Iot data analytics | Turukmane A.V., Pradeepa M., Reddy K.S.S., Suganthi R., Riyazuddin Y.M., Tallapragada V.V.S. | Measurement: Sensors |
41 | A Jamming Attacks Detection Approach Based on CNN based Quantum Leap Method for Wireless Sensor Network | Sheela M.S., Balasubramauf M., Jayakanth J.J., Rajalakskmi R., Manivaunau K., Surest D. | International Journal on Recent and Innovation Trends in Computing and Communication |
42 | Artificial Bee Colony Optimized Recurrent Neural Network-Based Port Container Throughput Forecast | Jayaprakash P.O., Raja K.T., Sree Dharinya S., Janaki N. | International Journal of Intelligent Systems and Applications in Engineering |
43 | Digital interference signal filtering on laser interface for optical fiber communication | Zhang S., Gadekallu T.R. | EAI Endorsed Transactions on Scalable Information Systems |
44 | Big Data Analytics, Processing Models, Taxonomy of Tools, V's, and Challenges: State-of-Art Review and Future Implications | Big Data Analytics, Processing Models, Taxonomy of Tools, V's, and Challenges: State-of-Art Review and Future Implications | Wireless Communications and Mobile Computing |
45 | Antimicrobial, antioxidant, anticancer, and antithrombotic, competency of saponins from the root of Decalepis hamiltonii | Gitanjali J., Dinesh Ram D.S., R K., Amalan V., Alahmadi T.A., Alharbi S.A., Kandasamy S., Shanmuganthan R., Vijayakumar N. | Environmental Research |
46 | A Novel Data Poisoning Attack in Federated Learning based on Inverted Loss Function | Gupta P., Yadav K., Gupta B.B., Alazab M., Gadekallu T.R. | Computers and Security |
47 | A Framework of Faster CRNN and VGG16- Enhanced Region Proposal Network for Detection and Grade Classification of Knee RA | Srinivasan S., Gunasekaran S., Mathivanan S.K., Jayagopal P., Khan M.A., Alasiry A.,Marzougui M., Masood A. | Diagnostics |
48 | Asymmetric Consortium Blockchain and Homomorphically Polynomial-Based PIR for Secured Smart Parking Systems | Haritha T., Anitha A. | Computers, Materials and Continua |
49 | Performance evaluation of deep learning techniques for lung cancer prediction | Deepapriya B.S., Kumar P., Nandakumar G., Gnanavel S., Padmanaban R., Anbarasan A.K., Meena K. | Soft Computing |
50 | An Entity Extraction and Categorization Technique on Twitter Streams | Narayanasamy S.K., Chang M. | International Journal of Information Technology and Decision Making |
51 | ASYv3: Attention-enabled pooling embedded Swin transformer-based YOLOv3 for obscenity detection | Samal S., Zhang Y.-D., Gadekallu T.R., Balabantaray B.K. | Expert Systems |
52 | A meta heuristic optimization algorithm (Lion-BES-XGB) for water quality prediction | K K., J V. | Urban Water Journal |
53 | Processing of digital mammogram images using optimized ELM with deep transfer learning for breast cancer diagnosis | Chakravarthy S.R.S., Bharanidharan N., Rajaguru H. | Multimedia Tools and Applications |
54 | Detection of Arrhythmia Heartbeats from ECG Signal Using Wavelet Transform- Based CNN Model | pandey S.K., Shukla A., Bhatia S., Gadekallu T.R., Kumar A., Mashat A., Shah M.A., Janghel R.R. | International Journal of Computational Intelligence Systems |
55 | Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology | Savithri M., Pradeepa M., Prasad D.R., Gangodkar D., Rajalakshmi R., Shafi S., Sinchana N.M., Prasanna Kumar K.R., Selvam N. | Wireless Communications and Mobile Computing |
56 | High Utility Periodic Frequent Pattern Mining in Multiple Sequences | Chen C.-M., Zhang Z., Wu J.M.-T., Lakshmanna K. | CMES - Computer Modeling in Engineering and Sciences |
57 | Detection and Counter Measure of Packet Misrouting by GPS-Free Positioning of Ad-Hoc Nodes | Sathianesan G.W., Gnanavel S., Salini R., Raji V., Vijay Anand R., Uddin M.S. | Mobile Information Systems |
58 | A robust malware traffic classifier to combat security breaches in industry 4.0 applications | Mangayarkarasi R., Vanmathi C., Ravi V. | Concurrency and Computation: Practice and Experience |
59 | RETRACTED ARTICLE: Industrial-IoT- hardware security-improvement using plan load optimization method in cloud | Basheer S., Gopu M., Mathew R.M., Bivi M.A., Prabu M. | International Journal of System Assurance Engineering and Management |
60 | Strategies for classifying water quality in the Cauvery River using a federated learning technique | J V., K K., P G.M., C G., Subramaniam P.R., Rangarajan S. | International Journal of Cognitive Computing in Engineering |
61 | COVID -19 Predictions using Transfer Learning based Deep Learning Model with Medical Internet of Things | Angulakshmi M., Deepa M., Anand M., Vanitha M., Sumaiya Thaseen I., Karthikeyan P. | International Journal on Recent and Innovation Trends in Computing and Communication |
62 | Detecting the Anti-Social Activity on Twitter using EGBDT with BCM | Chinthamu N., Gooda S.K., Shenbagavalli P., Krishnamoorthy N., Selvan S.T. | International Journal on Recent and Innovation Trends in Computing and Communication |
63 | SHBO-based U-Net for image segmentation and FSHBO-enabled DBN for classification using hyperspectral image | Subba Reddy T., Krishna Reddy V.V., Vijaya Kumar Reddy R., Kolli C.S., Sitharamulu V., Chandrababu M. | Imaging Science Journal |
64 | Phonetic-based Forward Online Transliteration Tool from English to Tamil Language | Anbukkarasi S., Elangovan D., Periyasamy J., Sathishkumar V.E., Sree Dharinya S., Sandeep Kumar M., Prabhu J. | International Journal of Reliability, Quality and Safety Engineering |
65 | Optimisation of SPARQL queries over the RDF data in the cloud environment | Dharmaraj C.R., Tripathy B.K. | International Journal of Advanced Intelligence Paradigms |
66 | A pattern mixture model with long short-term memory network for acute kidney injury prediction | Fathima Begum M., Narayan S. | Journal of King Saud University - Computer and Information Sciences |
67 | Precipitation prediction by integrating Rough Set on Fuzzy Approximation Space with Deep Learning techniques[Formula presented] | Manna T., A. A. | Applied Soft Computing |
68 | Vision Transformers, Ensemble Model, and Transfer Learning Leveraging Explainable AI for Brain Tumor Detection and Classification | Hossain S., Chakrabarty A., Gadekallu T.R., Alazab M., Piran M.J. | IEEE Journal of Biomedical and Health Informatics |
69 | Smart contract token-based privacy-preserving access control system for industrial Internet of Things | Wang W., Huang H., Yin Z., Gadekallu T.R., Alazab M., Su C. | Digital Communications and Networks |
70 | Sonar glass?Artificial vision: Comprehensive design aspects of a synchronization protocol for vision based sensors | Balakrishnan A., Ramana K., Ashok G., Viriyasitavat W., Ahmad S., Gadekallu T.R. | Measurement: Journal of the International Measurement Confederation |
71 | Optimization-Driven Machine Learning Approach for the Prediction of Hydrochar Properties from Municipal Solid Waste | Velusamy P., Srinivasan J., Subramanian N., Mahendran R.K., Saleem M.Q., Ahmad M., Shafiq M., Choi J.-G. | Sustainability (Switzerland) |
72 | Non-Gaussian Traffic Modelling for Multicore Architecture Using Wavelet Based Rosenblatt Process | Chaurasia A., Sharma V.S., Chowdhary C.L., Basheer S., Gadekallu T.R. | IEEE Access |
73 | DeepMist: Towards Deep Learning Assisted Mist Computing Framework for Managing Healthcare Big Data | Bebortta S., Tripathy S.S., Basheer S., Chowdhary C.L. | IEEE Access |
74 | Smart Decision-Making and Communication Strategy in Industrial Internet of Things | Gunasekaran K., Vinoth Kumar V., Kaladevi A.C., Mahesh T.R., Rohith Bhat C., Venkatesan K. | IEEE Access |
75 | Exergoenvironmental evaluation of kalina power generation system | Maheswari G.U., Ganesh N.S., Srinivas T., Reddy B.V. | Energy Sources, Part A: Recovery, Utilization and Environmental Effects |
76 | An Intelligent Waste Management Application Using IoT and a Genetic Algorithm?Fuzzy Inference System | Thaseen Ikram S., Mohanraj V., Ramachandran S., Balakrishnan A. | Applied Sciences (Switzerland) |
77 | A Deep Learning Approach for Kidney Disease Recognition and Prediction through Image Processing | Kumar K., Pradeepa M., Mahdal M., Verma S., RajaRao M.V.L.N., Ramesh J.V.N. | Applied Sciences (Switzerland) |
78 | Secure PBFT Consensus-Based Lightweight Blockchain for Healthcare Application | Hegde P., Maddikunta P.K.R. | Applied Sciences (Switzerland) |
79 | MBRSDTC: Design of a multimodal bioinspired model to improve resource scheduling efficiency with differential task-level constraints | Brahmam M.G., Vijay Anand R. | Expert Systems |
80 | Robust Graph Neural-Network-Based Encoder for Node and Edge Deep Anomaly Detection on Attributed Networks ? | Daniel G.V., Chandrasekaran K., Meenakshi V., Paneer P. | Electronics (Switzerland) |
81 | HCoF: Hybrid Collaborative Filtering Using Social and Semantic Suggestions for Friend Recommendation | Ramakrishna M.T., Venkatesan V.K., Bhardwaj R., Bhatia S., Rahmani M.K.I., Lashari S.A., Alabdali A.M. | Electronics (Switzerland) |
82 | A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication | Agilandeeswari L., Prabukumar M., Alenizi F.A. | Multimedia Tools and Applications |
83 | Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithm | Rajyalakshmi V., Lakshmanna K. | International Journal of Network Management |
84 | An anomaly detection on blockchain infrastructure using artificial intelligence techniques: Challenges and future directions? A review | Chithanuru V., Ramaiah M. | Concurrency and Computation: Practice and Experience |
85 | Integrated publish/subscribe and push-pull method for cloud based IoT framework for real time data processing | Sai Lohitha N., Pounambal M. | Measurement: Sensors |
86 | Gaussian kernelized feature selection and improved multilayer perceptive deep learning classifier for software fault prediction | Sivavelu S., Palanisamy V. | Indonesian Journal of Electrical Engineering and Computer Science |
87 | Uncertainty Quantification to Improve the Classification of Melanoma and Basal Skin Cancer Using ResNet Model | Deepa D., Muthukumaran V., Vinodhini V., Selvaraj S., Sandeep Kumar M., Prabhu J. | Journal of Uncertain Systems |
88 | An Improved MangoNet Architecture Using Harris Hawks Optimization for Fruit Classification with Uncertainty Estimation | Rajalaxmi R.R., Saradha M., Fathima S.K., Sathish Kumar V.E., Sandeep Kumar M., Prabhu J. | Journal of Uncertain Systems |
89 | Rainfall prediction using ensembled-LSTM and dense networks | Sinha U., Thakur V., Jain S., Parimala M., Kaspar S. | International Journal of Engineering Systems Modelling and Simulation |
90 | A systematic review of Explainable Artificial Intelligence models and applications: Recent developments and future trends | Saranya A., Subhashini R. | Decision Analytics Journal |
91 | A Systematic Review of Transformer-Based Pre-Trained Language Models through Self- Supervised Learning | Kotei E., Thirunavukarasu R. | Information (Switzerland) |
92 | A Comprehensive Survey on Certificate- Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems | Sripathi Venkata Naga S.K., Yesuraj R., Munuswamy S., Arputharaj K. | Sensors |
93 | A Scientometric Analysis of Deep Learning Approaches for Detecting Fake News | Dhiman P., Kaur A., Iwendi C., Mohan S.K. | Electronics (Switzerland) |
94 | A Survey of Explainable Artificial Intelligence for Smart Cities | Javed A.R., Ahmed W., Pandya S., Maddikunta P.K.R., Alazab M., Gadekallu T.R. | Electronics (Switzerland) |
95 | AITel: eHealth Augmented Intelligence based Telemedicine Resource Recommendation Framework for IoT devices in Smart cities | Ahmed S.T., Kumar V., Kim J. | IEEE Internet of Things Journal |
96 | Blockchain for the metaverse: A Review | Huynh-The T., Gadekallu T.R., Wang W., Yenduri G., Ranaweera P., Pham Q.-V., da Costa D.B., Liyanage M. | Future Generation Computer Systems |
97 | Securing Multimedia Using a Deep Learning Based Chaotic Logistic Map | Rupa C., Harshitha M., Srivastava G., Gadekallu T.R., Maddikunta P.K.R. | IEEE Journal of Biomedical and Health Informatics |
98 | An anonymization-based privacy- preserving data collection protocol for digital health data | Andrew J., Eunice R.J., Karthikeyan J. | Frontiers in Public Health |
99 | An authentication approach in SDN- VANET architecture with Rider-Sea Lion optimized neural network for intrusion detection | Pulligilla M.K., Vanmathi C. | Internet of Things (Netherlands) |
100 | An edge communication based probabilistic caching for transient content distribution in vehicular networks | Gupta D., Rani S., Tiwari B., Gadekallu T.R. | Scientific Reports |
101 | Particle Swarm-Based Federated Learning Approach for Early Detection of Forest Fires | Supriya Y., Gadekallu T.R. | Sustainability (Switzerland) |
102 | UsCoTc: Improved Collaborative Filtering (CFL) recommendation methodology using user confidence, time context with impact factors for performance enhancement | Mahesh T.R., Vinoth Kumar V., Lim S.-J. | PLoS ONE |
103 | Performance investigation on novel combined power generation and refrigeration system | Uma Maheswari G., Ganesh N.S., Srinivas T., Reddy B.V. | Energy and Environment |
104 | High-Performance Artificial Intelligence Recommendation of Quality Research Papers Using Effective Collaborative Approach | Venkatesan V.K., Ramakrishna M.T., Batyuk A., Barna A., Havrysh B. | Systems |
105 | Efficient Data Preprocessing with Ensemble Machine Learning Technique for the Early Detection of Chronic Kidney Disease | Venkatesan V.K., Ramakrishna M.T., Izonin I., Tkachenko R., Havryliuk M. | Applied Sciences (Switzerland) |
106 | Deep Ensemble-Based Approach Using Randomized Low-Rank Approximation for Sustainable Groundwater Level Prediction | Manna T., Anitha A. | Applied Sciences (Switzerland) |
107 | Experience Replay Optimisation via ATSC and TSC for Performance Stability in Deep RL | Osei R.S., Lopez D. | Applied Sciences (Switzerland) |
108 | A Forecasting Approach to Cryptocurrency Price Index Using Reinforcement Learning | Mariappan L.T., Pandian J.A., Kumar V.D., Geman O., Chiuchisan I., N?stase C. | Applied Sciences (Switzerland) |
109 | Homogeneous Adaboost Ensemble Machine Learning Algorithms with Reduced Entropy on Balanced Data | Ramakrishna M.T., Venkatesan V.K., Izonin I., Havryliuk M., Bhat C.R. | Entropy |
110 | Detection and Grade Classification of Diabetic Retinopathy and Adult Vitelliform Macular Dystrophy Based on Ophthalmoscopy Images | Srinivasan S., Nagarnaidu Rajaperumal R., Mathivanan S.K., Jayagopal P., Krishnamoorthy S., Kardy S. | Electronics (Switzerland) |
111 | Hybrid Whale and Gray Wolf Deep Learning Optimization Algorithm for Prediction of Alzheimer?s Disease | Dhakhinamoorthy C., Mani S.K., Mathivanan S.K., Mohan S., Jayagopal P., Mallik S., Qin H. | Mathematics |
112 | Identification of traffic signs for advanced driving assistance systems in smart cities using deep learning | Dhawan K., Srinivasa Perumal R., Nadesh R.K. | Multimedia Tools and Applications |
113 | Biodiversity in a forest ecosystem in India using environmental DNA sequence analysis of pathogen-hostile eucalyptus trees | Ram S.R., Narayanan L., Krishnan S., Robinson H. | Global Nest Journal |
114 | Artificial intelligence with earthworm optimization assisted waste management system for smart cities | Rajalakshmi J., Sumangali K., Jayanthi J., Muthulakshmi K. | Global Nest Journal |
115 | Object Sub-Categorization and Common Framework Method using Iterative AdaBoost for Rapid Detection of Multiple Objects | Rao B.N.K., Ranjana R., Challa N.P., Chakravarthi S.S., Vellingiri J. | Journal of Scientific and Industrial Research |
116 | Flexible and secure continues data transmission among multiple users in cloud environment | Elumalai E., Muruganandam D. | Indonesian Journal of Electrical Engineering and Computer Science |
117 | A Novel Framework on Security and Energy Enhancement Based on Internet of Medical Things for Healthcare 5.0 | Natarajan R., Lokesh G.H., Flammini F., Premkumar A., Venkatesan V.K., Gupta S.K. | Infrastructures |
118 | Human Detection and Action Recognition for Search and Rescue in Disasters Using YOLOv3 Algorithm | Valarmathi B., Kshitij J., Dimple R., Srinivasa Gupta N., Harold Robinson Y., Arulkumaran G., Mulu T. | Journal of Electrical and Computer Engineering |
119 | A Performance Enhancement of Deepfake Video Detectio | Ikram S.T., Sood D., Priya V., Arulkumar V., Chambial S. | International Journal of Electrical and Computer Engineering Systems |
120 | A Vision Transformer Approach for Traffic Congestion Prediction in Urban Areas | Ramana K., Srivastava G., Kumar M.R., Gadekallu T.R., Lin J.C., Alazab M., Iwendi C. | IEEE Transactions on Intelligent Transportation Systems |
121 | A framework to distinguish healthy/cancer renal CT images using the fused deep features | Rajinikanth V., Vincent P.M.D.R., Srinivasan K., Ananth Prabhu G., Chang C.-Y. | Frontiers in Public Health |
122 | Deep belief network-based approach for detecting Alzheimer's disease using the multi-omics data | Mahendran N., Vincent P M D.R. | Computational and Structural Biotechnology Journal |
123 | Preserving Privacy of Classified Authentic Satellite Lane Imagery Using Proxy Re-Encryption and UAV Technologies | Nagasree Y., Rupa C., Akshitha P., Srivastava G., Gadekallu T.R., Lakshmanna K. | Drones |
124 | Deep Learning-Based Metaheuristic Weighted K-Nearest Neighbor Algorithm for the Severity Classification of Breast Cancer | Sannasi Chakravarthy S.R., Bharanidharan N., Rajaguru H. | IRBM |
125 | SRC: Superior Robustness of COVID-19 Detection from Noisy Cough Data Using GFCC | Swain B.K., Khan M.Z., Chowdhary C.L., Alsaeedi A. | Computer Systems Science and Engineering |
126 | Local-Ternary-Pattern-Based Associated Histogram Equalization Technique for Cervical Cancer Detection | Srinivasan S., Raju A.B.K., Mathivanan S.K., Jayagopal P., Babu J.C., Sahu A.K. | Diagnostics |
127 | TAKEN: A Traffic Knowledge-Based Navigation System for Connected and Autonomous Vehicles | Kamath B N., Fernandes R., Rodrigues A.P., Mahmud M., Vijaya P., Gadekallu T.R., Kaiser M.S. | Sensors |
128 | Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy | Muhammad Z., Amjad F., Iqbal Z., Javed A.R., Gadekallu T.R. | Journal of Ambient Intelligence and Humanized Computing |
129 | Metaverse for Healthcare: A Survey on Potential Applications, Challenges and Future Directions | Chengoden R., Victor N., Huynh-The T., Yenduri G., H.Jhaveri R., Alazab M., Bhattacharya S., Hegde P., Maddikunta P.K.R., Gadekallu T.R. | IEEE Access |
130 | SDOT: Secure Hash, Semantic Keyword Extraction, and Dynamic Operator Pattern-Based Three-Tier Forensic Classification Framework | Joseph D.P., Viswanathan P. | IEEE Access |
131 | Novel Hybrid Optimization Techniques to Enhance Reliability from Reverse Osmosis Desalination Process | Baseer M.A., Vinoth Kumar V., Izonin I., Dronyuk I., Velmurugan A.K., Swapna B. | Energies |
132 | A Novel Approach for Continuous Authentication of Mobile Users Using Reduce Feature Elimination (RFE): A Machine Learning Approach | kumari S., Singh K., Khan T., Ariffin M.M., Mohan S.K., Baleanu D., Ahmadian A. | Mobile Networks and Applications |
133 | SEDIS?A Rumor Propagation Model for Social Networks by Incorporating the Human Nature of Selection | Govindankutty S., Gopalan S.P. | Systems |
134 | Secured MCDM Model for Crowdsource Business Intelligence | Nallakaruppan M.K., Johri I., Somayaji S., Bhatia S., Malibari A.A., Alabdali A.M. | Applied Sciences (Switzerland) |
135 | SBMYv3: Improved MobYOLOv3 a BAM attention-based approach for obscene image and video detection | Samal S., Zhang Y.-D., Gadekallu T.R., Nayak R., Balabantaray B.K. | Expert Systems |
136 | Filter-Based Ensemble Feature Selection and Deep Learning Model for Intrusion Detection in Cloud Computing | Kavitha C., Saravanan M., Gadekallu T.R., Nimala K., Kavin B.P., Lai W.-C. | Electronics (Switzerland) |
137 | Diabetic Retinopathy Detection: A Blockchain and African Vulture Optimization Algorithm-Based Deep Learning Framework | Uppamma P., Bhattacharya S. | Electronics (Switzerland) |
138 | Forest Fire Identification in UAV Imagery Using X-MobileNet | Namburu A., Selvaraj P., Mohan S., Ragavanantham S., Eldin E.T. | Electronics (Switzerland) |
139 | Federated Learning Approach for Early Detection of Chest Lesion Caused by COVID-19 Infection Using Particle Swarm Optimization | Kandati D.R., Gadekallu T.R. | Electronics (Switzerland) |
140 | IoMT with Deep CNN: AI-Based Intelligent Support System for Pandemic Diseases | Thandapani S., Mahaboob M.I., Iwendi C., Selvaraj D., Dumka A., Rashid M., Mohan S. | Electronics (Switzerland) |
141 | An Ensemble Learning Approach for Reversible Data Hiding in Encrypted Images with Fibonacci Transform | Panchikkil S., Vegesana S.P., Manikandan V.M., Donta P.K., Maddikunta P.K.R., Gadekallu T.R. | Electronics (Switzerland) |
142 | Trajectory Planning and Collision Control of a Mobile Robot: A Penalty-Based PSO Approach | Pandey K.K., Kumbhar C., Parhi D.R., Mathivanan S.K., Jayagopal P., Haque A. | Mathematical Problems in Engineering |
143 | A Distributed Framework for Predictive Analytics Using Big Data and MapReduce Parallel Programming | Natesan P., Sathishkumar V.E., Mathivanan S.K., Venkatasen M., Jayagopal P., Allayear S.M. | Mathematical Problems in Engineering |
144 | Fault prediction using fuzzy convolution neural network on IoT environment with heterogeneous sensing data fusion | Rajput D.S., Meena G., Acharya M., Mohbey K.K. | Measurement: Sensors |
145 | Deep Learning Speech Synthesis Model for Word/Character-Level Recognition in the Tamil Language | Rajendran S., Raja K.T., Nagarajan G., Dass S.A., Kumar S.M., Jayagopal P. | International Journal of e- Collaboration |
146 | Deep Learning and Medical Image Processing Techniques for Diabetic Retinopathy: A Survey of Applications, Challenges, and Future Trends | Uppamma P., Bhattacharya S. | Journal of Healthcare Engineering |
147 | A review on soft computing approaches for predicting maintainability of software: State-of-the-art, technical challenges, and future directions | Yenduri G., Gadekallu T.R. | Expert Systems |
148 | A Survey on Deep Learning Models Embed Bio-Inspired Algorithms in Cardiac Disease Classification | Pandiyan N., Narayan S. | Open Biomedical Engineering Journal |
149 | A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment | Chen C.-M., Li Z., Kumari S., Srivastava G., Lakshmanna K., Gadekallu T.R. | Vehicular Communications |
150 | Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks | Babu E.S., Barthwal A., Kaluri R. | Computer Communications |
151 | Distributed three-way formal concept analysis for large formal contexts | Chunduri R.K., Cherukuri A.K. | Journal of Parallel and Distributed Computing |
152 | The Laplacian Energy of Hesitancy Fuzzy Graphs in Decision-Making Problems | Rajagopal Reddy N., Khan M.Z., Sharief Basha S., Alahmadi A., Alahmadi A.H., Chowdhary C.L. | Computer Systems Science and Engineering |
153 | Securing social platform from misinformation using deep learning | Roy P.K., Tripathy A.K., Weng T.-H., Li K.-C. | Computer Standards and Interfaces |
154 | Solitons of dispersive wave steered from Navier?Bernoulli and Love's hypothesis in cylindrical elastic rod with compressible Murnaghan's materials | Silambarasan R., K?l?çman A. | Mathematics and Computers in Simulation |
155 | Load balancing and service discovery using Docker Swarm for microservice based big data applications | Singh N., Hamid Y., Juneja S., Srivastava G., Dhiman G., Gadekallu T.R., Shah M.A. | Journal of Cloud Computing |
156 | Deep Learning for Wind Speed Forecasting Using Bi-LSTM with Selected Features | Subbiah S.S., Paramasivan S.K., Arockiasamy K., Senthivel S., Thangavel M. | Intelligent Automation and Soft Computing |
157 | A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network | Theresa W.G., Gayathri A., Rama P. | Intelligent Automation and Soft Computing |
158 | Multiparameter optimization system with DCNN in precision agriculture for advanced irrigation planning and scheduling based on soil moisture estimation | Kumar P., Udayakumar A., Anbarasa Kumar A., Senthamarai Kannan K., Krishnan N. | Environmental Monitoring and Assessment |
159 | Dual attention guided deep encoder- decoder network for change analysis in land use/land cover for Dakshina Kannada District, Karnataka, India | Naik N., Chandrasekaran K., Sundaram V.M., Panneer P. | Environmental Earth Sciences |
160 | Normalized hellinger feature selection and soft margin boosting classification for water quality prediction | Karuppannan K., Jayagopal V. | Expert Systems |
161 | Smart IoMT Framework for Supporting UAV Systems with AI | Shankar N., Nallakaruppan M.K., Ravindranath V., Senthilkumar M., Bhagavath B.P. | Electronics (Switzerland) |
162 | Maliciously roaming person's detection around hospital surface using intelligent cloud-edge based federated learning | Gokulakrishnan S., Jarwar M.A., Ali M.H., Kamruzzaman M.M., Meenakshisundaram I.,Jaber M.M., Kumar R.L. | Journal of Combinatorial Optimization |
163 | Autonomous vehicles in 5G and beyond: A survey | Hakak S., Gadekallu T.R., Maddikunta P.K.R., Ramu S.P., M P., De Alwis C., Liyanage M. | Vehicular Communications |
164 | From Beginning to BEGANing: Role of Adversarial Learning in Reshaping Generative Models | Bhandari A., Tripathy B., Adate A., Saxena R., Gadekallu T.R. | Electronics (Switzerland) |
2022
SL. NO. | TITLE OF PAPER | NAME OF THE AUTHOR/S | NAME OF JOURNAL |
---|---|---|---|
1 | Blockchain for Internet of Underwater Things: State-of-the-Art, Applications, Challenges, and Future Directions | Bhattacharya S., Victor N., Chengoden R., Ramalingam M., Selvi G.C., Maddikunta P.K.R., Donta P.K., Dustdar S., Jhaveri R.H., Gadekallu T.R. | Sustainability (Switzerland) |
2 | Security Framework for Internet of Things based Software Defined Networks using Blockchain | Rani S., Babbar H., Srivastava G., Gadekallu T.R., Dhiman G. | IEEE Internet of Things Journal |
3 | Blockchain-Based Two-Stage Federated Learning With Non-IID Data in IoMT System | Lian Z., Zeng Q., Wang W., Gadekallu T.R., Su C. | IEEE Transactions on Computational Social Systems |
4 | Automatic 3D Facial Landmark-Based Deformation Transfer on Facial Variants for Blendshape Generation | Ingale A.K., Leema A.A., kim H.S., Udayan J.D. | Arabian Journal for Science and Engineering |
5 | Multi-tier block truncation coding model using genetic auto encoders for gray scale images | Rajasoundaran S., Santhosh Kumar S.V.N., Selvi M., Ganapathy S., Kannan A. | Multimedia Tools and Applications |
6 | Two-phase classification: ANN and A-SVM classifiers on motor imagery BCI | Mary Judith A., Baghavathi Priya S., Mahendran R.K., Gadekallu T.R., Ambati L.S. | Asian Journal of Control |
7 | Polygonal approximation for digital image boundary using firefly algorithm | Raja K.T., Ray B.K. | Journal of Electronic Imaging |
8 | Modelling of different On-Chip inductors for radio frequency integrated circuits | Muneeswaran D., Subramani J., Pandi T., Chenniappan N., Shanmugam M. | Comptes Rendus de L'Academie Bulgare des Sciences |
9 | Web Hazard Identification and Detection Using Deep Learning - A Comparative Study | Sivanantham S., Krishnamoorthy V., Karthikeyan D., Sakthivel M., Mohanraj V., Akshaya V. | Journal of Pharmaceutical Negative Results |
10 | Categorical Data Clustering Using Harmony Search Algorithm for Healthcare Datasets | Sharma A., Kumar P., Babulal K.S., Obaid A.J., Patel H. | International Journal of E-Health and Medical Communications |
11 | Ensuring prompt cloud service provider based on service level agreement using fuzzy logics and decision support system | Karthikeyan P., Sathiyamoorthy E. | International Journal of Intelligent Enterprise |
12 | Information security protection for eHealth records using temporal hash signature | Charanya R., Saravanaguru R.A.K., Aramudhan M. | International Journal of Intelligent Enterprise |
13 | Secure Communication Model for Dynamic Task Offloading in Multi-Cloud Environment | Usharani C., Krishna P.V., Akki P., Saritha V., Gitanjali J. | International Journal on Recent and Innovation Trends in Computing and Communication |
14 | ILAT (Software as a Service): Interactive Learning Application Tool for Autism Screening and Assessment in children with Autism Spectrum Disorder | Arivuselvan K., Nadesh R.K., Perumal R.S. | International Journal on Recent and Innovation Trends in Computing and Communication |
15 | Edge Computing and Blockchain in Smart Agriculture Systems | Prasad Ch.G.V.N., Mallareddy A., Pounambal M., Velayutham V. | International Journal on Recent and Innovation Trends in Computing and Communication |
16 | Mixed Game-Based AoI Optimization for Combating COVID-19 With AI Bots | Yang Y., Wang W., Yin Z., Xu R., Zhou X., Kumar N., Alazab M., Gadekallu T.R. | IEEE Journal on Selected Areas in Communications |
17 | Covert communication for cooperative NOMA with two phases detection | Peng H., Tian Z., Li X., Wang W., Nauryzbayev G., Rabie K., Gadekallu T.R. | Alexandria Engineering Journal |
18 | Spatiotemporal Assessment of Satellite Image Time Series for Land Cover Classification Using Deep Learning Techniques: A Case Study of Reunion Island, France | Navnath N.N., Chandrasekaran K., Stateczny A., Sundaram V.M., Panneer P. | Remote Sensing |
19 | Skin lesion classification of dermoscopic images using machine learning and convolutional neural network | Shetty B., Fernandes R., Rodrigues A.P., Chengoden R., Bhattacharya S., Lakshmanna K. | Scientific Reports |
20 | Conceptualising a channel-based overlapping CNN tower architecture for COVID-19 identification from CT-scan images | Tiwari R.S., D L., Das T.K., Srinivasan K., Chang C.-Y. | Scientific Reports |
21 | Smart Water Resource Management Using Artificial Intelligence?A Review | Krishnan S.R., Nallakaruppan M.K., Chengoden R., Koppu S., Iyapparaja M., Sadhasivam J., Sethuraman S. | Sustainability (Switzerland) |
22 | A Study of the Impacts of Air Pollution on the Agricultural Community and Yield Crops (Indian Context) | Pandya S., Gadekallu T.R., Maddikunta P.K.R., Sharma R. | Sustainability (Switzerland) |
23 | Dingo Optimization Based Cluster Based Routing in Internet of Things | Aravind K., Maddikunta P.K.R. | Sensors |
24 | Security in IoT Mesh Networks based on Trust Similarity | Kavitha A., Reddy V.B., Singh N., Gunjan V.K., Lakshmanna K., Khan A.A., Wechtaisong C. | IEEE Access |
25 | Energy Efficient End Device Aware Solution Through SDN in Edge-Cloud Platform | Patra S.S., Govindaraj R., Chowdhury S., Shah M.A., Patro R., Rout S. | IEEE Access |
26 | Survey on the Applications of Blockchain in Agriculture | L.B K. | Agriculture (Switzerland) |
27 | Incorporation of Energy Efficient Computational Strategies for Clustering and Routing in Heterogeneous Networks of Smart City | Venkatesan V.K., Izonin I., Periyasamy J., Indirajithu A., Batyuk A., Ramakrishna M.T. | Energies |
28 | Framework for Handling Rare Word Problems in Neural Machine Translation System Using Multi-Word Expressions | Garg K.D., Shekhar S., Kumar A., Goyal V., Sharma B., Chengoden R., Srivastava G. | Applied Sciences (Switzerland) |
29 | Simulating crop yield estimation and prediction through geospatial data for specific regional analysis | Mathivanan S.K., Jayagopal P. | Earth Science Informatics |
30 | Distributed-Ledger-Based Blockchain Technology for Reliable Electronic Voting System with Statistical Analysis | Ch R., Kumari D J., Gadekallu T.R., Iwendi C. | Electronics (Switzerland) |
31 | Detection and Classification of Tomato Crop Disease Using Convolutional Neural Network | Sakkarvarthi G., Sathianesan G.W., Murugan V.S., Reddy A.J., Jayagopal P., Elsisi M. | Electronics (Switzerland) |
32 | A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization | Gautam S., Henry A., Zuhair M., Rashid M., Javed A.R., Maddikunta P.K.R. | Electronics (Switzerland) |
33 | DocCompare: An Approach to Prevent the Problem of Character Injection in Document Similarity Algorithm | Namburu A., Surendran A., Balaji S.V., Mohan S., Iwendi C. | Mathematics |
34 | Optimized face-emotion learning using convolutional neural network and binary whale optimization | Muthamilselvan T., Brindha K., Senthilkumar S., Saransh, Chatterjee J.M., Hu Y.-C. | Multimedia Tools and Applications |
35 | Terahertz Micro-Strip Patch Antenna Design and Modelling for 6G Mobile Communication | Jeyakumar P., Anandpushparaj J., Thanapal P., Meenatchi S., Dhamodaran M. | Journal of Electrical Engineering and Technology |
36 | The Effectual Spectrum Defragmentation Algorithm with Holding Time Sensitivity in Elastic Optical Network (EON) | Selva Kumar S., Kamalakannan J., Seetha R., Asha N., Raja K.T., Sree Dharinya S., Sucharitha M., Kalaivani S. | International Journal of Optics |
37 | A Hybrid Deep Learning Based Assist System for Detection and Classification of Breast Cancer from Mammogram Images | Narayanan L., Krishnan S., Robinson H. | International Arab Journal of Information Technology |
38 | Heterogeneous sensor data fusion acquisition model for medical applications | Dhanke J., Pradeepa M., Karthik R., Rampur V., Poonguzhali I., Chittapragada H. | Measurement: Sensors |
39 | Survival Study on Different Water Quality Prediction Methods Using Machine Learning | Kalaivanan K., Vellingiri J. | Nature Environment and Pollution Technology |
40 | A High Secured Steganalysis Using QVDHC Model | Akki P., Gitanjali J., Iwendi C., Sumathy S., Waheed A. | International Journal on Recent and Innovation Trends in Computing and Communication |
41 | Modelling microscale impacts assessment of urban expansion on seasonal surface urban heat island intensity using neural network algorithms | Saha M., Kafy A.-A., Bakshi A., Faisal A.-A., Almulhim A.I., Rahaman Z.A., Al Rakib A., Fattah M.A., Akter K.S., Rahman M.T., Zhang M., Rathi R. | Energy and Buildings |
42 | Principal component analysis on face recognition using artificial firefirefly swarm optimization algorithm | Asha N., Syed Fiaz A.S., Jayashree J., Vijayashree J., Indumathi J. | Advances in Engineering Software |
43 | Digital Twins for Healthcare 4.0 - Recent Advances, Architecture, and Open Challenges | Alazab M., Khan L.U., Koppu S., Ramu S.P., M I., Boobalan P., Baker T., Maddikunta P.K.R., Gadekallu T.R., Aljuhani A. | IEEE Consumer Electronics Magazine |
44 | Curve-Aware Model Predictive Control (C-MPC) Trajectory Tracking for Automated Guided Vehicle (AGV) over On-Road, In-Door, and Agricultural-Land | Manikandan S., Kaliyaperumal G., Hakak S., Gadekallu T.R. | Sustainability (Switzerland) |
45 | Rice plant disease classification using dilated convolutional neural network with global average pooling | Senthil Pandi S., Senthilselvi A., Gitanjali J., ArivuSelvan K., Gopal J., Vellingiri J. | Ecological Modelling |
46 | Analysis on the Bus Arrival Time Prediction Model for Human-Centric Services Using Data Mining Techniques | Shanthi N., Sathishkumar V.E., Upendra Babu K., Karthikeyan P., Rajendran S., Allayear S.M. | Computational Intelligence and Neuroscience |
47 | Design and Analysis of Multilayered Neural Network-Based Intrusion Detection System in the Internet of Things Network | Sangeetha S.K.B., Mani P., Maheshwari V., Jayagopal P., Sandeep Kumar M., Allayear S.M. | Computational Intelligence and Neuroscience |
48 | An Efficient Signal Processing Algorithm for Detecting Abnormalities in EEG Signal | Syamsundararao T., Selvarani A., Rathi R., Vini | Contrast Media and Molecular Imaging |
49 | Computational and Mathematical Methods in Medicine Glioma Brain Tumor Detection and Classification Using Convolutional Neural Network | Saravanan S., Kumar V.V., Sarveshwaran V., Indirajithu A., Elangovan D., Allayear S.M. | Computational and Mathematical Methods in Medicine |
50 | A High-Capacity Reversible Data-Hiding Scheme for Medical Image Transmission Using Modified Elias Gamma Encoding | Manikandan V.M., Murthy K.S.R., Siddineni B., Victor N., Maddikunta P.K.R., Hakak S. | Electronics (Switzerland) |
51 | Optimal resource scheduling algorithm for cell boundaries users in heterogenous 5G networks | Gatti R., Arjun Kumar G.B., Sunil Kumar K.N.,Palle S., Gadekallu T.R. | Physical Communication |
52 | Influences of Aqueous Nanofluid Emulsion on Diesel Engine Performance, Combustion, and Emission: IoT (Emission Monitoring System) | Venkatesh B., Babu J.C., Mathivanan S.K., Jayagopal P., Prasanna S.,Uddin M.S. | Advances in Materials Science and Engineering |
53 | Deep Learning Based Load Forecasting with Decomposition and Feature Selection Techniques | Subbiah S.S., Kumar S.P. | Journal of Scientific and Industrial Research |
54 | Identifying peanut maturity based on Hyper Spectral Invariant Scaled Feature Selection using Adaptive Dense Net Recurrent Neural Network | M B., C N. | Measurement: Sensors |
55 | An overview of internet engineering task force mobility management protocols: approaches and its challenges | Mahenthiran P., Muruganadam D. | International Journal of Electrical and Computer Engineering |
56 | Cardiac disease detection using cuckoo search enabled deep belief network | P N., Narayan S. | Intelligent Systems with Applications |
57 | Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture | Chaganti R., Varadarajan V., Gorantla V.S.,Gadekallu T.R., Ravi V. | Future Internet |
58 | Design of resource matching model of intelligent education system based on machine learning | Xiang C.-Z., Fu N.-X., Gadekallu T.R. | EAI Endorsed Transactions on Scalable Information Systems |
59 | Towards computational solutions for precision medicine based big data healthcare system using deep learning models: A review | Thirunavukarasu R., C G.P.D., R G., Gopikrishnan M., Palanisamy V. | Computers in Biology and Medicine |
60 | Tear film breakup time-based dry eye disease detection using convolutional neural network | Vyas A.H., Mehta M.A., Kotecha K., Pandya S., Alazab M., Gadekallu T.R. | Neural Computing and Applications |
61 | Federated Learning for intrusion detection system: Concepts, challenges and future directions | Agrawal S., Sarkar S., Aouedi O., Yenduri G., Piamrat K., Alazab M., Bhattacharya S., Maddikunta P.K.R., Gadekallu T.R. | Computer Communications |
62 | A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis | Rehman M.U., Shafique A., Ghadi Y.Y., Boulila W., Jan S.U., Gadekallu T.R., Driss M., Ahmad J. | IEEE Transactions on Network Science and Engineering |
63 | Optimization driven model and segmentation network for skin cancer detection | Anup Kumar K., Vanmathi C. | Computers and Electrical Engineering |
64 | ECDSA-Based Water Bodies Prediction from Satellite Images with UNet | Ch A., Ch R., Gadamsetty S., Iwendi C., Gadekallu T.R., | Water (Switzerland) |
65 | Green-Tech CAV: Next Generation Computing for Traffic Sign and Obstacle Detection in Connected and Autonomous Vehicles | Kumar V.D.A., Raghuraman M., Kumar A., Rashid M., Hakak S., Reddy M.P.K. | IEEE Transactions on Green Communications and Networking |
66 | 6G Driven Fast Computational Networking Framework for Healthcare Applications | Srinivasu P.N., Ijaz M.F., Shafi J., Wozniak M., Sujatha R. | IEEE Access |
67 | Privacy Preserving Attribute-Focused Anonymization Scheme for Healthcare Data Publishing | Onesimu J.A., Karthikeyan J., Eunice J., Pomplun M., Dang H. | IEEE Access |
68 | Dynamic resource provisioning and secured file sharing using virtualization in cloud azure | Perumal K., Mohan S., Frnda J., Divakarachari P.B. | Journal of Cloud Computing |
69 | A Web-Based Model to Predict a Neurological Disorder Using ANN | Almazroi A.A., Alamin H., Sujatha R., Jhanjhi N.Z. | Healthcare (Switzerland) |
70 | Addressing Binary Classification over Class Imbalanced Clinical Datasets Using Computationally Intelligent Techniques | Kumar V., Lalotra G.S., Sasikala P., Rajput D.S., Kaluri R., Lakshmanna K., Shorfuzzaman M., Alsufyani A., Uddin M. | Healthcare (Switzerland) |
71 | Multiconvolutional Transfer Learning for 3D Brain Tumor Magnetic Resonance Images | Sangeetha S.K.B., Muthukumaran V., Deeba K., Rajadurai H., Maheshwari V., Dalu G.T. | Computational Intelligence and Neuroscience |
72 | Investigation of Applying Machine Learning and Hyperparameter Tuned Deep Learning Approaches for Arrhythmia Detection in ECG Images | Shanmugavadivel K., Sathishkumar V.E., Kumar M.S., Maheshwari V., Prabhu J., Allayear S.M. | Computational and mathematical methods in medicine |
73 | Analysis on COVID-19 Infection Spread Rate during Relief Schemes Using Graph Theory and Deep Learning | Palanivinayagam A., Panneerselvam R.K., Kumar P.J., Rajadurai H., Maheshwari V., Allayear S.M. | Computational and Mathematical Methods in Medicine |
74 | IoT-Cloud-Based Smart Healthcare Monitoring System for Heart Disease Prediction via Deep Learning | Nancy A.A., Ravindran D., Raj Vincent P.M.D., Srinivasan K., Gutierrez Reina D. | Electronics (Switzerland) |
75 | Genetic Clustered Federated Learning for COVID-19 Detection | Kandati D.R., Gadekallu T.R. | Electronics (Switzerland) |
76 | Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach | Selvaraj N.P., Paulraj S., Ramadass P., Kaluri R., Shorfuzzaman M., Alsufyani A., Uddin M. | Electronics (Switzerland) |
77 | SWIN transformer based contrastive self- supervised learning for animal detection and classification | Agilandeeswari L., Meena S.D. | Multimedia Tools and Applications |
78 | Improved COVID-19 detection with chest x- ray images using deep learning | Gupta V., Jain N., Sachdeva J., Gupta M., Mohan S., Bajuri M.Y., Ahmadian A. | Multimedia Tools and Applications |
79 | Utilizing satellite and UAV data for crop yield prediction and monitoring through deep learning | Mathivanan S.K., Jayagopal P. | Acta Geophysica |
80 | Traffic flow prediction in inland waterways of Assam region using uncertain spatiotemporal correlative features | Muthukumaran V., Natarajan R., Kaladevi A.C., Magesh G., Babu S. | Acta Geophysica |
81 | Comprehensive analysis on sensor node fault management schemes in wireless sensor networks | Babu N., Santhosh Kumar S.V.N. | International Journal of Communication Systems |
82 | Edge computing network resource allocation based on virtual network embedding | Zhan K., Chen N., Santhosh Kumar S.V.N., Kibalya G., Zhang P., Zhang H. | International Journal of Communication Systems |
83 | An Enhanced Triadic Color Scheme for Content-Based Image Retrieval | Sangeetha S.K.B., Mathivanan S.K., Pandi T., Arivu Selvan K., Jayagopal P., Teshite Dalu G. | Mathematical Problems in Engineering |
84 | G-Sep: A Deep Learning Algorithm for Detection of Long-Term Sepsis Using Bidirectional Gated Recurrent Unit | Rajmohan R., Kumar T.A., Julie E.G., Robinson Y.H., Vimal S., Kadry S., Crespo R.G. | International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems |
85 | A narrative review of medical image processing by deep learning models: Origin to COVID-19 | Mareeswari V., Vijayan R., Sathiyamoorthy E., Ephzibah E.P. | International Journal of Advanced Technology and Engineering Exploration |
86 | Evaluation of Dietary Habits in Relation to Covid-19 Mortality Rate Using Machine Learning Techniques | Sujatha R., Chatterjee J.M., Thorunitha S.S., Nadhiya S. | Journal of System and Management Sciences |
87 | A Deep Multimodal Adversarial Cycle- Consistent Network for Smart Enterprise System | Li P., Laghari A.A., Rashid M., Gao J., Gadekallu T.R., Javed A.R., Yin S. | IEEE Transactions on Industrial Informatics |
88 | Energy efficient fault tolerance techniques in green cloud computing: A systematic survey and taxonomy | Bharany S., Badotra S., Sharma S., Rani S., Alazab M., Jhaveri R.H., Reddy Gadekallu T. | Sustainable Energy Technologies and Assessments |
89 | Color contour texture based peanut classification using deep spread spectral features classification model for assortment identification | Balasubramaniyan M., Navaneethan C. | Sustainable Energy Technologies and Assessments |
90 | Incentive techniques for the Internet of Things: A survey | Maddikunta P.K.R., Pham Q.-V., Nguyen D.C., Huynh-The T., Aouedi O., Yenduri G., Bhattacharya S., Gadekallu T.R. | Journal of Network and Computer Applications |
91 | A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environment | Khan A.A., Laghari A.A., Gadekallu T.R., Shaikh Z.A., Javed A.R., Rashid M., Estrela V.V., Mikhaylov A. | Computers and Electrical Engineering |
92 | A new blockchain and fog computing model for blood pressure medical sensor data storage | Mani V., Ghonge M.M., Chaitanya N.K., Pal O., Sharma M., Mohan S., Ahmadian A. | Computers and Electrical Engineering |
93 | An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems | Padinjappurathu Gopalan S., Chowdhary C.L., Iwendi C., Farid M.A., Ramasamy L.K. | Sensors (Basel, Switzerland) |
94 | Relevant-Based Feature Ranking (RBFR) Method for Text Classification Based on Machine Learning Algorithm | Jasti V.D.P., Kumar G.K., Kumar M.S., Maheshwari V., Jayagopal P., Pant B., Karthick A., Muhibbullah M. | Journal of Nanomaterials |
95 | Multi-objective multi-verse optimizer based unsupervised band selection for hyperspectral image classification | Sawant S.S., Prabukumar M., Loganathan A., Alenizi F.A., Ingaleshwar S. | International Journal of Remote Sensing |
96 | Implementation of Combined Machine Learning with the Big Data Model in IoMT Systems for the Prediction of Network Resource Consumption and Improving the Data Delivery | Sugadev M., Rayen S.J., Harirajkumar J., Rathi R., Anitha G., Ramesh S., Ramaswamy K. | Computational Intelligence and Neuroscience |
97 | An Empirical Analysis of an Optimized Pretrained Deep Learning Model for COVID-19 Diagnosis | Sangeetha S.K.B., Kumar M.S., Deeba K., Rajadurai H., Maheshwari V., Dalu G.T. | Computational and Mathematical Methods in Medicine |
98 | Weather-based maize yield forecast in Saudi Arabia using statistical analysis and machine learning | Jayagopal P., Muthukumaran V., Koti M.S., Kumar S.S., Rajendran S., Mathivanan S.K. | Acta Geophysica |
99 | Comprehensive survey on data dissemination protocols for efficient reprogramming in Internet of Things | Shanmugapriya R., Santhosh Kumar S.V.N. | Concurrency and Computation: Practice and Experience |
100 | Feature Learning-Based Generative Adversarial Network Data Augmentation for Class-Based Few-Shot Learning | Subedi B., Sathishkumar V.E., Maheshwari V., Kumar M.S., Jayagopal P., Allayear S.M. | Mathematical Problems in Engineering |
101 | Recent Advancements in Privacy-aware Protocols of Source Location Privacy in Wireless Sensor Networks: a Survey | Roy P.K., Tripathy A.K., Singh S.K., Li K.-C. | Computer Science and Information Systems |
102 | COVID-19 Classification Using Medical Image Synthesis by Generative Adversarial Networks | Nandhini Abirami R., Durai Raj Vincent P.M., Rajinikanth V., Kadry S. | International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems |
103 | Ensemble of Artificial Intelligence Techniques for Bacterial Antimicrobial Resistance (AMR) Estimation Using Topic Modeling and Similarity Measure | Chakriswaran P., Vincent D.R., Kadry S. | International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems |
104 | Design of telemedicine information query system based on wireless sensor network | Qian G., Gadekallu T.R. | EAI Endorsed Transactions on Pervasive Health and Technology |
105 | An Empirical Study to Demonstrate that EdDSA can be used as a Performance Improvement Alternative to ECDSA in Blockchain and IoT | Guruprakash J., Koppu S. | Informatica (Slovenia) |
106 | Impact of Real-Time Information for Travellers: A Systematic Review | Akhla A.A.N., Ling T.C., Shibghatullah A.S., Mon C.S., Cherukuri A.K., Yen C.L., Yi L.C. | Journal of Information and Knowledge Management |
107 | An Investigation on the Impact of Technological Enablement on the Success of Entrepreneurial Adoption among Higher Education Students: A Comparative Study | Keoy K.H., Thong C.L., Cherukuri A.K., Koh Y.J., Chit S.M., Lee L., Genaro J., Kwek C.L. | Journal of Information and Knowledge Management |
108 | Guest Editorial: Security and Privacy Issues in Industry 4.0 Applications | Alazab M., Gadekallu T.R., Su C. | IEEE Transactions on Industrial Informatics |
109 | Assessing the impacts of vegetation cover loss on surface temperature, urban heat island and carbon emission in Penang city, Malaysia | Rahaman Z.A., Kafy A.-A., Saha M., Rahim A.A., Almulhim A.I., Rahaman S.N., Fattah M.A., Rahman M.T., S K., Faisal A.-A., Al Rakib A. | Building and Environment |
110 | A survey on COVID-19 impact in the healthcare domain: worldwide market implementation, applications, security and privacy issues, challenges and future prospects | Shakeel T., Habib S., Boulila W., Koubaa A., Javed A.R., Rizwan M., Gadekallu T.R., Sufiyan M. | Complex and Intelligent Systems |
111 | Cloud-based email phishing attack using machine and deep learning algorithm | Butt U.A., Amin R., Aldabbas H., Mohan S., Alouffi B., Ahmadian A. | Complex and Intelligent Systems |
112 | Health Informatics: Engaging Modern Healthcare Units: A Brief Overview | Yogesh M.J., Karthikeyan J. | Frontiers in Public Health |
113 | Medicine Drug Name Detection Based Object Recognition Using Augmented Reality | Rupa C., Srivastava G., Ganji B., Tatiparthi S.P., Maddala K., Koppu S., Chun-Wei Lin J. | Frontiers in Public Health |
114 | A Sequential Machine Learning-cum- Attention Mechanism for Effective Segmentation of Brain Tumor | Ali T.M., Nawaz A., Ur Rehman A., Ahmad R.Z., Javed A.R., Gadekallu T.R., Chen C.-L., Wu C.-M. | Frontiers in Oncology |
115 | Early Prediction of Lung Cancers Using Deep Saliency Capsule and Pre-Trained Deep Learning Frameworks | Ramana K., Kumar M.R., Sreenivasulu K., Gadekallu T.R., Bhatia S., Agarwal P., Idrees S.M. | Frontiers in Oncology |
116 | Fusion of Federated Learning and Industrial Internet of Things: A survey | Boobalan P., Ramu S.P., Pham Q.-V., Dev K., Pandya S., Maddikunta P.K.R., Gadekallu T.R., Huynh-The T. | Computer Networks |
117 | IoT enabled HELMET to safeguard the health of mine workers | Singh N., Gunjan V.K., Chaudhary G., Kaluri R., Victor N., Lakshmanna K. | Computer Communications |
118 | Healthcare Data Security Using Lightweight Protocol for Cyber Physical System | Roy P.K., Singh A., Desai J.V., Singh S.K. | IEEE Transactions on Network Science and Engineering |
119 | Collision avoidance approaches for autonomous mobile robots to tackle the problem of pedestrians roaming on campus road | Manikandan N.S., Kaliyaperumal G. | Pattern Recognition Letters |
120 | Ultra Super Fast Authentication Protocol for Electric Vehicle Charging Using Extended Chaotic Maps | Wang W., Han Z., Alazab M., Gadekallu T.R., Zhou X., Su C. | IEEE Transactions on Industry Applications |
121 | Improved Metaheuristic-Driven Energy- Aware Cluster-Based Routing Scheme for IoT-Assisted Wireless Sensor Networks | Lakshmanna K., Subramani N., Alotaibi Y., Alghamdi S., Khalafand O.I., Nanda A.K. | Sustainability (Switzerland) |
122 | Integration of Blockchain Technology and Federated Learning in Vehicular (IoT) Networks: A Comprehensive Survey | Javed A.R., Hassan M.A., Shahzad F., Ahmed W., Singh S., Baker T., Gadekallu T.R. | Sensors |
123 | IoT-Based Intelligent System for Internal Crack Detection in Building Blocks | Babu J.C., Kumar M.S., Jayagopal P., | Journal of Nanomaterials |
124 | Capability and Robustness of Novel Hybridized Artificial Intelligence Technique for Sediment Yield Modeling in Godavari River, India | Yadav A., Joshi D., Kumar V., Mohapatra H., Iwendi C., Gadekallu T.R. | Water (Switzerland) |
125 | E-commerce review sentiment score prediction considering misspelled words: a deep learning approach | Jain S., Roy P.K. | Electronic Commerce Research |
126 | A Modified Deep Learning Framework for Arrhythmia Disease Analysis in Medical Imaging Using Electrocardiogram Signal | Anbarasi A., Ravi T., Manjula V.S., Brindha J., Saranya S., Ramkumar G., Rathi R. | BioMed Research International |
127 | Prediction Performance of Deep Learning for Colon Cancer Survival Prediction on SEER Data | Gupta S., Kalaivani S., Rajasundaram A., Ameta G.K., Oleiwi A.K., Dugbakie B.N. | BioMed Research International |
128 | A Transfer Learning Approach with a Convolutional Neural Network for the Classification of Lung Carcinoma | Humayun M., Sujatha R., Almuayqil S.N., Jhanjhi N.Z. | Healthcare (Switzerland) |
129 | Harris Hawk Optimization: A Survey onVariants and Applications | Tripathy B.K., Reddy Maddikunta P.K., Pham Q.-V., Gadekallu T.R., Dev K., Pandya S., Elhalawany B.M. | Computational Intelligence and Neuroscience |
130 | Barnacles Mating Optimizer with Deep Transfer Learning Enabled Biomedical Malaria Parasite Detection and Classification | Dutta A.K., Mageswari R.U., Gayathri A., Dallfin Bruxella J.M., Ishak M.K., Mostafa S.M., Hamam H. | Computational Intelligence and Neuroscience |
131 | Cancer Detection and Prediction Using Genetic Algorithms | Bhandari A., Tripathy B.K., Jawad K., Bhatia S., Rahmani M.K.I., Mashat A. | Computational Intelligence and Neuroscience |
132 | Deep Learning-Based Privacy-Preserving Data Transmission Scheme for Clustered IIoT Environment | Lakshmanna K., Kavitha R., Geetha B.T., Nanda A.K., Radhakrishnan A., Kohar R. | Computational Intelligence and Neuroscience |
133 | PCA-Based Incremental Extreme Learning Machine (PCA-IELM) for COVID-19 Patient Diagnosis Using Chest X-Ray Images | Kumar V., Biswas S., Rajput D.S., Patel H., Tiwari B. | Computational Intelligence and Neuroscience |
134 | Novel Vision Transformer?Based Bi-LSTM Model for LU/LC Prediction?Javadi Hills, India | Mohanrajan S.N., Loganathan A. | Applied Sciences (Switzerland) |
135 | Automated sarcasm detection and classification using hyperparameter tuned deep learning model for social networks | Vinoth D., Prabhavathy P. | Expert Systems |
136 | Diagnosing Breast Cancer Based on the Adaptive Neuro-Fuzzy Inference System | Chidambaram S., Ganesh S.S., Karthick A., Jayagopal P., Balachander B., Manoharan S. | Computational and Mathematical Methods in Medicine |
137 | Diagnosis of Brain Tumor Using Light Weight Deep Learning Model with Fine- Tuning Approach | Shelatkar T., Urvashi D., Shorfuzzaman M., Alsufyani A., Lakshmanna K. | Computational and Mathematical Methods in Medicine |
138 | A Review on Deep Learning Techniques for IoT Data | Lakshmanna K., Kaluri R., Gundluru N., Alzamil Z.S., Rajput D.S., Khan A.A., Haq M.A., Alhussen A. | Electronics (Switzerland) |
139 | An effective deep learning model for grading abnormalities in retinal fundus images using variational auto-encoders | Sundar S., Sumathy S. | International Journal of Imaging Systems and Technology |
140 | IoT Based Smart Assist System to Monitor Entertainment Spots Occupancy and COVID 19 Screening During the Pandemic | Narayanan K.L., Krishnan R.S., Robinson Y.H. | Wireless Personal Communications |
141 | Tumor Detection on Microarray Data Using Grey Wolf Optimization with Gain Information | Sree Devi K.D., Karthikeyan P., Moorthy U., Deeba K., Maheshwari V., Allayear S.M. | Mathematical Problems in Engineering |
142 | Bio-Inspired PSO for Improving Neural Based Diabetes Prediction System | Khan M.Z., Mangayarkarasi R., Vanmathi C., Angulakshmi M. | Journal of ICT Standardization |
143 | Fault-Based Test Case Prioritization of Regression Testing Using Genetic Algorithm | Priya T., Prasanna M. | International Journal of e-Collaboration |
144 | Secure voting system for elections | El-Gburi J., Srivastava G., Mohan S. | International Journal of Computer Aided Engineering and Technology |
145 | Mobile Collaborative Secrecy Performance Prediction for Artificial IoT Networks | Xu L., Zhou X., Li X., Jhaveri R.H., Gadekallu T.R., Ding Y. | IEEE Transactions on Industrial Informatics |
146 | Water optimization technique for precision irrigation system using IoT and machine learning | Maria Manuel Vianny D., John A., Kumar Mohan S., Sarlan A., Adimoolam, Ahmadian A. | Sustainable Energy Technologies and Assessments |
147 | Humidity sensor based on fibre bragg grating for predicting microbial induced corrosion | Raju B., Kumar R., Senthilkumar M., Sulaiman R., Kama N., Dhanalakshmi S. | Sustainable Energy Technologies and Assessments |
148 | Authorship identification using ensemble learning | Abbasi A., Javed A.R., Iqbal F., Jalil Z., Gadekallu T.R., Kryvinska N. | Scientific Reports |
149 | AACF - Accessible Application-Centric Framework for the Internet of Things Backhauled Smart City Applications | Cui Y., Song X., Liu J., Chen K., Shi G., Zhou J., Gs T. | IEEE Transactions on Network Science and Engineering |
150 | A Novel Technique to Detect and Track Multiple Objects in Dynamic Video Surveillance Systems | Adimoolam M., Mohan S., John A., Srivastava G. | International Journal of Interactive Multimedia and Artificial Intelligence |
151 | Evaluating the Impact of Summer Drought on Vegetation Growth Using Space-Based Solar-Induced Chlorophyll Fluorescence Across Extensive Spatial Measures | Pandiyan S., Govindjee G., Meenatchi S., Prasanna S., Gunasekaran G., Guo Y. | Big Data |
152 | OTP-ER: an ordered transmission paradigm for effective routing in IoT based wireless sensor networks | Jothi Kumar C., Deeban Chakravarthy V., Ramana K., Maddikunta P.K.R., Xin Q., Surya Narayana G. | Optical and Quantum Electronics |
153 | Comparative analysis of FSO, OFC and diffused channel links in photonics using artificial intelligence based S-band, C- band and L-band of the attenuation metrics | Karpagarajesh G., Santhana Krishnan R., Harold Robinson Y., Vimal S., Thamizharasan S., Subbulakshmi P., Kaliappan M. | Optical and Quantum Electronics |
154 | Lower Back Pain Classification using Parameter Tuning | Lenka S., Victor N. | Research Journal of Pharmacy and Technology |
155 | Past, present and future of gene feature selection for breast cancer classification - a survey | Chowdhary C.L., Khare N., Patel H., Koppu S., Kaluri R., Rajput D.S. | International Journal of Engineering Systems Modelling and Simulation |
156 | Predicting Microscale Land Use/Land Cover Changes Using Cellular Automata Algorithm on the Northwest Coast of Peninsular Malaysia | Rahaman Z.A., Kafy A.-A., Faisal A.-A., Al Rakib A., Jahir D.M.A., Fattah M.A., Kalaivani S., Rathi R., Mallik S., Rahman M.T. | Earth Systems and Environment |
157 | Cyberbullying detection: an ensemble learning approach | Roy P.K., Singh A., Tripathy A.K., Das T.K. | International Journal of Computational Science and Engineering |
158 | An enhanced and hybrid fingerprint minutiae feature extraction method for identifying and authenticating the patient?s noisy fingerprint | Raghavan R., John Singh K. | International Journal of System Assurance Engineering and Management |
159 | A Privacy-Enhanced Retrieval Technology for the Cloud-Assisted Internet of Things | Wang T., Yang Q., Shen X., Gadekallu T.R., Wang W., Dev K. | IEEE Transactions on Industrial Informatics |
160 | Data Freshness Optimization Under CAA in the UAV-Aided MECN: A Potential Game Perspective | Wang W., Srivastava G., Lin J.C., Yang Y., Alazab M., Gadekallu T.R. | IEEE Transactions on Intelligent Transportation Systems |
161 | A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks | Liyanage M., Pham Q.-V., Dev K., Bhattacharya S., Maddikunta P.K.R., Gadekallu T.R., Yenduri G. | Journal of Network and Computer Applications |
162 | Secure routing for LEO satellite network survivability | Li H., Shi D., Wang W., Liao D., Gadekallu T.R., Yu K. | Computer Networks |
163 | Heart rate and blood pressure measurement based on photoplethysmogram signal using fast Fourier transform | Sharma A., Tanwar R.S., Singh Y., Sharma A., Daudra S., Singal G., Gadekallu T.R., Pancholi S. | Computers and Electrical Engineering |
164 | Covid-19 fake news sentiment analysis | Iwendi C., Mohan S., khan S., Ibeke E., Ahmadian A., Ciano T. | Computers and Electrical Engineering |
165 | XGBRS Framework Integrated with Word2Vec Sentiment Analysis for Augmented Drug Recommendation | Paliwal S., Mishra A.K., Mishra R.K., Nawaz N., Senthilkumar M. | Computers, Materials and Continua |
166 | Imbalanced Classification in Diabetics Using Ensembled Machine Learning | Kumar M.S., Khan M.Z., Rajendran S., Noor A., Dass A.S., Prabhu J. | Computers, Materials and Continua |
167 | A novel unsupervised ensemble framework using concept-based linguistic methods and machine learning for twitter sentiment analysis | Bibi M., Abbasi W.A., Aziz W., Khalil S., Uddin M., Iwendi C., Gadekallu T.R. | Pattern Recognition Letters |
168 | Bio-Imaging-Based Machine Learning Algorithm for Breast Cancer Detection | Safdar S., Rizwan M., Gadekallu T.R., Javed A.R., Rahmani M.K.I., Jawad K., Bhatia S. | Diagnostics |
169 | Hypertuned Deep Convolutional Neural Network for Sign Language Recognition | Mannan A., Abbasi A., Javed A.R., Ahsan A., Gadekallu T.R., Xin Q. | Computational Intelligence and Neuroscience |
170 | Performance Evaluation of Seis Tutor Using Cognitive Intelligence-Based "kirkpatrick Model" | Singh N., Gunjan V.K., Kadiyala R., Xin Q., Gadekallu T.R. | Computational Intelligence and Neuroscience |
171 | Diagnosis of Retinal Diseases Based on Bayesian Optimization Deep Learning Network Using Optical Coherence Tomography Images | Subramanian M., Kumar M.S., Sathishkumar V.E., Prabhu J., Karthick A., Ganesh S.S., Meem M.A. | Computational Intelligence and Neuroscience |
172 | Real-Time Twitter Spam Detection and Sentiment Analysis using Machine Learning and Deep Learning Techniques | Rodrigues A.P., Fernandes R., Aakash A., Abhishek B., Shetty A., Atul K., Lakshmanna K., Shafi R.M. | Computational Intelligence and Neuroscience |
173 | Multimodal Medical Image Fusion of Positron Emission Tomography and Magnetic Resonance Imaging Using Generative Adversarial Networks | Nandhini Abirami R., Durai Raj Vincent P.M., Srinivasan K., Manic K.S., Chang C.-Y. | Behavioural Neurology |
174 | Multiobjectives for Optimal Geographic Routing in IoT Health Care System | Aravind K., Maddikunta P.K.R. | Complexity |
175 | Perimeter Degree Technique for the Reduction of Routing Congestion during Placement in Physical Design of VLSI Circuits | Lakshmanna K., Shaik F., Gunjan V.K., Singh N., Kumar G., Shafi R.M. | Complexity |
176 | Pansharpening scheme using spatial detail injection?based convolutional neural networks | Saxena N., Saxena G., Khare N., Rahman M.H. | IET Image Processing |
177 | COVID-19 health analysis and prediction using machine learning algorithms for Mexico and Brazil patients | Iwendi C., Huescas C.G.Y., Chakraborty C., Mohan S. | Journal of Experimental and Theoretical Artificial Intelligence |
178 | Incentive Mechanisms for Smart Grid: State of the Art, Challenges, Open Issues, Future Directions | Bhattacharya S., Chengoden R., Srivastava G., Alazab M., Javed A.R., Victor N., Maddikunta P.K.R., Gadekallu T.R. | Big Data and Cognitive Computing |
179 | A Study on Diverse Methods and Performance Measures in Sentiment Analysis | Rani M.S., Sumathy S. | Recent Patents on Engineering |
180 | Test Case Generation for Arduino Programming Instructions using Functional Block Diagrams | Padmanabhan M. | Trends in Sciences |
181 | Non-invasive Detection of Parkinson?s Disease Using Deep Learning | Chowdhary C.L., Srivatsan R. | International Journal of Image, Graphics and Signal Processing |
182 | Tiling algorithm with line-based transform for rapid ship detection and wake feature extraction in ALOS-2 SAR sensor data | Selvaraj D., Krishnamurthy E., Sasikumar D., Sivankutty L., Kaliyaperumal G. | International Journal of Applied Science and Engineering |
183 | A review on smart city - IoT and deep learning algorithms, challenges | Rajyalakshmi V., Lakshmanna K. | International Journal of Engineering Systems Modelling and Simulation |
184 | An adaptive neuro-fuzzy inference for blockchain-based smart job recommendation system | Ephzibah E.P., Sujatha R., Chatterjee J.M. | International Journal of Information and Decision Sciences |
185 | Henry MaxNet: tversky index based feature selection and competitive swarm henry gas solubility optimization integrated Deep Maxout network for intrusion detection in IoT | Boopathi M. | International Journal of Intelligent Robotics and Applications |
186 | Smart Agricultural Decision Support Systems for Predicting Soil Nutrition Value Using IoT and Ridge Regression | Sudha M.K., Manorama M., Aditi T. | Agris On-line Papers in Economics and Informatics |
187 | Towards reliable electronic exam networks | El-Gburi J., Srivastava G., Mohan S. | International Journal of Computer Aided Engineering and Technology |
188 | Evolution of Industry and Blockchain Era: Monitoring Price Hike and Corruption using BIoT for Smart Government and Industry 4.0 | Hasan M.K., Akhtaruzzaman M., Kabir S.R., Gadekallu T.R., Islam S., Magalingam P., Hassan R., Alazab M., Alazab M.A. | IEEE Transactions on Industrial Informatics |
189 | Catalysis of neural activation functions: Adaptive feed-forward training for big data applications | Sarkar S., Agrawal S., Baker T., Maddikunta P.K.R., Gadekallu T.R. | Applied Intelligence |
190 | A Multistage Heterogeneous Stacking Ensemble Model for Augmented Infant Cry Classification | Joshi V.R., Srinivasan K., Vincent P.M.D.R., Rajinikanth V., Chang C.-Y. | Frontiers in Public Health |
191 | Computational techniques for the automated detection of mycobacterium tuberculosis from digitized sputum smear microscopic images: A systematic review | Kotei E., Thirunavukarasu R. | Progress in Biophysics and Molecular Biology |
192 | Resource Search Method of Mobile Intelligent Education System Based on Distributed Hash Table | Shen Y.-B., Gadekallu T.R. | Mobile Networks and Applications |
193 | CONTROL-CORE: A Framework for Simulation and Design of Closed- Loop Peripheral Neuromodulation Control Systems | Kathiravelu P., Arnold M., Fleischer J., Yao Y., Awasthi S., Goel A.K., Branen A., Sarikhani P., Kumar G., Kothare M., Mahmoudi B. | IEEE Access |
194 | A new lightweight conditional privacy preserving authentication and key ? agreement protocol in social internet of things for vehicle to smart grid networks | Agilandeeswari L., Paliwal S., Chandrakar A., Prabukumar M. | Multimedia Tools and Applications |
195 | A supervised learning-based approach for focused web crawling for IoMT using global co-occurrence matrix | Rajiv S., Navaneethan C. | Expert Systems |
196 | Identifying region specific seasonal crop for leaf borne diseases by utilizing deep learning techniques | Jayagopal P., Rajendran S., Mathivanan S.K., Sathish Kumar S.D., Raja K.T., Paneerselvam S. | Acta Geophysica |
197 | A Deep Convolutional Neural Network Based Approach for Effective Neonatal Cry Classification | Ashwini K., Durai Raj Vincent P.M. | Recent Advances in Computer Science and Communications |
198 | Similarity Learning-Based Supervised Discrete Hash Signature Scheme for authentication of smart home scenario | Sudha K.S., Jeyanthi N. | International Journal of Information Technology (Singapore) |
199 | Industry 5.0: A survey on enabling technologies and potential applications | Maddikunta P.K.R., Pham Q.-V., B P., Deepa N., Dev K., Gadekallu T.R., Ruby R., Liyanage M. | Journal of Industrial Information Integration |
200 | EPPDA: An Efficient Privacy- Preserving Data Aggregation Federated Learning Scheme | Song J., Wang W., Gadekallu T.R., Cao J., Liu Y. | IEEE Transactions on Network Science and Engineering |
201 | Hand gesture recognition based on a Harris Hawks optimized Convolution Neural Network | Gadekallu T.R., Srivastava G., Liyanage M., M. I., Chowdhary C.L., Koppu S., Maddikunta P.K.R. | Computers and Electrical Engineering |
202 | Risk monitoring strategy for confidentiality of healthcare information | Rizwan M., Shabbir A., Javed A.R., Srivastava G., Gadekallu T.R., Shabir M., Hassan M.A. | Computers and Electrical Engineering |
203 | Detection of tyre defectsusingweighted quality-based convolutional neural network | Rajeswari M., Julie E.G., Robinson Y.H., Joseph E., Arun A.S., Sebastian E., Kumar R., Long H.V., Son L.H. | Soft Computing |
204 | Banana Plant Disease Classification Using Hybrid Convolutional Neural Network | Narayanan K.L., Krishnan R.S., Robinson Y.H., Julie E.G., Vimal S., Saravanan V., Kaliappan M. | Computational Intelligence and Neuroscience |
205 | Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review | Majid M., Habib S., Javed A.R., Rizwan M., Srivastava G., Gadekallu T.R., Lin J.C.-W. | Sensors |
206 | Privacy Preserving Multi-Party Key Exchange Protocol for Wireless Mesh Networks | Roy A.K., Nath K., Srivastava G., Gadekallu T.R., Lin J.C.-W. | Sensors |
207 | CAPSO: Chaos Adaptive Particle Swarm Optimization Algorithm | Duan Y., Chen N., Chang L., Ni Y., Santhosh Kumar S.V.N., Zhang P. | IEEE Access |
208 | Situation-aware BDI Reasoning to Detect Early Symptoms of Covid 19 using Smartwatch | Saleem K., Saleem M., Zeeshan R., Javed A.R., Alazab M., Gadekallu T.R., Suleman A. | IEEE Sensors Journal |
209 | Hash-Based Deep Learning Approach for Remote Sensing Satellite Imagery Detection | Gadamsetty S., Ch R., Ch A., Iwendi C., Gadekallu T.R. | Water (Switzerland) |
210 | A neural network aided attuned scheme for gun detection in video surveillance images | Manikandan V.P., Rahamathunnisa U. | Image and Vision Computing |
211 | An Intrusion Detection and Prevention Protocol for Internet of Things Based Wireless Sensor Networks | Krishnan R., Krishnan R.S., Robinson Y.H., Julie E.G., Long H.V., Sangeetha A., Subramanian M., Kumar R. | Wireless Personal Communications |
212 | Hybrid Energy-based Secured clustering technique for Wireless Sensor Networks | Saveetha P., Robinson Y.H., Shanmuganathan V., Kadry S., Nam Y. | Journal of Internet Technology |
213 | Analysis of breast cancer prediction and visualisation using machine learning models | Magesh G., Swarnalatha P. | International Journal of Cloud Computing |
214 | Big data in healthcare made simple to save people's lives | Anand R.V., Meenakshisundaram I., Jothikumar R., Chaitanya P.K. | International Journal of Cloud Computing |
215 | InfusedHeart: A Novel Knowledge- Infused Learning Framework for Diagnosis of Cardiovascular Events | Pandya S., Gadekallu T.R., Reddy P.K., Wang W., Alazab M. | IEEE Transactions on Computational Social Systems |
216 | Transfer learning approach in deep neural networks for uterine fibroid detection | Sundar S., Sumathy S. | International Journal of Computational Science and Engineering |
217 | A Novel Model Based on Window-Pass Preferences for Data-Emergency-Aware Scheduling in Computer Networks | Jemmali M., Denden M., Boulila W., Jhaveri R.H., Srivastava G., Gadekallu T.R. | IEEE Transactions on Industrial Informatics |
218 | A survey on blockchain for big data: Approaches, opportunities, and future directions | Deepa N., Pham Q.-V., Nguyen D.C., Bhattacharya S., Prabadevi B., Gadekallu T.R., Maddikunta P.K.R., Fang F., Pathirana P.N. | Future Generation Computer Systems |
219 | Location Recommendation Based on Mobility Graph With Individual and Group Influences | Pan X., Cai X., Song K., Baker T., Gadekallu T.R., Yuan X. | IEEE Transactions on Intelligent Transportation Systems |
220 | An Empirical Model to Predict the Diabetic Positive Using Stacked Ensemble Approach | Sivashankari R., Sudha M., Hasan M.K., Saeed R.A., Alsuhibany S.A., Abdel-Khalek S. | Frontiers in Public Health |
221 | Geo Spatial Based Real Time Monitoring on Eutrophic Evaluation of Porunai River Basin for Pollution Risk Assessment | Gopikumar S., Banu J.R., Harold Robinson Y., Raja S., Vimal S., Pelusi D., Kaliappan M. | European Journal of Remote Sensing |
222 | FL-PMI: Federated Learning-Based Person Movement Identification through Wearable Devices in Smart Healthcare Systems | Arikumar K.S., Prathiba S.B., Alazab M., Gadekallu T.R., Pandya S., Khan J.M., Moorthy R.S. | Sensors |
223 | A Joint Resource Allocation, Security with Efficient Task Scheduling in Cloud Computing Using Hybrid Machine Learning Techniques | Bal P.K., Mohapatra S.K., Das T.K., Srinivasan K., Hu Y.-C. | Sensors |
224 | Construction of Sports Safety Information Mining Platform Based on Multimedia Data Sharing Technology | Cao X.-Z., Gadekallu T.R. | Mobile Networks and Applications |
225 | Sentiment analysis for user reviews using Bi-LSTM self-attention based CNN model | Bhuvaneshwari P., Rao A.N., Robinson Y.H., Thippeswamy M.N. | Multimedia Tools and Applications |
226 | A neuro-fuzzy based healthcare framework for disease analysis and prediction | Nagarajan R., Thirunavukarasu R. | Multimedia Tools and Applications |
227 | Crop Classification for Agricultural Applications in Hyperspectral Remote Sensing Images | Agilandeeswari L., Prabukumar M., Radhesyam V., Phaneendra K.L.N.B., Farhan A. | Applied Sciences (Switzerland) |
228 | An intelligent machine learning-based sarcasm detection and classification model on social networks | Vinoth D., Prabhavathy P. | Journal of Supercomputing |
229 | Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier | Ikram S.T., Priya V., Anbarasu B., Cheng X., Ghalib M.R., Shankar A. | Journal of Supercomputing |
230 | A Contemporary Review on Utilizing Semantic Web Technologies in | Narayanasamy S.K., Srinivasan K., Hu Y.-C., | Electronics (Switzerland) |
231 | An empirical intrusion detection system based on XGBoost and bidirectional long- short term model for 5G and other telecommunication technologies | Karthikraja C., Senthilkumar J., Hariharan R., Usha Devi G., Suresh Y., Mohanraj V. | Computational Intelligence |
232 | COVID-19 Detection Based on Lung Ct Scan Using Deep Learning Techniques | Kogilavani S.V., Prabhu J., Sandhiya R., Kumar M.S., Subramaniam U., Karthick A., Muhibbullah M., Imam S.B.S. | Computational and Mathematical Methods in Medicine |
233 | Hybrid Fuzzy AHP and Fuzzy TOPSIS Decision Model for Aquaculture Species Selection | Padma T., Shantharajah S.P., Ramadoss P. | International Journal of Information Technology and Decision Making |
234 | Multilevel controller-assisted intrinsically modified ant colony optimization heuristic- based load-balancing model for mega cloud infrastructures | Govardhan P., Srinivasan P. | International Journal of Communication Systems |
235 | Attention Aware Deep Learning Model for Wireless Capsule Endoscopy Lesion Classification and Localization | Muruganantham P., Balakrishnan S.M. | Journal of Medical and Biological Engineering |
236 | Cooperative and feedback based authentic routing protocol for energy efficient IoT systems | Gayathri A., Prabu A.V., Rajasoundaran S., Routray S., Narayanasamy P., Kumar N., Qi Y. | Concurrency and Computation: Practice and Experience |
237 | Deep Convolutional Nets Learning Classification for Artistic Style Transfer | Dinesh Kumar R., Golden Julie E., Harold Robinson Y., Vimal S., Dhiman G., Veerasamy M. | Scientific Programming |
238 | Developing an optimal MapReduce function for wireless sensor networks in a secure way | Vedhanayagam P. | International Journal of Computer Aided Engineering and Technology |
239 | Certificateless Aggregated Signcryption Scheme for Cloud-Fog Centric Industry 4.0 | Dohare I., Singh K., Ahmadian A., Mohan S., Reddy M P.K. | IEEE Transactions on Industrial Informatics |
240 | Federated learning enabled digital twins for smart cities: Concepts, recent advances, and future directions | Ramu S.P., Boopalan P., Pham Q.-V., Maddikunta P.K.R., Huynh-The T., Alazab M., Nguyen T.T., Gadekallu T.R. | Sustainable Cities and Society |
241 | Exergoeconomic Analysis of a Novel Zeotropic Mixture Power System | Ganesh N.S., Maheswari G.U., Srinivas T., Reddy B.V. | International Journal of Precision Engineering and Manufacturing - Green Technology |
242 | Evaluation of drought using satellite solar-induced chlorophyll fluorescence during crop development stage over Xinjiang, China | Pandiyan S., Navaneethan C., Vijayan R., Gunasekaran G., Khan K.Y., Guo Y. | Measurement: Journal of the International Measurement Confederation |
243 | Efficient resource allocation in fog computing using QTCS model | Iyapparaja M., Alshammari N.K., Kumar M.S., Krishnan S.S.R., Chowdhary C.L. | Computers, Materials and Continua |
244 | A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep Learning | Akshay Kumaar M., Samiayya D., Vincent P.M.D.R., Srinivasan K., Chang C.-Y., Ganesh H. | Frontiers in Public Health |
245 | Detecting COVID-19-Related Fake News Using Feature Extraction | Khan S., Hakak S., Deepa N., Prabadevi B., Dev K., Trelova S. | Frontiers in Public Health |
246 | A Comprehensive Survey on Computer Forensics: State-of-the-art,Tools, Techniques, Challenges, and Future Directions | Javed A.R., Ahmed W., Alazab M., Jalil Z.,Kifayat K., Gadekallu T.R. | IEEE Access |
247 | Prediction of heart abnormalities using deep learning model and wearabledevices in smart health homes | Shafi J., Obaidat M.S., Krishna P.V., Sadoun B., Pounambal M., Gitanjali J. | Multimedia Tools and Applications |
248 | Predicting attributes based movie success through ensemble machine learning | Gupta V., Jain N., Garg H., Jhunthra S., Mohan S., Omar A.H., Ahmadian A. | Multimedia Tools and Applications |
249 | DOA tracking for seamless connectivity in beamformed IoT- based drones | Balamurugan N.M., Mohan S., Adimoolam M., John A., reddy G T.,Wang W. | Computer Standards and Interfaces |
250 | Stealth assessment strategy in distributed systems using optimal deep learning with game based learning | Rajendran D., Prasanna S. | Journal of Supercomputing |
251 | Forecasting COVID-19: Vector Autoregression-Based Model | Rajab K., Kamalov F., Cherukuri A.K. | Arabian Journal for Science and Engineering |
252 | Self-organizing Maps and Bayesian Regularized Neural Network for Analyzing Gasoline and Diesel Price Drifts | Sujatha R., Chatterjee J.M., Priyadarshini I., Hassanien A.E., Mousa A.A.A., Alghamdi S.M. | International Journal of Computational Intelligence Systems |
253 | Heart failure patient survival analysis with multi kernel support vector machine | Sujatha R., Chatterjee J.M., Jhanjhi N.Z., Tabbakh T.A., Almusaylim Z.A. | Intelligent Automation and Soft Computing |
254 | Prediction of suitable candidates for covid-19 vaccination | Sujatha R., Venkata Siva Krishna B., Chatterjee J.M., Naidu P.R., Jhanjhi N.Z., Charita C., Mariya E.N., Baz M. | Intelligent Automation and Soft Computing |
255 | Cnn based driver drowsiness detection system using emotion analysis | Varun Chand H., Karthikeyan J. | Intelligent Automation and Soft Computing |
256 | Energy Optimization for Green Communication in IoT Using Harris Hawks Optimization | Dev K., Maddikunta P.K.R., Gadekallu T.R., Bhattacharya S., Hegde P., Singh S. | IEEE Transactions on Green Communications and Networking |
257 | An analysis on polygonal approximation techniques for digital image boundary | Raja K.T., Ray B.K. | Journal of Mobile Multimedia |
258 | Genetic algorithm-conditional mutual information maximization based feature selection for bot attack classification in iot devices | Kavitha G., Elango N.M. | Journal of Mobile Multimedia |
259 | Temporal Weighted Averaging for Asynchronous Federated Intrusion Detection Systems | Agrawal S., Chowdhuri A., Sarkar S., Selvanambi R., Gadekallu T.R. | Computational Intelligence and Neuroscience |
260 | Toward an Autonomous Incubation System for Monitoring Premature Infants | Alqaheri H., Sujatha R., Chatterjee J.M., Shooriya S., Kumar S.A., Satish N. | Studies in Informatics and Control |
261 | Wavelet enabled ranking and clustering-based band selection and three-dimensional spatial feature extraction for hyperspectral remote sensing image classification | Manoharan P., Vaddi R. | Journal of Applied Remote Sensing |
262 | Clinical Decision Support System for Detection of Dengue: A Case Comparison Using AHP and Fuzzy AHP | Mohapatro A., Mahendran S.K., Das T.K. | Journal of Cases on Information Technology |
263 | An IoT and artificial intelligence-based patient care system focused on COVID-19 pandemic | Goar V.K., Yadav N.S., Chowdhary C.L., Kumaresan P., Mittal M. | International Journal of Networking and Virtual Organisations |
264 | A comprehensive survey on aspect- based sentiment analysis | Yadav K., Kumar N., Maddikunta P.K.R., Gadekallu T.R. | International Journal of Engineering Systems Modelling and Simulation |
2021
SL. NO. | TITLE OF PAPER | NAME OF THE AUTHOR/S | NAME OF JOURNAL |
---|---|---|---|
1 | Review on implementation of IoT for environmental condition monitoring in the agriculture sector | Arun Kumar K., Karthikeyan J. | Journal of Ambient Intelligence and Humanized Computing |
2 | Improving the Classification of Alzheimer's Disease Using Hybrid Gene Selection Pipeline and Deep Learning | Mahendran N., Vincent P.M.D.R., Srinivasan K., Chang C.-Y. | Frontiers in Genetics |
3 | Low-Light Image Enhancement Based on Generative Adversarial Network | Nandhini Abirami R., Durai Raj Vincent P.M. | Frontiers in Genetics |
4 | A deep learning framework with an embedded-based feature selection approach for the early detection of the Alzheimer's disease | Mahendran N., P M D.R.V. | Computers in Biology and Medicine |
5 | Fault-Resilience for Bandwidth Management in Industrial Software- Defined Networks | Jhaveri R.H., Ramani S.V., Srivastava G., Gadekallu T.R., Aggarwal V. | IEEE Transactions on Network Science and Engineering |
6 | Ontology-Enabled Emotional Sentiment Analysis on COVID-19 Pandemic-Related Twitter Streams | Narayanasamy S.K.,Srinivasan K., Mian Qaisar S., Chang C.-Y. | Frontiers in Public Health |
7 | Genetic CFL: Hyperparameter Optimization in Clustered Federated Learning | Agrawal S., Sarkar S., Alazab M., Maddikunta P.K.R., Gadekallu T.R., Pham Q.-V. | Computational Intelligence and Neuroscience |
8 | Deep learning-based transfer learning for classification of skin cancer | Jain S., Singhania U., Tripathy B., Nasr E.A., Aboudaif M.K., Kamrani A.K. | Sensors |
9 | The smart pill sticker: Introducing a smart pill management system based on touch- point technology | Kataria G., Dhyani K., Patel D., Srinivasan K., Malwade S., Syed Abdul S. | Health Informatics Journal |
10 | A hybrid learning approach for the stage- wise classification and prediction of COVID-19 X-ray images | Adimoolam M., Govindharaju K., John A., Mohan S., Ahmadian A., Ciano T. | Expert Systems |
11 | Dynamic Private Modulus Based Password Conditional Privacy Preserving Authentication and Key-Agreement Protocol for VANET | Paliwal S., Cherukuri A.K., Gao X.-Z. | Wireless Personal Communications |
12 | Exploring Internet Meme Activity during COVID-19 Lockdown Using Artificial Intelligence Techniques | Priyadarshini I., Chatterjee J.M., Sujatha R., Jhanjhi N., Karime A., Masud M. | Applied Artificial Intelligence |
13 | Optimal Feature Selection and Hybrid Classification for Autism Detection in Young Children | Guruvammal S.,Chellatamilan T., Deborah L.J. | Computer Journal |
14 | ResMem-Net: memory based deep CNN for image memorability estimation | Praveen A., Noorwali A., Samiayya D., Khan M.Z., Durai R.V.P.M., Bashir A.K., Alagupandi V. | PeerJ Computer Science |
15 | Computational trust evaluation algorithm for cloud models using fuzzy logic approach | Thakare V.R., John S.K. | International Journal of Ad Hoc and Ubiquitous Computing |
16 | Lion plus firefly algorithm for ternary- based anomaly detection in semantic graphs in smart cities | Reddy M.S.K., Rajput D.S. | International Journal of Ad Hoc and Ubiquitous Computing |
17 | Recent advances in blockchain technology: A survey on applications and challenges | Hakak S., Khan W.Z., Gilkar G.A., Assiri B., Alazab M., Bhattacharya S., Reddy G.T. | International Journal of Ad Hoc and Ubiquitous Computing |
18 | A hybrid threat model for system-centric and attack-centric for effective security design in SDLC | Viswanathan G., Prabhu P.J. | Web Intelligence |
19 | A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT) | Swapna Sudha K., Jeyanthi N. | Cybernetics and Information Technologies |
20 | A systematic analysis of identity based encryption (IBE) | Karrothu A., Norman J. | International Journal of Knowledge-Based and Intelligent Engineering Systems |
21 | A Three-Tier Authentication Scheme for Kerberized Hadoop Environment | Hena M., Jeyanthi N. | Cybernetics and Information Technologies |
22 | Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models | Ikram S.T., Cherukuri A.K., Poorva B., Ushasree P.S., Zhang Y., Liu X., Li G. | Cybernetics and Information Technologies |
23 | Detection and localisation of cars in indoor parking through UWB radar-based sensing system | Rajendran S., Mathivanan S.K., Somanathan M.S., Geetha M., Jayagopal P., Venkatasen M., Mani P., Christopher J. | International Journal of Ultra Wideband Communications and Systems |
24 | Isolated word-based spoken dialogue system using odia phones | Swain B.K., Mohanty S., Chowdhary C.L. | Recent Advances in Computer Science and Communications |
25 | Remote monitoring of indoor/outdoor movement in epidemiological situations utilising UWB transceivers | Rajendran S., Jayagopal P., Mathivanan S.K., Prasanna S., Manivannan S.S., Kumar P.J.,Venkatasen M., Mani P. | International Journal of Ultra Wideband Communications and Systems |
26 | High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem | Jayabalasamy G., Koppu S. | Journal of King Saud University - Computer and Information Sciences |
27 | Adaptive practical Byzantine fault tolerance consensus algorithm in permission blockchain network | Navaroj G.I., Julie E.G., Robinson Y.H. | International Journal of Web and Grid Services |
28 | Socioeconomic impact due to COVID-19: An empirical assessment | Gupta V., Santosh K.C., Arora R., Ciano T., Kalid K.S., Mohan S. | Information Processing and Management |
29 | Recent advances in evolving computing paradigms: Cloud, edge, and fog technologies | Angel N.A., Ravindran D., Vincent P.M.D.R., Srinivasan K., Hu Y.-C. | Sensors |
30 | 5G Data Offloading Using Fuzzification with Grasshopper Optimization Technique | Balaji V.R., Kalavathi T., Vellingiri J., Rajkumar N., Padhy V.P. | Computer Systems Science and Engineering |
31 | Blockchain and PUF-based Lightweight Authentication Protocol for Wireless Medical Sensor Networks | Wang W., Qiu C., Yin Z., Srivastava G., Gadekallu T.R., Alsolami F., Su C. | IEEE Internet of Things Journal |
32 | Reinforced resource management in vehicular fog computing using deep beacon power control protocol | Kumar T.A., Rajmohan R., Julie E.G., Robinson Y.H., Vimal S., Kadry S. | International Journal of Web and Grid Services |
33 | A peer-to-peer blockchain based interconnected power system | Ahmed M.M., Hasan M.K., Shafiq M., Qays M.O., Gadekallu T.R., Nebhen J., Islam S. | Energy Reports |
34 | Context-sensitive lexicon for imbalanced text sentiment classification using bidirectional LSTM | Pavan Kumar M.R., Jayagopal P. | Journal of Intelligent Manufacturing |
35 | Cascading 1D-Convnet Bidirectional Long Short Term Memory Network with Modified COCOB Optimizer: A Novel Approach for Protein Secondary Structure Prediction | Sonsare P.M., C G. | Chaos, Solitons and Fractals |
36 | Secure-Enhanced Federated Learning for AI-Empowered Electric Vehicle Energy Prediction | Wang W., Fida M.H., Lian Z., Yin Z., Pham Q., Gadekallu T.R., Dev K., Su C. | IEEE Consumer Electronics Magazine |
37 | Improved whale optimization based band selection for hyperspectral remote sensing image classification | Manoharan P., Boggavarapu P.K.L.N. | Infrared Physics and Technology |
38 | Enhanced Border and Hole Detection for Energy Utilization in Wireless Sensor Networks | Robinson Y.H., Lawrence T.S., Julie E.G., Kumar R., Thong P.H., Son L.H. | Arabian Journal for Science and Engineering |
39 | SmartPharma: Blockchain Enabled Internet of Things for Smart Pharmaceutical Traceability System | Kavitha Margret M., Golden Julie E., Harold Robinson Y., Vijayanandh D., Vimal S., Kadry S., El- Sherbeeny A.M., El- Meligy M.A. | IETE Journal of Research |
40 | Big data integration enhancement based on attributes conditional dependency and similarity index method | Kolisetty V.V., Rajput D.S. | Mathematical Biosciences and Engineering |
41 | A Two-stage Text Feature Selection Algorithm for Improving Text Classification | Ashokkumar P., Siva Shankar G., Srivastava G., Maddikunta P.K.R., Gadekallu T.R. | ACM Transactions on Asian and Low- Resource Language Information Processing |
42 | TAMIZHI: Historical Tamil-Brahmi Script Recognition Using CNN and MobileNet | Dhivya S., Usha Devi G. | ACM Transactions on Asian and Low- Resource Language Information Processing |
43 | Study on Automated Approach to Recognize Characters for Handwritten and Historical Document | Dhivya S., Usha Devi G. | ACM Transactions on Asian and Low- Resource Language Information Processing |
44 | Image and signal processing in the underwater environment | Reddy P.C.S., Pradeepa M., Venkatakiran S., Walia R., Saravanan M., Pillai V.J. | Journal of Nuclear Energy Science and Power Generation Technology |
45 | Fundamentals, present and future perspectives of speech enhancement | Das, N., Chakraborty, S., Chaki, J., Padhy, N., Dey, N. | International Journal of Speech Technology |
46 | Pattern analysis based acoustic signal processing: a survey of the state-of-art | Chaki, J. | International Journal of Speech Technology |
47 | B Smart Technologies in Engineering Applications of Cyber Physical System in Healthcare: Sensing, Imaging, Computing and Networking | Dukiya, R., Perumal, K. | Recent Advances in Computer Science and Communications |
48 | Federated Learning for Cybersecurity: Concepts, Challenges and Future Directions | Alazab M., R M S.P., M P., Reddy P., Gadekallu T.R., Pham Q. | IEEE Transactions on Industrial Informatics |
49 | Blockchain for Edge of Things: Applications, Opportunities, and Challenges | Gadekallu T.R., Pham Q., Nguyen D.C., Maddikunta P.K.R., Deepa N., B P., Pathirana P.N., Zhao J., Hwang W. | IEEE Internet of Things Journal |
50 | Distributed authentication framework for Hadoop based bigdata environment | Hena M., Jeyanthi N. | Journal of Ambient Intelligence and Humanized Computing |
51 | FogQSYM: An Industry 4.0 Analytical Model for Fog Applications | Iyapparaja M., Kumar M.S., Krishnan S.S.R.,Chowdhary C.L., Yoon B., Singh S., Cho G.H. | Computers, Materials and Continua |
52 | SCB-HC-ECC'Based Privacy Safeguard Protocol for Secure Cloud Storage of Smart Card'Based Health Care System | Senthilkumar S., Brindha K., Kryvinska N., Bhattacharya S., Reddy Bojja G. | Frontiers in Public Health |
53 | An intelligent tutoring system for new student model using fuzzy soft set-based hybrid optimization algorithm | Chandrasekhar U., Khare N. | Soft Computing |
54 | Interoperable permissioned-blockchain with sustainable performance | Punathumkandi S., Sundaram V.M., Panneer P. | Sustainability (Switzerland) |
55 | Evaluation of risk causing factors for the incidence of neck and shoulder pain in adolescents using fuzzy analytic hierarchy process | Padma T., Shantharajah S.P. | International Journal of Information and Decision Sciences |
56 | A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions | Javed A.R., Jalil Z., Zehra W., Gadekallu T.R., Suh D.Y., Piran M.J. | Engineering Applications of Artificial Intelligence |
57 | A new fuzzy adaptive algorithm to classify imbalanced data | Patel H., Rajput D.S., Stan O.P., Miclea L.C. | Computers, Materials and Continua |
58 | Multi-class imbalanced image classification using conditioned GANs | Pavan Kumar M.R., Jayagopal P. | International Journal of Multimedia Information Retrieval |
59 | Automatic hate speech detection in english-odia code mixed social media data using machine learning techniques | Mohapatra S.K., Prasad S., Bebarta D.K., Das T.K., Srinivasan K., Hu Y.- C. | Applied Sciences (Switzerland) |
60 | FBDR-Fuzzy Based DDoS Attack Detection and Recovery Mechanism for Wireless Sensor Networks | Pajila P.J.B., Julie E.G., Robinson Y.H. | Wireless Personal Communications |
61 | Feature based opinion analysis on social media tweets with association rule mining and multi-objective evolutionary algorithms | Meesala S.R., Subramanian S. | Concurrency and Computation: Practice and Experience |
62 | A survey on challenges in transforming No-SQL Data to SQL data and storing in cloud storage based on user requirement | Shantharajah S.P., Maruthavani E. | International Journal of Performability Engineering |
63 | Effectiveness of contact tracing using KNN for COVID-19 | Venkatasen M., Mathivanan S.K., Mani P., Jayagopal P., Thanapal P., Somanathan M.S., Upendra Babu K., Elangovan D. | Journal of Mobile Multimedia |
64 | Protein classification using machine learning and statistical techniques | Gupta C.L.P., Bihari A., Tripathi S. | Recent Advances in Computer Science and Communications |
65 | ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs | Khan T., Singh K., Hasan M.H., Ahmad K., Reddy G.T., Mohan S., Ahmadian A. | Future Generation Computer Systems |
66 | PPSF: A Privacy-Preserving and Secure Framework using Blockchain-based Machine-Learning for IoT-driven Smart Cities | Kumar P., Kumar R., Srivastava G., Gupta G.P., Tripathi R., Gadekallu T.R., Xiong N. | IEEE Transactions on Network Science and Engineering |
67 | AACFAccessible Application-Centric Framework for the Internet of Things Backhauled Smart City Applications | Cui Y., Song X., Liu J., Chen K., Shi G., Zhou J., Tamizharasi G. | IEEE Transactions on Network Science and Engineering |
68 | Data-centric routing and caching approach for mobile and social sensing applications | Shynu P.G., Al-Turjman F. | Computers and Electrical Engineering |
69 | Identify glomeruli in human kidney tissue images using a deep learning approach | Shubham S., Jain N., Gupta V., Mohan S., Ariffin M.M., Ahmadian A. | Soft Computing |
70 | Security in Next Generation Mobile Payment Systems: A Comprehensive Survey | Ahmed W., Rasool A., Javed A.R., Kumar N., Gadekallu T.R., Jalil Z.,Kryvinska N. | IEEE Access |
71 | Security Enhanced Sentence Similarity Computing Model Based on Convolutional Neural Network | Sun Q., Huang X., Kibalya G., Kumar N., Kumar S.V.N.S., Zhang P., Xie D. | IEEE Access |
72 | Delineation of field boundary from multispectral satellite images through U-Net segmentation and template matching | M S.K., Jayagopal P. | Ecological Informatics |
73 | Fuzzy Guided Autonomous Nursing Robot through Wireless Beacon Network | Narayanan K.L., Krishnan R.S., Son L.H., Tung N.T., Julie E.G., Robinson Y.H., Kumar R., Gerogiannis V.C. | Multimedia Tools and Applications |
74 | Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks | Rajasoundaran S., Kumar S.V.N.S., Selvi M., Ganapathy S., Rakesh R., Kannan A. | Wireless Networks |
75 | A hadoop based framework integrating machine learning classifiers for anomaly detection in the internet of things | Thaseen I.S., Mohanraj V., Ramachandran S., Sanapala K., Yeo S.-S. | Electronics (Switzerland) |
76 | Hybrid Inception v3 XGBoost Model for Acute Lymphoblastic Leukemia Classification | Ramaneswaran S., Srinivasan K., Vincent P.M.D.R., Chang C.-Y. | Computational and Mathematical Methods in Medicine |
77 | Expert system for stable power generation prediction in microbial fuel cell | Srinivasan K., Garg L., Chen B.-Y., Alaboudi A.A., Jhanjhi N.Z., Chang C.-T., Prabadevi B., Deepa N. | Intelligent Automation and Soft Computing |
78 | A Review on Deep Learning Architecture and Methods for MRI Brain Tumour Segmentation | Angulakshmi M., Deepa M. | Current medical imaging |
79 | Literature review on software testing techniques and test suite reduction frameworks/tools | Asha N., Mani P. | International Journal of Advanced Intelligence Paradigms |
80 | Multilevel thresholding based follicle detection and classification of polycystic ovary syndrome from the ultrasound images using machine learning | Gopalakrishnan C., Iyapparaja M. | International Journal of Systems Assurance Engineering and Management |
81 | Improving the accuracy of item recommendations by combining collaborative and content-based recommendations: A hybrid approach | Parasuraman D., Elumalai S. | International Journal of Advanced Intelligence Paradigms |
82 | Fuzzy based feature engineering architecture for sentiment analysis of medical discussion over online social networks | Pavan Kumar C.S., Dhinesh Babu L.D. | Journal of Intelligent and Fuzzy Systems |
83 | Machine learning based deep job exploration and secure transactions in virtual private cloud systems | Rajasoundaran S., Prabu A.V., Routray S., Kumar S.V.N.S., Malla P.P., Maloji S., Mukherjee A., Ghosh U. | Computers and Security |
84 | Deep neural networks based approach for battery life prediction | Bhattacharya S., Maddikunta P.K.R., Meenakshisundaram I., Gadekallu T.R., Sharma S., Alkahtani M., Abidi M.H. | Computers, Materials and Continua |
85 | Investigation of digital video broadcasting application employing the modulation formats like QAM and PSK using OWC, FSO, and LOS-FSO channels | Karpagarajesh G., Santhana Krishnan R., Harold Robinson Y., Vimal S., Kadry S., Nam Y. | Alexandria Engineering Journal |
86 | An intelligent hybrid system for forecasting stock and forex trading signals using optimized recurrent flann and case-based reasoning | Bebarta D.K., Das T.K., Chowdhary C.L., Gao X.- Z. | International Journal of Computational Intelligence Systems |
87 | Storage and Proximity Management for Centralized Personal Health Records Using an IPFS-based Optimization Algorithm | Mubashar A., Asghar K., Javed A.R., Rizwan M., Srivastava G., Gadekallu T.R., Wang D., Shabbir M. | Journal of Circuits, Systems and Computers |
88 | Industrial-IoT-hardware security- improvement using plan load optimization method in cloud | Basheer S., Gopu M., Mathew R.M., Bivi M.A., Prabu M. | International Journal of Systems Assurance Engineering and Management |
89 | Language dialect based speech emotion recognition through deep learning techniques | Rajendran S., Mathivanan S.K., Jayagopal P., Venkatasen M., Pandi T., Sorakaya Somanathan M., Thangaval M., Mani P. | International Journal of Speech Technology |
90 | Design and development of ternary-based anomaly detection in semantic graphs using metaheuristic algorithm | Reddy M.S.K., Rajput D.S. | International Journal of Digital Crime and Forensics |
91 | GraphCrypto: Next generation data security approach towards sustainable smart city building | Mishra A.K., Puthal D., Tripathy A.K. | Sustainable Cities and Society |
92 | Classification and categorization of COVID-19 outbreak in Pakistan | Ayoub A., Mahboob K., Javed A.R., Rizwan M., Gadekallu T.R., Abidi M.H., Alkahtani M. | Computers, Materials and Continua |
93 | Deep Learning Assisted Neonatal Cry Classification via Support Vector Machine Models | Ashwini K., Vincent P.M.D.R., Srinivasan K., Chang C.-Y. | Frontiers in Public Health |
94 | Scalable algorithm for generation of attribute implication base using FPgrowth and spark | Chunduri R.K., Cherukuri A.K. | Soft Computing |
95 | Cloud- and IoT-based deep learning technique-incorporated secured health monitoring system for dead diseases | Malarvizhi Kumar P., Hong C.S., Chandra Babu G., Selvaraj J., Gandhi U.D | Soft Computing |
96 | A review on h-index and its alternative indices | Bihari A., Tripathi S., Deepak A | Journal of Information Science |
97 | Sparse Bayesian learning based channel estimation in FBMC/OQAM industrial IoT networks | Wang H., Li X., Jhaveri R.H., Gadekallu T.R., Zhu M., Ahanger T.A., Khowaja S.A. | Computer Communications |
98 | Machine learning prediction models for chronic kidney disease using national health insurance claim data in Taiwan | Krishnamurthy S., Kapeleshh K.S., Dovgan E., Lu'trek M., Gradi'ek Pileti' B., Srinivasan K., Li Y.-C., Gradi'ek A., Syed-Abdul S. | Healthcare (Switzerland) |
99 | Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks | Santhosh Kumar S.V.N., Palanichamy Y., Selvi M., Ganapathy S., Kannan A., Perumal S.P. | Wireless Networks |
100 | Hybrid Cache Management in Ad Hoc Networks | Krishnan C.G., Robinson Y.H., Julie E.G., Bamini A.M.A., Kumar R., Thong P.H., Son L.H | Wireless Personal Communications |
101 | Detection of Diabetic Retinopathy Using a Fusion of Textural and Ridgelet Features of Retinal Images and Sequential Minimal Optimization Classifier | Ramasamy L.K., Padinjappurathu S.G., Kadry S., Dama'evi'ius R | PeerJ Computer Science |
102 | An approach to merge domain ontologies using granular computing | Priya M., Aswani Kumar C. | Granular Computing |
103 | A hybrid feature selection model based on improved squirrel search algorithm and rank aggregation using fuzzy techniques for biomedical data classification | Nagarajan G., Dhinesh Babu L.D. | Network Modeling Analysis in Health Informatics and Bioinformatics |
104 | Naive Bayes and deep learning model for wireless intrusion detection systems | Rajadurai H., Gandhi U.D. | International Journal of Engineering Systems Modelling and Simulation |
105 | A Review on Various Applications of Reputation Based Trust Management | Govindaraj R., Govindaraj P., Chowdhury S., Kim D., Tran D.-T., Le A.N. | International Journal of Interactive Mobile Technologies |
106 | Rating Prediction Method for ItemBased collaborative Filtering Recommender Systems Using Formal Concept Analysis | Chemmalar Selvi G., Lakshmi Priya G.G. | EAI Endorsed Transactions on Energy Web |
107 | Early tumor diagnosis in brain MR images via deep convolutional neural network model | Das T.K., Roy P.K., Uddin M., Srinivasan K., Chang C.-Y., Syed-Abdul S. | Computers, Materials and Continua |
108 | Performance comparison of deep cnn models for detecting driver's distraction | Srinivasan K., Garg L., Datta D., Alaboudi A.A., Jhanjhi N.Z., Agarwal R., Thomas A.G. | Computers, Materials and Continua |
109 | Machine translation using deep learning for universal networking language based on their structure | Ali M.N.Y., Rahman M.L., Chaki J., Dey N., Santosh K.C. | International Journal of Machine Learning and Cybernetics |
110 | Multi-criteria-based approach for job scheduling in industry 4.0 in smart cities using fuzzy logic | Kumar P.M., Babu G.C., Selvaraj A., Raza M., Luhach A.K., Díaz V.G | Soft Computing |
111 | Iterative weighted EM and iterative weighted EM'-index for scientific assessment of scholars | Bihari A., Tripathi S., Deepak A. | Scientometrics |
112 | Deep CNN and Deep GAN in Computational Visual PerceptionDriven Image Analysis | Nandhini Abirami R., Durai Raj Vincent P.M., Srinivasan K., Tariq U., Chang C.-Y. | Complexity |
113 | Performance Assessment of Certain Machine Learning Models for Predicting the Major Depressive Disorder among IT Professionals during Pandemic times | Vincent P.M.D.R., Mahendran N., Nebhen J., Deepa N., Srinivasan K., Hu Y.-C. | Computational Intelligence and Neuroscience |
114 | Shadow detection from images using fuzzy logic and PCPerturNet | Chaki J. | IET Image Processing |
115 | Dispersed dummy selection approach for location-based services to preempt user-profiling | Manju A.B., Sumathy S. | Concurrency Computation |
116 | Identity preserving multi-pose facial expression recognition using fine tuned VGG on the latent space vector of generative adversarial network | Abirami R.N., Vincent P.M.D.R | Mathematical Biosciences and Engineering |
117 | A Spectrum Defragmentation Algorithm Using Jellyfish Optimization Technique in Elastic Optical Network (EON) | Selvakumar S., Manivannan S.S. | Wireless Personal Communications |
118 | Sentiment Analysis on Twitter Data by Using Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) | Gandhi U.D., Malarvizhi Kumar P., Chandra Babu G., Karthick G. | Wireless Personal Communications |
119 | Eeccrn: Energy enhancement with css approach using q-learning and coalition game modelling in crn | Shanmuganathan V., Kalaivani L., Kadry S., Suresh A., Harold Robinson Y., Lim S | Information Technology and Control |
120 | IoT based smart health monitoring with CNN using edge computing | Vimal S., Harold Robinson Y., Kadry S., Long H.V., Nam Y. | Journal of Internet Technology |
121 | A study of computational trust models in cloud security | Thakare V.R., Singh J.K | International Journal of Grid and High Performance Computing |
122 | Public Key Encryption with Equality Test for Industrial Internet of Things Based on Near-Ring | Muthukumaran V., Manimozhi I., Sundar P.P.V., Karthikeyan T., Gopu M. | International Journal of e-Collaboration |
123 | PPHE-automatic detection of sensitive attributes in a privacy preserved Hadoop environment using data mining techniques | Umapathy K., Khare N | International Journal of Computer Aided Engineering and Technology |
124 | K-means clustering-based radio neutron star pulsar emission mechanism | Shrimali S., Pandey A., Chowdhary C.L | Recent Advances in Computer Science and Communications |
125 | An analytical hierarchical processbased weighted assessment of factors contributing precipitation | Vaishnavi B., Karthikeyan J., Yarrakula K. | International Journal of Intelligent Enterprise |
126 | Cloud based extensible business management suite and data predictions | Dukiya R., Perumal K. | Recent Advances in Computer Science and Communications |
127 | An efficient attribute reduction and fuzzy logic classifier for heart disease and diabetes prediction | Gadekallu T.R., Gao X.-Z. | Recent Advances in Computer Science and Communications |
128 | A Machine Learning Way to Classify Autism Spectrum Disorder | Sujatha R., Aarthy S.L., Chatterjee J.M., Alaboudi A., Jhanjhi N.Z | International Journal of Emerging Technologies in Learning |
129 | Fuzzy deep learning-based crop yield prediction model for sustainable agronomical frameworks | Elavarasan D., Durai Raj Vincent P.M | Neural Computing and Applications |
130 | Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model | Movassagh A.A., Alzubi J.A., Gheisari M., Rahimi M., Mohan S., Abbasi A.A., Nabipour N. | Journal of Ambient Intelligence and Humanized Computing |
131 | Providing diagnosis on diabetes using cloud computing environment to the people living in rural areas of India | Rajput D.S., Basha S.M., Xin Q., Gadekallu T.R., Kaluri R., Lakshmanna K., Maddikunta P.K.R. | Journal of Ambient Intelligence and Humanized Computing |
132 | Whale optimization-based band selection technique for hyperspectral image classification | Phaneendra Kumar B.L.N., Manoharan P. | International Journal of Remote Sensing |
133 | Identifying and classifying plant disease using resilient LF-CNN | B.V. G., G. U.D. | Ecological Informatics |
134 | A method of progression detection for glaucoma using K-means and the GLCM algorithm toward smart medical prediction | Vimal S., Robinson Y.H., Kaliappan M., Vijayalakshmi K., Seo S | Journal of Supercomputing |
135 | An approach to forecast impact of Covid-19 using supervised machine learning model | Mohan S., John A., Abugabah A., Adimoolam M., Kumar Singh S., kashif Bashir A., Sanzogni L. | Software - Practice and Experience |
136 | Performance assessment of supervised classifiers for designing intrusion detection systems: A comprehensive review and recommendations for future research | Panigrahi R., Borah S., Bhoi A.K., Ijaz M.F.,Pramanik M., Jhaveri R.H., Chowdhary C.L. | Mathematics |
137 | A Threat Categorization of Risk-Based approach for analyzing Security Threats early phase in SDLC | Viswanathan G., Jayagopal P | Arabian Journal for Science and Engineering |
138 | Band selection strategies for hyperspectral image classification based on machine learning and artificial intelligent techniques 'Survey | Sawant S.S., Manoharan P., Loganathan A. | Arabian Journal of Geosciences |
139 | Development of Fuzzy Enabled Coverage Hole Detection Algorithm in Wireless Sensor Networks | Robinson Y.H., Lawrence T.S., Julie E.G., Vimal S. | Wireless Personal Communications |
140 | Enhanced Energy Proficient Encoding Algorithm for Reducing Medium Time in Wireless Networks | Robinson Y.H., Julie E.G., Jacob I.J., Lawrence T.S., Saravanan V., Darney P.E | Wireless Personal Communications |
141 | Inherent Security-aware Resource Utilizing Methodology for Cloud Environments | Gopala Krishnan C., Golden Julie E., Harold Robinson Y. | Wireless Personal Communications |
142 | ANFIS PD Plus I Control On Simscape Model of Nonlinear Physical System | Umamaheswari K., Prabhakar G., Viji K., Thanapal P. | Control Engineering and Applied Informatics |
143 | A new venture to image encryption using combined chaotic system and integer wavelet transforms | Subashanthini S., Pounambal M. | International Journal of Cloud Computing |
144 | A study and analysis of forecasts in resource allocation using ARIMA in cloud environment | Rajalakshmi L., Sathiyamoorthy E | Turkish Journal of Computer and Mathematics Education |
145 | An intelligent network intrusion detection system using particle swarm optimization (PSO) and deep network networks (DNN) | Preethi D., Khare N. | International Journal of Swarm Intelligence Research |
146 | Classification of cricket videos using finite state machines | Ellappan V., Rajkumar R. | International Journal of Information Technology and Management |
147 | Deep learning based recurrent neural networks to enhance the performance of wind energy forecasting: A review | Paramasivan S.K. | Revue d'Intelligence Artificielle |
148 | Landslide Hazard Zonation Mapping using Power Method based AHP for Saklespur, India | Sreedevi N., Karthikeyan J. | ndian Journal of Ecology |
149 | Some algorithms under non-parametric framework versus an unsupervised approach | Ray B.K. | Computer Science Review |
150 | Quantum-inspired ensemble approach to multi-attributed and multi-agent decision-making | M.S. I., Cherukuri A.K. | Applied Soft Computing |
151 | CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network using CNN and Attention-based GRU | Rehman A., Ur Rehman S., Khan M., Alazab M., G T.R. | IEEE Transactions on Network Science and Engineering |
152 | COVID19: Forecasting Air Quality Index and Particulate Matter (PM2.5) | Mangayarkarasi R., Vanmathi C., Khan M.Z., Noorwali A., Jain R., Agarwal P. | Computers, Materials and Continua |
153 | Deep Learning-Based Hookworm Detection in Wireless Capsule Endoscopic Image Using AdaBoost | Lakshminarayanan K., Muthukumaran N., Robinson Y.H., | Computers, Materials and Continua |
154 | Performance assessment of a novel power generation system | Ganesh N.S., Maheswari G.U., Srinivas T., Reddy B.V. | IET Renewable Power Generation |
155 | Blockchain-based Secure Healthcare Application for Diabetic-Cardio Disease Prediction in Fog Computing | Shynu P.G., Menon V.G., Kumar R., Kadry S., Nam Y. | IEEE Access |
156 | A Bayesian regularized neural network for analyzing bitcoin trends | Sujatha R., Mareeswari V., Chatterjee J.M., Mousa A.A.A., Hassanien A.E. | IEEE Access |
157 | BCD-WERT: a novel approach for breast cancer detection using whale optimization based efficient features and extremely randomized tree algorithm | Abbas S., Jalil Z., Javed A.R., Batool I., Khan M.Z., Noorwali A., Gadekallu T.R., Akbar A. | PeerJ Computer Science |
158 | Deep Neural Network to Predict Answer Votes on Community Question Answering Sites | Roy P.K. | Neural Processing Letters |
159 | Smart Animal Detection and Counting Framework for Monitoring Livestock in an Autonomous Unmanned Ground Vehicle Using Restricted Supervised Learning and Image Fusion | Meena S.D., Agilandeeswari L. | Neural Processing Letters |
160 | Spam review detection using self attention based CNN and bi-directional LSTM | Bhuvaneshwari P., Rao A.N., Robinson Y.H. | Multimedia Tools and Applications |
161 | A secured distributed detection system based on IPFS and blockchain for industrial image and video data security | Kumar R., Tripathi R., Marchang N., Srivastava G., Gadekallu T.R., Xiong N.N. | Journal of Parallel and Distributed Computing |
162 | Integrated Ranking Algorithm for Efficient Decision Making | Deepa N., Prabadevi B., Srivastava G. | International Journal of Information Technology and Decision Making |
163 | An effective data mining techniques based optimal paddy yield cultivation: a rational approach | Vinoth B., Elango N.M. | Paddy and Water Environment |
164 | 3-Dimensional Manifold and Machine Learning Based Localization Algorithm for Wireless Sensor Networks | Robinson Y.H., Vimal S., Julie E.G., Lakshmi Narayanan K., Rho S. | Wireless Personal Communications |
165 | Machine Learning Based Detection and a Novel EC-BRTT Algorithm Based Prevention of DoS Attacks in Wireless Sensor Networks | Lakshmi Narayanan K., Santhana Krishnan R., Golden Julie E., Harold Robinson Y., Shanmuganathan V. | Wireless Personal Communications |
166 | Ternary-based feature level extraction for anomaly detection in semantic graphs: an optimal feature selection basis | Reddy M.S.K., Rajput D.S. | Sadhana - Academy Proceedings in Engineering Sciences |
167 | Remote health patient monitoring system for early detection of heart disease | Babu G.C., Shantharajah S.P. | International Journal of Grid and High Performance Computing |
168 | DARE-SEP: A Hybrid Approach of Distance Aware Residual Energy-Efficient SEP for WSN | Naeem A., Javed A.R., Rizwan M., Abbas S., Lin J.C., Gadekallu T.R. | IEEE Transactions on Green Communications |
169 | Heart disease prediction system using ensemble of machine learning algorithms | Rajendran N.A., Vincent D.R. | Recent Patents on Engineering |
170 | Hybrid approach for semantic similarity calculation between Tamil words | Karuppaiah D., Durai Raj Vincent P.M. | International Journal of Innovative Computing and Applications |
171 | LIS4: Lesk Inspired Sense Specific Semantic Similarity using WordNet | Kandasamy S., Cherukuri A.K. | Journal of Information and Knowledge Management |
172 | Data mining of paddy cultivation patterns and water resource management in late samba season of Tamilnadu | Vinoth B., Elango N.M. | SSRG International Journal of Engineering Trends and Technology |
173 | A fine-tuned feature descriptor for pedestrian action recognition in autonomous vehicles | Ushapreethi P., Priya G.G.L. | International Journal of Vehicle Information and Communication Systems |
174 | Robustness for authentication of the human using face, Ear, and Gait multimodal biometric system | Singh L.K., Khanna M., Thawkar S., Gopal J. | International Journal of Information System Modeling and Design |
175 | Adoption of E-Learning during Lockdown in India | Mathivanan S.K., Jayagopal P., Ahmed S., Manivannan S.S., Kumar P.J., Raja K.T., Dharinya S.S., Prasad R.G. | International Journal of Systems Assurance Engineering and Management |
176 | Real-time 3D reconstruction techniques applied in dynamic scenes: A systematic literature review | Ingale A.K., J. D.U. | Computer Science Review |
177 | Regularized deep clustering approach for effective categorization of maize diseases | Gokulnath B.V., Gandhi U.D. | Journal of Ambient Intelligence and Humanized Computing |
178 | Optimal 5G network slicing using machine learning and deep learning concepts | Abidi M.H., Alkhalefah H., Moiduddin K., Alazab M., Mohammed M.K., Ameen W., Gadekallu T.R. | Computer Standards and Interfaces |
179 | Field-programmable gate arrays in a low power vision system | Suresh P., Saravanakumar U., Iwendi C., Mohan S., Srivastava G. | Computers and Electrical Engineering |
180 | Recognition of food type and calorie estimation using neural network | Kumar R.D., Julie E.G., Robinson Y.H., Vimal S., Seo S. | Journal of Supercomputing |
181 | An intrusion detection system using optimized deep neural network architecture | Ramaiah M., Chandrasekaran V., Ravi V., Kumar N. | Transactions on Emerging Telecommunications Technologies |
182 | Roughsets-based approach for predicting battery life in iot | Kaluri R., Rajput D.S., Xin Q., Lakshmanna K., Bhattacharya S., Gadekallu T.R., Maddikunta P.K.R. | Intelligent Automation and Soft Computing |
183 | Tyre inspection through multi-state convolutional neural networks | Sivamani C., Rajeswari M., Julie E.G., Robinson Y.H., Shanmuganathan V., Kadry S., Nam Y. | Intelligent Automation and Soft Computing |
184 | An Effective Traceback Network Attack Procedure for Source Address Verification | Balraj S., Leelasankar K., Ayyanar A., Yesudhas H.R., Kumar R., Long H.V., Hoang Son L. | Wireless Personal Communications |
185 | Enhanced QoS Through Optimized Architecture for Video Streaming Applications in Heterogeneous Networks | Duraimurugan S., Avudaiammal R., Vincent P.M.D.R. | Wireless Personal Communications |
186 | Image retrieval using intensity gradients and texture chromatic pattern: Satellite images retrieval | Jacob I.J., Paulraj B., Darney P.E., Long H.V., Tuan T.M., Yesudhas H.R., Shanmuganathan V., Eanoch G.J. | International Journal of Data Warehousing and Mining |
187 | Human action recognition in videos using convolution long short-term memory network with spatio-temporal networks | Sarabu A., Santra A.K. | Emerging Science Journal |
188 | A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques | Singh G., Khare N. | International Journal of Computers and Applications |
189 | A hybrid approach towards content-based image retrieval for colored images using enhanced first type of pessimistic covering based lower approximation multi-granular rough sets | R R., K J.S. | Evolutionary Intelligence |
190 | Trust-aware routing framework for internet of things | Sankar S., Somula R., Lakshmana Kumar R., Srinivasan P., Amala Jayanthi M. | International Journal of Knowledge and Systems Science |
191 | E-farming management system using data mining techniques | Kaviarasan S., Vanitha M. | International Journal of Intelligent Unmanned Systems |
192 | An efficient privacy-preserving deep learning scheme for medical image analysis | Andrew Onesimu J., Karthikeyan J. | Journal of Information Technology Management |
193 | Machine Learning Assisted Information Management Scheme in Service Concentrated IoT | Manogaran G., Alazab M., Saravanan V., Rawal B.S., Shakeel P.M., Sundarasekar R., Nagarajan S.M., Kadry S.N., Montenegro-Marin C.E. | IEEE Transactions on Industrial Informatics |
194 | An ensemble machine learning approach through effective feature extraction to classify fake news | Hakak S., Alazab M., Khan S., Gadekallu T.R., Maddikunta P.K.R., Khan W.Z. | Future Generation Computer Systems |
195 | Novel framework of GIS based automated monitoring process on environmental biodegradability and risk analysis using Internet of Things | Gopikumar S., Banu J.R., Robinson Y.H., Shanmuganathan V., Kadry S., Rho S. | Environmental Research |
196 | A reinforced random forest model for enhanced crop yield prediction by integrating agrarian parameters | Elavarasan D., Vincent P.M.D.R. | Journal of Ambient Intelligence and Humanized Computing |
197 | Analysis and evaluation of the regional air quality index forecasting based on web-text sentiment analysis method | Gao K., Anandhan P., Kumar R. | Environmental Impact Assessment Review |
198 | Prediction modelling of COVID using machine learning methods from B-cell dataset | Jain N., Jhunthra S., Garg H., Gupta V., Mohan S., Ahmadian A., Salahshour S., Ferrara M. | Results in Physics |
199 | An Emotion Care Model using Multimodal Textual Analysis on COVID-19 | Gupta V., Jain N., Katariya P., Kumar A., Mohan S., Ahmadian A., Ferrara M. | Chaos, Solitons and Fractals |
200 | A social immunity based approach to suppress rumors in online social networks | Srinivasan S., L D D.B. | International Journal of Machine Learning and Cybernetics |
201 | Secrecy Outage Probability of Relay Selection Based Cooperative NOMA for IoT Networks | Li H., Chen Y., Zhu M., Sun J., Do D.-T., Menon V.G., P. G. S. | IEEE Access |
202 | Multi-objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities | Alazab M., Lakshmanna K., G T.R., Pham Q.-V., Reddy Maddikunta P.K. | Sustainable Energy Technologies and Assessments |
203 | Accessing Covid19 epidemic outbreak in Tamilnadu and the impact of lockdown through epidemiological models and dynamic systems | Rajendran S., Jayagopal P. | Measurement: Journal of the International Measurement Confederation |
204 | Keyword weight optimization using gradient strategies in event focused web crawling | Rajiv S., Navaneethan C. | Pattern Recognition Letters |
205 | SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles | Kumar R., Kumar P., Tripathi R., Gupta G.P., Gadekallu T.R., Srivastava G. | Computer Networks |
206 | Unmanned Aerial Vehicles in Smart Agriculture: Applications, Requirements, and Challenges | Maddikunta P.K.R., Hakak S., Alazab M., Bhattacharya S., Gadekallu T.R., Khan W.Z., Pham Q. | IEEE Sensors Journal |
207 | Adaptive beam formation and channel allocation using substance near multicast protocol and CS-iEHO | Velusamy Y., Manickam R., Chinnaswamy S., Eanoch G.J., Yesudhas H.R., Kumar R., Long H.V. | Soft Computing |
208 | Sustainable task scheduling strategy in cloudlets | Mukherjee D., Nandy S., Mohan S., Al-Otaibi Y.D., Alnumay W.S. | Sustainable Computing: Informatics and Systems |
209 | EMMM: Energy-efficient mobility management model for context-aware transactions over mobile communication | Yadav A.K., Singh K., Ahmadian A., Mohan S., Hussain Shah S.B., Alnumay W.S. | Sustainable Computing: Informatics and Systems |
210 | Energy-efficient cluster head selection through relay approach for WSN | Rathore P.S., Chatterjee J.M., Kumar A., Sujatha R. | Journal of Supercomputing |
211 | Exploration of sentiment analysis and legitimate artistry for opinion mining | Kumar R.S., Saviour Devaraj A.F., Rajeswari M., Julie E.G., Robinson Y.H., Shanmuganathan V. | Multimedia Tools and Applications |
212 | Learning automata and reservation based secure smart parking system: Methodology and simulation analysis | Waheed A., Krishna P.V., J G., Sadoun B., Obaidat M. | Simulation Modelling Practice and Theory |
213 | A bio-inspired defensive rumor confinement strategy in online social networks | Srinivasan S., Dhinesh B.L.D. | Journal of Organizational and End User Computing |
214 | Longitudinal strain waves propagating in an infinitely long cylindrical rod composed of generally incompressible materials and its Jacobi elliptic function solutions | Silambarasan R., Baskonus H.M., Vijay Anand R., Dinakaran M., Balusamy B., Gao W. | Mathematics and Computers in Simulation |
215 | Performance of deep learning vs machine learning in plant leaf disease detection | Sujatha R., Chatterjee J.M., Jhanjhi N.Z., Brohi S.N. | Microprocessors and Microsystems |
216 | Route manipulation aware Software-Defined Networks for effective routing in SDN controlled MANET by Disney Routing Protocol | J M., S P., P J., V M., B S.K., P S. | Microprocessors and Microsystems |
217 | A pragmatic approach to understand hebbian cell assembly | Cherukuri A.K., Shivhare R., Abraham A., Li J., Jonnalagadda A. | International Journal of Cognitive Informatics and Natural Intelligence |
218 | Word sense disambiguation in Tamil using indo-wordnet and cross-language semantic similarity | Karuppaiah D., Durai Raj Vincent P.M. | International Journal of Intelligent Enterprise |
219 | Topological properties of multigranular rough sets on intuitionistic fuzzy approximation spaces | Reddy A.J., Tripathy B.K. | International Journal of Intelligent Enterprise |
220 | A new dominant point detection technique for polygonal approximation of digital planar closed curves | Kalaivani S., Ray B.K. | International Journal of Intelligent Enterprise |
221 | Finding location of fake and phantom source for source location privacy in wireless sensor network | Rimjhim, Roy P.K., Singh J.P. | International Journal of Communication Networks and Distributed Systems |
222 | Efficient learning from two-class categorical imbalanced healthcare data | Mathews L., Seetha H. | International Journal of Healthcare Information Systems and Informatics |
223 | Palmprint Recognition Using Hessian Matrix and Two-Component Partition Method | Chaki J., Dey N. | International Journal of Digital Crime and Forensics |
224 | Design and Evaluation of Wi-Fi Offloading Mechanism in Heterogeneous Networks | Vinoth Kumar V., Ramamoorthy S., Dhilip Kumar V., Prabu M., Balajee J.M. | International Journal of e-Collaboration |
225 | Robust attack detection approach for iiot using ensemble classifier | Priya V., Thaseen I.S., Gadekallu T.R., Aboudaif M.K., Nasr E.A. | Computers, Materials and Continua |
226 | Distinct two-stream convolutional networks for human action recognition in videos using segment-based temporal modeling | Sarabu A., Santra A.K. | Data |
227 | Face Analysis Using Row and Correlation Based Local Directional Pattern | Perumal S.R., Mouli C.P.V.S.S.R. | Electronic Letters on Computer Vision and Image Analysis |
2020
SL. NO. |
TITLE OF PAPER | NAME OF THE AUTHOR/S | NAME OF JOURNAL |
---|---|---|---|
1 | Deep learning to filter SMS Spam | Roy P.K., Singh J.P., Banerjee S. | Future Generation Computer Systems |
2 | An efficient XGBoost–DNN-based classification model for network intrusion detection system | Devan P., Khare N. | Neural Computing and Applications |
3 | Quantum Aspects of High Dimensional Conceptual Space: a Model for Achieving Consciousness | Ishwarya M.S., Kumar C.A. | Cognitive Computation |
4 | Hybrid context enriched deep learning model for fine-grained sentiment analysis in textual and visual semiotic modality social data | Kumar A., Srinivasan K., Cheng W.-H., Zomaya A.Y. | Information Processing and Management |
5 | A novel automata and neural network based fault diagnosis system for PLC controlled manufacturing systems | Ghosh A., Wang G.-N., Lee J. | Computers and Industrial Engineering |
6 | SVM-enabled intelligent genetic algorithmic model for realizing efficient universal feature selection in breast cyst image acquired via ultrasound sensing systems | Chang C.-Y., Srinivasan K., Chen M.-C., Chen S.-J. | Sensors (Switzerland) |
7 | Predicting drug responsiveness with deep learning from the effects on gene expression of Obsessive–Compulsive Disorder affected cases | Sekaran K., Sudha M. | Computer Communications |
8 | Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT | Vimal S., Khari M., Dey N., Crespo R.G., Harold Robinson Y. | Computer Communications |
9 | LNR-PP: Leaf Node Count and RSSI Based Parent Prediction Scheme to Support QoS in Presence of Mobility in 6LoWPAN | Suganya P., C.H. P.R. | Computer Communications |
10 | An efficient public key secure scheme for cloud and IoT security | Thirumalai C., Mohan S., Srivastava G. | Computer Communications |
11 | Periodic waves of the non dissipative double dispersive micro strain wave in the micro structured solids | Gao W., Silambarasan R., Baskonus H.M., Anand R.V., Rezazadeh H. | Physica A: Statistical Mechanics and its Applications |
12 | AVRM: adaptive void recovery mechanism to reduce void nodes in wireless sensor networks | Ayyasamy A., Julie E.G., Robinson Y.H., Balaji S., Kumar R., Son L.H., Thong P.H., Priyadarshini I. | Peer-to-Peer Networking and Applications |
13 | A hybrid meta-heuristic approach for optimization of routing and spectrum assignment in Elastic Optical Network (EON) | Selvakumar S., Manivannan S.S. | Enterprise Information Systems |
14 | Bio-inspired dual cluster heads optimized routing algorithm for wireless sensor networks | Visu P., Praba T.S., Sivakumar N., Srinivasan R., Sethukarasi T. | Journal of Ambient Intelligence and Humanized Computing |
15 | Quality assessment of tire shearography images via ensemble hybrid faster region-based convnets | Chang C.-Y., Srinivasan K., Wang W.-C., Ganapathy G.P., Vincent D.R., Deepa N. |
Electronics (Switzerland) |
16 | An algorithmic approach to rank the disambiguous entities in Twitter streams for effective semantic search operations | Senthil Kumar N., Dinakaran M. | Sadhana - Academy Proceedings in Engineering Sciences |
17 | A neuro-fuzzy approach to detect rumors in online social networks | Srinivasan S., Dhinesh Babu L.D. | International Journal of Web Services Research |
18 | Genetic algorithm influenced top-n recommender system to alleviate new user cold start problem | Moses S.J., Babu D.L.D. | International Journal of Swarm Intelligence Research |
19 | Analysing thalamus and its sub nuclei in MRI brain image to distinguish schizophrenia subjects using back propagation neural network | ArivuSelvan K., Sathiya Moorthy E. | International Journal of Internet Technology and Secured Transactions |
20 | Fundamentals, present and future perspectives of speech enhancement | Das N., Chakraborty S., Chaki J., Padhy N., Dey N. | International Journal of Speech Technology |
21 | Predicting bipolar disorder and schizophrenia based on non- overlapping genetic phenotypes using deep neural network | Karthik S., Sudha M. | Evolutionary Intelligence |
22 | Learnability of interestingness with semantic similarity and reasoning in the knowledge base of decision support systems | Rajendran S., Prabhu J. | International Journal of Web Portals |
23 | Effective feature selection using hybrid Ga-EHO for classifying big data siot | Iyapparaja M., Deva Arul S. | International Journal of Web Portals |
24 | Optimal feature selection through a cluster-based DT learning (CDTL) in heart disease prediction | Magesh G., Swarnalatha P. | Evolutionary Intelligence |
25 | Bi-level user authentication for enriching legitimates and eradicating duplicates in cloud infrastructure | Thandeeswaran R., Saleem Durai M.A. | International Journal of Computer Aided Engineering and Technology |
26 | A framework for ranking hospitals based on customer perception using rough set and soft set techniques | Mohapatro A., Mahendran S.K., Das T.K. | International Journal of Healthcare Information Systems and Informatics |
27 | Survey on IoT security and challenges of IoT forensics | Joseph A., John Singh K. | Test Engineering and Management |
28 | Anaphora and coreference resolution: A review | Sukthanker R., Poria S., Cambria E., Thirunavukarasu R. | Information Fusion |
29 | Fuzzy Logic based Smart Irrigation System using Internet of Things | Krishnan R.S., Julie E.G., Robinson Y.H., Raja S., Kumar R., Thong P.H., Son L.H. | Journal of Cleaner Production |
30 | Unsupervised band selection based on weighted information entropy and 3D discrete cosine transform for hyperspectral image classification | Sawant S.S., Manoharan P. | International Journal of Remote Sensing |
31 | Ultrasonic sensors-assisted corrosion studies on surface coated AlSi9Cu3 alloy die castings | Hu Y.-C., Selvaraj S.K., Subramanian M., Srinivasan K., Narayanan S. | Coatings |
32 | Early detection of diabetic retinopathy using pca-firefly based deep learning model | Gadekallu T.R., Khare N., Bhattacharya S., Singh S., Maddikunta P.K.R., Ra I.-H., Alazab M. | Electronics (Switzerland) |
33 | A novel PCA-firefly based XGBoost classification model for intrusion detection in networks using GPU | Bhattacharya S., Siva Ramakrishnan S., Praveen Kumar Reddy M., Kaluri R., Singh S., Thippa Reddy G., Alazab M., Tariq U. | Electronics (Switzerland) |
34 | Improving quality-of-service in fog computing through efficient resource allocation | Mani S.K., Meenakshisundaram I. | Computational Intelligence |
35 | Deep learning techniques for traffic flow prediction in intelligent transportation system: A survey | George S., Santra A.K. | Test Engineering and Management |
36 | Evolving dictionary based sentiment scoring framework for patient authored text | Kumar C.S.P., Babu L.D.D. | Evolutionary Intelligence |
37 | Enhancing blockchain performance using parallel merkle root and parallel proof of work | Thilagavathi M., Lopez D. | Journal of Advanced Research in Dynamical and Control Systems |
38 | Pattern analysis based acoustic signal processing: a survey of the state-of-art | Chaki J. | International Journal of Speech Technology |
39 | SMSS: Does social, mobile, spatial and sensor data have high impact on big data analytics | Govardanan C.S., Gnanapandithan L.P.G. | International Journal of Intelligent Enterprise |
40 | An efficient crop identification using deep learning | Agila N., Senthil Kumar P. | International Journal of Scientific and Technology Research |
41 | An Efficient Technique for Three- Dimensional Image Visualization through Two-Dimensional Images for Medical Data | Gunasekaran G., Venkatesan M. | Journal of Intelligent Systems |
42 | A New Representation of Intuitionistic Fuzzy Systems and Their Applications in Critical Decision Making | Son L.H., Ngan R.T., Ali M., Fujita H., Abdel- Basset M., Giang N.L., Manogaran G., Priyan M.K. |
IEEE Intelligent Systems |
43 | Realizing a Stacking Generalization Model to Improve the Prediction Accuracy of Major Depressive Disorder in Adults | Mahendran N., Durai Raj Vincent P.M., Srinivasan K., Sharma V., Jayakody D.K. |
IEEE Access |
44 | A new integrated approach based on the iterative super-resolution algorithm and expectation maximization for face hallucination | Lakshminarayanan K., Krishnan R.S., Julie E.G., Robinson Y.H., Kumar R., Son L.H., Hung T.X., Samui P., Thi Ngo P.T., Bui D.T. |
Applied Sciences (Switzerland) |
45 | A two-fold fusion fuzzy framework to restore non-uniform illuminated blurred image | Chaki J. | Optik |
46 | An efficient hybrid fuzzy‐clustering driven 3D‐ modeling of magnetic resonance imagery for enhanced brain tumor diagnosis | Kanniappan S., Samiayya D., Durai Raj Vincent P.M., Srinivasan K., Jayakody D.N.K., Reina D.G., Inoue A. | Electronics (Switzerland) |
47 | An improved long short-term memory networks with Takagi-Sugeno fuzzy for traffic speed prediction considering abnormal traffic situation | George S., Santra A.K. | Computational Intelligence |
48 | A novel methodology for the development of an optimal agricultural crop field using Internet of Things |
Manikandan R., Prasanna S., Ashwin M., Sathish Kumar L., Pandiyan S. | Computational Intelligence |
49 | Earlier detection of rumors in online social networks using certainty-factor- based convolutional neural networks | Santhoshkumar S., Dhinesh Babu L.D. | Social Network Analysis and Mining |
50 | Exploring breast cancer classification of histopathology images from computer vision and image processing algorithms to deep learning | Chowdhary C.L., Shynu P.G., Gurani V.K. | International Journal of Advanced Science and Technology |
51 | A review on the significance of machine learning for data analysis in big data | Kolisetty V.V., Rajput D.S. | Jordanian Journal of Computers and Information Technology |
52 | Exploring digital signal processing concepts using on-line graphical DSP simulator | Sasi G., Thanapal P., Arvind Shriram R.K., Balaji V.S., Elamaran V. |
International Journal of Advanced Science and Technology |
53 | Social internet of things using big data analytics and security aspects - a review | Deva Arul S., Iyapparaja M. | Electronic Government |
54 | Classification of heart disease using cluster based DT learning | Mohan S., Thirumalai C., Rababah A. | Journal of Computer Science |
55 | Optimal feature extraction and classification-oriented medical insurance prediction model: machine | Chowdhury S., Mayilvahanan P., Govindaraj R. | International Journal of Computers and Applications |
56 | An improved trusted on-demand multicast routing with qos for wireless networks | Gopal J., Vellingiri J., Gitanjali J., Arivuselvan K., Sudhakar S. | International Journal of Advanced Trends in Computer Science and Engineering |
57 | Low power area efficient adaptive FIR filter for hearing aids using distributed arithmetic architecture | Praveen Sundar P.V., Ranjith D., Karthikeyan T., Vinoth Kumar V., Jeyakumar B. | International Journal of Speech Technology |
58 | A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks | Numan M., Subhan F., Khan W.Z., Hakak S., Haider S., Reddy G.T., Jolfaei A., Alazab M. | IEEE Access |
59 | Analysis of Dimensionality Reduction Techniques on Big Data | Reddy G.T., Reddy M.P.K., Lakshmanna K., Kaluri R., Rajput | IEEE Access |
60 | A deep neural networks based model for uninterrupted marine environment monitoring | G. T.R., R.M. S.P., Parimala M., Chowdhary C.L., M. P.K.R., Hakak S., Khan W.Z. | Computer Communications |
61 | Hyperspectral band selection based on metaheuristic optimization approach | Sawant S., Manoharan P. | Infrared Physics and Technology |
62 | Hyperspectral image classification using CNN with spectral and spatial features integration | Vaddi R., Manoharan P. | Infrared Physics and Technology |
63 | A novel user interaction middleware component system for ubiquitous soft computing environment by using fuzzy agent computing system | Vasanthi R., Jayavadivel R., Prasadh K., Vellingiri J., Akilarasu G., Sudhakar S., Balasubramaniam P.M. | Journal of Ambient Intelligence and Humanized Computing |
64 | Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything | R.M S.P., Bhattacharya S., Maddikunta P.K.R., Somayaji S.R.K., Lakshmanna K., Kaluri R., Hussien A., Gadekallu T.R. | Journal of Parallel and Distributed Computing |
65 | A review on classification of imbalanced data for wireless sensor networks | Patel H., Singh Rajput D., Thippa Reddy G., Iwendi C., Kashif Bashir A., Jo O. |
International Journal of Distributed Sensor Networks |
66 | An Effective Congestion Control Scheme for MANET with Relative Traffic Link Matrix Routing | Krishnamoorthy D., Vaiyapuri P., Ayyanar A., Harold Robinson Y., Kumar R., Long H.V., Son L.H. | Arabian Journal for Science and Engineering |
67 | Attention Mechanism with Gated Recurrent Unit Using Convolutional Neural Network for Aspect Level Opinion Mining | Rani M.S., Subramanian S. | Arabian Journal for Science and Engineering |
68 | A quantum approach in LiFi security using quantum key distribution | Vinoth Kumar V., Karthikeyan T., Praveen Sundar P.V., Magesh G., Balajee J.M. | International Journal of Advanced Science and Technology |
69 | 28 GHZ printed antenna for 5G communication with improved gain using array |
Kavitha M., Dinesh Kumar T., Gayathri A., Koushick V. | International Journal of Scientific and Technology Research |
70 | A survey on workload prediction models in cloud based on spot instances for proactive auto scaling strategy | Secaran R.Y., Sathiyamoorthy E. | Journal of Critical Reviews |
71 | An approach for facial recognition using deep learning | Gopal J., Menon S.R., Vellingiri J., Arivuselvan K., Kamalakannan J. | Journal of Advanced Research in Dynamical and Control Systems |
72 | Dimensionality reduction of fuzzy soft sets using fpso algorithm | Chandrasekhar U., Khare N. | International Journal of Advanced Science |
73 | Dynamic thresholding based ancient character recognition using enhanced convolution neural network | Balasubramanie P., Vellingiriraj E.K., Logesh Babu R., Dinakaran M. | International Journal of Advanced Science and Technology |
74 | Event recognition and classification in sports video using HMM | Ellappan V., Rajkumar R. | International Journal of Computer Aided Engineering and Technology |
75 | Probabilistic approach for channel selection in centralized cognitive scheme utilizing invasive weed optimization |
Sumathi D., Manivannan S.S. | International Journal of Advanced Trends in Computer Science and Engineering |
76 | Tricky information applicable answer interest optimization by intellect methods | Mohankumar P., Vijayan R., Mareeswari V. | International Journal of Scientific and Technology Research |
77 | A stacked ensemble learning model for intrusion detection in wireless network | Rajadurai H., Gandhi U.D. | Neural Computing and Applications |
78 | Crop Yield Prediction Using Deep Reinforcement Learning Model for Sustainable Agrarian Applications |
Elavarasan D., Durairaj Vincent P.M. | IEEE Access |
79 | A Multidirectional LSTM Model for Predicting the Stability of a Smart Grid | Alazab M., Khan S., Krishnan S.S.R., Pham Q.-V., Reddy M.P.K., Gadekallu T.R. | IEEE Access |
80 | Review of Health Prognostics and Condition Monitoring of Electronic Components | Bhargava C., Sharma P.K., Senthilkumar M., Padmanaban S., Ramachandaramurthy V.K., Leonowicz Z., Blaabjerg F., Mitolo M. | IEEE Access |
81 | KeySplitWatermark: Zero Watermarking Algorithm for Software Protection against Cyber-Attacks | Iwendi C., Jalil Z., Javed A.R., Thippa Reddy G., Kaluri R., Srivastava G., Jo O. | IEEE Access |
82 | Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN | Thangaramya K., Kulothungan K., Indira Gandhi S., Selvi M., Santhosh Kumar S.V.N., Arputharaj K. | Soft Computing |
83 | Green communication in IoT networks using a hybrid optimization algorithm | Maddikunta P.K.R., Gadekallu T.R., Kaluri R., Srivastava G., Parizi R.M., Khan M.S. | Computer Communications |
84 | Deep neural networks to predict diabetic retinopathy | Gadekallu T.R., Khare N., Bhattacharya S., Singh S., Maddikunta P.K.R., Srivastava G. | Journal of Ambient Intelligence and Humanized Computing |
85 | Cost optimization of secure routing with untrusted devices in software defined networking | Yazdinejad A., Parizi R.M., Dehghantanha A., Srivastava G., Mohan S., Rababah A.M. | Journal of Parallel and Distributed Computing |
86 | SMO-DNN: Spider monkey optimization and deep neural network hybrid classifier model for intrusion detection |
Khare N., Devan P., Chowdhary C.L., Bhattacharya S., Singh G., Singh S., Yoon B. |
Electronics (Switzerland) |
87 | Realizing an integrated multistage support vector machine model for augmented recognition of unipolar depression | Srinivasan K., Mahendran N., Vincent D.R., Chang C.-Y., Syed-Abdul S. | Electronics (Switzerland) |
88 | Precision agriculture and farming using Internet of Things based on wireless sensor network | Sanjeevi P., Prasanna S., Siva Kumar B., Gunasekaran G., Alagiri I., Vijay Anand R. | Transactions on Emerging Telecommunications Technologies |
89 | Realizing the resolution enhancement of tube-to-tube plate friction welding microstructure images via hybrid sparsity model for improved weld interface defects diagnosis | Srinivasan K., Deepa N., Durai Raj Vincent P.M., Senthil Kumaran S. | Journal of Internet Technology |
90 | A novel solution for economizing water by a mix of technologies with a low cost approach | Rajalakshmi N.R., Baskar M., Jayalakshmi P., Thiagarajan R., Mohan I. | International Journal of Advanced Science and Technology |
91 | Hybrid optimization algorithm for providing big data classification | Margret M.K., Devi S.S., Goldenjulie E., Vijayanandh D., Robinson Y.H. | International Journal of Advanced Science and Technology |
92 | Privacy preserving sensitive data publishing using (k,n,m) anonymity approach | Victor N., Lopez D. | Journal of Communications Software and Systems |
93 | Flood inundation mapping of lower Godavari river basin using remote sensing and GIS |
Vaishnavi B., Yarrakula K., Karthikeyan J. | Indian Journal of Ecology |
94 | Automated road safety surveillance system using hybrid cnn-lstm approach | Babitha D., Ismail M., Chowdhury S., Govindaraj R., Prakash K.B. | International Journal of Advanced Trends in Computer Science and Engineering |
95 | Skeleton-based STIP feature and discriminant sparse coding for human action recognition | Ushapreethi P., Lakshmi Priya G.G. | International Journal of Intelligent Unmanned Systems |
96 | Transfer learning techniques for emotion classification on visual features of images in the deep learning network | Tamil Priya D., Divya Udayan J. | International Journal of Speech Technology |
97 | A hybrid model collaborative movie recommendation system using K- means clustering with ant colony optimisation | Sandeep Kumar M., Prabhu J. | International Journal of Internet Technology and Secured Transactions |
98 | Energy aware task scheduling using hybrid firefly - GA in big data | Senthilkumar M., Ilango P. | International Journal of Advanced Intelligence Paradigms |
99 | Biometric based multi-authority inner product encryption for electronic health record | Exceline C.E., Norman J. | EAI Endorsed Transactions on Pervasive Health and Technology |
100 | Outfit selection recommendation system using classification techniques | Gupta N.S., Thanishvi D.S., Valarmathi B. | International Journal on Emerging Technologies |
101 | Evolution of privacy preservation models in location-based services | Manju A.B., Subramanian S. | Advances in Science, Technology and Engineering Systems |
102 | SDPBDVC: Secure data processing on big data using visual cryptography | Brindha K., Jeyanthi N. | International Journal of Services, Technology and Management |
103 | Word based language model using long short term memory for disabilities | Guruvammal S., Chellatamilan T., Deborah L.J. | International Journal of Psychosocial Rehabilitation |
104 | Crime prediction using machine learning and testing with classification models | Kavithakumari K.S., Uma K., Rameshkumar C., Bashakhaja M. | International Journal of Psychosocial Rehabilitation |
105 | Machinelearning and deep learning techniques in diagnosing alzheimers disease-a review | Sudha B., Srinivasan K. | International Journal of Advanced Science and Technology |
106 | Adaptive filtering and artificial intelligence methods on fetal ECG extraction | Pradeepa M., Kumaraperumal S. | Journal of Critical Reviews |
107 | A Centralized Cluster-Based Hierarchical Approach for Green Communication in a Smart Healthcare System | Yang G., Jan M.A., Menon V.G., Shynu P.G., Aimal M.M., Alshehri M.D. | IEEE Access |
108 | An Adaptive and Flexible Brain Energized Full Body Exoskeleton with IoT Edge for Assisting the Paralyzed Patients | Jacob S., Alagirisamy M., Menon V.G., Kumar B.M., Jhanjhi N.Z., Ponnusamy V., Shynu P.G., Balasubramanian V. | IEEE Access |
109 | ITFDS: Channel-aware integrated time and frequency-based downlink LTE scheduling in MANET | Tuan L.M., Son L.H., Long H.V., Priya L.R., Soundar K.R., Robinson Y.H., Kumar R. | Sensors (Switzerland) |
110 | Survey on Land Use/Land Cover (LU/LC) change analysis in remote sensing and GIS environment: Techniques and Challenges | MohanRajan S.N., Loganathan A., Manoharan P. | Environmental Science and Pollution Research |
111 | A machine learning forecasting model for COVID-19 pandemic in India | Sujath R., Chatterjee J.M., Hassanien A.E. | Stochastic Environmental Research and Risk Assessment |
112 | An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture | Swarna Priya R.M., Maddikunta P.K.R., Parimala M., Koppu S., Gadekallu T.R., Chowdhary C.L., Alazab M. | Computer Communications |
113 | Computational system to classify Cyber Crime offenses using machine learning | Ch R., Gadekallu T.R., Abidi M.H., Al-Ahmari A. | Sustainability (Switzerland) |
114 | A New Supervised Clustering Framework Using Multi Discriminative Parts and Expectation–Maximization Approach for a Fine-Grained Animal Breed Classification (SC-MPEM) | Sundaram D.M., Loganathan A. | Neural Processing Letters |
115 | An AI-based intelligent system for healthcare analysis using Ridge- Adaline Stochastic Gradient Descent Classifier | Deepa N., Prabadevi B., Maddikunta P.K., Gadekallu T.R., Baker T., Khan M.A., Tariq U. | Journal of Supercomputing |
116 | Predicting autism spectrum disorder from associative genetic markers of phenotypic groups using machine learning | Sekaran K., Sudha M. | Journal of Ambient Intelligence and Humanized Computing |
117 | Blended multi-modal deep convnet features for diabetic retinopathy severity prediction | Bodapati J.D., Veeranjaneyulu N., Shareef S.N., Hakak S., Bilal M., Maddikunta P.K.R., Jo O. | Electronics (Switzerland) |
118 | Internet of Green Things with autonomous wireless wheel robots against green houses and farms | Ram C.R.S., Ravimaran S., Krishnan R.S., Julie E.G., Robinson Y.H., Kumar R., Son L.H., Thong P.H., Thanh N.Q., Ismail M. | International Journal of Distributed Sensor Networks |
119 | An integrated intrusion detection system using correlation-based attribute selection and artificial neural network |
Sumaiya Thaseen I., Saira Banu J., Lavanya K., Rukunuddin Ghalib M., Abhishek K. |
Transactions on Emerging Telecommunications Technologies |
120 | A distributed collaborative trust service recommender system for secure cloud computing | Benjula Anbu Malar M.B., Prabhu J. | Transactions on Emerging Telecommunications Technologies |
121 | An empirical model in intrusion detection systems using principal component analysis and deep learning models | Rajadurai H., Gandhi U.D. | Computational Intelligence |
122 | Extraction of qualitative behavior rules for industrial processes from reduced concept lattice | Dias S.M., Zárate L.E.,Song M.A.J., Vieira N.J., Kumar C.A. | Intelligent Data Analysis |
123 | Enhanced adaptive distributed energy- efficient clustering (EADEEC) for wireless sensor networks | Poluru R.K., Praveen Kumar Reddy M., Basha S.M., Patan R., Kallam S. |
Recent Advances in Computer Science and Communications |
124 | Preserving learnability and intelligibility at the point of care with assimilation of different speech recognition techniques | Rajendran S., Jayagopal P. | International Journal of Speech Technology |
125 | Intrusion detection in software defined networking using snort and mirroring | Sampath N., Sadhasivam J., Jayavel S., Chindarmony N.S., Sharma S. | SSRG International Journal of Engineering Trends and Technology |
126 | Chest X-ray investigation: A convolutional neural network approach | Das T.K., Lal Chowdhary C., Gao X.Z. | Journal of Biomimetics, Biomaterials and Biomedical Engineering |
127 | Gaussian hybrid fuzzy clustering and radial basis neural network for automatic brain tumor classification in MRI images | Sathish P., Elango N.M. | Evolutionary Intelligence |
128 | Prediction of user interest fluctuation using fuzzy neural networks in web search |
N C S., Ch P.R. | International Journal of Intelligent Unmanned Systems |
129 | A comparative study on transformation of UML/OCL to other specifications | Thangaraj J., Ulaganathan S. | Recent Advances in Computer Science and Communications |
130 | A weighted assignment approach using recommendation routing for congestion control in wireless sensor networks-WEAR |
Somayaji S.R.K., Thangavelu A.K. | Recent Advances in Computer Science and Communications |
131 | Comprehensive data analysis and prediction on IPL using machine learning algorithms |
Amala Kaviya V.S., Mishra A.S., Valarmathi B. |
International Journal on Emerging Technologies |
132 | Survey of genetic algorithm approach in machine learning | Sadhasivam J., Jayavel S., Rathore A. | SSRG International Journal of Engineering Trends and Technology |
133 | Decision-making in cognitive paradoxes with contextuality and quantum formalism | M.S I., Cherukuri A.K. | Applied Soft Computing Journal |
134 | Graph based feature extraction and hybrid classification approach for facial expression recognition | Krithika L.B., Priya G.G.L. | Journal of Ambient Intelligence and Humanized Computing |
135 | Invariant Features-Based Fuzzy Inference System for Animal Detection and Recognition Using Thermal Images | Meena D., Agilandeeswari L. | International Journal of Fuzzy Systems |
136 | Performance Prediction and Interpretation of a Refuse Plastic Fuel Fired Boiler | Shaha A.P., Singamsetti M.S., Tripathy B.K., Srivastava G., Bilal M., Nkenyereye L. | IEEE Access |
137 | ECMCRR-MPDNL for Cellular Network Traffic Prediction with Big Data | Dommaraju V.S., Nathani K., Tariq U., Al-Turjman F., Kallam S., Reddy M P.K., Patan R. | IEEE Access |
138 | Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networks | Krishnan R.S., Julie E.G., Robinson Y.H., Kumar R.,Thong P.H., Son L.H. | Computers and Security |
139 | Failure assessment of pressure vessels made of plain carbon steel by using modified inherent flaw model in DL based industry optimization intelligent processing | Joemax Agu M., Gopikumar S., Vimal S., Harold Robinson Y. | Measurement: Journal of the International Measurement Confederation |
140 | An efficient segmentation and classification system in medical images using intuitionist possibilistic fuzzy C-mean clustering and fuzzy SVM algorithm | Chowdhary C.L., Mittal M., Kumaresan P., Pattanaik P.A., Marszalek Z. | Sensors (Switzerland) |
141 | Intelligent animal detection system using sparse multi discriminative-neural network (SMD-NN) to mitigate animal-vehicle collision | Meena S.D., Loganathan A. | Environmental Science and Pollution Research |
142 | Multilayer Convolutional Neural Network to Filter Low Quality Content from Quora | Roy P.K. | Neural Processing Letters |
143 | Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignment | Xu X., Han M., Nagarajan S.M., Anandhan P. | Computer Communications |
144 | Deep learning disease prediction model for use with intelligent robots | Koppu S., Maddikunta P.K.R., Srivastava G. | Computers and Electrical Engineering |
145 | Energy efficiency maximization algorithm for underwater Mobile sensor networks | Pasupathi S., Vimal S., Harold-Robinson Y., Khari M., Verdú E., Crespo R.G. | Earth Science Informatics |
146 | Hyperspectral image classification using fuzzy-embedded hyperbolic sigmoid nonlinear principal component and weighted least squares approach | Phaneendra Kumar B.L.N., Prabukumar M. | Journal of Applied Remote Sensing |
147 | FSSCaps-DetCountNet: Fuzzy soft sets and CapsNet-based detection and counting network for monitoring animals from aerial images | Sundaram D.M., Loganathan A. | Journal of Applied Remote Sensing |
148 | Traffic Prediction Using Multifaceted Techniques: A Survey | George S., Santra A.K. | Wireless Personal Communications |
149 | Affective emotion classification using feature vector of image based on visual concepts | Priya D.T., Udayan J.D. | International Journal of Electrical Engineering Education |
150 | A novel smart meal planner website with online store and dietician consultancy-for this modern era-from the human-computer interaction practitioners’ perspective | Vellingiri J., Suraj A., Gopal J., Gitanjali J. | International Journal of Advanced Trends in Computer Science and Engineering |
151 | Channel-based encrypted binary arithmetic coding in wireless sensor networks | Subramanian B., Yesudhas H.R., Enoch G.J. | Ingenierie des Systemes d'Information |
152 | Social economic impact of COVID-19 outbreak in India | M S.K., V M., J P., M P., P J., P S., M.B B.A.M., Jothikumar R. | International Journal of Pervasive Computing and Communications |
153 | Enhanced resemblance measures for integration in image-rich information networks | Jothikumar R., Kumar T.R., Jayalakshmi P., Baskar M., Thiagarajan R., Mohan I. | Journal of Critical Reviews |
154 | Impact of multimedia competencies of faculties on the effectiveness of engineering lectures | Ushapreethi P. | Journal of Critical Reviews |
155 | Survey of various algorithms used in twitter for sentiment analysis | Sadhasivam J.,Kalivaradhan R.B., Jayavel S. | SSRG International Journal of Engineering Trends and Technology |
156 | Machine learning and artificial intelligence based Diabetes Mellitus detection and self- management: A systematic review | Chaki J., Thillai Ganesh S., Cidham S.K., Ananda Theertan S. | Journal of King Saud University - Computer and Information Sciences |
157 | Mechanism of the effect of traditional Chinese medicine fumigation on blood lactic acid in exercise body | Gang R., Nagarajan S.M., Anandhan P. | Journal of Ambient Intelligence and Humanized Computing |
158 | EC-ElGamal and Genetic Algorithm-Based Enhancement for Lightweight Scalable Blockchain in IoT Domain | Guruprakash J., Koppu S. | IEEE Access |
159 | Latency Evaluation of SDFGs on Heterogeneous Processors Using Timed Automata | Rajadurai S., Alazab M., Kumar N., Gadekallu T.R. | IEEE Access |
160 | Fuzzy Inspired Deep Belief Network for the Traffic Flow Prediction in Intelligent Transportation System Using Flow Strength Indicators | George S., Santra A.K. | Big data |
161 | N-Sanitization: A semantic privacy- preserving framework for unstructured medical datasets | Iwendi C., Moqurrab S.A., Anjum A., Khan S., Mohan S., Srivastava G. | Computer Communications |
162 | Application of active remote sensing in confirmation rights and identification of mortgage supply-demand subjects of rural land in Guangdong Province | Hu S., Fu Z., Jackson Samuel R.D., Anandhan P. | European Journal of Remote Sensing |
163 | Energy-aware grid-based data aggregation scheme in routing protocol for agricultural internet of things | Sankar S., Srinivasan P., Luhach A.K., Somula R., Chilamkurti N. | Sustainable Computing: Informatics and Systems |
164 | A novel predicate based access control scheme for cloud environment using open stack swift storage | Anilkumar C., Subramanian S. | Peer-to-Peer Networking and Applications |
165 | Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions | Preethi D., Khare N. | Peer-to-Peer Networking and Applications |
166 | A novel grid and place neuron's computational modeling to learn spatial semantics of an environment | Shrivastava R., Kumar P., Tripathi S., Tiwari V., Rajput D.S., Gadekallu T.R., Suthar B., Singh S., Ra I.-H. | Applied Sciences (Switzerland) |
167 | Suspicious activity detection using deep learning in secure assisted living IoT environments | Vallathan G., John A., Thirumalai C., Mohan S.K., Srivastava G., Lin J.C.-W. | Journal of Supercomputing |
168 | Tree-based convolutional neural networks for object classification in segmented satellite images | Robinson Y.H., Vimal S., Khari M., Hernández F.C.L., Crespo R.G. | International Journal of High Performance Computing Applications |
169 | Multispectral and hyperspectral images based land use / land cover change prediction analysis: an extensive review | Navin M.S., Agilandeeswari L. | Multimedia Tools and Applications |
170 | Deep learning based genome analysis and NGS-RNA LL identification with a novel hybrid model | Ramamurthy M., Krishnamurthi I., Vimal S., Robinson Y.H. | BioSystems |
171 | Stochastic approach for channel selection in cognitive radio networks using optimization techniques | Sumathi D., Manivannan S.S. | Telecommunication Systems |
172 | Forest data visualization and land mapping using support vector machines and decision trees | Radhakrishnan S., Lakshminarayanan A.S., Chatterjee J.M., Hemanth D.J. | Earth Science Informatics |
173 | Fragmented handwritten digit recognition using grading scheme and fuzzy rules | Chaki J., Dey N. | Sadhana - Academy Proceedings in Engineering Sciences |
174 | EM- and EM’-index Sequence: Construction and Application in Scientific Assessment of Scholars | Bihari A., Tripathi S., Deepak A., Kumar P. | Measurement |
175 | A survey on plant disease prediction using machine learning and deep learning techniques | Gokulnath B.V., Usha Devi G. | Inteligencia Artificial |
176 | ACO-based enhanced energy-efficient intelligent routing protocol for MANET | Jayalakshmi P., Saravanan R. | International Journal of Grid and Utility Computing |
177 | An efficient computational model for assessing the stability characteristics of electro-active natural bio-resources | Jhawar D., Sharma P., Sharma A., Srinivasan K., Chen B.-Y. | Recent Advances in Computer Science and Communications |
178 | A framework for multimedia event classification with convoluted texture feature | Kanagaraj K., Lakshmi Priya G.G. | Recent Advances in Computer Science and Communications |
179 | Irrigation control system-data gathering in WSN using IOT | Kumar K.A., Jayaraman K. | International Journal of Communication Systems |
180 | A study on data de-duplication schemes in cloud storage | Kumar P.M., Usha Devi G., Basheer S., Parthasarathy P. | International Journal of Grid and Utility Computing |
181 | An enhanced two factor authentication for e-healthcare system | Likitha S., Saravanan R. | International Journal of Internet Manufacturing and Services |
182 | Comprehensive review on land use/land cover change classification in remote sensing | Navin M.S., Agilandeeswari L. | Journal of Spectral Imaging |
183 | PMCAR: proactive mobility and congestion aware route prediction mechanism in IoMT for delay sensitive medical applications to ensure reliability in COVID-19 pandemic situation | Pandi S., Ch P.R. | International Journal of Pervasive Computing and Communications |
184 | IoT role in prevention of COVID-19 and health care workforces behavioural intention in India - an empirical examination | R V.A., J P., P J K., SS M., Rajendran S., Kumar K.R., S S., Jothikumar R. | International Journal of Pervasive Computing and Communications |
185 | Learning models for concept extraction from images with drug labels for a unified knowledge base utilizing NLP and IoT tasks | Rajendran S., Prabhu J. | International Journal of Information Technology and Web Engineering |
186 | Performance evaluation of transactions in blockchain based on workload using queueing model | Santhi K., Lawanya Shri M. | Journal of Green Engineering |
187 | Fast hash-based high secure hiding technique for digital data security | Shrimali S., Kumar A., John Singh K. | Electronic Government |
188 | Hybrid coherent encryption scheme for multimedia big data management using cryptographic encryption methods | Stephen Dass A., Prabhu J. | International Journal of Grid and Utility Computing |
189 | Defining theoretical foundations to unified metamodel for model reusability |
Thangaraj J., Ulaganathan S. | Recent Advances in Computer Science and Communications |
190 | Boosted-DEPICT: an effective maize disease categorization framework using deep clustering | Gokulnath B.V., Usha Devi G. | Neural Computing and Applications |
191 | R-CNN and wavelet feature extraction for hand gesture recognition with EMG signals | Shanmuganathan V., Yesudhas H.R., Khan M.S., Khari M., Gandomi A.H. | Neural Computing and Applications |
192 | A heuristic angular clustering framework for secured statistical data aggregation in sensor networks | Krishnasamy L., Dhanaraj R.K., Gopal D.G., Gadekallu T.R., Aboudaif M.K., Nasr E.A. | Sensors (Switzerland) |
193 | Analytical study of hybrid techniques for image encryption and decryption | Chowdhary C.L., Patel P.V., Kathrotia K.J., Attique M., Kumaresan P., Ijaz M.F. | Sensors (Switzerland) |
194 | Improved diver communication system by combining optical and electromagnetic trackers | Kataria A., Ghosh S., Karar V., Gupta T., Srinivasan K., Hu Y.-C. | Sensors (Switzerland) |
195 | Prevention of Hello Flood Attack in IoT using combination of Deep Learning with Improved Rider Optimization Algorithm | Aditya Sai Srinivas T., Manivannan S.S. | Computer Communications |
196 | Penetration testing framework for smart contract Blockchain | Bhardwaj A., Shah S.B.H., Shankar A., Alazab M., Kumar M., Gadekallu T.R. | Peer-to-Peer Networking and Applications |
197 | COVID-19 patient health prediction using boosted random forest algorithm | Iwendi C., Bashir A.K., Peshkar A., Sujatha R., Chatterjee J.M., Pasupuleti S., Mishra R., Pillai S., Jo O. | Frontiers in Public Health |
198 | A new framework for hyperspectral image classification using Gabor embedded patch based convolution neural network | Boggavarapu L.N.P.K., Manoharan P. | Infrared Physics and Technology |
199 | CNN based hyperspectral image classification using unsupervised band selection and structure-preserving spatial features | Vaddi R., Manoharan P. | Infrared Physics and Technology |
200 | A hybrid optimization approach for hyperspectral band selection based on wind driven optimization and modified cuckoo search optimization | Sawant S., Manoharan P. | Multimedia Tools and Applications |
201 | A hybrid CFS filter and RF-RFE wrapper-based feature extraction for enhanced agricultural crop yield prediction modeling |
Elavarasan D., Durai Raj Vincent P.M., Srinivasan K., Chang C.- Y. |
Agriculture (Switzerland) |
202 | Integrating encryption techniques for secure data storage in the cloud | Seth B., Dalal S., Jaglan V., Le D.-N., Mohan S., Srivastava G. |
Transactions on Emerging Telecommunications Technologies |
203 | Person identification with aerial imaginary using SegNet based semantic segmentation | Manickam R., Kumar Rajan S., Subramanian C., Xavi A., Eanoch G.J., Yesudhas H.R. | Earth Science Informatics |
204 | HEALTH of THINGS MODEL for CLASSIFYING HUMAN HEART SOUND SIGNALS USING CO- OCCURRENCE MATRIX and SPECTROGRAM | Arora V., Ng E.Y.-K., Leekha R.S., Verma K., Gupta T., Srinivasan K. | Journal of Mechanics in Medicine and Biology |
205 | A comparative study about workload prediction from one time forecast with cyclic forecasts using ARIMA model for cloud environment | Yuvha Secaran R., Sathiyamoorthy E. | EAI Endorsed Transactions on Energy Web |
206 | A modified cuckoo search algorithm based in this issue: Spectral preprocessing to compensate for packaging film / using neural nets to invert the prosail canopy model optimal band subset selection approach for hyperspectral image classification | Sawant S.S., Prabukumar M., Samiappan S. | Journal of Spectral Imaging |
207 | A novel method for deduplication of information storage managing in cloud computing | Santhi K., Lawanya Shri M., Gangadevi E., Meenatchi S., Navaneethan C. | International Journal of Psychosocial Rehabilitation |
208 | A secure and privacy-preserving approach to protect user data across cloud based online social networks | Khare N., Kumaran U. | International Journal of Grid and High Performance Computing |
209 | A survey of band selection techniques for hyperspectral image classification |
Sawant S.S., Prabukumar M. | Journal of Spectral Imaging |
210 | An adaptive service monitoring system in a cloud computing environment | Sathiyamoorthy E., Karthikeyan P. | International Journal of Grid and High Performance Computing |
211 | Exquisite Analysis of Popular Machine Learning–Based Phishing Detection Techniques for Cyber Systems | Das M., Saraswathi S., Panda R., Mishra A.K., Tripathy A.K. | Journal of Applied Security Research |
212 | Innovative shopping through mobile using Google’s arcore | Sathish Kumar P., Chandra Prakash S., Ajith Kumar K., Shri M.L., Santhi K., Mon F.A. | International Journal of Psychosocial Rehabilitation |
213 | Monitoring and analysis of the recovery rate of Covid-19 positive cases to prevent dangerous stage using IoT and sensors | Kumar K.R., Iyapparaja M., Niveditha V.R., Magesh S., Magesh G., Marappan S. | International Journal of Pervasive Computing and Communications |
214 | Secure virtual machine migration technique using blockchain | Lawanya Shri M., Santhi K., Gangadevi E., Meenatchi S., Navaneethan C. | International Journal of Psychosocial Rehabilitation |
215 | Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack | Anbu Malar M.B.B., J P. | International Journal of Pervasive Computing and Communications |
216 | Service-Oriented Broker for Effective Provisioning of Cloud Services – a Survey | Nagarajan R., Thirunavukarasu R. | International Journal of Computing and Digital Systems |
217 | A novel optimal feature selection technique for medical data classification using ANOVA based whale optimization | Moorthy U., Gandhi U.D. | Journal of Ambient Intelligence and Humanized Computing |
218 | Thermoeconomic investigation on advanced Kalina power generation system | Uma Maheswari G., Shankar Ganesh N., Srinivas T., Reddy B.V. |
Energy Reports |
219 | Optimization of routing-based clustering approaches in wireless sensor network: Review and open research issues |
Manuel A.J., Deverajan G.G., Patan R., Gandomi A.H. | Electronics (Switzerland) |
220 | Antlion re-sampling based deep neural network model for classification of imbalanced multimodal stroke dataset | Thippa Reddy G., Bhattacharya S., Maddikunta P.K.R., Hakak S., Khan W.Z., Bashir A.K., Jolfaei A., Tariq U. | Multimedia Tools and Applications |
221 | Compression based clustering technique for enhancing accuracy in web scale videos | Pillai K.G.R., Radhakrishnan K., Ramakrishnan D., Yesudhas H.R., Eanoch G.J., Kumar R., Long H.V., Son L.H. |
Multimedia Tools and Applications |
222 | A new 3D convolutional neural network (3D-CNN) framework for multimedia event detection |
Kanagaraj K., Priya G.G.L. | Signal, Image and Video Processing |
223 | An intelligent ensemble of long-short- term memory with genetic algorithm for network anomaly identification | Thaseen I.S., Chitturi A.K., Al-Turjman F., Shankar A., Ghalib M.R., Abhishek K. | Transactions on Emerging Telecommunications Technologies |
224 | Hybrid optimization routing management for autonomous underwater vehicle in the internet of underwater things | Robinson Y.H., Vimal S., Julie E.G., Khari M., Expósito-Izquierdo C., Martínez J. | Earth Science Informatics |
225 | High-performance implementation of a two-bit geohash coding technique for nearest neighbor search | Varalakshmi M., Kesarkar A.P., Lopez D. | Concurrency Computation |
226 | Auto encoder based dimensionality reduction and classification using convolutional neural networks for hyperspectral images | Ramamurthy M., Robinson Y.H., Vimal S., Suresh A. | Microprocessors and Microsystems |
227 | A novel approach for merging ontologies using formal concept analysis | Priya M., Kumar C.A. | International Journal of Cloud Computing |
228 | A queuing theory model for e-health cloud applications | Kumar M.S., Raja M.I. | International Journal of Internet Technology and Secured Transactions |
229 | An approach to feature selection in intrusion detection systems using machine learning algorithms | Kavitha G., Elango N.M. | International Journal of e-Collaboration |
230 | An early prevention method for node failure in wireless sensor networks | Krishnan S.S.R., Thangavelu A. | International Journal of Internet Technology and Secured Transactions |
231 | An effective prediction model for online course dropout rate | Narayanasamy S.K., Elçi A. | International Journal of Distance Education Technologies |
232 | Automated intelligent public lighting system | Senthilkumar S., Brindha K., Jena A. | International Journal of Internet Technology and Secured Transactions |
233 | Chronological and exponential-based Lion optimisation for optimal resource allocation in cloud | Devagnanam J., Elango N.M. | International Journal of Grid and Utility Computing |
234 | Coverless VoIP steganography using hash and hash | Deepikaa S., Saravanan R. | Cybernetics and Information Technologies |
235 | Data storage security in the cloud environment using the honey pot system |
Malar B.A., Prabhu J. | International Journal of e-Collaboration |
236 | Efficient clustering of water distribution network using affinity propagation | Somisetti V.S.S., Palla S.H. | Ingenierie des Systemes d'Information |
237 | EFS-LSTM (Ensemble-based feature selection with LSTM) classifier for intrusion detection system | Preethi D., Khare N. | International Journal of e-Collaboration |
238 | Enhancing the mobility support in internet of things | Sankar S., Srinivasan P. | International Journal of Fuzzy System Applications |
239 | Generative adversarial networks: a survey on applications and challenges | Pavan Kumar M.R., Jayagopal P. | International Journal of Multimedia Information Retrieval |
240 | Hybrid machine learning model for healthcare monitoring systems | Nallakaruppan M.K., Kumaran U.S. | International Journal of Internet Technology and Secured Transactions |
241 | Hybrid swarm intelligence for feature selection on IoT-based infrastructure | Nallakaruppan M.K., Kumaran U.S. | International Journal of Cloud Computing |
242 | Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor Network | Ashwini B. Abhale, Manivannan S.S. | Optical Memory and Neural Networks (Information Optics) |
243 | Survey of methodologies for quantifying software reliability | Viswanathan G., Prabhu J. | International Journal of Internet Technology and Secured Transactions |
244 | A method of landfill leachate management using internet of things for sustainable smart city development | Gopikumar S., Raja S., Robinson Y.H., Shanmuganathan V., Chang H., Rho S. | Sustainable Cities and Society |
245 | Deep learning and medical image processing for coronavirus (COVID-19) pandemic: A survey | Bhattacharya S., Reddy Maddikunta P.K., Pham Q.-V., Gadekallu T.R., Krishnan S S.R., Chowdhary C.L., Alazab M., Jalil Piran M. | Sustainable Cities and Society |
246 | Forecasting of the SARS-CoV-2 epidemic in India using SIR model, flatten curve and herd immunity | Venkatasen M., Mathivanan S.K., Jayagopal P., Mani P., Rajendran S., Subramaniam U.S., Ramalingam A.C., Rajasekaran V.A., Indirajithu A., Sorakaya Somanathan M. | Journal of Ambient Intelligence and Humanized Computing |
247 | A physical memristor based Muthuswamy–Chua–Ginoux system | Ginoux J.-M., Muthuswamy B., Meucci R., Euzzor S., Di Garbo A., Ganesan K. | Scientific Reports |
248 | Multiclass model for agriculture development using multivariate statistical method | Deepa N., Khan M.Z., Prabadevi B., Vincent D.R.P.M., Maddikunta P.K.R., Gadekallu T.R. |
IEEE Access |
249 | Pilot decontamination using asynchronous fractional pilot scheduling in massive MIMO systems |
Zahoor M.I., Dou Z., Shah S.B.H., Khan I.U., Ayub S., Gadekallu T.R. |
Sensors (Switzerland) |
250 | A secure data deduplication system for integrated cloud-edge networks | Shynu P.G., Nadesh R.K., Menon V.G., Venu P., Abbasi M., Khosravi M.R. | Journal of Cloud Computing |
251 | Predictive model for battery life in IoT networks | Maddikunta P.K.R., Srivastava G., Gadekallu | IET Intelligent Transport Systems |
252 | Security and privacy of UAV data using blockchain technology | Ch R., Srivastava G., Reddy Gadekallu T., Maddikunta P.K.R., Bhattacharya S. | Journal of Information Security and Applications |
253 | Detection of the triple riding and speed violation on two-wheelers using deep learning algorithms | Mallela N.C., Volety R., R S.P., R. K N. | Multimedia Tools and Applications |
254 | Biometric template security using DNA codec based transformation | Jacob I.J., Betty P., Darney P.E., Raja S., Robinson Y.H., Julie E.G. | Multimedia Tools and Applications |
255 | Medical information retrieval systems for e-Health care records using fuzzy based machine learning model | L A.J.P., Sengan S., G K K., J V., Gopal J., Velayutham P., V S. |
Microprocessors and Microsystems |
256 | Modelling Spatial Drivers for LU/LC Change Prediction Using Hybrid Machine Learning Methods in Javadi Hills, Tamil Nadu, India | MohanRajan S.N., Loganathan A. | Journal of the Indian Society of Remote Sensing |
257 | Social and QoS based trust model for secure clustering for wireless body area network | Ramaswamy S., Norman J. | International Journal of Electrical Engineering Education |
258 | Constrained multifacility location problems – A review | Santra A.K. | International Journal of Industrial Engineering : Theory Applications and Practice |
259 | Defensive modeling of fake news through online social networks | Shrivastava G., Kumar P., Ojha R.P., Srivastava P.K., Mohan S., Srivastava G. | IEEE Transactions on Computational Social Systems |
260 | Heart sound interference cancellation from lung sound using dynamic neighbourhood learning-particle swarm optimiser based optimal recursive least square algorithm | Mekala A.M., Chandrasekaran S. | International Journal of Biomedical Engineering and Technology |
261 | Energy-aware multipath routing protocol for internet of things using network coding techniques |
Sankar S., Srinivasan P., Ramasubbareddy S., Balamurugan B. |
International Journal of Grid and Utility Computing |
262 | Intelligent prediction approach for diabetic retinopathy using deep learning based convolutional neural networks algorithm by means of retina photographs | Thomas G.A.S., Robinson Y.H., Julie E.G., Shanmuganathan V., Rho S., Nam Y. | Computers, Materials and Continua |
263 | Machine Learning Based Computational Gene Selection Models: A Survey, Performance Evaluation, Open Issues, and Future Research Directions |
Mahendran N., Durai Raj Vincent P.M., Srinivasan K., Chang C.-Y. | Frontiers in Genetics |
264 | Reinforced XGBoost machine learning model for sustainable intelligent agrarian applications | Elavarasan D., Vincent D.R. | Journal of Intelligent and Fuzzy Systems |
265 | Context-aware resource management and alternative pricing model to improve enterprise cloud adoption | Balaji M., Ch A.K. | Concurrency Computation |
266 | Adaptive Decentralized Tracking Control for Nonlinear Large-Scale Systems | Chandran K., Zhang W., Murugesan R., Prasanna S., Baseera A., Pandiyan S. |
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems |
267 | Pattern Mining Approaches Used in Social Media Data | Chaki J., Dey N., Panigrahi B.K., Shi F., Fong S.J., Sherratt R.S. | International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems |
268 | Multi-modal prediction of breast cancer using particle swarm optimization with non-dominating sorting | Vijayalakshmi S., John A., Sunder R., Mohan S., Bhattacharya S., Kaluri R., Feng G., Tariq U. | International Journal of Distributed Sensor Networks |
269 | A unique data identification system for wireless sensor networks based on enhanced arithmetic coding | Subramanian B., Yesudhas H.R., Eanoch G.J. | Ingenierie des Systemes d'Information |
270 | Web application for traffic monitoring and guidance | Sujatha R., Teja A., Naveen P., Chatterjee J.M., Aarthy S.L., Hassanien A.E. | Journal of System and Management Sciences |
271 | A comparative study on delay-tolerant network routing protocols | Angulakshmi M., Deepa M., Vanitha M., Mangayarkarasi R., Nagarajan I. | International Journal of Intelligent Unmanned Systems |
272 | Computational approach for character identification and retrieval of grantha inscription | Dhivya S., Usha Devi G., Deepanjali S., Tom R.J., Kumar S. | International Journal of Advanced Trends in Computer Science and Engineering |
2019
Sl.No | TITLE OF PAPER | NAME OF THE AUTHOR/S | NAME OF JOURNAL | ISBN/ISSN NUMBER |
---|---|---|---|---|
1 | IoT based fall detection and ambient assisted system for the elderly | Chandra I., Sivakumar N., Gokulnath C.B., Parthasarathy P. | Cluster Computing | 1386-7857 |
2 | Periodicity Mining, "a Time Inference over High Utility Item set mining" - A study | Arunkumar M.S, Suresh P, Gunavathi C, Preethi S | International Journal of Recent Technology and Engineering | 2277-3878 |
3 | Real time sentiment analysis of e-commerce websites using machine learning algorithms | Sudheer K., Valarmathi B. | International Journal of Mechanical Engineering and Technology | 0976-6340 |
4 | Analyzing Gene Expression Data By Using Crfm-Covering Rough Set Fuzzy C-Medoids Clustering Approach | Journal of Web Engineering | 1540-9589 | |
5 | Comparative study on dimensionality reduction for disease diagnosis using fuzzy classifier | R.Sujatha , E.P.Ephzibah, Sree Dharinya , G. Uma Maheswari, V.Mareeswari, Vamsi Pamidimarri | International Journal of Engineering & Technology | 2227-524X |
6 | ANALYSING EFFECTIVE METHODOLOGIES USED FOR TEXT CLUSTERING USING WEIGHTED ALGORITHMS | S.Sree Dharinya | ARPN Journal of Engineering and Applied Sciences | 1819-6608 |
7 | Analysis and comparison of routing attacks and preventive measures in IoT environment | Aditya Sai Srinivas T., Manivannan S.S. | Journal of Advanced Research in Dynamical and Control Systems | 1943-023X |
8 | Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm | Srinivas Koppu,Madhu Viswanatham Vankadara | Evolutionary Intelligence | 1864-5909 |
9 | High Utility Infrequent Itemset Mining Using a Customized Ant Colony Algorithm | M.S. Arunkumar, P.Suresh, C.Gunavathi | International Journal of Parallel Programming | 0885-7458 |
10 | Integration of fuzzy DEMATEL and FMCDM approach for evaluating knowledge transfer effectiveness with reference to GSD project outcome | Gopal J., Sangaiah A.K., Basu A., Gao X.Z. | International Journal of Machine Learning and Cybernetics | 1868-8071 |
11 | Adaptive mechanism for distributed query processing and data loading using the RDF data in the cloud | Ranichandra Dharmaraj C., Tripathy B. | International Journal of Communication Systems | 1074-5351 |
12 | Investigation on different clustering techniques in wireless sensor networks | Meenatchi S., Prabu S. | International Journal of Advanced Intelligence Paradigms | 1755-0386 |
13 | Analysis of performance measures to improve the quality of service in cloud based e-government web portal | Priya V., Subha S., Balamurugan B. | Electronic Government | 1740-7494 |
14 | an overview of web socket: the future real time communication | Dr.M.P.vani bhumji | International journal of engineering and technology | 2395-0056 |
15 | Adaptive cruise control and cooperative cruise control in real life traffic situation | Ravikumar C.V., Venugopal P., Jagannadha Naidu K., Satheesh Kumar S., Koppu S. | International Journal of Mechanical Engineering and Technology | 0976-6340 |
16 | Encrypted image-based data hiding technique using elliptic curve ElGamal cryptography | Jayanthi R., John Singh K. | International Journal of Reasoning-based Intelligent Systems | 1755-0556 |
17 | A Fuzzy Linguistic Approach-Based Non-malicious Noise Detection Algorithm for Recommendation System | Sharon Moses J., Dhinesh Babu L.D. | International Journal of Fuzzy Systems | 1562-2479 |
18 | A case study on partial homomorphic encryption: Breast cancer diagnosis | Sushmetha N., Vairamuthu S., Selvarani B. | International Journal of Pure and Applied Mathematics | 1311-8080 |
19 | Optimization of QoS parameters using scheduling techniques in heterogeneous network | Chandra I., Prabha K.H., Sivakumar N. | Personal and Ubiquitous Computing | 1617-4909 |
20 | DTCF: Deadline task consolidation first for energy minimisation in cloud data centres | Sanjeevi P., Viswanathan P. | International Journal of Networking and Virtual Organisations | 1470-9503 |
21 | A fuzzy-based decision-making broker for effective identification and selection of cloud infrastructure services | Nagarajan R., Thirunavukarasu R. | Soft Computing | 1432-7643 |
22 | A case study on commending user in social media based on user information and rating of product in interface forums | Deepa M., Santhi K., Lawnyashri M., Malar M.B.B.A., Priya G., Mon F.A. | International Journal of Civil Engineering and Technology | 0976-6308 |
23 | Density Based Traffic Management Using IoT | M Pounambal K Lalitha | International Journal of Pure and Applied Mathematics | 1314-3395 |
24 | Coagulation attacks over networked UAVs: concept, challenges, and research aspects | Vishal Sharma., Dushantha Nalin K. Jayakody., Kathiravan Srinivasan., Ravinder Kumar | International Journal of Engineering & Technology | 2227-524X |
25 | Energy-efficient border intrusion detection using pipeline monitoring system | Jeevitha K., Manivannan S.S. | Journal of Advanced Research in Dynamical and Control Systems | 1943-023X |
26 | Optimized approach for data sharing in WRN using NS2 simulation | Shalini R., Manivannan S.S. | Journal of Advanced Research in Dynamical and Control Systems | 1943-023X |
27 | Dimensionality reduced local directional number pattern for face recognition | Srinivasa perumal ramalingam., Chandra mouli paturu venkata subbu sita rama | Journal of Ambient Intelligence and Humanized Computing | 1868-5137 |
28 | Hybrid rough fuzzy soft classifier based multi-class classification model for agriculture crop selection | Deepa N., Ganesan K. | Soft Computing | 1432-7643 |
29 | Machine learning based approach for pothole detection | Karmel A., Adhithiyan M., Senthil Kumar P. | International Journal of Civil Engineering and Technology | 0976-6308 |
30 | Heart disease classification system using optimised fuzzy rule based algorithm | Reddy G.T., Khare N. | International Journal of Biomedical Engineering and Technology | 1752-6418 |
31 | Optimized feature extraction for precise sign gesture recognition using Self-Improved Genetic Algorithm | Kaluri R., Reddy C.H.P. | International Journal of Engineering and Technology Innovation | 2223-5329 |
32 | Concept Lattice Simplification in Formal Concept Analysis Using Attribute Clustering | K. S., Ch. A.K. | Journal of Ambient Intelligence and Humanized Computing | 1868-5137 |
33 | Stock Prediction Using Machine-Learning Algorithms | Jayavel, Senthil Rathore, Arpit Sadhasivam, Jayakumar | International Journal of Engineering and Advanced Technology | 22498958 |
34 | Agent Based Hybrid Routing Protocol for Vehicular Ad Hoc Networks | Dr. P.S.Nithyadharshini1 , Dr. SanthiyaKumari2 and * Dr. M.Pounambal3 | International Journal of Pure and Applied Mathematics | 1314-3395 |
35 | An empirical study on peer-to-peer sharing of resources in mobile cloud environment | Nadesh R.K., Aramudhan M. | International Journal of Electrical and Computer Engineering | 2088-8708 |
36 | A survey of block chain technology for digitization in india | Manikandan N., Vijayakumar K., Anusha K. | International Journal of Civil Engineering and Technology | 0976-6308 |
37 | Software Effort Estimation Techniques | E J Sai Pavan Chowdary R Charanya | International Journal for Research in Applied Science & Engineering Technology (IJRASET) | 23219653 |
38 | TSCBA-A Mitigation System for ARP Cache Poisoning Attacks | Prabadevi, B; Jeyanthi, N; | Cybernetics and Information Technologies | 1311-9702 |
39 | Analytical Model for Sybil Attack Phases in Internet of Things | Mishra A.K., Tripathy A.K., Puthal D., Yang L.T. | IEEE Internet of Things Journal | 2327-4662 |
40 | A walk-through: complete survey on blood pressure monitoring devices and applications | Jeyanthi, N; Thandeeswaran, R; Gokulnath, BV; | Biomedical Research | 0970-938X |
41 | Haloop approach for concept generation in formal concept analysis | Chunduri R.K., Cherukuri A.K. | Journal of Information and Knowledge Management | 0219-6492 |
42 | A cloud broker framework for infrastructure service discovery using semantic network | Nagarajan R., Thirunavukarasu R., Shanmugam S. | International Journal of Intelligent Engineering and Systems | 2185-310X |
43 | A framework to mitigate ARP sniffing attacks by cache poisoning | Prabadevi B., Jeyanthi N. | International Journal of Advanced Intelligence Paradigms | 1755-0386 |
44 | Recommendation systems: A beginner's perspective | Selva Rani B., Ananda Kumar S. | International Journal of Pure and Applied Mathematics | 1311-8080 |
45 | Region-specific multi-attribute white mass estimation-based mammogram classification | Padmavathy T.V., Vimalkumar M.N., Sivakumar N. | Personal and Ubiquitous Computing | 1617-4909 |
46 | Intrusion detection model using feature extraction and LPBoost technique | Thaseen I.S., Kumar Ch.A. | International Journal of Internet Technology and Secured Transactions | 1748-569X |
47 | Detection of Intrusion by Stochastic Gradient Descent and K-means Clustering | Suraj Saha., Riya Shaji., Abhijeet Giri., John Singh. K | Research article | - |
48 | A framework for prediction using rough set and real coded genetic algorithm | Rathi R., Acharjya D.P. | Arabian journal of science and engineering | 2193-567X |
49 | Decision support systems - An overview | Rahamathunnisa U., Chellappa B. | International Journal of Mechanical Engineering and Technology | 0976-6340 |
50 | An automated detection of human disease using supervised learning method | Manivannan S.S., Lakshmi S.K. | Journal of Advanced Research in Dynamical and Control Systems | 1943-023X |
51 | TRAM-based VM handover with dynamic scheduling for improved QoS of cloud environment | Nadesh R.K., Aramudhan M. | International Journal of Internet Technology and Secured Transactions | 1748-569X |
52 | A Fuzzy-Based Intelligent Cloud Broker with MapReduce Framework to Evaluate the Trust Level of Cloud Services Using Customer Feedback | Nagarajan R., Thirunavukarasu R., Shanmugam S. | International Journal of Fuzzy Systems | 1562-2479 |
53 | Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing | Shynu P.G., Singh K.J. | International Journal of Embedded Systems | 1741-1068 |
54 | Energy-Aware task scheduling using hybrid Firefly-BAT (FFABAT) in Big data | Senthilkumar M. | Cybernetics and Information Technologies | 1311-9702 |
55 | Intelligent intrusion detection system using temporal analysis and type-2 fuzzy neural classification | Rama Prabha K.P., Jeyanthi N. | International Journal of Internet Technology and Secured Transactions | 1748-569X |
56 | Arranging job flow on hadoop | Navaneethan C., Meenatchi S., Iyapparaja M., Thanapal P. | Journal of Advanced Research in Dynamical and Control Systems | 1943-023X |
57 | Maching language prediction algorithm for crypto currency | Prasanna M., Iyapparaja M., Thanapal P., Navaneethan C., Meenatchi S. | Journal of Advanced Research in Dynamical and Control Systems | 1943-023X |
58 | The sequence way of performance analysis for device to device communication | Meenatchi S., Navaneethan C., Iyapparaja M., Thanapal P., Suganya P. | Journal of Advanced Research in Dynamical and Control Systems | 1943-023X |
59 | Case study on big data inspection in pharmaceutical services | Iyapparaja M., Prasanna M., Thanapal P., Meenatchi S., Navaneethan C. | Journal of Advanced Research in Dynamical and Control Systems | 1943-023X |
60 | BMAQR: Balanced multi attribute QoS aware replication in HDFS | Kumar P.J., Ilango P. | International Journal of Internet Technology and Secured Transactions | 1748-569X |
61 | Angle Based Energy and Power Efficient Node Detection Routing Protocol for MANET | Jayalakshmi Periyasamy., R. Saravanan. | Recent Patents on Computer Science | 1874-4796 |
62 | Vehicular Cloud for Smart Driving Using Internet of Things | Vijayarangam S., Megalai J., Krishnan S., Nagarajan S., Devi M.R., Lokesh S. | Journal of Medical Systems | 0148-5598 |
63 | Visualizing trade-off between performance and energy in parallel computations | Maheswari G.U., Subha S. | Journal of Computational and Theoretical Nanoscience | 1546-1955 |
64 | Walsh Hadamard kernel-based texture feature for multimodal MRI brain tumour segmentation | Angulakshmi M., Lakshmi Priya G.G. | International Journal of Imaging Systems and Technology | 0899-9457 |
65 | Multi-Layer Cluster Based Energy Aware Routing Protocol for Internet of Things | Sankar, S.; Srinivasan, P. | Cybernetics and Information Technologies | 1311-9702 |
66 | An intelligent neuro-genetic framework for effective intrusion detection | Rama Prabha K.P., Jeyanthi N. | International Journal of Reasoning-based Intelligent Systems | 1755-0556 |
67 | An improved carry save adder design | S Subha | International Journal of Advanced Science and Research | 2455-4227 |
68 | A novel recommender system based on FFT with machine learning for predicting and identifying heart diseases | Narayan S., Sathiyamoorthy E. | Neural Computing and Applications | 0941-0643 |
69 | Calorie Measurement Predicting the Nutrient Content of Food using image Analysis | Thamarai, Nivetha, P.M. Durai Raj Vincent, S.S. Manivannan | Research Journal of Pharmacy and Technology | 0974-3618 |
70 | Internet of Things Based Digital Lock System | S Sankar., P Srinivasan | Journal of Computational and Theoretical Nanoscience | 1546-1955 |
71 | The significance of holographic data storage in cost effective and faster data transfer rates | Bhavani S., Chhabra S. | International Journal of Civil Engineering and Technology | 0976-6308 |
72 | Region-based colour image spatial fusion steganographic system | PV Krishna., P Viswanathan | International Journal of Multimedia Intelligence and Security | 2042-3462 |
73 | Link stable routing with minimal delay nodes for MANETs | P Jayalakshmi., R Saravanan | International Journal of Social and Humanistic Computing | 1752-6124 |
74 | Providing privacy and dimensional search on longitudinal data using safe computing: A case study | Deepa M., Santhi K., Lawnya Shri M., Benjula Anbu Malar M.B., Priya G., Mon F.A. | International Journal of Civil Engineering and Technology | 0976-6308 |
75 | Fuzzy Logic Based Energy Aware Routing Protocol for Internet of Things | S.Sankar., P.Srinivasan | International Journal Intelligent Systems and Applications | 2074-904X |
76 | A reference model for testing internet of things based applications | Jacob P.M., Mani P. | Journal of Engineering Science and Technology | 1823-4690 |
77 | A review on graph-based semi-supervised learning methods for hyperspectral image classification | Sawant S.S., Prabukumar M. | Egyptian Journal of Remote Sensing and Space Science | 1110-9823 |
78 | Quantum aspects of high dimensional formal representation of conceptual spaces | M S Ishwarya., Aswani Kumar Cherukuri | Artificial Intelligence | 1694-0814 |
79 | Ant colony optimization algorithm with Internet of Vehicles for intelligent traffic control system | Kumar P.M., Devi G U., Manogaran G., Sundarasekar R., Chilamkurti N., Varatharajan R. | Computer Networks | 1389-1286 |
80 | Software architecture pattern selection model for internet of things based systems | Jacob P.M., Mani P. | IET Software | 1751-8806 |
81 | Secure wireless communication and surveillance system | Swarnalatha P., Anandakumar S., Vairamuthu S., Priya S.R.M., Sathyaraj R. | International Journal of Civil Engineering and Technology | 0976-6308 |
82 | Self service software | Vijay Anand R., Prabhu J., Jayalakshmi P. | Journal of Advanced Research in Dynamical and Control Systems | 1943-023X |
83 | Semantic filtering and event extraction of twitter streams through RDF and SPARQL | Kumar N.S., Dinakaran M. | International Journal of Computer Information Systems and Industrial Management Applications | 2150-7988 |
84 | Smart green resource conservation approach for smart IoT cloud | Shanmugam G.S., Shantharajah S.P., Sriman Narayana Iyengar N.C. | Journal of Computational and Theoretical Nanoscience | 1546-1955 |
85 | Smart home-control and monitoring system for power and security management | Gami M., Brindha K., Sudha S., Thandeeswaran R., Priya M. | International Journal of Civil Engineering and Technology | 0976-6308 |
86 | Secure big data storage using training dataset filtering-K nearest neighbour classification with elliptic curve cryptography | Ezhilarsan E., Dinakaran M. | Journal of Computational and Theoretical Nanoscience | 1546-1955 |
87 | Scalable formal concept analysis algorithms for large datasets using Spark | Chunduri R.K., Cherukuri A.K. | Journal of Ambient Intelligence and Humanized Computing | 1868-5137 |
88 | An improved tumour identification with Gabor Wavelet segmentation | Chowdhary C.L., Das T.K., Gurani V., Ranjan A. | Research Journal of Pharmacy and Technology | 0974-3618 |
89 | An efficient implementation of mobile Raspberry Pi Hadoop clusters for Robust and Augmented computing performance | Srinivasan K., Chang C.-Y., Huang C.-H., Chang M.-H., Sharma A., Ankur A. | Journal of Information Processing Systems | 1976-913X |
90 | Three-dimensional discrete cosine transform-based feature extraction for hyperspectral image classification | Prabukumar M., Sawant S., Samiappan S., Agilandeeswari L. | Journal of Applied Remote Sensing | 1931-3195 |
91 | Spam review detection on e-commerce sites | Nandhini G., Muthamilselvan T., Alagiri I., Thanapal P. | International Journal of Civil Engineering and Technology | 0976-6308 |
92 | Survey on data analytics techniques in healthcare using IOT platform | Babu G.C., Shantharajah S.P. | International Journal of Reasoning-based Intelligent Systems | 1755-0556 |
93 | Role based access control design using three-way formal concept analysis | Subramanian C.M., Cherukuri A.K., Chelliah C. | International Journal of Machine Learning and Cybernetics | 1868-8071 |
94 | Removing leaf petioles and auto locating apex-base points using straight line interpolation and bisection | Visu P., Sivakumar N., Kumaresan P., Yokesh Babu S., Ramesh P.S. | Multimedia Tools and Applications | 1380-7501 |
95 | Query expansion using named entity disambiguation for a question-answering system | Kandasamy S., Cherukuri A.K. | Concurrency Computation | 1532-0626 |
96 | Public key cryptography using sphere and spheroid | John Singh K., Gagneja K. | International Journal of Communication Networks and Distributed Systems | 1754-3916 |
97 | A new Quantum Tunneling Particle Swarm Optimization algorithm for training feedforward neural networks | Geraldine Bessie Amali D., Dinakaran M. | International Journal of Intelligent Systems and Applications | 2074-904X |
98 | Providing cyber security using machine learning for social networks | Sheba Pari N., Chandrababu M., Senthil Kumar K. | Indian Journal of Public Health Research and Development | 0976-0245 |
99 | Smart home observing and control security system: A case study | Santhi K., Deepa M., Shri M.L., Malar M.B.B.A., Priya G., Mon F.A. | International Journal of Civil Engineering and Technology | 0976-6308 |
100 | Evaluating the performance of supervised classification models: Decision tree and Naïve Bayes Using KNIME | Basha S.M., Rajput D.S., Poluru R.K., Bharath Bhushan S., Basha S.A.K. | International Journal of Engineering and Technology(UAE) | 2227-524X |
101 | Lattice based Conceptual Spaces to Explore Cognitive Functionalities for Prosthetic Arm | MS Ishwarya., Aswani Kumar Cherukuri | Artificial Intelligence | 1694-0814 |
102 | On the positioning likelihood of UAVs in 5G networks | Sharma V., Jayakody D.N.K., Srinivasan K. | Physical Communication | 1874-4907 |
103 | Curvelet transform based feature extraction and selection for multimedia event classification | Kanagaraj K., Priya G.G.L. | Journal of King Saud University - Computer and Information Sciences | 1319-1578 |
104 | Online social networking services and spam detection approaches in opinion mining – A review | Rani M.S., Sumathy S. | International Journal of Web Based Communities | 1477-8394 |
105 | Design and implementation of energy efficient reconfigurable networks (WORN-DEAR) for BAN in IOT environment (BIOT) | Kumaresan P., Prabukumar M. | International Journal of Reasoning-based Intelligent Systems | 1755-0556 |
106 | Diagnosing sudden and gradual drifts in business process | Thanapal P., Meenatchi S., Navaneethan C., Iyapparaja M., Prasanna M. | Journal of Advanced Research in Dynamical and Control Systems | 1943-023X |
107 | Public key encryption for SAFE transfer of one time password | Thirumalai C., Budugutta S. | International Journal of Pure and Applied Mathematics | 1311-8080 |
108 | Cluster-based EA-PATM protocol for energy consumption in hierarchical WSNs | Meenatchi S., Prabu S. | International Journal of Reasoning-based Intelligent Systems | 1755-0556 |
109 | Online compilers for android using mobile cloud computing | Vijayan R., Mareeswari V., Gunesekaran G., Balasubramanian V., Senthil Kumar R. | International Journal of Civil Engineering and Technology | 0976-6308 |
110 | Parsing based sarcasm detection from literal language in tweets | Basha S.M., Rajput D.S. | Recent Patents on Computer Science | 2213-2759 |
111 | Predicting dispersion of radionuclides through parallel approach | Uma Maheswari, G., Subha, S | ProProgress in Industrial Ecology, An International Journal | 1476-8917 |
112 | Future of Storage Technologies | Bhavani S, Charanya R, Mahadevan R, Malathy E, Priya M | International Journal of Civil Engineering and Technology (IJCIET) | 0976-6308 |
113 | Octagonal picture languages | Govindaraj R., Mahendran A. | International Journal of Reasoning-based Intelligent Systems | 1755-0556 |
114 | Nano drive: Privacy preserving decentralized storage | Seetha R., Malisetty N. | International Journal of Mechanical Engineering and Technology | 0976-6340 |
115 | MAFONN-EP: A Minimal Angular Feature Oriented Neural Network based Emotion Prediction system in image processing | Krithika L.B., Lakshmi Priya G.G. | Journal of King Saud University - Computer and Information Sciences | 1319-1578 |
116 | IoT based smart garbage collector for smart cities | Rajaprabha M.N., Jayalakshmi P., Anand R.V., Asha N. | International Journal of Civil Engineering and Technology | 0976-6308 |
117 | A survey: energy-efficient sensor and VM selection approaches in green computing for X-IoT applications | Mekala M.S., Viswanathan P. | International Journal of Computers and Applications | 1206-212X |
118 | Forecasting yield by integrating agrarian factors and machine learning models A survey | Dhivya Elavarasan, Durai Raj Vincent, Vishal Sharma, Albert Y. Zomaya, Kathiravan Srinivasan | Computers and Electronics in Agriculture | 0168-1699 |
119 | Proficient information method for inconsistency detection in multiple data sources | Bazeer Ahamed B., Ramkumar T. | International Journal of Artificial Intelligence | 0974-0635 |
120 | Properties of multigranular rough sets on fuzzy approximation spaces and their application to rainfall prediction | Tripathy B.K., Bhambhani U. | International Journal of Intelligent Systems and Applications | 2074-904X |
121 | Machine Learning and Deep Learning Methods in Heart Disease (HD) Research | Kusuma S, Divya Udayan J | International Journal of Pure and Applied Mathematics | 0972-9828 |
122 | Integrated Intrusion Detection Model Using Chi-Square Feature Selection and Ensemble of Classifiers | I. Sumaiya Thaseen., Ch. Aswani Kumar., Amir Ahmad | Arabian Journal for Science and Engineering | 1319-8025 |
123 | A scaled-down neural conversational model for chatbots | Mathur S., Lopez D. | Concurrency Computation | 1532-0626 |
124 | Image anonymization using clustering with pixelization | Ria. Elin Thomas., Sharmila K. Banu., B. K. Tripathy | International Journal of Engineering & Technology | 2227-524X |
125 | Internet of Things based Ambient assisted living for Elderly People Health Monitoring | S. Sankar., P. Srinivasan., R. Saravanakumar | Research Journal of Pharmacy and Technology | 0974-3618 |
126 | Energy and Load Aware Routing Protocol for Internet of Things | S Sankar., P Srinivasan | International Journal of Advances in Applied Sciences | 2252-8814 |
127 | A study of handwritten characters recognition through neural networks using data mining approaches | Bothra G., Bhattacharya S., Deepa P. | International Journal of Mechanical Engineering and Technology | 0976-6340 |
128 | Comparison of multi-criteria recommendation system for improving accurate prediction | Sandeepkumar M., Prabhu J. | Journal of Advanced Research in Dynamical and Control Systems | 1943-023X |
129 | A survey, design and analysis of IoT security and QoS challenges | Kesavan M., Prabhu J. | International Journal of Information System Modeling and Design | 1947-8186 |
130 | A review on various sniffing attacks and its mitigation techniques | Prabadevi B., Jeyanthi N. | Indonesian Journal of Electrical Engineering and Computer Science | 2502-4752 |
131 | Predicting user behaviour on E-Commerce site using Ann | Srinivas A.S., Ramasubbareddy S., Manivannan S.S., Govinda K. | International Journal of Engineering and Technology(UAE) | 2227-524X |
132 | Non-Intrusive Transaction Aware Filtering During Enterprise Application Modernization | Ravikumar Ramadoss., N. M. Elango., Satheesh Abimannan., Ching-Hsien Hsu | Journal of Supercomputing | 0920-8542 |
133 | Privacy-preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing | P.G. Shynu., K. John Singh | International Journal of Embedded Systems | 1741-1068 |
134 | Band clustering using expectation-maximization algorithm and weighted average fusion-based feature extraction for hyperspectral image classification | Prabukumar M., Shrutika S. | Journal of Applied Remote Sensing | 1931-3195 |
135 | Classification of breast abnormality using decision tree based on GLCM features in mammograms | Kamalakannan J., Babu M.R. | International Journal of Computer Aided Engineering and Technology | 1757-2657 |
136 | An amoeboid approach for identifying optimal citation flow in big scholarly data network | Nivash J.P., Dhinesh Babu L.D. | International Journal of Communication Systems | 1074-5351 |
137 | PFB+- tree for big data memory management system | Santhi K., Chellatamilan T., Valarmathi B. | Indian Journal of Public Health Research and Development | 0976-0245 |
138 | Performing item-based recommendation for mining multi-source big data by considering various weighting parameters | Thillainayagam V., Kunjithapatham S., Thirunavukarasu R. | International Journal of Engineering and Technology(UAE) | 2227-524X |
139 | A supervised aspect level sentiment model to predict overall sentiment on tweeter documents | Basha S.M., Rajput D.S. | International Journal of Metadata, Semantics and Ontologies | 1744-2621 |
140 | A Diabetes Case Management Study in a Rural Setting in India | Radhakrishnan, S.Email Author, Rajakumar, C.A., Radhakrishnan, B. | Professional Case Management | 19328087 |
141 | Predicting justice delivery time using Machine learning | Megha Kanwar ,Prabhavathy.P | International Journal of Pure and Applied Mathematics | 1314-3395 |
142 | A Cloud Based Natural Hazard Detection and Warning System | Nishanth A, Vanmathi C | International Journal of Research and Scientific Innovation (IJRSI) | 2321-2705 |
143 | Smart Home Automation in Air Conditioning using Data Mining and Image Processing | Ishaan Arora, Vanmathi C, | International Journal of Engineering Trends and Technology (IJETT) | 2231-5381 |
144 | Detecting Streaming of Twitter Spam Using Hybrid Method | Senthil Murugan N., Usha Devi G. | Wireless Personal Communications | 0929-6212 |
145 | A complete survey on blood pressure monitoring devices and applications | Thandeeswaran R Jeyanthi N, Gokulnath BV | Biomedical Research | 0970-938X |
146 | Advanced Vehicle Safety and Monitoring System, | Akhil Sharma, Vanmathi C | International Journal of Engineering Science Invention Research & Development | 2349-6185 |
147 | Transportation Service System for Grocery Kart using Genetic Algorithm | Deepank Kartikey, Vanmathi C | International Journal of Engineering Trends and Technology (IJETT) | 2231-5381 |
148 | Weighing Type Rain Gauge with Weather Monitoring System | Rajkumar R, Vanmathi C, | International Journal of Research and Scientific Innovation (IJRSI) | 2321-2705 |
149 | Design and development of exponential lion algorithm for optimal allocation of cluster resources in cloud | Devagnanam J., Elango N.M. | Cluster Computing | 1386-7857 |
150 | ENCRYPTION AND DECRYPTION OF GRAY SCALE IMAGES USING SCALABLE CODING MECHANISM | K.UMA | International Journal of Mechanical Engineering and Technology (IJMET) | 0976-6340 |
151 | Comparative study on dimensionality reduction for disease diagnosis using fuzzy classifier | Sujatha, R., Ephzibah, E.P., Dharinya, S., Uma Maheswari, G., Mareeswari, V., Pamidimarri, V. | International Journal of Engineering and Technology(UAE) | 2227524X |
152 | Analyzing Gene Expression Data By Using Crfm-Covering Rough Set Fuzzy C-Medoids Clustering Approach | Avulapalli Jayaram Reddy, B.K Tripathy | Journal of Web Engineering | 1540-9589 |
153 | WhaleRank: An optimisation based ranking approach for software requirements prioritisation | Anand R.V., Dinakaran M. | International Journal of Environment and Waste Management | 1478-9876 |
154 | Predictive mathematical model for solving multi-criteria decision-making problems | Deepa N., Ganesan K., Sethuramasamyraja B. | Neural Computing and Applications | 0941-0643 |
155 | Performance analysis of pre-cancerous mammographic image enhancement feature using non-subsampled shearlet transform | Padmavathy T.V., Vimalkumar M.N., Nagarajan S., Babu G.C., Parthasarathy P. | Multimedia Tools and Applications | 1380-7501 |
156 | In-Mapper combiner based MapReduce algorithm for processing of big climate data | Manogaran G., Lopez D., Chilamkurti N. | Future Generation Computer Systems | 0167-739X |
157 | An Interval valued fuzzy soft set based optimization algorithm for high yielding seed selection | Sooraj T.R., Tripathy B.K. | International Journal of Fuzzy System Applications | 2156-177X |
158 | Design of I-shaped dual C-slotted rectangular microstrip patch antenna (I-DCSRMPA) for breast cancer tumor detection | Padmavathy T.V., Venkatesh P., Bhargava D., Sivakumar N. | Cluster Computing | 1386-7857 |
159 | IOT BASED SMART GARBAGE COLLECTOR FOR SMART CITIES | M N Rajaprabha, P Jayalakshmi, R Vijay Anand and N Asha | International Journal of Civil Engineering and Technology (IJCIET) | 0976-6308 |
160 | Energy saving offloading scheme for mobile cloud computing using CloudSim | Thanapal P., Durai M.A.S. | International Journal of Advanced Intelligence Paradigms | 1755-0386 |
161 | Walsh Hadamard kernel‐based texture feature for multimodal MRI brain tumour segmentation | M. Angulakshmi, G. G Lakshmi Priya | International Journal of Imaging Systems and Technology | 1098-1098 |
162 | Brain tumour segmentation from MRI using superpixels based spectral clustering | Angulakshmi, M., Lakshmi Priya, G.G | Journal of King Saud University - Computer and Information Sciences. Elsevier | 1319-1578 |
163 | An intelligent decision support system to prevent and control of dengue | Lopez D., Manogaran G., Varatharajan R., Abbas K.M. | Journal of Ambient Intelligence and Humanized Computing | 1868-5137 |
164 | Experimenting with runtime and energy tradeoffs in high-performance computing | G Uma Maheswari, S Subha | , Progress in Industrial Ecology12(1-2), pp. 154-163 | 1476-8917 |
165 | Resourceful Investigte Encryption Method using Data Hunt in Mobile Cloud Service | A. S. Syed Navaz , Asha. N , Vanmathi Chandrasekaran , J. Jayashree | ARPN Journal of Engineering and Applied Sciences | 1819-6608 |
166 | Embarrassingly parallel GPU based matrix inversion algorithm for big climate data assimilation | Varalakshmi M., Kesarkar A.P., Lopez D. | International Journal of Grid and High Performance Computing | 1938-0259 |
167 | A Review on Utilizing Queuing Models for Improving Performance in Cloud | M. Sathish Kumar, M. Iyappa Raja | Jour of Advance Research in Dynamical & Control Systems | 1943-023X |
168 | RFID BASED AUTOMATED GATE SECURITY SYSTEM | Asha. N, A. S. Syed Navaz, J. Jayashree and J. Vijayashree | ARPN Journal of Engineering and Applied Sciences | 1819-6608 |
169 | Detecting spams in social networks using ML algorithms �€“ a review | Murugan N.S., Devi G.U. | International Journal of Environment and Waste Management | 1478-9876 |
170 | Face Recognition and Detection with New Image Enhancement Techniques | A.S.Syed Navaz and Asha. N | Jour of Adv Research in Dynamical & Control Systems | 1943-023X |
171 | Applying Knowledge Based Heuristic Method for Efficient Test Automation | Asha. N and Prasanna Mani | Jour of Adv Research in Dynamical & Control Systems | 1943-023X |
172 | Knowledge-based Acceptance Test driven agile Approach for Quality Software Development | Asha. N and Prasanna Mani | International Journal of Recent Technology and Engineering (IJRTE) | 2277-3878 |
173 | Efficient routing based on core relay intermediate nodes in MANET | Jayalakshmi P., Saravanan R. | Electronic Government | 1740-7494 |
174 | Earthquake analysis: Visualizing seismic data with python | Tulsyan S., Bahl B., Kaya S., Reddy G.T. | Lecture Notes in Computational Vision and Biomechanics | 2212-9391 |
175 | A novel approach to perform analysis and prediction on breast cancer dataset using R | Basha S.M., Rajput D.S., Iyengar N.C.S.N., Caytiles R.D. | International Journal of Grid and Distributed Computing | 2005-4262 |
176 | WIRELESS HEALTH ACQUISITION SYSTEM USING INTERNET OF THINGS | Dr.K.Uma | International Journal of Mechanical Engineering and Technology (IJMET) | 0976-6340 |
177 | RESOURCEFUL INVESTIGATE ENCRYPTION METHOD USING DATA HUNT IN MOBILE CLOUD SERVICE | A. S. Syed Navaz, Asha. N, Vanmathi Chandrasekaran and J. Jayashree | ARPN Journal of Engineering and Applied Sciences | 1819-6608 |
178 | Group Decision Making through Interval Valued Intuitionistic Fuzzy Soft Sets | BK Tripathy., TR Sooraj., RK Mohanty., A Panigraghi | International Journal of Fuzzy System Applications | 2156-177X |
179 | Implementation of moving object detection and categorization from hevc compressed surveillance video | Kruthi S., Kamalakannan J. | International Journal of Mechanical Engineering and Technology | 0976-6340 |
180 | BGFS: Design and development of brain genetic fuzzy system for data classification | Chandrasekar Ravi., Neelu Khare | Journal of Intelligent Systems | 0334-1860 |
181 | Neighborhood Rough-Sets-Based Spatial Data Analytics | Sharmila Banu K.., B. K. Tripathy | Encyclopedia of Information Science and Technology, Fourth Edition | - |
182 | A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks | Rama Prabha K.P., Jeyanthi N. | Wireless Personal Communications | 0929-6212 |
183 | Tracking eye center location based on inner product detector | MythiliBoopathi , Nivetha R | Journal of International Pharmaceutical Research | 1674-0440 |
184 | Smart City Based on Cloud Computing and IoT | Mythili BoopathiS. Pati | International Journal of Civil Engineering and Technology | 0976-6308 |
185 | Comparison of NoSQL Database and Traditional Database-An emphatic analysis | M. Sandeep Kumar., Prabhu. J | INTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION | 2549-9610 |
186 | A Survey of Big Data Analytics Using Machine Learning Algorithms | usha moorthy., usha devi gandhi | HCI Challenges and Privacy Preservation in Big Data Security | 15225-28636 |
187 | Future of storage technologies | Bhavani, S., Charanya, R., Mahadevan, R., Malathy, E., Priya, M. | International Journal of Civil Engineering and Technology | 0976-6308 |
188 | Robust Face Recognition Using Enhanced Local Binary Pattern | Srinivasa Perumal R., Nadesh R. K., Senthil Kumar N. C | Bulletin of Electrical Engineering and Informatics | 2089-3191 |
189 | Optimization of Seed Selection for Higher Product using Interval Valued Hesitant Fuzzy Soft sets | BK Tripathy., Sooraj.T.R | Songklanakarin Journal of Science and Technology | 0125-3395 |
190 | Experimenting with runtime and energy tradeoffs in high-performance computing | Uma Maheswari, G., Subha, S | Progress in Industrial Ecology | 1476-8917 |
191 | Enhancing security for end users in cloud computing environment using hybrid encryption technique | Nadesh R.K., Srinivasa Perumal R., Shynu P.G., Gaurav Sharma1 | International Journal of Engineering and Technology | 0975-4024 |
192 | ONLINE COMPILERS FOR ANDROID USING MOBILE CLOUD COMPUTING | Vijayan R, Mareeswari V, Gunesekaran G,Balasubramanian V,Senthil Kumar R | International Journal of Civil Engineering and Technology (IJCIET) | 0976-6308 |
193 | Mapping USE Specifications into Spec# | Jagadeeswaran T Senthilkumaran U | Software Technologies: Applications and Foundations | 0302-9743 |
194 | A risk-centric defensive architecture for threat modelling in e-government application | Venkatasen M., Mani P. | Electronic Government | 1740-7494 |
195 | Model Reusability and Multidirectional Transformation using Unified Metamodel | Jagadeeswaran T, Senthilkumaran U | IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER) | 1854-8419 |
196 | Quick fix for obstacles emerging in management recruitment measure using IOT-based candidate selection | Nallakaruppan, M.K., Senthil Kumaran, U. | Service Oriented Computing and Applications | 18632386 |
197 | Verification of Cloud Based Information Integration Architecture using Colored Petri Nets | Murale Narayanan., Aswani Kumar Cherukuri | International Journal of Computer Network and Information Security | - |
198 | Secure big data storage using training dataset filtering-K nearest neighbour classification with elliptic curve cryptography | Ezhilarsan E, Dinakaran M | Journal of Computational and Theoretical Nanoscience | 15461955 |
199 | D‐ConvNet: Deep learning model for enhancement of brain MR images | Kathiravan Srinivasan, Vishal Sharma, DNK Jayakody, Durai Raj Vincent | Basic & Clinical Pharmacology & Toxicology | - |
200 | Robust design and validation of balanced tournaments via Hamiltonian path | Kathiravan Srinivasan, Desh Deepak Pathak Ravinder Kumar, Durai Raj Vincent, Chuan-Yu Chang | Journal of Information and Optimization Sciences | 0252-2667 |
201 | Semantic filtering and event extraction of twitter streams through RDF and SPARQL | Kumar, NS, Dinakaran, M | International Journal of Computer Information Systems and Industrial Management Applications | 21507988 |
202 | Design and development of microstrip patch antenna with circular and rectangular slot for structural health monitoring | Padmavathy T.V., Bhargava D.S., Venkatesh P., Sivakumar N. | Personal and Ubiquitous Computing | 1617-4909 |
203 | Propels in compiler construction for versatile figuring | Ezilarasan, E, Dinakaran, M, Boominathan P, Krishnamoorthy, A, Naresh, K | International Journal of Internet Technology and Secured Transactions | 1748569 |
204 | An adaptive fault tolerance mechanism in Grid computing | Nithyadharshini P.S., Pounambal M., Nagaraju D., Saritha V. | ARPN Journal of Engineering and Applied Sciences | 1819-6608 |
205 | PSPO: a framework for cost-effective service placement optimisation during enterprise modernisation on hybrid clouds | Ravikumar Ramadoss., N.M. Elango., A. Satheesh., Ching-Hsien Hsu | International Journal of Web and Grid Services | 1741-1106 |
206 | A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases | Kumar P.M., Devi Gandhi U. | Computers and Electrical Engineering | 0045-7906 |
207 | An optimized feature selection based on genetic approach and support vector machine for heart disease | Gokulnath C.B., Shantharajah S.P. | Cluster Computing | 1386-7857 |
208 | An Efficient and Secure Content Contribution and Retrieval content in Online Social Networks using Level-level Security Optimization and Content Visualization Algorithm | Kumaran Umapathy., Neelu Khare | Indonesian Journal of Electrical Engineering and Computer Science | 2502-4752 |
209 | Performance Analysis of Clustering Algorithm in Data Mining in R Language | Avulapalli Jayaram Reddy, Balakrushna Tripathy , Seema Nimje, | Communications in Computer and Information Science | 1865-0929 |
210 | Load balancing prototype for cost proficient fault tolerant geo-distributed datacenters | Anusha, K., Manikandan, N., Nallakaruppan, M.K., Rahamathunnissa, U. | Journal of Advanced Research in Dynamical and Control Systems | 1943-023X |
211 | Application of Soft Set in Game Theory | B. K. Tripathy Sooraj., T. R. Radhakrishna., N. Mohanty | Encyclopedia of Information Science and Technology, Fourth Edition | - |
212 | Secure Group Key Sharing Protocols and Cloud System | Vaishali Ravindra Thakar., John Singh K | Encyclopedia of Information Science and Technology, Fourth Edition | - |
213 | Secure data storage in cloud computing to avoiding some cipher text attack | Gundala Swathi., Gundala Swathi | JOURNAL OF INFORMATION and OPTIMIZATION SCIENCES | 0252-2667 |
214 | Optimal Decision Tree Fuzzy Rule-Based Classifier (ODT-FRC) For Heart Disease Prediction Using Improved Cuckoo Search Algorithm | Subhashini Narayan, Jagadeesh Gobal | International Journal of Business Intelligence and Data Mining | 1743-8187 |
215 | Brain tumour segmentation from MRI using superpixels based spectral clustering | Angulakshmi M., Lakshmi Priya G.G. | Journal of King Saud University - Computer and Information Sciences | 1319-1578 |
216 | Depth Impurity Pruned Strategies for Extracting High Utility Itemsets | K. Santhi1*, B.Valarmathi2, T.Chellatamilan3 | International Journal of Engineering & Technology | 2227-524X |
217 | Software Project Management Risk Management Literature Review | CHARANYA R | International Journal for Research in Applied Science & Engineering Technology (IJRASET) | - |
218 | Student performance dashboard using mining approach | Suganya D., Kumar K., Ramesh P.S., Suganthan C. | International Journal of Pure and Applied Mathematics | 1311-8080 |
219 | Predicting life time of heart attack patient using improved c4.5 classification algorithm | Jothikumar R., Susi S., Sivakumar N., Ramesh P.S. | Research Journal of Pharmacy and Technology | 0974-3618 |
220 | Scheduling tasks using Bat's algorithm in cloud sim | Gitanjali J., Sathiyamoorthi E., Mummadisetti A., Dammu R.S., Kadari R.R. | International Journal of Pure and Applied Mathematics | 1311-8080 |
221 | Survey on the role of IoT in intelligent transportation system | Varun Chand H., Karthikeyan J. | Indonesian Journal of Electrical Engineering and Computer Science | 2502-4752 |
222 | Comparative study on dimensionality reduction for disease diagnosis using fuzzy classifier | Sujatha R., Ephzibah E.P., Dharinya S., Uma Maheswari G., Mareeswari V., Pamidimarri V. | International Journal of Engineering and Technology(UAE) | 2227-524X |
223 | An empirical machine learning approach to extract and rank multi-word product names using iCIW approach | Sivashankari R., Valarmathi B. | Journal of Engineering Science and Technology | 1823-4690 |
224 | Parallel AES algorithm for performance improvement in data analytics security for IoT | Manikandan N., Subha S. | International Journal of Networking and Virtual Organisations | 1470-9503 |
225 | A Study of Handwritten Characters Recgnition through Neural Networks using Data Mining approaches | Gaurav Bothra, Sweta Bhattacharya and Deepa P. | International Journal of Mechanical Engineering and Technology | 09766340 |
226 | Secure medical data transmission by using collaborative neighbour based method in WBAN | Devi L., Shantharajah S.P. | World Review of Science, Technology and Sustainable Development | 1741-2242 |
227 | , Predicting dispersion of radionuclides through parallel approach | G Uma Maheswari, S Subha | Progress in Industrial Ecology 12(1-2), pp. 35-45 | 1476-8917 |
228 | Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles | Priyan M.K., Devi G.U. | Cluster Computing | 1386-7857 |
229 | One-Dimension Force Balance System for Hypersonic Vehicle an experimental and Fuzzy Prediction Approach | Kalaiarassan G., Krishan., Somanadh M., Thirumalai C., Senthil Kumar M. | Materials Today: Proceedings | 2214-7853 |
230 | A SURVEY ON IMPLEMENTATION METHODS AND APPLICATIONS OF SENTIMENT | Sudheer K and B.Valarmathi | International Journal of Civil Engineering and Technology (IJCIET) | 0976-6308 |
231 | Stout unidirectional face recognition system in hands of DRBF methodology | Sudhan M., Dharun V.S., Swarna Priya R.M. | International Journal of Pure and Applied Mathematics | 1311-8080 |
232 | Software Project Management Risk Management Literature Review | CHARANYA R | International Journal of Innovative Science and Research Technology(IJISRT) | - |
233 | Secured cloud banking transactions using two-way verification process | Anitha A., Varalakhshmi M., Mary Mekala A., Subashanthini., Thilagavathy M. | International Journal of Civil Engineering and Technology | 0976-6308 |
234 | A rule based classifcation for vegetable production using rough set and genetic algorithm | Rathi R., Acharjya D.P. | International Journal of Fuzzy System Applications | 2156-177X |
235 | Modified dimensionality reduced local directional pattern for facial analysis | Srinivasa Perumal R, Chandra Mouli P.V.S.S.R | Journal of Ambient Intelligence and Humanized Computing | 1868-5137 |
236 | Group and hierarchical key management for secure communications in internet of things | Karrothu A., Norman J. | International Journal of Communication Systems | 1074-5351 |
237 | Dr. Cloud- IOT Based Health Monitoring System | Aditya Shukla, Vanmathi C | International Journal of Scientific Research in Computer Sciences and Engineering | 2456-3307 |
238 | A survey on applications of internet of things in healthcare domain | Mugauri P.C., Aravind K., Deshmukh A., Vhansure F., Kavitha B.R. | Research Journal of Pharmacy and Technology | 0974-3618 |
239 | Security strategies for cloud identity management - a study | Anilkumar C., Sumathy S. | International Journal of Engineering and Technology(UAE) | 2227-524X |
240 | RST invariant robust video watermarking algorithm using quaternion curvelet transform | Agilandeeswari L., Ganesan K. | Multimedia Tools and Applications | 1380-7501 |
241 | Robustness of DR-LDP over PCANet for face analysis | Ramalingam S.P., Chandra Mouli P.V.S.S.R. | International Journal of Multimedia Information Retrieval | 2192-6611 |
242 | Calorie measurement: predicting the nutrient content of food using image analysis | Thamarai., Nivetha., Durai Raj Vincent P.M., Manivannan S.S. | Research Journal of Pharmacy and Technology | 0974-3618 |
243 | An efficient method for secure 2D image visualization and transmission through chaotic confusion and pixel diffusion | Gunasekaran G., Venkatesan M. | Pertanika Journal of Science and Technology | 0128-7680 |
244 | Multi-class classification using hybrid soft decision model for agriculture crop selection | Deepa N., Ganesan K. | Neural Computing and Applications | 0941-0643 |
245 | Tri-texture feature extraction and region growing-level set segmentation in breast cancer diagnosis | Aarthy S.L., Prabu S. | International Journal of Biomedical Engineering and Technology | 1752-6418 |
246 | Spam filtering and phishing in facebook | Gitanjali J., Jagadeesh G., Mummadisetti A., Dammu R.S., Kadari R.R. | International Journal of Pure and Applied Mathematics | 1311-8080 |
247 | Impact of Gradient ascent and Boosting algorithm in classification | Basha S.M., Rajput D.S., Vandhan V. | International Journal of Intelligent Engineering and Systems | 2185-310X |
248 | Generating various kolam patterns using new kolam picture grammar | Govindaraj R., Mahendran A. | International Journal of Internet Technology and Secured Transactions | 1748-569X |
249 | HIoTPOT: Surveillance on IoT Devices against Recent Threats | Gandhi U.D., Kumar P.M., Varatharajan R., Manogaran G., Sundarasekar R., Kadu S. | Wireless Personal Communications | 0929-6212 |
250 | Hybrid IT architecture by gene-based cryptomata (HITAGC) for lightweight security services | Thirumalai, C., Viswanathan, P. | Service Oriented Computing and Applications | 1863-2386 |
251 | High utility itemset mining using partition utility list structure | Arunkumar M.S., Suresh P., Gunavathi C. | Journal of Computational and Theoretical Nanoscience | 1546-1955 |
252 | A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT) | Gopinath, M.P., Arasi, G.S., Kavisankar, L., Sathyaraj, R., Karthi, S., Aarthy, S.L., & Balusamy, B. (2018) | Neural Computing and Applications | 0941-0643 |
253 | Secure and Optimized Real-Time System for Internet of Medical Things Using MATuino and ThingSpeak Analytics | Ranjani, J., A. Shanthoshini Selvapriya, and E. Vijayan | Journal of Testing and Evaluation | 00903973 |
254 | Implementing self adaptiveness in whale optimization for cluster head section in Internet of Things | Reddy M.P.K., Babu M.R. | Cluster Computing | 1386-7857 |
255 | Buyagain grocery recommender algorithm for Online shopping of grocery and gourmet foods | Moses S.J., Dhinesh Babu L.D. | International Journal of Web Services Research | 1545-7362 |
256 | CONVENTIONAL IMPLEMENTATION OF LFS SYSTEM FOR DEVELOPMENT OF LINUX OPERATING SYSTEM | M.Priya J. Raju | International Journal of Pure and Applied Mathematics | 13118080 |
257 | Health data analytics using scalable logistic regression with stochastic gradient descent | Manogaran G., Lopez D. | International Journal of Advanced Intelligence Paradigms | 1755-0386 |
258 | Feature extraction using LR-PCA hybridization on twitter data and classification accuracy using machine learning algorithms | Murugan N.S., Devi G.U. | Cluster Computing | 1386-7857 |
259 | G-L fractional differential operator modified using auto-correlation function: Texture enhancement in images | Hemalatha S & Margret Anouncia S | Ain Shams Engineering Journal | 2090-4479 |
260 | Predictive Cloud resource management framework for enterprise workloads | Balaji M., Aswani Kumar C., Rao G.S.V.R.K. | Journal of King Saud University - Computer and Information Sciences | 1319-1578 |
261 | Advancing knowledge on Regulating and saving of the Animals Health with Sensor and Networks through IoT | Subrata Chowdhury, P.Mayilvahanan, Ramya Govindaraj | Jour of Adv Research in Dynamical & Control Systems | - |
262 | Videocompression techniques: A review | Singh J.K., Gagneja K., Raghuvanshi U. | International Journal of Pure and Applied Mathematics | 1311-8080 |
263 | A Comparative Analysis on Smart Farming Techniques using Internet of Things (IoT) | Pramod Mathew Jacob, Prasanna M, Parveen Sultana H | Helix | 2277-3495 |
264 | Knowledge-based Acceptance Test driven agile Approach for Quality Software Development | N. Asha, Prasanna Mani | International Journal of Recent Technology and Engineering | 2277-3878 |
265 | A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system | Manogaran G., Varatharajan R., Lopez D., Kumar P.M., Sundarasekar R., Thota C. | Future Generation Computer Systems | 0167-739X |
266 | A Descriptive Study on Contents Being Generalized in News Apps and Smartphone Users’ Attitude Towards Them | Surendheran Kaliyaperumal | OmniScience: A Multi-disciplinary Journal | 2347-9949 |
267 | Mining DNA Sequence Patterns with Constraints Using Hybridization of Firefly and Group Search Optimization | Lakshmanna K., Khare N. | Journal of Intelligent Systems | 0334-1860 |
268 | A Novel Genetic Algorithm for Solving Machine Part Cell Formation Problem considering alternative Process Plans | Sowmiya N., Valarmathi B., Srinivasa Gupta N., Essaki Muthu P., Rajendran C. | Materials Today: Proceedings | 2214-7853 |
269 | Outlet sales analysis using r and various machine learning algorithms | Singh J.K., Gagneja K., Bhushan V. | International Journal of Pure and Applied Mathematics | 1311-8080 |
270 | Improved scrum method through staging priority and cyclomatic complexity to enhance software process and quality | Vijay Anand R., Dinakaran M. | International Journal of Internet Technology and Secured Transactions | 1748-569X |
271 | Wireless camera network with enhanced SIFT algorithm for human tracking mechanism | Usha Devi G., Priyan M.K., Gokulnath C. | International Journal of Internet Technology and Secured Transactions | 1748-569X |
272 | LocPSORank-prediction of ranking of web services using location-based clustering and PSO algorithm | Mareeswari V., Sathiyamoorthy E. | International Journal of Web Services Research | 1545-7362 |
273 | A firefly inspired game dissemination and QoS-based priority pricing strategy for online social network games | Raj E.D., Dhinesh Babu L.D. | International Journal of Bio-Inspired Computation | 1758-0366 |
2018
Sl.No | TITLE OF PAPER | NAME OF THE AUTHOR/S | NAME OF JOURNAL | ISBN/ISSN NUMBER |
---|---|---|---|---|
1 | A Comparative Analysis of Firefly and FuzzyFirefly based Kernelized Hybrid C-Means Algorithms | B.K. Tripathy, Anmol Agrawal, A. Jayaram Reddy 1 | I.J. Intelligent Systems and Applications | 2074-904X |
2 | IoT based machine learning techniques for climate predictive analysis | Nallakaruppan, M.K., Senthil Kumaran, U. | International Journal of Recent Technology and Engineering | 22773878 |
3 | Patients Health Monitoring System Using IOT | Sudha Senthilkumar, Brindha.K, Charanya R, Abishek Kumar | Indian Journal of Public Health Research & Development | 0976-0245 |
4 | Fragmented plant leaf recognition: Bag-of-features, fuzzy-color and edge-texture histogram descriptors with multi-layer perceptron | Chaki J., Dey N., Moraru L., Shi F. | Optik | 0030-4026 |
5 | Walsh Hadamard Transform for Simple Linear Iterative Clustering (SLIC)Superpixel based Spectral Clustering of Multimodal MRI Brain Tumour Segmentation | M. Angulakshmi, G. G Lakshmi Priya | Innovation and Research in BioMedical engineering- Elesiver | 1959-0318 |
6 | An efficient algorithm for dynamic task offloading using cloudlets in mobile cloud computing | Shobha Rani, D., Pounambal, M., Saritha, V. | International Journal of Communication Systems | 1099-1131 |
7 | A Big Data Recommendation Engine Framework Based on Local Pattern Analytics Strategy for Mining Multi-Sourced Big Data | Venkatesan, T., Saravanan, K., Ramkumar, T. | Journal of Information and Knowledge Management | 0219-6492 |
8 | CLAY-MIST: IoT-cloud enabled CMM index for smart agriculture monitoring system | Mekala M.S., Viswanathan P. | Measurement: Journal of the International Measurement Confederation | 0263-2241 |
9 | Sentiment analysis of Amazon products using ensemble machine learning algorithm | Jayakumar Sadhasivam, Ramesh Babu Kalivaradhan | International Journal of Mathematical, Engineering and Management Sciences | 2455-7749 |
10 | Implementation of Collage Grammar in Kolam Grammar to Generate Kolam Patterns in Picture Languages | Ramya Govindaraj, M.Anand | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | 22783075 |
11 | Health Machine Sensors Network Controlling and Generating Trust Count in the Servers Platform through IoT | Subrata Chowdhury, P. Mayilvahananan, Ramya Govindaraj | International Journal of Recent Technology and Engineering (IJRTE) | 2277-3878 |
12 | A survey on internet of vehicles: Applications, technologies, challenges and opportunities | Priyan M.K., Usha Devi G. | International Journal of Advanced Intelligence Paradigms | 1755-0386 |
13 | Performance analysis of cloud computing using series of queues with Erlang service | K.Santhi, R.Saravanan | International Journal of Internet Technology and Secured Transactions | 1748-5703 |
14 | Accurate facial ethnicity classification using artificial neural networks trained with galactic swarm optimization algorithm | Bagchi, C, Geraldine Bessie Amali, D, Dinakaran, M | Advances in Intelligent Systems and Computing | 21945357 |
15 | A novel dyadic multiresolution wavelet image steganography using N-ary | C. Vanmathi; S. Prabu | International Journal of Internet Technology and Secured Transactions | 1748-5703 |
16 | Performance comparison of various feature descriptors in object category detection application using SVM classifier | Kavitha B R , Ramya G, Priya G | International Journal of Innovative Technology and Exploring Engineering | 22783075 |
17 | A roadmap towards implementing parallel aspect level sentiment analysis | Basha S.M., Rajput D.S. | Multimedia Tools and Applications | 1380-7501 |
18 | K-means and hierarchical based clustering in suicide analysis | Sujatha, R., Sree Dharinya, S., Ephzibah, E.P., Thangam, R.K. | International Journal of Engineering and Advanced Technology | 22498958 |
19 | AN ANALYSIS OF SECURITY ISSUES IN CLOUD COMPUTING | M B BENJULA ANBU MALAR J PRABHU | International Journal of Civil Engineering and Technology (IJCIET) | 0976-6308 |
20 | A Suite of Load Balancing Algorithms and Service Broker Policies for Cloud: A Quantitative Analysis with Different User Grouping Factor in Cloud | Kumar PJ, Suganya P, Komal Malhotra, Payal Yadav | International Journal of Recent Technology and Engineering (IJRTE) | 2277-3878 |
21 | Reduction of Artefacts in JPEG-XR Compressed Images | Kai-Lung Hua, Ho Thi Trang, Kathiravan Srinivasan, Yung-Yao Chen, Chun-Hao Chen, Vishal Sharma, Albert Y Zomaya | MDPI Sensors | 1424-8220 |
22 | EFF-FAS: Enhanced Fruit Fly Optimization Based Search and Tracking By Flying Ad Hoc Swarm | Vishal Sharma, Roberto Sabatini, Subramanian Ramasamy, Kathiravan Srinivasan, Rajesh Kumar | International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) | 1743-8225 |
23 | A Comprehensive Survey On Various Semantic Based Video/Image Retrieval Techniques | Tamil Priya D, Divya Udayan J | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | 2278-3075 |
24 | Evaluating and Visualizing Influential Node Using Various Measures in Social Network Data | G. Kavitha and N. M. Elango | journal of Computational and Theoretical Nanoscience | 1546-1955 |
25 | Distribution of Frequency Words Using Hierarchical Clustering Method in R | Shakila Basheer1, S. Mariyam Aysha Bivi2, G. Kavitha3 ∗, P. V. Praveen Sundar4, C. Kousalya3, and B. Lokeshwari3 | Journal of Computational and Theoretical Nanoscience | 1546-1955 |
26 | Analysis and Visualize Text Mining Using Twitter Data in R | Shakila Basheer1, Rincy Merlin Mathew2, G. Kavitha3 ∗, K. Nivetha3, S. Kalai Selvi3, and R. Sandhya3 | Journal of Computational and Theoretical Nanoscience | 1546-1955 |
27 | Location-Based Collaborative Filtering for Web Service Recommendation | Mareeswari Venkatachalaappaswamy, Vijayan Ramaraj, Saranya Ravichandran | Recent Patents on Computer Science | 2213-2759 |
28 | Evaluating and Visualizing influential Node Using Various Measures in Social Network Data | G.kavitha and N M ELango | journal of Computational and Theoretical Nanoscience | 1546-1955 |
29 | Deep Learning for Short Answer Scoring | Surya, K., Gayakwad, E., Nallakaruppan, M.K. | International Journal of Recent Technology and Engineering | 22773878 |
30 | A survey on different continuous authentication systems | Ayeswarya S., Norman J. | International Journal of Biometrics | 1755-8301 |
31 | K-means and hierarchical based clustering in suicide analysis | Sujatha.R,Sree Dharinya.S,Ephzibah,Kirubathangam.R | International Journal of Engineering and Advanced Technology | 2249-8958 |
32 | Risk-based availability modelling and reputation management on fault tolerant cloud computing systems | Deepa Mani; Anand Mahendran | International Journal of Internet Technology and Secured Transactions (IJITST) | 1748-569X |
33 | Decision-making tool for crop selection for agriculture development | Deepa N., Ganesan K. | Neural Computing and Applications | 0941-0643 |
34 | Predicting Autism Spectrum Disorder Using Machine Learning Algorithms with Jaundice Symptomatic Analysis | Sharath Chandrika M B, Nallakaruppan M K, Siva Rama Krishnan S, Senthilkumar N C | International Journal of Recent Technology and Engineering | 2277-3878 |
35 | Real-Time Classification of Twitter Trends using Support Vector Machine with Location Tracking | Vijayan Ramaraj, G Gunasekaran, Prasanna Santhanam, S Meenatchi, Kishore Kumar K | International Journal of Innovative Technology and Exploring Engineering | 2278-3075 |
36 | Semantic analysis - internet of things, study of past, present and future of IoT | Snigdha Gharami, B.Prabadevi, Anupama Bhimnath | Electronic Government , an International Journal | 1740-7494 |
37 | Pattern Analysis of Genetics and Genomics: A Survey of the State-of-art | Jyotismita Chaki, Nilanjan Dey | Multimedia Tools and Applications (Springer) | 1380-7501 |
38 | Pattern Mining Approaches used in Sensor-Based Biometric Recognition: A Review | Jyotismita Chaki, Nilanjan Dey, Fuqian Shi , R. Simon Sherratt | IEEE Sensors | 1530-437X |
39 | A heuristic method for initial dominant point detection for polygonal approximations | S. Kalaivani , Bimal Kumar Ray | Soft Computing | 1432-7643 |
40 | A Survey and Analysis of various Objective Functions Defined for RPL in 6LoWPAN | Suganya. P, Pradeep Reddy. C.H | International Journal of Recent Technology and Engineering | 2277-3878 |
41 | Car Sales Prediction Using Machine Learning Algorithmns | Madhuvanthi.K, Nallakaruppan.M.K, Senthilkumar N C, Siva Rama Krishnan S | International Journal of Innovative Technology and Exploring Engineering | 2278-3075 |
42 | Comparative Performance Analysis of Various Classifiers for Cloud E-Health Users | T. MuthamilSelvan,B. Balamurugan | International Journal of E-Health and Medical Communications | 1947-315X |
43 | Continuous Monitoring and Detection of Epileptic Seizures using Wearable Device | Darshan Mehta, Tanay Deshmukh, Yokesh Babu Sundaresan,, P.Kumaresan | Advances in Intelligent Systems and Computing Smart Innovations in Communication and Computational Sciences Proceedings of ICSICCS-2018, | 2194-5357 |
44 | Predicting Austim Spectrum Disorder Using Machine Learning Algorithms with Jaundice Symptomatic Analysis | Sharath Chandrika M B, Nallakaruppan M K, Siva Rama Krishnan S, Senthilkumar N C | International Journal of Recent Technology and Engineering | 2277-3878 |
45 | Stochastic Multifacility Location Problem under Triangular Area Constraint with Squared Euclidean Norm | A. K. Santra | Journal of Scientific & Industrial Research | 0022-4456 |
46 | Test Suite Reduction based on knowledge Reuse: An Adaptive Elitism Based Intellect approach (AEBI) using Clustering Technique | Asha N and Prasanna Mani | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | 2278-3075 |
47 | Prediction Intelligence System Based Real Time Monitoring of Yoga Performers | Mani Prasanna, Thangavelu Arun Kumar, Sangaiah Arun Kumar, Mohamed Iqubal Jawid Nazir | Recent Patents on Computer Science | 1874-4796 |
48 | Walsh Hadamard Transform for Simple Linear Iterative Clustering (SLIC) Superpixel Based Spectral Clustering of Multimodal MRI Brain Tumor Segmentation | M Angulakshmi, GG Lakshmi Priya | Innovation and Research in BioMedical engineering (IRBM) | 1959-0318 |
49 | Predictive analysis of stocks using data mining | Magesh, G., Swarnalatha, P. | Smart Innovation, Systems and Technologies | 2190-3018 |
50 | Classification of breast cancer based on thermal image using support vector machine | Aarthy, S.L., Prabu, S. | International Journal of Bioinformatics Research and Applications | 1744-5485 |
51 | Estimating the distance of a human from an object using 3D image reconstruction | Swarna Priya, R.M., Gunavathi, C., Aarthy, S.L. | Advances in Intelligent Systems and Computing | 2194-5357 |
52 | Big data analysis for anomaly detection in telecommunication using clustering techniques | Gunavathi, C., Swarna Priya, R.M., Aarthy, S.L | Advances in Intelligent Systems and Computing | 2194-5357 |
53 | VoIP Steganography Methods, a Survey | S. Deepikaa, R. Saravanan | CYBERNETICS AND INFORMATION TECHNOLOGIES | 1311-9702 |
54 | Flow based classification for specification based intrusion detection in software defined networking: Flowclassify | Sampath N, Dinakaran M | International Journal of Software Innovation | 21667160 |
55 | Performance Comparison of Various Feature Descriptors in Object Category Detection Application using SVM Classifier | Kavitha B R , G. Ramya, G.Priya | International Journal of Innovative Technology and Exploring Engineering | 2278-3075 |
56 | Energy-Efficient virtual machine selection based on resource ranking and utilization factor approach in cloud computing for IoT | Mekala M.S., Viswanathan P. | Computers and Electrical Engineering | 0045-7906 |
57 | Effective Classification of Major Depressive Disorder Patients using Machine Learning Techniques | Nivedhitha M, Durairaj Vincent P M | Recent patents on computer science | 2213-2759 |
58 | Machine learning on medical dataset | Gopinath, M.P., Aarthy, S.L., Manchanda, A., Rishadh | Advances in Intelligent Systems and Computing | 2194-5357 |
59 | Design of Secure Ehealth System Through Temporal Shadow using Blockchain | R Charanya, Ra. K Saravanaguru, M Aramudhan | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | 2278-3075 |
60 | K-means and hierarchical based clustering in suicide analysis | Sujatha.R,Sree Dharinya.S,Ephzibah,Kirubathangam.R | International Journal of Engineering and Advanced Technology | 2249-8958 |
61 | New Approach Data Encryption using Key Generation and DS-PEKS Algorithm | Pratik Badala, Senthilkumar N C | Research Journal of Engineering and Technology | 0976-2973 |
62 | Crime Pattern Matching based on Process Execution Context – An Evidence Acquisition Technique | Asha Joseph and K. John Singh | Journal of Advanced Research in Dynamical and Control Systems | 1943-023X |
63 | Histogram-Equalized Hypercube Adaptive Linear Regression for Image Quality Assessment | Balakrishnan, N., Shantharajah, S.P. | Sadhana - Indian Academy of Engineering and Sciences | 0256-2499 |
64 | A Survey, International Journal of Advanced Intelligence Paradigms | R. Jayanthi and K. John Singh | International Journal of Advanced Intelligence Paradigms | 0 |
65 | Predicting ozone layer concentration using machine learning techniques | Srinivas, A.S., Somula, R., Govinda, K., Manivannan, S.S. | Springer Briefs in Applied Sciences and Technology | 2191-530X |
66 | Healthcare Android Application | Shakila Basheer, Nithya Sampath, Jayakumar Sadhasivam R. Ilampirai R. Ramya Bharathi V. Ilakkiya | Journal of Computational and Theoretical Nanoscience | 1546-1955 |
67 | An empirical comparison of supervised learning algorithms and hybrid WDBN algorithm for MOOC courses | Jayakumar Sadhasivam Ramesh Babu Kalivaradhan | Journal of Ambient Intelligence and Humanized Computing | 1868-5137 |
68 | Image encryption techniques for data transmission in networks: A survey | Jayanthi R., John Singh K. | International Journal of Advanced Intelligence Paradigms | 1755-0386 |
69 | Accessibility Using Human Face Object and Text Recognition for Visually Impaired People | V. Mareeswari, Vijayan Ramaraj, G. Uma Maheswari, R. Sujatha, Preethi. E | International Journal of Innovative Technology and Exploring Engineering | 22783075 |
70 | Machine Learning Based Classification of Cervical Cancer Using K-Nearest Neighbour, Random Forest and Multilayer Perceptron Algorithms | Shakila Basheer S. Mariyam Aysha Bivi S. Jayakumar Arpit Rathore Balajee Jeyakumar | Journal of Computational and Theoretical Nanoscience | 1546-1955 |
71 | Review on recent developments in frequent itemset based document clustering, its research trends and applications | D. S. Rajput | International journal of data analysis techniques and strategies, InderScience | 1755-8069 |
72 | Ignition Pollution Check | Yadav, V., Khatana, D., Bajoria, M., Nallakaruppan, M.K., Singh, S.P. | International Journal of Innovative Technology and Exploring Engineering | 22783075 |
73 | Data cryptography based on musical notes on a fingerboard along with a dice | Tripathy, A.K., Das, T.K., Navaneethan, C. | Indonesian Journal of Electrical Engineering and Computer Science | 2502-4752 |
74 | Comparison of particle swarm optimization and simulated annealing applied to travelling salesman problem | Sumathi, M., Rahamathunnisa, U., Anitha, A., Das, D., Nallakaruppan, M.K. | International Journal of Innovative Technology and Exploring Engineering | 22783075 |
75 | Location-Based Collaborative Filtering for Web Service Recommendation | Venkatachalaappaswamy, M., Ramaraj, V., Ravichandran, S. | Recent Patents on Computer Science | 1874-4796 |
76 | Classifying streaming of Twitter data based on sentiment analysis using hybridization | Senthil Murugan N & Usha Devi G | Neural Computing and Applications | 0941-0643 |
77 | Analyzing Financial Data and Mutual Funds Recommendation by Using Big Data Analytics | Nithya Sampath Jayakumar Sadhasivam R. Raj Kumar M. Sathish Kumar Balajee Jeyakumar P. V. PraveenSundar | Journal of Computational and Theoretical Nanoscience | 1546-1955 |
78 | An approach to aggregate the partial rank list of web services in e-business | Mareeswari V., Sathiyamoorthy E. | International Journal of e-Business Research | 1548-1131 |
79 | Securing one-time password generation using elliptic-curve cryptography with self-portrait photograph for mobile commerce application | Ramasamy, P., Ranganathan, V., Palanisamy, V., Kadry, S. | Multimedia Tools and Applications | 1380-7501 |
80 | Monitoring individual medical record by using wearable body sensors | Gopal J,Sathiyamoorthy E,Mohammed Ayaz R | Smart Innovation, Systems and Technologies | 21903018 |
81 | An Optimized Breast Cancer Diagnosis System Using a Cuckoo Search Algorithm and Support Vector Machine Classifier | Manoharan prabukumar., Loganathan agilandeeswari., Arun kumar sangaiah | Hybrid Intelligence for Image Analysis and Understanding | 1868-5137 |
82 | Intelligent intrusion detection techniques for secure communications in wireless networks: A survey | Rama Prabha K.P., Jeyanthi N. | International Journal of Advanced Intelligence Paradigms | 1755-0386 |
83 | 32-Bit One Instruction Core: A Low-Cost,Reliable, and Fault-Tolerant Core for Multi-core Systems | Venkatesha, S. and Parthasarathi, R | Journal of Testing and Evaluation | 0090-3973 |
84 | Implementation of enhanced canny recognition algorithm and non – natural neural system based speech fusion for sightless persons | Arunkumar, P., Shantharajah, S.P. | Multimedia Tools and Applications | 1380-7501 |
85 | E-health cloud security using timing enabled proxy re-encryption | V Vijayakumar, MK Priyan, G Ushadevi, R Varatharajan, G Manogaran, Prathamesh Vijay Tarare | Mobile Networks and Applications | 1383-469X |
86 | MMSI: A multi-mode service invocation algorithm to improve the connectivity in accessing cloud services in heterogeneous mobile cloud | Nadesh R.K., Aramudhan M. | International Journal of Advanced Intelligence Paradigms | 1755-0386 |
87 | A Comparative Study On Transformation of UML/OCL to Other Specifications | Jagadeeswaran T, Senthilkumaran U | Recent Patents on Computer Science | 2213-2759 |
88 | Health care arrangement system for Doctor-Patient Communications | Angulakshmi.M, Sudha.S, Brindha.K | Indian Journal for Public health and Research development | 0976-0245 |
89 | Accessibility using human face, object and text recognition for visually impaired people | Mareeswari, V., Vijayan Ramaraj, , Uma Maheswari, G., Sujatha, R., Preethi, E | International Journal of Innovative Technology and Exploring Engineering | 2278-3075 |
90 | Network Support Data Analysis for Fault Identification Using Machine Learning | Parthasarathy Panchatcharam Shakila Basheer, Usha Devi Gandhi | International Journal of Software Innovation | 2166-7160 |
91 | Accurate facial ethnicity classification using artificial neural networks trained with galactic swarm optimization algorithm | Bagchi, C., Geraldine Bessie Amali, D., Dinakaran, M. | Advances in Intelligent Systems and Computing | 2194-5357 |
92 | Agricultural leaf blight disease segmentation using indices based histogram intensity segmentation approach | Kalaivani.S, Shantharajah.S.P, Padma.T, | Multimedia Tools and Applications | 1380-7501 |
93 | Optimal body mass index cutoff point for cardiovascular disease and high blood pressure | Chandra Babu, G., Shantharajah, S.P. | Neural Computing and Applications | 0941-0643 |
94 | Gurumurthy S., Senthilkumar N.C., Ghalib M.R. | A study of digital signal processing application for remote patient monitoring system using live EEG data transmission | International Journal of Applied Engineering Research | 0973-4562 |
95 | Jeyanthi N., Thandeeswaran R., Vinithra J. | RQA based approach to detect and prevent DDOS attacks in VoIP networks | Cybernetics and Information Technologies | 1311-9702 |
96 | Angulakshmi M. | A survey on multi-relational database based classification approaches | International Journal of Applied Engineering Research | 0973-4562 |
2017
S.No. | Title Of Paper | Name of the author/s | Name of journal | ISBN/ISSN Number |
---|---|---|---|---|
1 | A Novel Women Chaperone "An Anti-Violation Technology" | Prabhu J , Thanapal P , Vijayanand R , Kirubathagam R , Sundaravadivazhagan B | International Journal of Pure and Applied Mathematics | 1314-3395 |
2 | Classification: Grouping The Users Based On Their Web Search Using Fuzzy Logic | Senthilkumar N C, Ch Pradeep Reddy | International Journal of Pure and Applied Mathematics | 1314-3395 |
3 | An Empirical Study Of Various Load Balancing Algorithms For Cloud Computing | M Lawanyashri, S Subha. B Balamurugan | International Journal of Pure and Applied Mathematics | 1314-3395 |
4 | An Improved Floating Point Addition Algorithm | S Subha | ARPN Journal of Engineering and Applied Sciences | 1819-6608 |
5 | Analysis Of Performance Measures To Handle Medical Ecommerce Shopping Cart Abandonment In Cloud, | V Priya, S Subha, B Balamurugan | Informatics in Medicine Unlocked-Elsevier, March 2017 | 2352-9148 |
6 | Energy Aware Fruitfly Optimization Algorithm For Load Balancing In Cloud Computing Environments | M. Lawanya Shri, S Subha, Balusamy | International Journal of Intelligent Engineering and Systems, | 2185-310 |
7 | A Credential Data Privacy Preserving In Web Environment Using Secure Data Contribution Retrieval Algorithm” | Kumaran U, Neelu Khare | International Journal of Intelligent Engineering and Systems | 2185-310 |
8 | 2D Chaotic Map Based On 2D Adaptive Grey Wolf Algorithm For Ultra Sound Medical Image Security | Srinivas Koppu & Viswanatham | International Journal of Intelligent Engineering and System | 2185-310 |
9 | 3D Reconstruction Of A Scene From Multiple 2D Images | Srinivas Koppu, Swarna Priya, R. M., Aarthy, S. L., Gunavathi, C., Venkatesh, P. & Gao, X. Z | International Journal of Civil Engineering and Technology (IJCIET) | 0976-6316 |
10 | A Case Study : 3D City Generation Using Procedural Modeling Framework And Evaluations Trategies | Divya Udayan J, M.Priya, R.Charanya, Tamil Priya. D And Boyu Gao | International Journal of Civil Engineering & Technology (IJCIET) | 0976-6316 |
11 | Enchanced Id Based Ring Signature By Validating Time Slots In Cloud Environment | Nithya S | International Journal of Mechanical Engineering and Technology | 0976-6340 |
12 | A Case Study On Coactive Subject Modelling For Acclaiming Technical Articles | Praveen Kumar Reddy M, Rajesh Kaluri, Kuruva Lakshmanna, Nagaraja G, Swamy T, Guokun Li | International Journal of Mechanical Engineering and Technology (IJMET) | 0976-6340 |
13 | A Case Study On Cost Estimation Of Cloud Service Using Fuzzy Approach | Srinivas Koppu, Joy Bhowmick., Madhu V. Satheesh S. And Tsung C.H | International Journal of Pure and Applied Mathematics, | 13118080 |
14 | A Case Study: 3D City Generation Using Procedural Modeling Framework And Evaluation Strategies | M.Priya | International Journal of Civil Engineering and Technology (IJCIET) | 0976-6308 |
15 | A Case Study: Analysis Of Single Phase And Hybrid Cascade Multilevel Inverter With Pwm And Level Inverters |
M.Priya | International Journal of Mechanical Engineering and Technology (IJMET) | 0976-6340 |
16 | A Case Study: Home Environment Monitoring System Using Internet Of Things | R. Raghavan, John Singh. K, Thippa Reddy. G, Sudheer. K, Venkatesh. P And Stephen Olatunde Olabiyisi | International Journal of Mechanical Engineering and Technology | 0976-6359 |
17 | A Case Study: Usb Device Charging And Fitness Monitor With Smart Safety Shoe And Iot | John Singh. K, Sagar G. V, Sushmita Lenka, Belwin Edward. J, Jacob Raglend. I, Stephen Olatunde Olabiyisi, | International Journal of Mechanical Engineering and Technology | 0976-6359 |
18 | A Comprehensive Overview On The Foundations Of Formal Concept Analysis | K. Sumangali Ch. Aswani Kumar | Knowledge Management & E-Learning | 2073-7904 |
19 | A Computer Aided System To Detect Breast Masses Using Digital Mammograms | Sujatha,R., Gao, X.-Z.,Gopinath, M.P., Prabu, S.,Murali, S.,Mohanasundaram, R., Kumar, N.S. | International journal of Civil Engineering and Technology | 0976 - 6316 |
20 | A Condorcet Voting Theory Based Ahp Approach For Mcdm Problems | Sweta Bhattacharya, V. Raju | Indonesian Journal of Electrical Engineering and Computer Science | 2502-4752 |
21 | A Fast Enhanced Secure Image Chaotic Cryptosystem Based On Hybrid Chaotic Magic Transform | Srinivas Koppu & Viswanatham | Modelling and Simulation in Engineering | 16875591 |
22 | A Framework For Attribute Selection In Marketing Using Rough Computing And Formal Concept Analysis | T. K. Das | IIMB Management Review | 0970-3896 |
23 | A Framework For Computational Offloading To Extend The Energy Of Mobile Devices In Mobile Cloud Computing. | Thanapal, P., & Durai, M. S. | International Journal of Embedded Systems | 1741-1076 |
24 | A Framework To Mitigate Arp Sniffing Attacks By Cache Poisoning | B. Prabadevi, N. Jeyanthi | International Journal of Advanced Intelligence Paradigms (Inderscience) | 1755-0386 |
25 | A Mobile Application Based Smart System For Supporting Yoga Activities And Health Monitoring | Prasanna M, Arunkumar T, Arunkumar S | Research Journal of Pharmacy and Technology | 0974-360X |
26 | A Naive-Bayes Strategy For Sentiment Analysis On Demonetization And Indian Budget 2017-Case-Study | Jasmine Norman, Mangayarkarasi R, Vanitha M, Praveen Kumar T, Umamaheswari G | International Journal of Pure and Applied Mathematics | 1314-3399 |
27 | A New Algorithm For Password Encryption And Decryption | M.Iyapparaja | Journal of Advanced Research and Dynamical & Control Systems | 1943-023X |
28 | A Novel Temporal Access Control Scheme For Outsourced Data In Cloud With User Revocation | P. G. Shynu And K. John Singh | Electronic Government, an International Journal, | 1740-7508 |
29 | A Novel Threshold Based Multi-Authority Access Control System In Cloud Storage Environment | M.Lawanyashri | International Journal of Pure and Applied Mathematics | 1314-3399 |
30 | A Prevention Model For Web Application Session Hijack Attacks In Wireless Networks Using Mac Appended Session Id | S.S.Manivannan, E.Sathiyamoorthy | Journal of Advanced Research in Dynamical and Control Systems | 1943-023X |
31 | A Privacy-Preserving Secure Access Control Mechanism In Cloud | M.Iyapparaja | Journal of Advanced Research and Dynamical & Control Systems | 1943-023X |
32 | A Real Time Monitoring System For Yoga Practitioners | Prasanna M, Arunkumar T, Akshat Sharma, Nikhil Chaudhari | International Journal of Intelligent Engineering and Systems | 2185-3118 |
33 | A Replica Detection Scheme Based On The Deviation In Distance Travelled Sliding Window For Wireless Sensor Networks | Alekha Kumar Mishra, Asis Kumar Tripathy, Arun Kumar, And Ashok Kumar Turuk | Wireless Communications and Mobile Computing, | 1530-8677 |
34 | A Review Of Soft Computing Techniques In Short-Term Load Forecasting | Senthil Kumar P | International Journal of Applied Engineering Research | 0973-4562 |
35 | A Review On Various Encoding Scehmes Used In Digital Dna Data Storage | A.Swati, Forum Mathuria, S.Bhavani, E.Malathy, R.Mahadevan | International Journal of Civil Engineering and Technology | 0976-6308 |
36 | A Study On Different Types Of Authentication Techniques In Data Security | Dinesh Kumar D, K.Vijay, S.Bhavani, E.Malathy, R.Mahadevan | International Journal of Civil Engineering and Technology | 0976-6308 |
37 | A Survey On Fault Detection Techniques In Different Machines - An Image Processing Approach | U.Rahamathunnisa,Babu Chellappa Chetty And A.Clement King | International Journal of Civil Engineering and Technology | 0976-6316 |
38 | A Survey On Feature Selection Methods In Microarray Gene Expression Data For Cancer Classification | Gunavathi C, Premalatha K, Sivasubramanian K | Research Journal of Pharmacy and Technology | 0974-360X |
39 | An Access Control Models In Cloud Computing: A Review | Priya G, Kavitha Br, Ramya G , Kumaresan P , Feslin Anish Mon | International Journal of Pure and Applied Mathematics | ISSN: 1311 |
40 | An Analysis And Performance Evaluation Of Nosql Databases For Efficient Data Management In E-Health Clouds | S L Aarthy | Internation Journal of Pure and Applied Mathematics | 13118080 |
41 | An Approach For Dynamic Replica Allocation For Sparse (Urban/Sub-Urban) And Dense Regions (City Side) In Vanet | Kumar P J, Manikandan, N., Suganya, P., Sureka, S | International Journal of Civil Engineering and Technology | 0976-6308 |
42 | An Approach To Evaluate The Availability Of System In Cloud Computing Using Fault Tree Technique | M.Deepa, M.Anand | INASS | 2185-3118 |
43 | An Efficient And Secure Biometric Authentication Scheme For M-Commerce | R. Thandeeswaran, Hamid Mcheick, Hemant Agrawal, Ajay Thakur, N. Jeyanthi, Rajan Slathia, | International Journal of Civil Engineering and Technology | 0976 - 6308 |
44 | An Efficient Deep Learning Neural Network Based Brain Tumor Detection System | Chinmayi, L Agilandeeswari, M Prabukumar, K Muralibabu | International Journal of Pure and Applied Mathematics, | 1314-3395 |
45 | An Efficient Hybrid Approach For Hyperspectral Image Classification, |
L Agilandeeswari, M Prabukumar, S Sathishkumar | International Journal of Pure and Applied Mathematics, | 1314-3395 |
46 | A Survey On Iot Related Patterns | Siva Kumar N | International Journal of Pure and Applied Mathematics | 1314-3395 |
47 | An Enhanced Abe Based Secure Access Control Scheme For E-Health Clouds | P. G. Shynu And K. John Singh | International Journal of Intelligent Engineering and Systems | 2185-3118 |
48 | An Enhanced Cp-Abe Based Access Control Algorithm For Point To Multi-Point Communication In Cloud Computing | P. G. Shynu And K. John Singh | Journal of Information Science and Engineering | 1016-2364 |
49 | An Enhanced Framework For Sign Gesture Recognition Using Hidden Markov Model And Adaptive Histogram Technique | Rajesh Kaluri, Pradeep Reddy Ch | International Journal of Intelligent Engineering and Systems | 2185-3118 |
50 | An Enhanced Virtual Backoff Algorithm For Wireless Sensor Networks | Babu, P.R., Krishna, P.V., Saritha, V., Pounambal, M | International Journal of Wireless and Mobile Computing | 17411084 |
51 | An Intelligent Approach Of Query Process Optimisation Using Cooperative Semantic Caching Techniqu | P.Mohankumar | Journal of Engineering science and Technology | 1823-4690 |
52 | An Overview Of Data Mining Techniques And Its Applications | G.Kavitha,N.M.Elango | International Journal of Civil Engineering and Technology | 9766308 |
53 | Analysis Of Using Sparse Matrix Storage Formats In Image Compression Techniques | Banu,J.S, Babu.M.R, Thaseen,I.S And Balamurugan.P | International Journal of Pure and Applied Mathematics | 1311-8080 |
54 | Analyzing Customer Sentiments Using Machine Learning Techniques | Magesh G, Dr.P.Swarnalatha | International Journal of Civil Engineering and Technology (IJCIET Journal) | 0976 - 6316 |
55 | Assessment And Optimisation Of User Imprecise Queries In Cloud Environments | P.Mohankumar | International journal of Intelligent Engineering and system | 2185-3118 |
56 | Automatic Brain Tumour Segmentation Techniques - A Review | Angulakshmi.M, Lakshmi Priya. Gg | International Journal of Imaging Systems and technology | 1098-1098 |
57 | Automatic Grading System For Mangoes Using Multiclass Svm Classifier | L Agilandeeswari, M Prabukumar, Goel Shubham | International Journal of Pure and Applied Mathematics | 1311-1314 |
58 | Availability Modelling Of Fault Tolerant Cloud Computing System | M.Deepa, M.Anand | INASS | 2185-3118 |
59 | An Evolutionary Secre Energy Efficient Routing Protocol In Iot | Praveen Kumar Reddy, Rajasekhara Babu | International Journal intelligent engineering and systems | 1311063047 |
60 | Big Data And Its Applications: A Survey | Magesh G, Dr.P.Swarnalatha | Research Journal of Pharmaceutical, Biological and Chemical Sciences | 0975-8585 |
61 | Big Data Management With Machine Learning Inscribed By Domain Knowlegde For Health Care | Sujatha R., E.P.Ephzibah | International Journal of Engineering & Technology | 2227-524X |
62 | Biomarker Selection From Gene Expression Data For Tumour Categorization Using Bat Algorithm | Gunavathi Chellamuthu, Premalatha Kandasamy, Sivasubramanian Kanagaraj | International Journal of Intelligent Engineering & Systems | 2185-3118 |
63 | Bluetooth Based Low Power Data Acquisition System For Ban | Kumaresan P Prabukumar M, | International Journal of Pure and applied Mathematics - Special issue on Computer and Communication Editors | 1311-8083 |
64 | Case Study: A Line Following Robot For Hospital Management | Kumaresan P,Priya.G,Kavitha B R, Ramya G, M.Lawanyashri | International Journal of Pure and Applied Mathematics | 1311-1314 |
65 | Ciphertext-Scheme Based On Attribute Hybrid Encryption In Cloud Computing. | Meenatchi, S., Navaneethan, C., Iyapparaja, M., Thanapal, P., & Prabhakaran, R., | Jour of Adv Research in dynamic & Control System | 1943-023X |
66 | Clustering Of Wireless Sensor Networks | Nallakaruppan, M.K., Ilango, P., Deepa, N., Muthukumarappan, A. | Research Journal of Pharmacy and Technology | 9743618 |
67 | Comparative Study On Performance Analysis Of Time Series | Syed Muzamil Basha, Yang Zhenning, Dharmendra Singh Rajput, Iyengar N.Ch.S.N. And Ronnie D. Caytiles | International Journal of Grid and Distributed Computing | 2207-6379 |
68 | Computer Numerical Control Machine Based On Machine Learning | Kumaresan P Balavignesh G, Kavitha B R, Ramya Govindaraj, Venkatesan S | International Journal of Pure and applied Mathematics - Special issue on Computer and Communication Editors | 1311-8080 |
69 | An Enhanced Trust Startegy For Online Social Networks Using Probalistic Reputation Features | Raj E D, Babu L.D.D | Neurocomputing | 9252312 |
70 | Concept Compression In Formal Concept Analysis Using Entropy-Based Attribute Priority | K. Sumangali Ch. Aswani Kumar | Applied Artificial Intelligence An International Journal | 0883-9514 |
71 | Context Residual Energy Based Trust Management In Mobile Adhoc Networks | R. Vijayan, N. Jeyanthi | International Journal of Communication Networks and Distributed Systems (Inderscience | 1754-3916 |
72 | Covering Rough Set Fuzzy C- Medoids (Crfm) Clustering Algorithm For Gene Expression Data |
A.Jayaram Reddy |
Journal of Advanced Research in Dynamical and Control Systems |
1943-023X |
73 |
Crypto Currencies For Digital Currency Using Cipher Text And Sha 256 |
Sukhbir, C.P., Manivannan |
Journal of Advanced Research in Dynamical and Control Systems |
1943-023X |
74 |
Customized Services To Generate Test Suits For Testing Custom Software Application System Based On Knowledge Reuse |
Asha N, Prasanna M |
Journal of Advanced Research in Dynamical and Control Systems |
1943-023X |
75 |
Decision Making Tool For Crop Selection For Agriculture Development |
N. Deepa, K.Ganesan |
Neural Computing and Applications |
1433-3058 |
76 |
Detection Of Anaemia From Tongue Datasets By Image Processing |
Sujatha, R., Aarthy, S.L., Charulatha, A.R. And Sasikala, T.M.S |
International Journal of Research in Pharmaceutical Sciences |
0975-7538 |
77 |
Development Of Advanced Encryption Standard Architecture With Sbox Validity |
Vanitha. M And S. Subha |
Walailak Journal of Science and Technology |
2228-835X |
78 |
Discovery Of Drug And Medicine Using Datamining Techniques |
Anish Chittora , A.Mary Mekala |
Research Journal of Pharmacy and Technology |
0974-3618 |
79 |
Domain Specific Predictive Analytics: A Case Study With R |
Syed Muzamil Basha, Yang Zhenning, Dharmendra Singh Rajput, Iyengar N.Ch.S.N. And Ronnie D. Caytiles |
International Journal of Multimedia and Ubiquitous Engineering |
1975-0080 |
80 |
Dynamic Data Partitioning And Virtual Chunking For Effective Data Retrieval |
M.Vanitha, R.Mangayarkarasi, Jasmine Norman, R.Sakthivel, K.Baranitharan |
International Journal of Pure and Applied Mathematics |
1311-8080 |
81 |
Dynamic Energy Optimization Technique In Mobile Cloudlet For Mobile Cloud Computing Using Effective Offloading Algorithm |
P.Priya, S.P.Shantharajah |
Journal of Theoretical and Applied Information Technolog |
1992-8645 |
82 |
Effective Evaluation Of Prediction Accuracy Using Optimization Algorithm, |
Brindha.K, Sudha.S , Rathi.R And Charanya.S, |
International Journal of Pure and Applied Mathematics |
1311-8080 |
83 |
Effective Mining Approach To Produce Quality Search Results Using Proposed Approach |
Elavarasan D, Durai Raj Vincent |
International Journal of Intelligent Engineering and Systems |
2185-3118 |
84 |
Energy Efficient Consumption For Quality Based Sleep Scheduling In Wireless Sensor Networks |
A. S. Syed Navaz, N. Asha And D. Sumathi |
ARPN Journal of Engineering and Applied Sciences |
1819-6608 |
85 |
Energy Efficient Node Selection Algorithm Based On Node Performance Index And Random Waypoint Mobility Model In Internet Of Vehicles |
P M Kumar, Ushadevi Gandhi, R Varatharajan, Gunasekaran Manogaran, R Jidhesh, Thanjai Vadivel |
Cluster Computing |
1573-7543 |
86 |
Integration Of Fuzzy Dematel And Fmcdm Approach For Evaluating Knowledge Transfer Effectiveness With Reference To Gsd Project Outcome |
Jagadeesh G, Arun Kumar S, X.Z.Gao |
International Journal of Machine Learning and cybernetics |
1868-8071 |
87 |
Enhanced Dtls With Coap-Based Authentication Scheme For The Internet Of Things In Healthcare Application |
Pm Kumar, Ud Gandhi |
The Journal of Supercomputing |
0920-8542 |
88 |
Enhancing Trust In Mobile Adhoc Network Using Trust And Dynamic With Energy Efficient Multipath Routing Protocol |
Vijayan R , Jeyanthi N |
International Journal of Signal and Imaging Systems Engineering |
1748-0698 |
89 |
Estimating Construction Data Using An Authenticated Application For Urban Planning |
S.Sree Dharinya, Ephzibah.E.P, Divya Udayan, R. Kirubathangam, & Charanya.R |
International Journal of Civil Engineering and Technology (IJCIET) |
9766308 |
90 |
Evaluating The Impact Of Feature Selection On Overall Performance Of Sentiment Analysis |
Syed Muzamil Basha, Dharmendra Singh Rajput |
ACM Digital Library |
978-1-4503 |
91 |
Evolutionary And Neural Computing Based Decision Support System For Disease Diagnosis From Clinical Data Sets In Medical Practice, |
M. Sudha |
Journal of Medical Systems |
1573-689X |
92 |
Feature Selection For Privacy Preserving In Data Mining With Linear Regression Using Genetic Algorithm |
Kumaran U, Neelu Khare |
Journal of Advanced Research in Dynamical and Control Systems |
1943-023X |
93 |
Flowagent: Software Defined Firewall Rule Generator For Network Intrusion Detection System |
Nithya S |
International Journal of Intelligent Engineering and Systems |
2185-3118 |
94 |
Forward Secrecy Scheme For Data Sharing In Cloud |
M. Lawanya Shri , G.Priya, M.B.Benjula Anbumalar, Deepa Mani, K.Santhi |
International Journal of Pure and Applied Mathematics |
1311-8080 |
95 |
Handling Stakeholder Conflict By Agile Requirement Prioritization Using Apriori Technique |
Rv Anand, M.Dinakaran |
Computers & Electrical Engineering |
0045-7906 |
96 |
Hb-Ppac: Hierarchy-Based Privacy Preserving Access Control Technique In Public Cloud |
Sudha Senthilkumar,Madhu Viswanatham |
International journal of High Performance computing and networking |
1740-0570 |
97 |
Information Retrieval For Question Answering System Using Knowledge Based Query Reconstruction By Adapted Lesk And Latent Semantic Analysis |
Saravanakumar K, Aswani Kumar Cherukuri |
International Journal of Computer Science and Applications |
0972-9038 |
98 |
Intelligent Decision Support System Based On Rough Set And Fuzzy Logic Approach For Efficacious Precipitation Forecast, |
M. Sudha |
Decision Science Letters |
19295812 |
99 |
Intelligent Face Recognition And Navigation System Using Neural Learning For Smart Security In Internet Of Things |
Pm Kumar, Ud Gandhi |
Cluster Computing |
1573-7543 |
100 |
Intrusion Detection Model Using Fusion Of Chi-Square Feature Selection And Multi Class Svm |
I.Sumaiya Thaseen, |
Journal of King Saud University-Computer and Information Sciences |
1319-1578 |
101 |
A Hybrid Cluster Head Selection Model For Iot |
Praveen Kumar Reddy M |
springer |
1058601712 |
102 |
K-Means Modification For Scalability |
S.Bhavani,Sumit Patel, Dhanashri Patil, Yash Shah, Rushikesh Babar, Abhishek Rathi |
International Journal of Civil Engineering and Technology |
0976-6308 |
103 |
Llvm Compiler |
R.Bansal, Jasmine Norman,Mangayarkarasi R,Vanitha M, Chandramouliswaran S |
International Journal of Pure and Applied Mathematics |
1311-8080 |
104 |
Luggage Tracking System Using Iot |
Sudha Senthilkumar, Brindha.K, Rathi.R, Charanya. R, Mayank Jain |
International Journal of Pure and Applied Mathematics |
1314-3395 |
105 |
Metrics Based Evaluation For Disease Affection In Distinct Cities |
M.Iyapparaja |
Research Journal of Pharmacy and Technology |
0974-3618 |
106 |
Multi-Voting And Binary Search Tree-Based Requirements Prioritisation For E-Service Software Project Development |
Vijayanand R, Dinakaran M |
Electronic Government, an International Journal |
1740-7494 |
107 |
Network Life Time Uniformed By Mutual Nodes Cooperation And Life Nodes Relay In Wsn’S. |
Thanapal, P., Prabhakaran, R., Meenatchi, S., Navaneethan, C., & Iyapparaja, M. |
Jour of Adv Research in dynamic & Control System |
1943-023X |
108 |
Non-Intrusive Transaction Aware Filtering During Enterprise Application Modernizationra |
Ramadoss, R., Elango, N.M., Abimannan, S., Hsu, C.-H. |
Journal of Supercomputing |
0920-8542 |
109 |
Soft Sequential Recognition Approach For User Activity Using A Wearable Device |
Prabhavathy P |
IJMET |
9766359 |
110 |
Opinion Mining Services Using Machine Learning |
Sujatha. R, M Sai Praneeth And M Lakshmi Deepak |
Journal of Chemical and Pharmaceutical Sciences |
0974-2115 |
111 |
Optimal Decision Tree Fuzzy Rule Based Classifier (Odt-Frc) For Heart Disease Prediction Using Improved Cuckoo Search Algorithm” |
Subhashini Narayan , Jagadeesh Gobal |
International Journal of Business Intelligence and Data Mining. |
1943-023X |
112 |
Optimizing Health Care Records By Preventing Duplication In Cloud |
Sujatha R, Kaviya P.S |
International Journal of Research in Pharmaceutical Sciences |
0975-7538 |
113 |
Overview Of Securing Multimedia Content Using Efficient Encryption Methods And Modes |
K. John Singh And Kunal Gagneja |
International Journal of Advanced and Applied Sciences |
2313-3724 |
114 |
Parallel Aes Algorithm For Performance Improvement In Data Analytics Security For Iot |
Manikandan N, Subha S |
International Journal of Networking and Virtual Organisations |
1470-9503 |
115 |
Passive Incidental Alertness—Based Link Visualization For Secure Data Transmission In Manet |
S.Uma, S.P.Shantharajah, C.Rani |
1936-1610 |
|
116 |
Prediction Of Diabetes Using Data Mining Techniques |
V. Mareeswari, Saranya R, Mahalakshmi R, Preethi E |
Research Journal of Pharmacy and Technology |
0974-3618 |
117 |
Preventing From Phishing Attack By |
U.Rahamathunnisa,N.Manikandan,U.Senthilkumaran And C.Niveditha |
International Journal of Civil Engineering and Technology |
0976-6316 |
118 |
Rating Prediction Based On Social Sentiment From Textual Reviews |
M. Deepa, K. Santhi, M. B. Benjulaanbu Malar,Priya . G, M. Lawanya Shri |
International Journal of Pure and Applied Mathematics |
1311-8080 |
119 |
Robust Classification Of Hyperspectral Remote Sensing Images Combined With Multihypothesis Prediction And 3 Dimensional Discrete Wavelet Transform |
Boggavarapu L N P, M Prabukumar |
International Journal of Pure and Applied Mathematics, |
1311-8080 |
120 |
Secret Image Enhanced Sharing Using Visual Cryptography |
K.Brindha, N.Jeyanthi |
Cybernetics and Information Technologies |
1314-4081 |
121 |
Secured Sharing Data In Cloud Using Revocable Storage Identity Based Encryption |
M.Iyapparaja |
Journal of Advanced Research and Dynamical & Control Systems |
1943-023X |
122 |
Securing Portable Document Format File Using Extended Visual Cryptography To Protect Cloud Data Storage |
K.Brindha, N.Jeyanthi |
International Journal of Network Security |
1816-3548 |
123 |
Security Algorithms In Cloud Computing: A Review, |
M B Benjula Anbu Malar, Lawanyasri |
International Journal of Pure and Applied Mathematics |
1314-3395 |
124 |
Security Solution For Arp Cache Poisoning Attacks In Large Data Center Networks |
B. Prabadevi, N. Jeyanthi |
Cybernetics and Information Technologies |
1311-9702 |
125 |
Smart Cooking Oil Analyzer Using Dielectric Constant Metric |
Sriniavs Koppu., Rajesh D., Srinivasa Perumal R., Satheesh Kumar S., Rajeev Pankaj Nelapati |
International Journal of Pure and Applied Mathematics, |
1311-8080 |
126 |
Software Management Issues In Mobile Application Development |
Deepa N, M. Senthilkumar, M.K.Nallakaruappn, R.Chandrasekar, B R Kavitha ,Anand Muthukumarappan |
International Journal of Civil Engineering and Technology (IJCIET) |
0976-6308 |
127 |
Specification Based Intrusion Detection In Software Defined Networking |
Nithya S |
International Journal of Pure and Applied Mathematics |
1314-3395 |
128 |
An Improved Multiplication Algorithm |
Subha S |
International Journal of Pure and Applied Mathematics |
1311-8080 |
129 |
Stable Multipath Routing Protocol Using Different Route Selection Mechanism For Mobile Ad-Hoc Networks. |
Alagiri, I., Muthamil Selvan, T., Thanapal, P., & Navaneethan C. |
Inernational journal of pure and applied mathematics |
1314-3395 |
130 |
Statistical Feature Ranking And Fuzzy Supervised Learning Approach In Modeling Regional Rainfall Prediction Systems |
M. Sudha |
AGRIS on-line Papers in Economics and Informatics |
1804-1930 |
131 |
Stratified Sampling Method Based Training Pixels Selection For Hyper Spectral Remote Sensing Image Classification |
M Radhesyam, Vaddi, Prabukumar M |
International Journal of Pure and Applied Mathematics, |
1314-3395 |
132 |
Successive Shape Based Image Registration |
L Agilandeeswari, M Prabukumar, Chinmay, K Muralibabu, Sudharani |
International Journal of Pure and Applied Mathematics, |
1314-3395 |
133 |
Survey About Segmentation Feature Extraction And Classification Of Disease Affected Leaf Using Digital Image |
S.Kalaivani, S.P.Shantharajah |
Journal of Advanced Research in Dynamical and Control System |
1943-023X |
134 |
Techiecardia-A System For Detection And Prediction Of Sudden Cardiac Arrests |
M.Iyapparaja |
Journal of Advanced Research and Dynamical & Control Systems |
1943-023X |
135 |
Test Case Generation For Embedded System Software Using Uml Interaction Diagram |
Mani P, Prasanna M |
Journal of Engineering Science and Technology |
1823-4690 |
136 |
Swf Scheduled Workflow Integration Profile For The Connectivity Problems In Radiology Workflow |
Prabadevi. B, |
International Journal of Intelligent Engineering and Systems |
9758585 |
137 |
Two Layered Optimized System Using Bluetooth And Hipherlan Interfaced Wireless Sensor Networks |
M.Iyapparaja |
Journal of Advanced Research and Dynamical & Control Systems |
1943-023X |
138 |
User Web Access Recording And Mining For Business Intelligence |
Sindhuja, T.,S.S. Manivannan |
Journal of Advanced Research in Dynamical and Control Systems |
1943-023X |
139 |
Weighted Fuzzy Rule Based Sentiment Prediction Analysis On Tweets |
Syed Muzamil Basha, Yang Zhenning, Dharmendra Singh Rajput, Iyengar N.Ch.S.N And Ronnie D. Caytiles |
International Journal of Grid and Distributed Computing |
2207-6379 |
140 |
Cloud Based Automated Framework For Semantic Rich Ontology Construction |
T. Muthamilselvan , B. Balamurugan |
Informatics in Medicine Unlocked |
2352-9148 |
141 |
Hybrid Approach For Data Classification In E-Health Cloud |
T. Muthamilselvan , B. Balamurugan |
International Journal of Intelligent Engineering and Systems |
2185-3118 |
142 |
Role Of Automation In Waste Management And Recent Trends |
Raghavendra Desai, M Parimala |
International Journal of Environment and Waste Management |
1478-9868 |
143 |
An Optimized Replica Allocation Algorithm Amidst Of Selfish Nodes In Manet |
Kumar Pj, Ilango P |
Wireless Personal Communication, Springer |
0929-6212 |
144 |
Mqrc: Qos Aware Multimedia Data Replication In Cloud |
Kumar Pj, Ilango P |
International Journal of BioMedical Engineering and Technology |
1752-6418 |
145 |
Upper Bound Tighter Item Caps For Fast Frequent Itemsets Mining For Uncertain Data Implemented Using Splay Trees |
Shashikiran.V And S.Murali |
International Journal of Pure and Applied Mathematics |
1311-8080 |
146 |
Energy Efficient Cluster Head Selection Algorithm In Wireless Sensor Networks Using Ea-Fkpso Protocol |
Meenatchi, S., & Prabu, S. |
Jour of Adv Research in Dynamical & Control Systems. |
1943-023X |
147 |
Test Case Generation For Real Time System Software Using Specification Diagram |
Prasanna M |
international journal of intelligent engineering and systems |
2185-3118 |
148 |
An Intelligent Lung Cancer Diagnosis System |
Prabukumar M, Agilandeeswari, L. And Ganesan. K |
Journal of Ambient Intelligence and Humanized Computing |
1868-5137 |
149 |
Heart Disease Prediction System Using Ann, Rbf And Cbr |
N. Sivakumar, R.Jothikumar, P.S.Ramesh & Suganthan |
International Journal of Pure and Applied Mathematics |
1314-3395 |
150 |
Applying Reversible Data Hiding For Medical Images In Hybrid Domain Using Haar And Modified Histogram |
Vanmathi Chandrasekaran, Prabu Sevugan, |
International Journal of Intelligent Engineering and Systems |
2185-3118 |
151 |
Image Steganography Using Fuzzy Logic And Chaotic For Large Payload And High Imperceptibility |
Vanmathi C., Prabu S |
International Journal of Fuzzy Systems |
1562-2479 |
152 |
A Comparative Study Of Statistical And Rough Computing Models In Predictive Data Analsis |
A. Anitha, D. P. Acharjya |
International Journal of Ambient Computing and Intelligence (IJACI) |
1941-6237 |
153 |
Crop Suitability Prediction In Vellore District Using Rough Set On Fuzzy Approximation Space And Neural Network |
A. Anitha, D. P. Acharjya |
Neural Computing and Applications |
0941-0643 |
154 |
Optimal View Point Selection In Direct Volume Rendering For 3D Visualization |
Gunasekaran, G., & Venkatesan, M. |
International Journal of Intelligent Engineering and Systems |
2185-3118 |
155 |
An Efficient Technique For Three-Dimensional Image Visualization Through Two-Dimensional Images For Medical Data |
Gunasekaran, G., & Venkatesan, M. |
Journal of Intelligent Systems |
2191-026X |
156 |
A Novel Method For Smart Vehicle Safety |
K.Uma, Anand Kannan, |
Journal of Advanced Research in Dynamical and Control Systems |
1943-023X |
157 |
Alert On Detection Of Hazardous Changes In Environmental Parameters Using Gsm |
K.Uma |
Journal of Advanced Research in Dynamical and Control Systems |
1943-023X |
158 |
Smart Vehicle Safety Using Efficient Technique To The Vehicle Traveller’S |
K.Uma |
Journal of Advanced Research in Dynamical and Control Systems |
1943-023X |
159 |
The Challenges And Issues On Big Data Analytics |
K.Uma, Anand Kannan |
Journal of Advanced Research in Dynamical and Control Systems |
1943-023X |
160 |
An Analysis Of Decision Theoretic Kernalized Rough Intuitionistic Fuzzy C-Means |
Ryan Serrao, B.K.Tripathy And A.Jayaram Reddy |
Advances in Intelligent Systems and Computing |
2194-5357 |
161 |
Hocs : Host Oscommunication Service |
Jayakumar Sadhasivam, Senthil Jayavel, Balajee Jayakumar, Shoaib Merchant |
International Journal of Civil Engineering and Technology |
0976-6316 |
162 |
A Review On Polygonal Approximation Techniques Of The Digital Planar Curves |
Kalaivani S |
International Journal of pure and Applied Mathematics |
1311-8080 |
163 |
Review Of Gaming And Its Evolution Over Networks |
Jaya Kumar S |
International Journal of Civil Engineering and Technology |
0976-6316 |
164 |
Convoluted Local Binary Pattern Based Grouping Neural Network For Face Emotion Recognition |
Krithika L B,Lakshmi Priya Gg |
Journal of Engineering Science and Technology Review |
1791-2377 |
165 |
A Case Study Of Carry Skip Adder And Design Of Feed-Forward Mechanism To Improve The Speed Of Carry Chain |
Premson Y, Sakthivel.R,Vivek.T, Vanitha M |
International Journal of Pure and Applied Mathematics |
1311-8080 |
166 |
Performance Analysis Of Cloud Computing In Healthcare Systemusing Tandem Queues |
K.Santhi, R.Saravanan |
International Journal of Intelligent Engineering and Systems |
2185-3118 |
167 |
Performance Analysis Of Cloud Computing Bulkservice Using Queueing Models |
K.Santhi, R.Saravanan |
International Journal of Applied Engineering Research |
1311-8080 |
168 |
Performance Analysis Of Cloud Computing Using Batch Queueing Models In Healthcare Systems |
K.Santhi, R.Saravanan |
Research Journal of Pharmacy and Technology |
0974-360X |
169 |
Clustering Algorithm In Possibilistic Exponential Fuzzy C-Mean Segmenting Medical Images |
Chiranji Lal Chowdhary |
JOURNAL OF BIOMIMETICS, BIOMATERIALS AND BIOMEDICAL ENGINEERING |
2296-9845 |
170 |
Modelling The H1Ni Influenza Using Mathematical And Neural Network Approaches |
Daphne Lopez, Gunasekaran M, Jagan Mohan |
Biomedical Research |
0970-938X |
171 |
Parametric Model To Predict H1N1 Influenza In Vellore District, Tamil Nadu, India |
Daphne Lopez, Gunasekaran Monoharan |
Handbook of Statistics |
1992-8408 |
172 |
A Survey On Big Data Arcitectures And Machine Learning Algorithms In Healthcare |
Gunasekaran M,Daphne Lopez |
International Journal of Biomedical Engineering and Technology |
1752-6418 |
173 |
A Gaussian Process Based Big Data Processing Framework In Cluster Computing Environment |
Gunasekaran M,Daphne Lopez |
Cluster Computing |
1386-7857 |
174 |
Disease Surveillance System For Big Climate Data Processing And Dengue Transmission |
Gunasekaran M,Daphne Lopez |
International Journal of Amient Computing and Intelligence |
1941-6237 |
175 |
Document Level Prioritization And Identificataion Of Dominant Multi-Word Named Products In Customer Reviews |
Sivashankar,Valarmathi |
Aab Journal of Science & Engineering |
2191-4281 |
176 |
A Heuristic Approach To Machine-Part Cell Formation In The Presence Of Alternative Process Plans |
Sowmiya N, Srinivasa Gupta, Valarmathi, Poonambalam |
International Journal of Advanced Manufacturing Technology |
14333015 |
177 |
A Review Of Categorical Data Clustering Methodologies Based On Recent Studies |
Sowmiya,Valarmathi |
IIOAB Journal |
9763104 |
178 |
Brain Tumour Segmentation From Mri Using Superpixels Based Spectral Clustering. |
Angulakshmi, M., Gg Lakshmi Priya |
Journal of King Saud University-Computer and Information Sciences |
1319-1578 |
179 |
Procedural Restoration Of Texture And Restruing Geometry From Façade Image |
Divya Udayan |
IEEE access |
21693536 |
180 |
A Study On Tailor-Made Security Schemes To Defend Iots |
M N Rajaprabha, P Jayalakshmi, R Vijay Anand |
International Journal of Advance Research in Science and Engineering |
2319-8354 |
181 |
Bike Sharing Prediction Using Deep Neural Networks |
Thirumalai, Chandrasegar And Koppuravuri, Ravisankar. |
JOIV: International Journal on Informatics Visualization |
2549-9610 |
182 |
Comparative Study On Various Graph Algorithms, . 414-419 |
Angulakshmi., Rathi,R., Sudha, S., Brindha,K., |
International journal of advance research in science and engineering |
2319-8346 |
183 |
Honey Bee Foreaging Algorithm For Load Balancing In Cloud Computing Optimization |
Sudha, S., Brindha,K., Rathi,R.,Angulakshmi., Jothi.,Thirani., |
International Journal of Engineering Science and Computing |
2321-3361 |
184 |
A Case Study On Cognitively Improvised Min-Max Algorithm For Distributed Computer Systems, |
Sudha, S., Brindha,K., Rathi,R.,Nishanth,A., Vivek,P., |
International Journal for Scientific Research & Development |
906-911 |
185 |
A Case Study On Performance Analysis Of Routing Protocols In Mobile Adhoc Netwoks |
Nallakaruppan.M.K, N. Deepa,Pranava Kumar.R, Sudhanshu Gera,Arpit Chikara |
International Journal for Science and Advance Research in Technology |
2395-1052 |
186 |
Analysis Of Agricultural Data Using Big Data Analytics |
Ravishankar K, Sidhardha K, Prabadevi B |
Journal of chemical and pharmaceutical Sciences |
0974-2115 |
187 |
A Data Security Self-Attribute System In Cloud Computing |
Kumaresan P Dhanesh Lokhande |
International Journal of Innovative Research in Computer |
2320-9798 |
188 |
A Modified Synthetic Division Algorithm |
S Subha |
International Journal of Computational and Applied Mathematics |
2349-5103 |
189 |
A Novel Based Ranking Radically Influential Web Environment Users, |
M B Benjula Anbu Malar |
International Journal of Advance Research in Science and Engineering |
2319-8354 |
190 |
A Novel Method Of Real Time City Scale Taxi Trip Distribution |
M B Benjula Anbu Malar |
International Journal of Advance Research in Science and Engineering |
2319-8354 |
191 |
A Study On Travel Recommendation System |
Angulakshmi , Rathi.R , Dr.Sudha Senthilkumar , Dr.K.Brindha , Rajat Tandon |
International Journal of Engineering Science and Computing, December |
2321 3361 |
192 |
A Survey On Trust Models In Cloud Computing |
Kumaresan P Ramya Govindaraj Kavitha B R |
International Journal of Advance research in Science and Engineering |
2319-8354 |
193 |
A Synthetic Division Algorithm With Positive Remainder |
S Subha |
International Journal of Advanced Science and Research |
2455-4227 |
194 |
Agriculture E-Commerce Website, |
M B Benjula Anbu Malar |
International Journal of Advance Research in Science and Engineering , |
2319-8354 |
195 | Agronomic Disaster Management Using Artificial Intelligence – A Case Study | M. Sudha | International Journal of Computer Science and Business Intelligence | 2364-4168 |
196 | An Efficient And Secured Data Storage Scheme In Cloud Computing, | M B Benjula Anbu Malar | International Journal of Advance Research in Science and Engineering | 2319-8354 |
197 | Applications Of Iot In Green Environment | Kumaresan P, Darshan K N, Kavitha B R, Ramya Govindaraj | International Journal of Advance research in Science and Engineering | 2319-8354 |
198 | Big Data In Healthcare: A Review | Magesh G, P.Swarnalatha | Emerging trends in Computer Engineering and Research, IIOAB Journal | 0976-3104 |
199 | Cloud With Iot In Smart Parking | Sujatha R, Rahul Gorai, Harshita Wadhwa, Shivani Tripathi | International Journal of Innovative Research in Management, Engineering and Technology | 2456-0448 |
200 | Computational Intelligence Based Sports Success Prediction System Using Functional Pattern Growth Tree – A Case Study | M. Sudha | International Journal of Computational Intelligence Research | 0974-1259 |
201 | Content Based Image Retrieval Using Hadoop And Hipi | Kumaresan P, Kavitha B R, Ramya Govindaraj | International Journal of Advance research in Science and Engineering | 2319-8354 |
202 | Detection Of Phishing Pages Over The Internet Using Anti-Phishing Techniques | P Jayalakshmi, M N Rajaprabha, R Vijay Anand | International Journal of Advance Research in Science and Engineering | 2319-8354 |
203 | Expelling Undesired Targets From An Image Exploiting Surface Synthesis And Dispersion and Communication Engineering Based Technique |
Kumaresan P, Pratik Bhosale | International Journal of Innovative Research in Computer | 2320-9798 |
204 | Framework For Reliable Re Encryption In Cloud | Magesh G, P.Swarnalatha | Journal of Chemical and Pharmaceutical Sciences | 0974-2115 |
205 | Fuzzy-Set Based Privacy Preserving Access Control Techniques In Cloud (Fb-Ppac) | Brindha.K, Sudha.S ,Sushmitakumari | International Journal of Artificial Intelligence | 2252-8938 |
206 | Gdfs Based Data Encryption Technique In Cloud Computing Environments | M B Benjula Anbu Malar | International Journal of Advance Research in Science and Engineering | 2319-8354 |
207 | Heart Disease Prediction Using Data Mining Techniques | Nallakaruppan.M.K, N. Deepa, Moin Ahmed, Tanuja, Ajith Kumar,Pranava Kumar.R | International Journal of Engineering Science and Computing | 2321-3361 |
208 | An Improved Tumour Identification With Gabor Wavelet Segmentation | Ciranji Lal Choudahary | Research | 2321 3361 |
209 |
Inquiry Based E-Learning System Using Personalized Knowledge Search |
P Jayalakshmi, M N Rajaprabha, R Vijay Anand And K Venkatesan |
International Journal of Advance Research in Science and Engineering |
2319-8354 |
210 |
Instant Medical Care And Drug Suggestion Service Using Data Mining And Machine Learning Based Intelligent Self-Diagnosis Medical System |
M. Sudha |
International Journal of Advanced Life Sciences |
2277-758X |
211 |
Iris Recognition System |
Magesh G, Ravee Sundararajan |
International Research Journal of Engineering and Technology (IRJET) |
2395-0056 |
212 |
Leaf Disease Detection Using Image Processing |
Sujatha, R, Y Sravan Kumar And Garine Uma Akhil |
Journal of Chemical and Pharmaceutical Sciences |
0974-2115 |
213 |
Precision Agriculture Using Real Time |
Kumaresan P Ketan Prakash Kandagale |
International Journal of Innovative Research in Computer |
2320-9798 |
214 |
Privacy Preserving And Secret Based Navigation Scheme In Vehicular Adhocnetwork : A Case Study |
M B Benjula Anbu Malar |
International Journal of Advance Research in Science and Engineering , |
2319-8354 |
215 |
Reconfigurable Interpolation Filter Architecture Design |
Satheesh Kumar S, Venugopal P, Srinivas Koppu, Rajeev Pankaj N, Rajesh Kaluri, Madhusudhana Rao |
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering |
2278-8875 |
216 |
Reconstruction Of Per Packet Routing Path |
M B Benjula Anbu Malar |
International Journal of Advance Research in Science and Engineering |
2319-8354 |
217 |
Smarter Way To Access Multiple Mobile Cloud Applications Without Interoperability Issues. |
Thanapal, P., Marimuthu, K., Rajkumar, S., & Niranchana, R. |
I.J. Wireless and Microwave Technologies |
2076-1449 |
218 |
Temperature Controlled Dc Fan |
Sudha, S., Brindha,K., Rathi,R.,Hardi,S., Kataria,S., |
International journal of advance research in science and engineering |
498-506 |
219 |
User Authentication Framework With Improved Performance In Multi-Cloud Environment |
R. Thandeeswaran, M A Saleem Durai |
American Journal of Computer Science and Information Technology |
2349-3917 |
220 |
Validation Of Automated Test Cases With Specification Path |
Mani P, Prasanna M |
Journal of statistics and Management Systems |
0972-0510 |
221 |
Weather Modeling Using Data-Driven Adaptive Rough-Neuro-Fuzzy Approach |
M. Sudha |
Current World Environment |
0973-4929 |
222 |
Assessment Of Unfair User Rating In Multidisciplinary System |
V.Mareeswari, Bala Prasanth P |
Research Journal of Pharmaceutical, Biological and Chemical Sciences |
0975-8585 |
223 |
Pattern Recognition Using Pca Algorithms |
Uma Maheswari G, Ephzibah E P, Mareeswari V |
Research Journal of Pharmaceutical, Biological and Chemical Sciences |
0975-8585 |
224 |
Fog Computing – Enhancing The Maximum Energy Consumption Of Data Servers |
Priyanka C, Prabadevi, Jeyanthi N |
IDL - International Digital Library Of Technology & Research |
2349-302X |
225 |
Anomaly Based Intrusion Detection Methods In Network Infrastructure – A Survey |
Dhanabal L, S.P.Shantharajah, T. Padma |
Asian Journal of Research in Social Sciences and Humanities |
2249-7315 |
226 |
Survey Of Image Segmentation Algorithm For Medical Images: Challenges And Methodologies |
P Chinmayi, M Prabukumar, L Agilandeeswari |
RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES |
0975-8585 |
227 |
Data Replication In Current Generation Computing Environment |
Kumar Pj, Ilango P |
International Journal of Engineering trends and Technology, |
2231-5381 |
228 |
Data Replication In Conventional Computing Environment |
Kumar Pj, Ilango P |
International Journal of Computer Trends and Technology |
2231-2803. |
229 |
Case Study- Machine Learning Based On Scenario Analysis |
Prabadevi. B, Vanmathi. C, Krithika. L. B, Sudha. S, Vivek Akabote |
International Journal of Scientific Research in Computer Science, Engineering and Information Technology |
2456-3307 |
230 |
Precise Investigations Of Software Quality |
Alice Auxilia .L, Asha .N, Vanmathi .C |
International Journal of Engineering Science and Computing, |
2321-3361 |
231 |
Intrusion Detection System Based On Artificial Intelligence |
|
International Journal of Technology |
2231-3915 |
232 |
Mooc : A Framework For Learners Using Learning Style |
Jayakumar Sadhasivam And Ramesh Babu Kalivaradhan |
International Education and Research Journal |
2454-9916 |
233 |
Review On Sentiment Analysis A Learners’ Opinion |
Jayakumar Sadhasivam And Ramesh Babu Kalivaradhan |
IIOAB - Emerging trends in Computer Engineering and Research |
0976-3104 |
234 |
Comparative Study On Web Based Software Project Management Tools |
Jayakumar Sadhasivam |
International Journal of Modern Computer Science |
2320-7868 |
235 |
Data Load Balancing In A Big Data Heterogeneous Environment |
P Jayalakshmi, M N Rajaprabha, R Vijay Anand And K Venkatesan |
International Journal of Advance Research in Science and Engineering |
2319-8354 |
236 |
I Voting |
P Jayalakshmi, M N Rajaprabha, R Vijay Anand And K Venkatesan |
International Journal of Advance Research in Science and Engineering |
2319-8354 |
237 |
A Novel Method For Key Aggregation On Data Sharing In Cloud Stoeage Environment |
K.Shanthi, M.Deepa, M.Lawanya Shri |
International Journal of Advance Research in Science and Engineering |
2319-8354 |
238 |
Implementation Of Morphological Image Processing Algorithm Using Mammograms |
Tk Das, Cl Chowdhary |
journal of chemical and proceessing |
9742-115 |
239 |
A Review On Internet Of Things And Its Applications In Healthcare |
Chiranji Lal Chowdhary |
Journal of Chemical and Pharmaceutic al Sciences |
0974-2115 |
2016
S.No. | Publication details (incl complete bibliography) |
---|---|
1. |
Raj, E. D., & Babu, L. D. (2016). A fuzzy adaptive resonance theory inspired overlapping community detection method for online social networks. Knowledge-Based Systems, 113, 75-87. |
2. |
Vijayakumar, P., Chang, V., Deborah, L. J., Balusamy, B., & Shynu, P. G. (2016). Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Generation Computer Systems. |
3. |
Loganathan, A., & Kaliyaperumal, G. (2016). An adaptive HVS based video watermarking scheme for multiple watermarks using BAM neural networks and fuzzy inference system. Expert Systems with Applications, 63, 412-434. |
4. |
PVSSR, C. M. (2016). Dimensionality reduced local directional pattern (DR-LDP) for face recognition. Expert Systems with Applications, 63, 66-73. |
5. |
Boobalan, M. P., Lopez, D., & Gao, X. Z. (2016). Graph clustering using k-Neighbourhood Attribute Structural similarity. Applied Soft Computing, 47, 216-223. |
6. |
Deepa, N., & Ganesan, K. (2016). Multi-class classification using hybrid soft decision model for agriculture crop selection. Neural Computing and Applications, 1-14. |
7. |
Lopez, D., & Sekaran, G. (2016). Climate change and disease dynamics-a big data perspective. International Journal of Infectious Diseases, 45(1):23-24. |
8. |
Singh, P. K., Kumar, C. A., & Li, J. (2016). Knowledge representation using interval-valued fuzzy formal concept lattice. Soft Computing., 20(4), 1485-1502. |
9. |
Agilandeeswari, L., & Ganesan, K. (2016). A bi-directional associative memory based multiple image watermarking on cover video. Multimedia Tools and Applications, 75(12), 7211. |
10. |
Agilandeeswari, L., & Ganesan, K. (2016). A robust color video watermarking scheme based on hybrid embedding techniques. Multimedia Tools Appl., 75(14), 8745-8780. |
11. |
Ahamed, B. B., & Ramkumar, T. (2016). An intelligent web search framework for performing efficient retrieval of data. Computers & Electrical Engineering, 56, 289-299. |
12. |
Balakrishnan, S. M., & Sangaiah, A. K. (2016). Integrated QoUE and QoS approach for optimal service composition selection in internet of services (IoS). Multimedia Tools and Applications, 1-28. |
13. |
Sujatha, R., & Ezhilmaran, D. (2016). A new efficient SIF-based FCIL (SIF–FCIL) mining algorithm in predicting the crime locations. Journal of Experimental & Theoretical Artificial Intelligence, 28(3), 561-579. |
14. |
Pounambal, M., & Krishna, P. V. (2016). Efficient channel assignment method for multimedia traffic in wireless mesh networks. International Journal of Communication Systems, 29(5), 929-941. |
15. |
Singh, P. K., Aswani Kumar, C., & Gani, A. (2016). A comprehensive survey on formal concept analysis, its research trends and applications. International Journal of Applied Mathematics and Computer Science, 26(2), 495-516. |
16. |
Tripathy, A. K., Chinara, S., & Sarkar, M. (2016). An application of wireless brain–computer interface for drowsiness detection. Biocybernetics and Biomedical Engineering, 36(1), 276-284. |
17. |
Navaneethan, C., & Prabha, K. H. (2016). Optimizing Network Layer with Adaptive Modulation for Time Varying Channel. Wireless Personal Communications, 90(2), 1003-1019. |
18. |
Balasubramanian, V., Nagarajan, S. G., & Veerappagoundar, P. (2016). Mahalanobis distance-the ultimate measure for sentiment analysis. Int. Arab J. Inf. Technol., 13(2), 252-257. |
19. |
Nalinipriya, G., Maheswari, K. G., Balusamy, B., Kotteswari, K., & Kumar Sangaiah, A. (2016). Availability modeling for multi-tier cloud environment. Intelligent Automation & Soft Computing, 1-8. |
20. |
Kumar, C. A., Mouliswaran, S. C., Li, J. H., & Chandrasekar, C. (2016). Role based access control design using triadic concept analysis. Journal of Central South University, 23(12), 3183-3191. |
21. |
Swathi, G., & Saravanan, R. (2016). A Framework for Efficient Routing in MANET using Index Routing Tables-based Algorithms. Defence Science Journal, 66(6), 568. |
22. |
Deepa, N., & Ganesan, K. (2016). Mahalanobis Taguchi system based criteria selection tool for agriculture crops. Sādhanā, 41(12), 1407-1414. |
23. |
Leo Dencelin X, Ramkumar, T. (2016). Analysis of multilayer perceptron machine learning approach in classifying protein secondary structures. Biomedical Research. Special Issue- Computational Life Science and Smarter Technological Advancement, August 2016, S166-S173. |
24. |
Rajavel, D., & Shantharajah, S. P. (2016). Scrambling algorithm for encryption of text using cube rotation artificial intelligence technique. Biomedical Research. Special Issue-Computational Life Science and Smarter Technological Advancement, August 2016, S251-S256. |
25. |
Das, T. K., & Nahar, K. M. (2016). A Voice Identification System using Hidden Markov Model. Indian Journal of Science and Technology, 9(4). |
26. |
Manikandan, N., & Subha, S. (2016). Software Design Challenges in Time Series Prediction Systems Using Parallel Implementation of Artificial Neural Networks. The Scientific World Journal, 2016. |
27. |
Subha, S. (2016). A Power Saving Set Associative Cache Model. Indian Journal of Science and Technology, 9(6). |
28. |
Praveen Kumar Reddy M. & M. Rajasekhara Babu (2016). A scalable approach for improving dynamic multithreaded applications on NUMA based architectures. ARPN Journal of Engineering and Applied Sciences, 11(3), 1494-1503. |
29. |
Narayanan, M., & Cherukuri, A. K. (2016). A study and analysis of recommendation systems for location-based social network (LBSN) with big data. IIMB Management Review, 28(1), 25-30. |
30. |
Jayanthi R, Siva Rama Krishnan S, Rama Prabha K P., (2016). Spoofing Assault Identification and Limiting Several Adversaries in Wireless Networks. International Journal of Applied Engineering Research, 11(1), 286-289. |
31. |
Shynu, P. G., & Singh, K. J. (2016). A Comprehensive Survey and Analysis on Access Control Schemes in Cloud Environment. Cybernetics and Information Technologies, 16(1), 19-38. |
32. |
Subha, S. (2016). A literature survey on cpu cache reconfiguration. ARPN Journal of Engineering and Applied Sciences. 11(5), 3008-3012. |
33. |
Prasanna, S., & Ezhilmaran, D. (2016). A Survey of Stock Price Prediction & Estimation Using Data Mining Techniques. International Journal of Applied Engineering Research, 11(6), 4097-4099. |
34. |
Vijayan, R., & Jeyanthi, N. (2016). A survey of trust management in mobile ad hoc networks. International Journal of Applied Engineering Research, 11(4), 2833-2838. |
35. |
Thanapal P., Saleem Durai M A., (2016). A survey on application partitioning for mobile cloud computing. International Journal of Pharmacy and Technology. 8(1), 10574-10589. |
36. |
Suganya P, (2016). A survey on various security measures used in cloud. International Journal of Pharmacy and Technology. 8(1), 3644-3647 |
37. |
Prathik, A., Uma, K., & Anuradha, J. (2016). An Overview of application of Graph theory. International Journal of ChemTech Research, 9(2), 242-248. |
38. |
Anusha, K., & Sathiyamoorthy, E. (2016). Comparative study for feature selection algorithms in intrusion detection system. Automatic Control and Computer Sciences, 50(1), 1-9. |
39. |
Seetha R & Saravanan R. (2016). Digital Signature Schemes for group communication: A Survey. International Journal of Applied Engineering Research, 11(6), 4416-4422. |
40. |
Rathi R., (2016). Hybridization of soft computing framework – a survey. International Journal of Pharmacy & Technology, 8(1), 3594-3602. |
41. |
Das, T. K. (2016). Intelligent techniques in decision making: A survey. Indian Journal of Science and Technology, 9(12). |
42. |
Anand, R. V., & Dinakaran, M. (2016). Popular Agile Methods in Software Development: Review and Analysis. International Journal of Applied Engineering Research, 11(5), 3433-3437. |
43. |
Fiaz, A. S., Asha, N., Sumathi, D., & Navaz, A. S. (2016). Data Visualization: Enhancing Big Data More Adaptable and Valuable. International Journal of Applied Engineering Research, 11(4), 2801-2804. |
44. |
Thandeeswaran, R., & Durai, M. S. (2016). Wide-ranging Survey on Authentication Mechanisms. International Journal of Applied Engineering Research, 11(6), 4114-4117. |
45. |
Sharon Moses J., Babu, L. D. (2016). A locality centred recommendation system combining CNM clustering technique with fuzzy preference tree-based ranking algorithm. International Journal of Business Intelligence and Data Mining, 11(1), 63-84. |
46. |
Siva Rama Krishnan S., karthik Balasubramanian, Arun Kumar T., Challenges in Data Aggregation in Wireless Sensor Network – A Review. International Journal of Applied Engineering Research, 11(7), 5342-5345. |
47. |
Panneer, P., & Tripathy, B. K. (2016). Covering Rough Clustering Approach for Unstructured Activity Analysis. International Journal of Intelligent Information Technologies (IJIIT), 12(2), 1-11. |
48. |
Kumar, K. S., & Deepa, K. (2016). Medical Query Expansion using UMLS. Indian Journal of Science and Technology, 9(14). |
49. |
Bhushan, S. B. Reddy. C. H., Pradeep (2016). A network qos aware service ranking using hybrid ahp-promethee method in multi-cloud domain. International Journal of Engineering Research in Africa, 24. |
50. |
Senthil Kumar P., Daphne Lopez., (2016). A Review on Feature Selection Methods for High Dimensional Data. International Journal of Engineering and Technology, 8(2), 669-672. |
51. |
Hemalatha S., Margret Anouncia S., (2016). A Review on Human Identification Systems using Biometrics Fingerprint Matching, Internation Journal of Pharmacy and Technolog, 8(1), 3604-3610. |
52. |
Pushparaj R., Dinakaran M., (2016). An Energy aware routing for Manets using Dynamic power threshold with load balancing. World Applied Sciences Journal, 34(1), 120-127. |
53. |
SenthilKumar M, Ilango P., (2016). Analysis of DNA data using Hadoop Distributed File System. Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(3). |
54. |
Dharinya, S. (2016). Analysis of document summarization and word classification in a smart environment. Indian Journal of Science and Technology, 9(19). |
55. |
Sangamithra A., Vani. M.P., (2016). Analysis of Network Security Spasms and Circumvention. International Journal of Engineering and Technology, 8(2), 604-608. |
56. |
Thippa Reddy, G., & Khare, N. (2016). FFBAT-Optimized Rule Based Fuzzy Logic Classifier for Diabetes. In International Journal of Engineering Research in Africa (Vol. 24, pp. 137-152). Trans Tech Publications. |
57. |
Manogaran, G., Thota, C., & Kumar, M. V. (2016). Meta Cloud Data Storage architecture for Big Data security in cloud computing. Procedia Computer Science, 87, 128-133. |
58. |
Suganya P., Pradeep Reddy Ch., (2016). Potential threats caused by malicious nodes and various counter measures available in MANET: A Survey. Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(3), 1012-1016. |
59. |
Senthilkumar, M. N. M., & Senthilkumaran, U. (2016). Review of asymmetric key cryptography in wireless sensor networks. International Journal of Engineering and Technology, 8(2), 859-862. |
60. |
Gunasekaran G., Venkatesan M., (2016). Review on Visualization Techniques for Medical Data and its Application. Research Journal of Pharmaceutical, Biological and Chemical Science, 7(3), 169-173. |
61. |
Gagneja, K., & Singh, J. (2016). Survey and analysis of security issues on RSA algorithm for digital video data. Journal of Discrete Mathematical Sciences and Cryptography, 19(1), 39-55. |
62. |
Rajesh kaluri, (2016). A Comparative study on image segmentation techniques. International Journal of Pharmacy and Technology, 8(2), 12712-12717. |
63. |
Srinivas Koppu, Madhu Viswanathan, (2016). A Novel Chaotic Image Encryption System for color images based Arnold Cat Map and Efficient Pixel Shuffling. International Journal of Pharmacy and Technology, 8(2), 13353-13361. |
64. |
Subha, S., & Sakthivel, R. (2016). A Power Saving Multiplication Algorithm. International Journal of Applied Engineering Research, 11(9), 6200-6203. |
65. |
Manikandan N., Subha S., (2016). A Review on evaluating the usage of multiple cores effectively in personal computer based applications. International Journal of Pharmacy & Technology, 8(2), 3916-3927. |
66. |
Dinakaran M., (2016). A Review on requirement of self sustainable natural farming and application of information and communication technology (Agro Informatics) for agriculture in India. International Journal of Pharmacy & Technology, 8(2), 3944-3956. |
67. |
Nagaraja G., Pradeep Reddy Ch., (2016). A Survey on group key management frameworks for secure group communication in mobile Ad hoc Networks. International Journal of Pharmacy & Technology, 8(2), 4121-4129. |
68. |
Srinivas Koppu, Madhu Viswanatham V., (2016). A Survey on security issues: Digital Images. International Journal of Pharmacy & Technology, 8(2), 13420-13427. |
69. |
Santhi K., Saravanan R., (2016). A Survey on queueing models for cloud computing. International Journal of Pharmacy & Technology, 8(2), 3964-3977. |
70. |
Manivannan S.S., (2016). A Systematic survey of routing attacks and counter measures in wireless networks. International Journal of Pharmacy & Technology, 8(2), 3957-3963. |
71. |
Agilandeeswari, L., & Ganesan, K. (2016). An efficient hilbert and integer wavelet transform based video watermarking. Journal of Engineering Science and Technology, 11(3), 327-345. |
72. |
Kuruva Lakshmanna, Rajesh Kaluri, Thippa Reddy G., Nagaraja G., Dhenesh V Subramanian, (2016). An enhanced algorithm for frequent pattern mining from Biological sequences. International Journal of Pharmacy & Technology, 8(2), 12776-12784. |
73. |
Subha, S. (2016). An Improved Non-Restoring Algorithm. International Journal of Applied Engineering Research, 11(8), 5452-5454. |
74. |
Rajesh Kaluri, Pradeep Reddy Ch., (2016). An overview of Human Gesture Recognition. International Journal of Pharmacy & Technology, 8(2), 12037-12045. |
75. |
Arivu Selvan K., Sathiyamoorthy E., (2016). Automated Retrieval of medical images based on distinct features using Fuzzy Logic approach. International Journal of Pharmacy & Technology, 8(2), 13230-13239. |
76. |
Rahamathunnisa U., Saravanan R., (2016). Classificationn of Noise in Video – A Review. International Journal of Pharmacy & Technology, 8(2), 3928-3932. |
77. |
Kumar, N. S., & Muruganantham, D. (2016). Disambiguating the Twitter Stream Entities and Enhancing the Search Operation Using DBpedia Ontology: Named Entity Disambiguation for Twitter Streams. International Journal of Information Technology and Web Engineering (IJITWE), 11(2), 51-62. |
78. |
Deepa M., Santhi K., Benjula Anbu Malar M.B., Lawanya Shri M., (2016). Distributed Detection of malicious nodes in wireless sensor networks under Byzantine Attack. International Journal of Pharmacy & Technology, 8(2), 13546-13552. |
79. |
Lawanya Shri M., Benjula Anbu Malar M.B., Santhi K., Deepa M., (2016). E-Learning system with Hierarchical attribute set based encryption access control in cloud. International Journal of Pharmacy & Technology, 8(2), 12785-12792. |
80. |
Mohankumar, S., & Balasubramanian, V. (2016). Identifying Effective Features and Classifiers for Short Term Rainfall Forecast Using Rough Sets Maximum Frequency Weighted Feature Reduction Technique. CIT. Journal of Computing and Information Technology, 24(2), 181-194. |
81. |
Dharmendra Singh Rajput, Praveen Kumar Reddy M, Shrivastava D.P., (2016). Mining Frequent Termset for Web document data using Genetic Algorithm. International Journal of Pharmacy & Technology, 8(2), 4038-4054. |
82. |
Mohankumar P., Balamurugan, (2016). Optimality analysis of query processing using various caching approaches – A Review. International Journal of Pharmacy & Technology, 8(2), 3739-3751. |
83. |
Manivannan, S. S., & Sathiyamoorthy, E. (2016). Preventing health care web applications from session hijack attacks using session key authentication and distributed session id. ARPN Journal of Engineering and Applied Sciences,11(13), 8257-8263. |
84. |
Perumal, V. (2016). Randomized Symmetric Crypto Spatial Fusion Steganographic System. Journal of ICT Research and Applications, 10(1), 15-28. |
85. |
Durai Raj Vincent P M., (2016). RSA Encryption Algorithm – A Survey on its various forms and its security level. International Journal of Pharmacy & Technology, 8(2), 12230-12240. |
86. |
Durai Raj Vincent P M., (2016). Secured Healthcare Date exchange using proposed security scheme. International Journal of Pharmacy & Technology, 8(2), 12144-12154. |
87. |
Prabukumar, M., & Ray, B. K. (2016). Semi-circular angle-based one bit circle generation algorithm on a hexagonal grid. International Journal of Computer Aided Engineering and Technology, 8(3), 199-216. |
88. |
Krithika, L. B. Lakshmi Priya G G. (2016). Student Emotion Recognition System (SERS) for E-Learning Improvement Based on Learner Concentration Metric. Procedia Computer Science, 85, 767-776. |
89. |
Kaushik Roy, Ramya G., (2016). Survey on mobile vulnerability issues and basic security policies. International Journal of Pharmacy & Technology, 8(2), 3823-3833. |
90. |
Hemalatha, S., & Anouncia, S. M. (2016). A Computational Model for Texture Analysis in Images with Fractional Differential Filter for Texture Detection. International Journal of Ambient Computing and Intelligence, 7(2). |
91. |
Chowdhary, C. L., & Acharjya, D. P. (2016). A hybrid scheme for breast cancer detection using intuitionistic fuzzy rough set technique. International Journal of Healthcare Information Systems and Informatics, 11(2). |
92. |
Senthilkumar, M., & Ilango, P. (2016). A Survey on Job Scheduling in Big Data. Cybernetics and Information Technologies, 16(3), 35-51. |
93. |
Malar, M. B. A., Shri, M. L., Deepa, M., & Santhi, K. (2016). Approach for Secure Authorized Deduplication using Hybrid Cloud. International Journal of Applied Engineering Research, 11(15), 8480-8482. |
94. |
Ramachandran, P., & Dinakaran, M. (2016). Signal Strength and Residual Power Based Optimum Transmission Power Routing for Mobile Ad hoc Networks. Procedia Computer Science, 92, 168-174. |
95. |
Parimala, M., & Lopez, D. (2016). Spatio-temporal graph clustering algorithm based on attribute and structural similarity. International Journal of Knowledge-based and Intelligent Engineering Systems, 20(3), 149-160. |
96. |
Das, A. J., Wahi, A., Kothari, I., & Raskar, R. (2016). Ultra-portable, wireless smartphone spectrometer for rapid, non-destructive testing of fruit ripeness. Scientific reports, 6, 32504. |
97. |
Anusha, K., & Sathiyamoorthy, E. (2016). OMAMIDS: Ontology Based Multi-Agent Model Intrusion Detection System for Detecting Web Service Attacks. Journal of Applied Security Research, 11(4), 489-508. |
98. |
Prabhavathy P, Tripathy BK, Venkatesan Meenakshi Sundaram, (2016). Covering based refined Rough K-Means Algorithm, Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(5), 2142-2151. |
99. |
Senthil Kumar N, Kauser Ahamed P. (2016). Pervasive utilization of PSO techniques over twitter data streams. Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(5), 796-803. |
100. |
Anitha, A., & Acharjya, D. P. (2016). Customer Choice of Super Markets using Fuzzy Rough Set on Two Universal Sets and Radial Basis Function Neural Network. International Journal of Intelligent Information Technologies (IJIIT), 12(3), 20-37. |
101. |
Vincent, P. D. R., & Sathiyamoorthy, E. (2016). A novel and efficient public key encryption algorithm. International Journal of Information and communication technology, 9(2), 199-211. |
102. |
Shivhare, R., & Kumar, C. A. (2016). On the cognitive process of abstraction. Procedia Computer Science, 89, 243-252. |
103. |
Ramu, S. P., & Sevugan, P. (2016), An approach for efficient pre-processing of multi-temporal hyperspectral satellite imagery., The IIOAB Journal, 7(5), 12-20. |
104. |
Kumaran U., Neelu Khare, (2016). An Empirical study of security in Text mining for large datasets. International Journal of Control theory and applications, 9(6), 2737-2743. |
105. |
Prasanna, S., & Ezhilmaran, D. (2016). Association rule mining using enhanced apriori with modified GA for stock prediction. International Journal of Data Mining, Modelling and Management, 8(2), 195-207. |
106. |
Mani P., Prasanna M., (2016). A Study on functional specification based test case generation for real-time systems. International Journal of Engineering and Technology, 8(4), 1801-1806. |
107. |
Lakshmanna, K., & Khare, N. (2016). Constraint-based measures for DNA sequence mining using group search optimization algorithm. International Journal of Intelligent Engineering and systems, 9(3), 91-100. |
108. |
Radhakrishnan, S., & Devarasan, E. (2016). Computing the Probability on Socio Economic Factors to Predict the Crime Locations by Means of Joint Probability Based AMABC-FCIL. International Journal of Intelligent Engineering & Systems, 9(3), 80-90. |
109. |
Bhushan, S. B., & Reddy, P. (2016). BB-LBA: biogeography-based load balancing algorithm in multi cloud domain. International Journal of Internet Protocol Technology, 9(2-3), 100-106. |
110. |
Balakrishnan, S. M., & Sangaiah, A. K. (2016). Aspect-oriented middleware framework for resolving service discovery issues in Internet of Things. International Journal of Internet Protocol Technology, 9(2-3), 62-78. |
111. |
Arivuselvan K., Sathiyamoorthy E., (2016). Analysing EEG sub-bands to distinguish between individuals with neural disorder using Back propagation neural network. International Journal of Pharma and Bio sciences, 7(4), 80-87. |
112. |
Kumar, S., Saravanakumar, K., & Deepa, K. (2016). On Privacy and Security in Social Media– A Comprehensive Study. Procedia Computer Science, 78, 114-119. |
113. |
Pranusha Soma, Arivuselvan K., (2016). Automated Recognition of Emotions From Facial Expressions using Back propagation Neural networks. Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(4), 1895-1902. |
114. |
Magesh G., (2016). A review paper: Student attitude towards computer science. International Journal of Pharmacy & Technology, 8(3), 4653-4666. |
115. |
Angulakshmi M., (2016). Big Data Analytics – A Review. International Journal of Pharmacy & Technology, 8(3), 4634-4639. |
116. |
Sudha Senthilkumar, Madhu Viswanatham, (2016). Survey on Data Access Control techniques in cloud computing. International Journal of Pharmacy & Technology, 8(3), 17442-17461. |
117. |
Kavitha G., (2016). Factors associated with improving quality of healthcare services. International Journal of Pharmacy & Technology, 8(3), 4844-4856. |
118. |
Praveen Kumar Reddy M., Nagaraja G., (2016). Creating trusted learning by using QR based U learning System. International Journal of Pharmacy & Technology, 8(3), 18268-18272. |
119. |
Rajeswari C., (2016). Performance analysis of sports persons using data mining based ranking and classification methods. International Journal of Pharmacy & Technology, 8(3), 18070-18097. |
120. |
Sree Dharinya S., Kirubathangam R., (2016). Analyzing a selection strategy for data De-duplication in large datasets. International Journal of Pharmacy & Technology, 8(3), 16590-16595. |
121. |
Chandrasegar Thirumalai, (2016). Physicians drug encoding system using an efficient and secured linear public key cryptosystem (ESLPKC). International Journal of Pharmacy & Technology, 8(3), 16296-16303. |
122. |
Prabhu J., (2016). A survey on slim process with developers in agile software. International Journal of Pharmacy & Technology, 8(3), 15558-15565. |
123. |
Asha N., (2016). Customer segregation in banking organisation using knowledge management. International Journal of Pharmacy & Technology, 8(3), 17645-17649. |
124. |
Vijay Anand R., Dinakaran M., (2016). Automation Framework to perform measure actions from NBI. International Journal of Pharmacy & Technology, 8(3), 16261-16276. |
125. |
Chiranji Lal Chowdhary, (2016). A review of feature extraction application areas in medical imaging. International Journal of Pharmacy & Technology, 8(3), 4501-4509. |
126. |
Navaneethan C., (2016). A Literature Review on energy saving along with precautions in wireless sensor network. International Journal of Pharmacy & Technology, 8(3), 15408-15424. |
127. |
Sumangali K., (2016). Security in sensor networks and necessity for self destruction. International Journal of Pharmacy & Technology, 8(3), 15566-15575. |
128. |
Rathi R., (2016). Hybridization of soft computing technique with Apriori for Association rule mining. International Journal of Pharmacy & Technology, 8(3), 15820-15827. |
129. |
Kumaresan P., Prabukumar M., Yokesh Babu Sundaresan, (2016). An Adaptable web based light weight framework for remote HVAC system using programmable thermostat. International Journal of Pharmacy & Technology, 8(3), 16456-16466. |
130. |
Mohankumar P., Prasanna S., Gunasekaran G., (2016). Intelligence inference user satisfactory refinement for E-Applications. International Journal of Pharmacy & Technology, 8(3), 15917-15931. |
131. |
Sudheer Karnam, Thippa Reddy G., Lakshmanna Kuruva, Rajesh Kaluri, Srinivas Koppu, (2016). Dynamically improved weighted Apriori algorithm in Market analysis. International Journal of Pharmacy & Technology, 8(3), 15658-15668. |
132. |
Siddharth Samal, Pradeep Reddy Ch., Bharath Bhushan S., (2016). Implementing a modified power aware routing protocol using AODV protocol in MANET. International Journal of Pharmacy & Technology, 8(3), 15600-15610. |
133. |
Vijayan R., (2016). An application for web navigation using speech engine for blind people. International Journal of Pharmacy & Technology, 8(3), 15805-15819. |
134. |
Sudha M., (2016). Disease diagnosis using association rule mining based knowledge inference system. International Journal of Pharmacy & Technology, 8(3), 16369-16379. |
135. |
Santhi K., Saravanan R., (2016). Facilitate refined keywords search over encrypted data on cloud. International Journal of Pharmacy & Technology, 8(3), 15552-15557. |
136. |
Sudheer K., Thippa Reddy G., Lakshmanna K., (2016). An Android App to reduce battery power consumption in smart phones. International Journal of Pharmacy & Technology, 8(3), 16164-16171. |
137. |
Vanitha M., (2016). Mutual Authentication using shared secret key generation. International Journal of Pharmacy & Technology, 8(3), 16399-16411. |
138. |
Santhi K., Deepa M., Lawanya Shri M., Benjula Anbu Malar B., (2016). Efficient searching with multiple keyword over encrypted cloud data by blind storage. International Journal of Pharmacy & Technology, 8(3), 15704-15711. |
139. |
Prabhu J., Thanapal P., Vijay Anand R., (2016). Home Intruder Detection System. International Journal of Pharmacy & Technology, 8(3), 15640-15650. |
140. |
Kumaresan P., Subha S., (2016). A Low cost multi-functional robot prototype for Intelligent services. International Journal of Pharmacy & Technology, 8(3), 15370-15381. |
141. |
Suganya P., (2016). An approach for selection of replica nodes to support QOS requirement of applications in VANET. International Journal of Pharmacy & Technology, 8(3), 15789-15795. |
142. 1 |
Nivash J P., Dhinesh Babu L D., (2016). An optimal IOT enabled data processing approach for effective detection of remote air pollution. International Journal of Pharmacy & Technology, 8(3), 15496-15509. |
143. 1. |
Senthilkumaran U., Manikandan N., Senthilkumar M., (2016). Role of data mining on pharmaceutical industry – a survey. International Journal of Pharmacy & Technology, 8(3), 16100-16106. |
144. 1. |
Kamalakannan J., Rajasekhara Babu, (2016). Segmentation techniques on Mammograms to detect breast abnormality: A survey. International Journal of Pharmacy & Technology, 8(3), 16089-16099. |
145. 1 |
Vanmathi C., Prabu S., (2016). Steganography: A Comparative study, analysis of key issues and current trends. International Journal of Pharmacy & Technology, 8(3), 4696-4715. |
146. 1. |
Deepa Mani., Anand Mahendran, (2016). DDOS detection and mitigation for managed security of cloud resources. International Journal of Pharmacy & Technology, 8(3), 15455-15470. |
147. 1 |
Meenatchi S., Prabu S., (2016). A cluster based load balancing technique for increasing the wireless sensor network life time. International Journal of Pharmacy & Technology, 8(3), 4716-4727. |
148. |
Pounambal M., Nithyadharshini P S., (2016). Distributed channel allocation in smart grid networks using Particle Swarm Optimization. International Journal of Pharmacy & Technology, 8(3), 18547-18558. |
149. |
Ranjith D., Balajee J., Kumar C., (2016). In premises of cloud computing and models. International Journal of Pharmacy & Technology, 8(3), 4685-4695. |
150. |
Reddy, G. T., & Khare, N. (2017). An Efficient System for Heart Disease Prediction Using Hybrid OFBAT with Rule-Based Fuzzy Logic Model. Journal of Circuits, Systems and Computers, 26(04), 1750061. |
151. |
Paramasivan, S. K., & Lopez, D. (2016). Forecasting of wind speed using feature selection and neural networks. International Journal of Renewable Energy Research (IJRER), 6(3), 833-837. |
152. |
Thakare, V. R., & Singh, K. J. (2016). A Study of Security and Privacy Issues at Service Models of Cloud Computing. Indian Journal of Science and Technology, 9(38). |
153. |
Uma K., (2016). Ambient Air prominence information analysis collision/population. Journal of Chemical and Pharmaceutical Sciences, 9(4), 2566-2569. |
154. |
Uma. K., (2016). Efficient finding of item sets in knowledge representation using RHUI extraction. Journal of Chemical and Pharmaceutical Sciences, 9(4), 2599-2601. |
155. |
Chithapuram, C. U., Cherukuri, A. K., Jeppu, Y. (2016). Aerial vehicle guidance based on passive machine learning technique. International Journal of Intelligent Computing and Cybernetics, 9(3), 255-273. |
156. |
Praveen Kumar Reddy M., Rajasekhara Babu M., (2016). Improving performance of program by finding good optimal sequences using sequence selection approach. ARPN Journal of Engineering and Applied Sciences, 11(17), 10563-10570. |
157. |
Nithya, S., & Jayakumar, C. (2016). Automatic Firewall Rule Generator for Network Intrusion Detection System based on Multiple Minimum Support. Indian Journal of Science and Technology, 9(41). |
158. |
Krishnan, S. N., & Srinivasan, P. (2016). A QOS Parameter based Solution for Black hole Denial of Service Attack in Wireless Sensor Networks. Indian Journal of Science and Technology, 9(38). |
159. |
Rajesh Kaluri, Kuruva Lakshmanna, Thippa Reddy, Sudheer Karnam, Srinivas Koppu., (2016). A Comparative study on selecting and ranking the test cases in software testing. ARPN Journal of Engineering and Applied Sciences, 11(1), 754-757. |
160. |
Kamalakannan, J., & Babu, R. M. (2016). Early detection of breast cancer using GLCM feature extraction in Mammograms. IIOAB JOURNAL, 7(5), 170-179. |
161. |
Ahamed, B., & Ramkumar, T. (2016). Data Integration-Challenges, Techniques and Future Directions: A Comprehensive Study. Indian Journal of Science and Technology, 9(44). |
162. |
Nagaraja, G., & Ch, P. R. (2016). A Reliable Group Key Management Framework Using Fuzzy Logic for MANETs. International Journal of Intelligent Engineering and Systems, 9(4), 107-115. |
163. |
Kaluri, R., & Reddy, P. (2016). Sign Gesture Recognition Using Modified Region Growing Algorithm and Adaptive Genetic Fuzzy Classifier. Int J Intell Eng Syst, 9, 225-233. |
164. |
Nagaraja, G., & Ch, P. R. (2016). Mitigate Lying and On-Off Attacks on Trust Based Group Key Management Frameworks in MANETs. International Journal of Intelligent Engineering and Systems, 9(4), 215-224. |
165. |
Parimala, M., & Lopez, D. Spatio-Temporal Modelling of Frequent Human Mobility Pattern to Analyse the Dynamics of Epidemic Disease. International Journal of Intelligent Engineering & Systems, 9(4), 167-178. |
166. |
Bhushan, S. B., & CH, P. R. A QoS Aware Cloud Service Composition Algorithm for Geo-Distributed Multi Cloud Domain. International Journal of Intelligent Engineering & Systems, 9(4), 147-156. |
167. |
Lakshmanna, K., & Khare, N. (2016). FDSMO: frequent DNA sequence mining using FBSB and optimization. International Journal of Intelligent Engineering & Systems, 9(4), 157-166. |
168. |
LawanyaShri, M., Balusamy, B., & Subha, S. (2016). Threshold-Based Workload Control for an Under-Utilized Virtual Machine in Cloud Computing. International Journal of Intelligent Engineering & Systems, 9(4), 234-241. |
169. |
Anusha, K., & Sathiyamoorthy, E. (2016). A decision tree-based rule formation with combined PSO-GA algorithm for intrusion detection system. International Journal of Internet Technology and Secured Transactions, 6(3), 186-202. |
170. |
Rajganesh, N., & Ramkumar, T. (2016). A Review on Broker Based Cloud Service Model. CIT. Journal of Computing and Information Technology, 24(3), 283-292. |
171. |
Aarthy, S. L., & Prabu, S. (2016). A computerized approach on breast cancer detection and classification. IIOAB JOURNAL, 7(5), 157-169. |
172. |
P J Kumar, Suganya P., (2016). Variable Replica allocation in VANET using node failure probability. International Journal of Pharmacy & Technology, 8(4), 25990-25994. |
173. |
Sankar S., Srinivasan P., (2016). Internet of Things (IOT): A survey of empowering technologies, research opportunities and applications. International Journal of Pharmacy & Technology, 8(4), 26117-26141. |
174. |
Srinivasan P., Nagamuthu Krishnan S.S., (2016). A recent survey on trust models for wireless sensor networks. International Journal of Pharmacy & Technology, 8(4), 26163-26168. |
175. |
Vijaya C., Srinivasan P., (2016). A survey on resource scheduling in cloud computing. International Journal of Pharmacy & Technology, 8(4), 26142-26162. |
176. |
Padmapriya, S., Kirubakaran, E., & Elango, N. M. (2016). Medical Image Classification using Hybrid classifier by Extending the Attributes. Indian Journal of Science and Technology, 9(6). |
177. |
Uma, K., & Bangalore Morarji, A. R. Comparative Analysis of Current Engineering Education in Majority Countries. Journal of Chemical and Pharmaceutical Sciences, 10(1), 293-296. |
178. |
Navaneethan C., Meenatchi S., Kumar P J., Suganya P., (2016). Comparison of RSA and MD5 algorithm. International Journal of Pharmacy & Technology, 8(4), 26609-26615. |
179. |
Kumar P J., Suganya P., Navaneethan C., Meenatchi S., (2016). BigData social media analysis using R and Hadoop. International Journal of Pharmacy & Technology, 8(4), 26616-16620. |
180. |
Divya Udayan J., HyungSeok Kim, (2016). Constrained Procedural Modeling of Real Buildings from single façade layout. International Journal of Computer Vision and Signal Processing, 6(1), 33-46. |
181. |
Udayan, J. D. (2016). An Analysis of Reconstruction Algorithms Applied to 3D Building Modeling. Indian Journal of Science and Technology, 9(33). |
182. |
Iyapparaja M., (2016). Coupling and Cohesion metrics based measurement of software reusable component strength. International Journal of Pharmacy & Technology, 8(4), 21515-21526. |
183. |
Kumaran, U., & Khare, N. (2016). A Review on Privacy Preserving Data Mining using Secure Multiparty Computation. Indian Journal of Science and Technology, 9(48). |
184. |
Ravi, C., & Khare, N. (2016). BGFS: Design and Development of Brain Genetic Fuzzy System for Data Classification. Journal of Intelligent Systems. |
185. |
Ravi, C., & Khare, N. (2016). Review of Fuzzy Rule Based Classification systems. Research Journal of Pharmacy and Technology, 9(8), 1299-1302. |
186. |
Deepa, N., & Ravi, C. (2016). Dimension Reduction Using Principal Component Analysis for Pharmaceutical Domain. Research Journal of Pharmacy and Technology, 9(8), 1169-1173. |
187. |
Kaluri, R., & Reddy, C. P. (2016). A framework for sign gesture recognition using improved genetic algorithm and adaptive filter. Cogent Engineering, 3(1), 1251730. |
188. |
Deepa, N., & Ganesan, K. (2016). A Brief Survey of Decision Making Methods and its Applications in Various Domains. Research Journal of Pharmacy and Technology, 9(8), 1079-1082. |
189. |
Deepa, N., & Ganesan, K. (2016). Aqua Site Classification Using Neural Network Models. AGRIS on-line Papers in Economics and Informatics, 8(4), 51. |
190. |
Deepika S., Ushadevi G., (2016). Performance analysis of topology based Ad-hoc wireless routing protocols using Qualnet. International Journal of Pharmacy & Technology, 8(4), 25527-25533. |
191. |
Raman, I. (2016). Certain height-balanced subtrees of hypercubes. International Journal of Computer Mathematics: Computer Systems Theory, 1(1), 32-41. |
192. |
Kuppusamy, L., Raman, I., & Krithivasan, K. (2016). On succinct description of certain context-free languages by ins-del and matrix ins-del systems. International Journal of Foundations of Computer Science, 27(7), 775-786. |
193. |
Bhattacharya, S. (2016). A review of the application of automation technologies in healthcare domain. Research Journal of Pharmacy and Technology, 9(12), 2343-2348. |
194. |
Singh, B., Bhattacharya, S., Chowdhary, C. L., & Jat, D. S. A review on internet of things and its applications in healthcare. Journal of Chemical and Pharmaceutical Sciences. 10(1), 447-452. |
195. |
Srinivasa Gupta N., Valarmathi B., (2016). Opinion mining using intuitive scoring approach. International Journal of Pharmacy & Technology, 8(4), 21527-21546. |
196. |
Sivashankari R., Valarmathi B., (2016). A Literature survey on entity extraction techniques in Bio-medical datasets. International Journal of Pharmacy & Technology, 8(4), 5055-5066. |
197. |
Raghavan, R., & Singh, K. J. (2016). Necessity of different patterns of fingerprint and its applications: A study. International Journal of Applied Engineering Research, 11(8), 5787-5790. |
198. |
Brindha, K., & Jeyanthi, N. (2016). DOVC: Data Obfuscation Visual Cryptography to Protect Cloud Storage. International Journal of Soft Computing, 11(6), 374-381. |
199. |
Sundaresan, Y. B., & Kumaresan, P. (2016). A Comparative Analysis of Low Cost Solutions for Quiz Controller and Classroom Access Control Systems. Research Journal of Pharmacy and Technology, 9(9), 1357-1362. |
200. |
Sundaresan, Y. B., Kumaresan, P., & Prabu, A. S. (2016). Anamolized Based Security for Private Information Attacks on Social Network. International Journal of Applied Engineering Research, 11(13), 7914-7919. |
201. |
Ramya, G. (2016). Survey on various Classes of Picture Languages. International Journal of Applied Engineering Research, 11(8), 5376-5381. |
202. |
Geraldine Bessie Amali D., Dinakaran M., (2016). Solution of the non linear least squares problem using a new gradient based genetic algorithm, ARPN Journal of Engineering and Applied Sciences, 11(21), 12876-12882. |
203. |
Priya, R. S., Prabu, S., & Dharun, V. S. (2016). F-SIFT and FUZZY-RVM based efficient multi-temporal image segmentation approach for remote sensing applications. Automatic Control and Computer Sciences, 50(3), 151-164. |
204. |
Senthilkumar M., Ilango P., (2016). Big data optimization for social networking tweet. International Journal of Soft Computing, 11(5), 305-311. |
205. |
Rani, B. S. (2016). A Novice’s Perception of Partial Homomorphic Encryption Schemes. Indian Journal of Science and Technology, 9(37). |
206. |
Pandiyan, S., & Perumal, V. (2016). A Survey on Various Problems and Techniques for Optimizing Energy Efficiency in Cloud Architecture. Walailak Journal of Science and Technology (WJST), 14(10), 749-758. |
207. |
Sanjeevi, P., Balamurugan, G., & Viswanathan, P. (2016). The improved DROP security based on hard AI problem in cloud. International Journal of Internet Protocol Technology, 9(4), 207-217. |
208. |
Sumathi, D., Velmurugan, T., Nandakumar, S., & Renugadevi, S. (2016). Dynamic Weight Assignment based Vertical Handoff Algorithm for Load Optimization. Indian Journal of Science and Technology, 9(37). |
209. |
Ramaiah, M., & Ray, B. K. (2016). An iterative point elimination technique to retain significant vertices on digital planar curves. International Journal of Computational Vision and Robotics, 6(4), 354-368. |
210. |
Shini, S. N. (2016). A survey on population based meta-heuristic techniques. International Journal of Chemical and Pharmaceutical Analysis, 4(1), 7. |
211. |
Vanitha, M. (2016). Survey on Secured Password Authentication for IOT. Advances in Systems Science and Applications, 16(3), 21-32. |
212. |
Thandeeswaran, R., & Durai, M. S. (2016). DPCA: Dual Phase Cloud Infrastructure Authentication. International Journal of Communication Networks and Information Security, 8(3), 197. |
213. |
Pounambal, M. (2016). Survey on channel allocation techniques for Wireless Mesh Network to reduce contention with Energy Requirement. Indian Journal of Science and Technology, 9(32). |
214. |
Gopal, D. G., & Saravanan, R. (2016). Selfish node detection based on evidence by trust authority and selfish replica allocation in DANET. International Journal of Information and Communication Technology, 9(4), 473-491. |
215. |
Seetha, H., Murty, M. N., & Saravanan, R. (2016). Classification by majority voting in feature partitions. International Journal of Information and Decision Sciences, 8(2), 109-124. |
216. |
Nirmala, M., Vidyavathi, M., Nivash, J. P., & Kumar, C. P.(2016). Scalable cloud computing based healthcare application. International Journal of Pharmacy & Technology, 8(4), 25891-25901. |
217. |
Nirmala M., Pavan Kumar C S., Ansu Miriam Varghese, Neethu Santhosh. (2016). Text Encryption and Decryption strategy using matrix operations. International Journal of Pharmacy & Technology, 8(4), 25910-25917. |
218. |
Thathera, H., Shashi, H., & Rajput, D. S. (2016). Green Computing: An Earth Friendly System, International Journal of Pharmacy and Technology, 8(4):25540 – 25550. |
219. |
Gupta, S., AkashKataria, S. R., & Rajput, D. S. (2016). Information security issues in big data: solution using ppdm (privacy preserving data mining), International Journal of Pharmacy & Technology, 8(4): 25551 – 25568. |
220. |
C. Ranichandra and B.K. Tripathy, 2016. A Study on Non Java Options for Mapreduce Programming with Hadoop. Asian Journal of Information Technology, 15(16): 2999-3003. |
221. |
Nithya S., Asha Jerlin M., Jayakumar C. (2016). A Survey of software defined network. International Journal of Pharmacy & Technology, 8(4), 25944-25958. |
222. |
Asha Jerlin, M., Nithya S., Coker Oswald, Jayakumar C., (2016). Layer two firewall in software defined network. International Journal of Pharmacy & Technology, 8(4), 25365-25372. |
223. |
Asha Jerlin M., Jayakumar C., Prabhu J., (2016).EFE:Efficient feature extraction algorithm for dynamic malware analysis in windows executables using API call sequence. International Journal of Pharmacy & Technology, 8(4), 25373-25383. |
224. |
Asha Jerlin M., Nithya S., Jayakumar C., Robin Rohit. (2016). A case study on advanced evasion techniques. International Journal of Pharmacy & Technology, 8(4), 26599-26608. |
225. |
Alagiri I., (2016). Multipath life time prediction of node-to-node communication using multipoint relays in OLSR protocol for mobile adhoc networks. International Journal of Pharmacy & Technology, 8(4), 26584-26598. |
226. |
Devendiran S., Manivannan K., Arun tom Mathew, Rajeswari C., (2016). Vibration signal based fault diagnosis of gears using ensemble empirical mode decomposition and linguistic hedges neural fuzzy classifier with selected features. Journal of Chemical and Pharmaceutical Sciences, Special Issue 3, 47-57. |
227. |
Singh, B. (2016). Nurse’s attitude towards computerization in private hospitals of Tamil Nadu, India. Research Journal of Pharmacy and Technology, 9(12), 2205-2210. |
228. |
Charanya, R., Aramudhan, M., & Saravananaguru, R. K. (2016). A Review on Access Control Issues in EHealth Application in Cloud Computing. Indian Journal of Science and Technology, 9(42). |
229. |
Dharmendra Singh Rajput, Ramjeevan Singh Thakur, Ghanshyam Singh Thakur, (2016). A Computational model for knowledge extraction in uncertain textual data using karnaugh map technique. International Journal of Computing Science and Mathematics, 7(2). |
230. |
Ikram, S. T., & Cherukuri, A. K. (2016). Improving accuracy of intrusion detection model using PCA and optimized SVM. Journal of computing and information technology, 24(2), 133-148. |
231. |
Thaseen, S., & Kumar, C. A. (2016). Intrusion Detection Model using PCA and Ensemble of Classifiers. Advances in Systems Science and Applications, 16(2), 15-38. |
232. |
Ramalingam, S. P., & Mouli, P. C. (2016). Two-level dimensionality reduced local directional pattern for face recognition. International Journal of Biometrics, 8(1), 52-64. |
233. |
Priya V., Subha S., Balamurugan B., (2016). Quality-of-service in cloud computing: A Survey. International Journal of Pharmacy & Technology, 8(4), 25742-25753. |
234. |
Singh, P. K., & Kumar, C. A. (2016). Analysis of composed fuzzy contexts through projection. International Journal of Data Analysis Techniques and Strategies, 8(3), 206-219. |
235. |
Dinakaran M., Belgacem F.B.M. (2016). An experimental study to prevent packet hiding over wireless networks using AONTS and swarm intelligent algorithm. International Journal of Pharmacy & Technology, 8(4), 25596-25605. |
236. |
Geraldine Bessie Amali D., Dinakaran M., (2016). A review of heuristic global optimization based artificial neural network training approaches. International Journal of Pharmacy & Technology, 8(4), 21670-21679. |
237. |
Jayanthi, M. Prabadevi B., (2016). Multi-keyword ranked search over encrypted data supporting synonym query. The IIOAB Journal, 7(1), 1. |
238. |
Susmita Subhadarshini Panda, Saravanan R., (2016). A secure approach to Spatial Image Steganography. International Journal of Pharmacy & Technology, 8(2), 13384-13400. |
239. |
Harish H S., Vijayan R., (2016). A Secured and Reliable routing in opportunistic network in MANET using Trust management scheme based on behaviour feedback. International Journal of Pharmacy & Technology, 8(2), 12514-12522. |
240. |
Nagendramani P., Vijayan R., (2016). An analysis on the performance of various replica allocation algorithms in cloud using Matlab. International Journal of Pharmacy & Technology, 8(2), 3892-3902. |
241. |
Hemavathi E., Srinivasa Perumal R., (2016). An approach for automatic vehicle plate recognition in unconstrained environment. International Journal of Pharmacy & Technology, 8(2), 4013-4025. |
242. |
Ajay Mummadisetti, Rajeshwar Reddy Kadari, Rajeev Sushmanth Dammu, Durai Raj Vincent P M., (2016). An effective approach of RSA & impact of wieners attack: Survey. International Journal of Pharmacy & Technology, 8(2), 13093-13099 |
243. |
Gopika D., Kumar P J., (2016). An innovative approach for user validation system using keylog and Sudoku algorithm. International Journal of Pharmacy & Technology, 8(2), 11732-11739. |
244. |
Ashutosh Sharma, Vijayan R., (2016). Correlative study of Video compression techniques – H.264/AVC. International Journal of Pharmacy & Technology, 8(2), 12638-12646. |
245. |
Kaushik Roy, Brindha K., Sudha Senthil Kumar, (2016). Optimizing the executing time of compiler optimization using code segmentation technique. International Journal of Pharmacy & Technology, 8(2), 12537-12551. |
246. |
Pavithra S., Lawanya Shri M., (2016). Privacy Preserving the Electronic Health Record using Encryption Protocol in Cloud Computing. International Journal of Pharmacy & Technology, 8(2), 13261-13268. |
247. |
Sathiyamoorthy E., Jagadeesh G., Vaibhav Mahajan, (2016). Home Automation system over mobile network. International Journal of Pharmacy & Technology, 8(3), 16352-16362. |
248. |
E. Vijayan, N.C. SenthilKumar, Siddhant Agnihotry, Mehaboob Subuhani, (2016). Effective Clustering in Big Data for efficient knowledge discovery using parallel K-means and enhanced K-means algorithm. International Journal of Pharmacy & Technology, 8(3), 18646-18652. |
249. |
Salman Ahmed G., (2016). A Framework for classification of medical data using Bijective soft set. International Journal of Pharmacy & Technology, 8(3), 16559-16568. |
250. |
Vijayan E., Senthil Kumar N C., Navneet Shukla, Rudra Prasad Dwivedi, (2016). Architecture of parallel database to make future database processing high. International Journal of Pharmacy & Technology, 8(3), 18640-18645. |
251. |
Navaneethan C., Ramkesh, (2016). Advanced Rail Fence Cipher Algorithm. International Journal of Pharmacy & Technology, 8(3), 16539-16545. |
252. |
Akshay Gaikwad, Pradeep Reddy Ch., Bharath Bhushan S., (2016). A Keyed Hash message authentication code technique for secure communication in VANETs. International Journal of Pharmacy & Technology, 8(3), 15620-15632. |
253. |
Vijayan E., SenthilKumar K., Shalini A.M., Suganya N., (2016). Image Segmentation and classification. International Journal of Pharmacy & Technology, 8(3), 18325-18334. |
254. |
Thandeeswaran R., Ankita Vinod Mandekar, Jeyanthi N., (2016). Securing service set identifier of wireless network. International Journal of Pharmaccy & Technology, 8(3), 16605-16610. |
255. |
Jidhesh R, Indusree J R, Sumathy S., (2016). Survey on congestion aware and adaptive routing protocols in mobile ad hoc networks. International Journal of Pharmacy & Technology, 8(3), 16521-16538. |
256. |
Yuvan Shankar R K., Ramaprabha K P., Jayanthi R., (2016). Discovery against node isolation attack on MANET and its node removal. International Journal of Pharmacy & Technology, 8(3), 16391-16398. |
257. |
Priya V., Sindhupaarkavi V., (2016). Convolution based Image Enhancement in unique finger impression. International Journal of Pharmacy & Technology, 8(3), 15611-15619. |
258. |
Rajan Slathia, Jeyanthi N., (2016). Internet of Things in mobile health care (IOT-m Health). International Journal of Pharmacy & Technology, 8(3), 15901-15916. |
259. |
Vijayan E., S., Hemalatha., S., Shweta Shaw, Alokananda Ghoshal, (2016). A new approach for collision free, energy efficient, hybrid routing algorithm with the use of progressive adaptive concept. International Journal of Pharmacy & Technology, 8(3), 18604-18610. |
260. |
Shakthi D.S., Prabadevi B., (2016). An approach to detect selfish and malicious node in Adhoc – MANETs. International Journal of Pharmacy & Technology, 8(3), 16107-16117. |
261. |
Vijayan E., Senthilkumar K., Prernakumari, Sourabh Tolani, Prasenjeet Bhadra, (2016). Convergence from SQL, NoSQL to NewSQL. International Journal of Pharmacy & Technology, 8(3), 18351-18355. |
262. |
Akshay Narayan Hegde, Vinay Kumar E., Vijayan R., (2016). Self-Routing: A Novel approach for context based trust evaluation and malicious node detection in MANET. International Journal of Pharmacy & Technology, 8(3), 15589-15599. |
263. |
Vijayan E., Senthil kumar K., Aishwarya Singh, Yasmeen Khatoon, (2016). Approach on big data using Hybrid cloud. International Journal of Pharmacy & Technology, 8(3), 18344-18350. |
264. |
Shynu P.G., Lakshmipriya S., Pavithra J., (2016). A Novel Decentralised scheme for identity preserved access control in cloud. International Journal of Pharmacy & Technology, 8(3), 18141-18148. |
265. |
Sathya Sankaran, Sneha Ambhore, P.M. Durai Raj Vincent, (2016). Modified advanced encryption standard with additional row transformation. International Journal of Pharmacy & Technology, 8(3), 16436-16440. |
266. |
Koteswara Rao E., Vijayan R., (2016). Context based access optimizing system for Android mobile devices. International Journal of Pharmacy & Technology, 8(3), 19071-19079. |
267. |
Manivannan S.S., Dhanashree P., Chandrasekaran C., (2016). Transport Plane [TP] simulator in E-Utran LTE for Control Plane (CP). International Journal of Pharmacy & Technology, 8(3), 16242-16253. |
268. |
Himanshu Dewangan, Angulakshmi M., Nagarajan I., (2016). Multiprocessing optimization – parallel quick sort using OpenMp. International Journal of Pharmacy & Technology, 8(3), 15633-15639. |
269. |
Harsha Sarah Thomas, Nancy Victor, (2016). An approach for Incremental frequent pattern mining using modified Apriori Algorithm. Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(6), 1049-1055. |
270. |
Uma, K., Radhakrishnan, P., & Vinoth, R. (2016). Compression of Compound Images using Fuzzy Clustering Technique. Indian Journal of Science and Technology, 9(S1). |
271. |
Uma, K., Vignesh, B., & Reynold, L. R. (2016). Encoding of Multifaceted Images using Pattern Matching Techniques. Indian Journal of Science and Technology, 9(S1). |
272. |
Uma, K., Akram, K. W., & Vignesh, R. (2016). A Novel Method for Segmentation of Compound Images using the Improved Fuzzy Clustering Technique. Indian Journal of Science and Technology, 9(S1). |
273. |
Uma, K., Geetha, P., & Kannan, A. (2016). A novel segmentation of scanned compound images using fuzzy logic. Journal of Medical Imaging and Health Informatics, 6(3), 763-768. |
274. |
Uma, K., & Kavitha, E. (2016). Comparison of Various Fingerprint Analysis Techniques. Indian Journal of Science and Technology, 9(S1). |
275. |
Uma, K., & Reddy, G. R. (2016). Predicting Analysis of Data Mining Extraction Technique in Secondary Education. Indian Journal of Science and Technology, 9(S1). |
276. |
Uma, K., Pallavi, A. R., & Srilatha, S. (2016). Comparision of Blur Detection and Segmentation Techniques. Indian Journal of Science and Technology, 9(S1). |
277. |
Aniket Sen, Prasun Jaiswal, Vikram, Prabadevi B. (2016). Improved K-Means clustering algorithm – working with labelled datasets. International Journal of Pharmacy & Technology, 8(4), 27091-27096. |
278. |
Mohamed Fahad M., Simama Hassan Mottur, Prasanna M., Mohammed Fazeel K., (2016). Prediction of Life cycle models for software. International Journal of Pharmacy & Technology, 8(4), 25763-25778. |
279. |
Girish Paul, Abhishek Chandan, Prasanna M., Abhishek Yadav, (2016). Voice based mail system for blind. International Journal of Pharmacy & Technology, 8(4), 25754-25762. |
280. |
Shivam Kapil, Ashwini Kumar, Rishav Bansal, Nancy Victor, (2016). Social Network Forensics. International Journal of Pharmacy & Technology, 8(4), 25843-25849. |
281. |
Ashish Gupta, Nancy Victor. (2016). Machine unlearning – An approach to make machine learning algorithms forget data and authenticates ML level security. International Journal of Pharmacy & Technology, 8(4), 25807-25818. |
282. |
Ashish Gupta, Nancy Victor (2016). Real Time analysis of mobile GPS data. International Journal of Pharmacy & Technology, 8(4), 25827-25834. |
283. |
Lokesh Sharma, Nancy Victor (2016). A Technique for classifying massive dataset using parallel ID3 approach. International Journal of Pharmacy & Technology, 8(4), 25819-25826. |
284. |
Beryl Joylin A., Aswathi T., Nancy Victor, (2016). Sentiment analysis based on word-emoticon clusters. International Journal of Pharmacy & Technology, 8(4), 25288-25296. |
285. |
Beryl Joylin A., Aswathi T., Suma P., Nancy Victor, (2016). Sentiment analysis on “Ebola” outbreak using twitter data. International Journal of Pharmacy & Technology, 8(4), 25835-25842. |
286. |
Kumaran, U., Khare, N., & Suraj, A. S. (2016). Privacy preserving in data mining technical: A review. Research Journal of Pharmacy and Technology, 9(11), 2023-2026. |
287. |
Sharathbabu B., Ayesha Banu S., Naveen Kumar S., Deepika S., (2016). Denoising ultrasound scan image from speckle noise. International Journal of Pharmacy & Technology, 8(4), 26306-26311. |
288. |
Thanikaiselvan, V., Shastri, S., Ahmad, S., & Subashanthini, S. (2016). A New Pixel Value Based Steganography Method for Data Security. Indian Journal of Science and Technology, 9(37). |
289. |
Kanugo, S., & Mekala, A. M. (2016). Particle Swarm Optimization based Edge Detection Algorithms for Computer Tomography Images. Indian Journal of Science and Technology, 9(37). |
290. |
Shah, R., Subramaniam, S., Dasarathan, L., & Babu, D. (2016). Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks. CIT. Journal of Computing and Information Technology, 24(3), 237-252. |
291. |
Shubham D., Mithil P., Sumathy S., (2016). Fair resource allocation schemes for resource constrained cloud computing environment. International Journal of Pharmacy & Technology, 8(4), 26260-26268. |
292. |
Shashank Joseph, Calvin Mugauri, Chunduru Anilkumar, Sumathy S., (2016). Access Control using attribute based encryption in cloud computing: A survey. International Journal of Pharmacy & Technology, 8(4), 26282-26291. |
293. |
Meesala Shobha Rani, Sumathy S., (2016). Analysis of KNN, C5.0 and one class SVM for intrusion detection system. International Journal of Pharmacy & Technology, 8(4), 26251-26259. |
294. |
Lawanya Shri M., Benjula Anbu Malar M B., Santhi K., Deepa M., Feslin Anish Mon., (2016). Threshold-based virtual machine allocation in cloud environment. International Journal of Pharmacy & Technology, 8(4), 21547-21559. |
295. |
Nirmala M., Anshumati Gaikwad, Nittin Choudhary, Swati Bathla, (2016). A study on improving the cloud security by virtualization. International Journal of Pharmacy & Technology, 8(4), 25885-25890. |
296. |
Nirmala M., Sharon Moses, Ankisetty Ramya, Ghanta Krishna Chaitanya., (2016). Managing and Mitigating risks in Pharmaceutical supply chain management systems. International Journal of Pharmacy & Technology, 8(4), 25864-25875. |
297. |
Nirmala M., Preethi E., Spoorti S Doddamani, Sharon Moses J, Chitturi Satya Pavan Kumar, (2016). An approach to ensuring security in cloud-based social networks. International Journal of Pharmacy & Technology, 8(4), 25918-25926. |
298. |
Tanu Maheshwari, Nirmala M., Dhinesh Babu L.D., Sharon Moses J., (2016). Extension of Rough set K-Means using parallel mapreduce algorithm. International Journal of Pharmacy & Technology, 8(4), 25876-25884. |
299. |
Malge, A., Muthamil Selvan, T. (2016). A hybrid cloud approach for secure authorized deduplication. International Journal of Pharmacy and Technology, 8(4), 25262-25272 |
300. |
Hemanth, R.B., Vijayan, R. (2016). An enhanced ford-fulkerson algorithm to determine max-flow in large mesh network using hadoop, International Journal of Pharmacy and Technology, 8(4), 25210-25220 |
301. |
Das, S.K., Patil, M.D., Sumathy, S. (2016). Review On Neural Network Based Approaches For Intrusion Detection System. International Journal of Pharmacy and Technology, 8(4), 26269-26281 |
302. |
Ananya, Dutta, A., Sandhu, P.S., Thandeeswaran, R. (2016). A graph based message encryption algorithm. International Journal of Pharmacy and Technology, 8(4), 26339-26345 |
303. |
Benjula anbu Malar, M.B., Lawanya Shri, M., Deepa, M., Santhi, K., Mon, F.A. , (2016)Efficient system for finding solution to recover bugs in software projects, International Journal of Pharmacy and Technology, 8(4), 21571-21579 |
304. |
Khandelwal, R., Ellappan, V., Ajay, Hamsadhvani, A. (2016). Comparative study of algorithms to solve travelling salesman problem. International Journal of Pharmacy and Technology,8(4), 25624-25631 |
305. |
Kumar, P.J., Ellappan, V., Badala, P. (2016). Image duplication detection. International Journal of Pharmacy and Technology, 8(4), 25632-25639 |
306. |
Ellappan, V., Upadhayay, D., Yadav, R., Vandana (2016). Hand gesture recognition for physically disabled people. International Journal of Pharmacy and Technology, 8(4), 25640-25647 |
307. |
Dubey, A.K., Ellappan, V., Paul, R., Chopra, V. (2016). Comparative analysis of backtracking and genetic algorithm in n queen’s problem. International Journal of Pharmacy and Technology, 8(4), pp. 25618-25623 |
308. |
Aswini S., Kavya R S., Senthil kumaran U., (2016). Application of Internet of things and cloud computing for health care – A survey. International Journal of Pharmacy & Technology, 8(4), 22009-22017. |
309. |
Aarthi B., Saranya R., Vaishnavi M., Senthil kumaran U., (2016). Agriculture facilitation using cloud computing – survey. International Journal of Pharmacy & Technology, 8(4), 22028-22035. |
310. |
KV. Krishna, KV. Ganesh, Ashwini S., Senthil Kumaran U., (2016). A Survey on security methods in public id system. International Journal of Pharmacy & Technology, 8(4), 21915-21922 |
311. |
Suhasini K., Yamuna M., Senthil kumaran U., (2016). A review on various event management techniques. International Journal of Pharmacy & Technology, 8(4), 5142-5149. |
312. |
Shreyas Kadu, Saryu Chugh, Nidhiben Bhatt, Nadesh R.K. (2016). Superintending of cloudlets in versatile Ad-hoc ambience utilizing Qualnet – A review on performance analysis of routing mechanisms. International Journal of Pharma and Bio sciences; Special issue SP02 “Healthcare Technology and management” 260-264. |
313. |
Keerthana A., Abirami B., Selva Kumar P., Rajaprabha M N., (2016). Dry eye monitors in computers & Mobiles – Via Webcams & Front CAMs. International Journal of Pharmacy & Technology, 8(4), 26006-26012. |
314. |
Aman Shrivastav, Bharat Nalwaya, Sudish Kumar, Rajaprabha M N., (2016), Improvement on initial seed selection for K-means algorithm. International Journal of Pharmacy & Technology, 8(4), 26000-26005. |
315. |
Sunil Sigar, Senthil Kumar N., (2016). Effective processing of question generation from text. International Journal of Pharmacy & Technology, 8(4), 25974-25980. |
316. |
Akshit Bhandari, Lavish Chhatwani, Shivali Chauhan, Senthil Kumar N., (2016). An effective load balancing approach for handling big data. International Journal of Pharmacy & Technology, 8(4), 25967-25973. |
317. |
Ayushi Jain, Saumya Bajpai, Shivali Jain, Uma Maheswari G., Jasmine Norman. (2016). Providing and detecting steganographic content communication security. International Journal of Pharmacy & Technology, 8(4), 26370-26375. |
318. |
Saurav K. Shaw, Mudit Jain, Jitesh Shaw, Durai Raj Vincent P M.,(2016). A proposed design for secure hash algorithm-2 (SHA-2) using 640 bits. International Journal of Pharmacy & Technology, 8(4), 26515-26523. |
319. |
Sudhir G., Lokesh S., Sathish Kumar K., Malathy E. (2016). Sharing file over cloud with privacy key generation. International Journal of Pharmacy & Technology, 8(4), 25691-25698. |
320. |
Arjun Biyani, Ramya G., (2016). Recommendation engine for web products. International Journal of Pharmacy & Technology, 8(4), 26019-26025. |
321. |
Prerna Kumari, Prasenjeet Bhadra, Ramya G., (2016). Study on performance issues in mobile application. International Journal of Pharmacy & Technology, 8(4), 26292-26305. |
322. |
Shashi H., Honey Thathera, Ramya G., (2016). The Safeguarding concerns for mobile applications. International Journal of Pharmacy & Technology, 8(4), 26032-26038. |
323. |
Himanshu Ewangan, Ramya G., (2016). Cross-platform mobile application development using Apache Cordova. International Journal of Pharmacy & Technology, 8(4), 26026-26031. |
324. |
Nitish Chawla, Ramya G., (2016). Lookout Android Application. International Journal of Pharmacy & Technology, 8(4), 26013-26018. |
325. |
Aditya Shivhare,Saurabh Kumar Pradhan, Manivannan S.S,(2016). Survey on Issues and Challenges in biometric based authentication, International Journal of Pharmacy and Technology,4(8),26188-26192. |
326. |
E.Ragavan., C.Hariharan,N.Aravindraj, S.S.Manivannan., (2016). Real Time Water Quality Monitoring System, International Journal of Pharmacy and Technology, 8(4), 26199-26205 |
327. |
Ashwani Gupta, Nitin Katiyar, Brijendra Singh, Sweta Bhattacharya, (2016). Comparitive study on big data architectures proposed for smart cities context, International Journal of Pharmacy and Technology,8(4), 25440-25451 |
328. |
Yoginder Singh, Sweta Bhattacharya, Brijendra Singh, (2016). IoT: Framework for Smart City. International Journal of Pharmacy and Technology, 8(4), 25432-25439. |
329. |
Pinaki Bhattacharjee, Sweta Bhattacharya, Govern Scholar Assessment Apparatus Employing Perusal Of Statistics, International Journal of Pharmacy and Technology,8(4), 26312-26322 |
330. |
Raju Kumar, Vijayan Ellappan, Kumar P.J, (2016), A Survey On Face Detection And Recognition Techniques In Different Application Domain, International Journal of Pharmacy & Technology, 8(4), 25606 – 25610. |
331. |
Payal Nemade, Aarti Sharma, Eklendra Jadam, C.L.Chowdhary (2016), Survey On Grid Clustering Approach With Intuitionistic Fuzzy Histogram, International Journal of Pharmacy & Technology, 8(4), 25475 – 25482. |
332. |
S. Kausal, V.K. Shukla, Eklendra Jadam, C.L.Chowdhary (2016), Learning Work On Online Educational Data With Bi-Directional Mapping, International Journal of Pharmacy & Technology, 8(4), 25511 – 25520. |
333. |
Payal Nemade, Aarti Sharma, C.L.Chowdhary (2016), Study On Level Set Segmentation Based Classification Using Mammograms, International Journal of Pharmacy & Technology, 8(4), 25483 – 25490. |
334. |
Gitanjali, J.,Abdul Khanadar, Bhanupriya Sharma, Shambhavi Srivastava (2016). Data mining from smart card data using data clustering. International Journal of Applied Engineering Research, 11(1), 347-352. |
335. |
Hemalatha S., Giridharan L., (2016). A Steganographic Technique based region level sparse representation for high density data hiding, International Journal of Pharmacy & Technology, 8(2), 12940-12949. |
336. |
Ajay, V. K., Desai, R., Gawannavar, M., & Nadesh, R. K. (2006). HGD: a rescue system for an alive human gesture detection in disasters management-an experimental study. ARPN Journal of Engineering and Applied Sciences, 11(11), 6826-6831. |
337. |
Hemalatha S., Santhosh Kumar S., (2016). Image Forgery Detection using Key-point Extraction and Segmentation. International Journal of Pharmacy & Technology, 8(2), 13219-13229. |
338. |
Hemalatha S., Prasanna G., (2016). Robust Remote Authentication of Video Object through Steganographic mechanism. International Journal of Pharmacy & Technology, 8(2), 12691-12700. |
339. |
Thanapal P, Muhammad Faizan M, (2016). Parental control for android smart phones. International Journal of Pharmacy & Technology, 8(3), 16581-16589. |
340. |
Bharat Khatavkar, Nadesh R.K., (2016). A Comparative study and performance evaluations for using reactive and hybrid routing approaches in intra and inter communication in VANET. International Journal of Pharmacy & Technology, 8(3), 17776-17783. |
341. |
Priya V., Divya Vandana S., (2016). Chennai Rains Sentiment – An analysis of opinion about youngsters reflected in tweets using Hadoop. International Journal of Pharmacy & Technology, 8(3), 16172-16180. |
342. |
Nadesh R.K., Akshaya Narayan Hegde, Vinay Kumar E., (2016). PANAS: A Personal Area Network for an effective monitoring of an event in a pharmacy institute – An Empirical Study. International Journal of Pharmacy & Technology, 8(3), 15932-15938. |
343. |
Priya V., Anupama Bhimnath, Sanjay M., (2016). Movement and motion modelling visitors of shopping mall. International Journal of Pharmacy & Technology, 8(3), 16230-16241. |
344. |
Vijayan E., Senthilkumar N.C., Nirmal Kumar J., Mandakini Rastogi, Himika I., (2016). Cipher and Decipher of Image. International Journal of Pharmacy & Technology, 8(3), 18653-18663. |
345. |
Vijayan E., Senthil kumar K., Aishwarya Singh, Yasmeen Khatoon, (2016). Approach on big data using Hybrid cloud. International Journal of Pharmacy & Technology, 8(3), 18344-18350. |
346. |
Shynu P.G., Lakshmipriya S., Pavithra J., (2016). A Novel Decentralised scheme for identity preserved access control in cloud. International Journal of Pharmacy & Technology, 8(3), 18141-18148. |
347. |
Baby C., Thippa Reddy G., (2016). Heart Disease prediction using Rule based Fuzzy Logic. International Journal of Pharmacy & Technology, 8(3), 15471-15479. |
348. |
Nadesh, R. K., Arivuselvan, K., & Pathanjali, S. (2016). A Quantitative Review on Introducing the Election Process with Cloud Based Electronic Voting and Measuring the Performance using Map Reduce. Indian Journal of Science and Technology, 9(39). |
349. |
Bhavani S., Malathy E., Dorothy S., (2016). Prevailing parameters by Lease using Ant Colony Optimization. Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(6), 1211-1219. |
350. |
Hardik Pandey, P J Kumar, Suganya P., (2016). Performance analysis of RBG Encryption algorithm. International Journal of Pharmacy & Technology, 8(4), 25995-25999. |
351. |
Sundaresan, Y. B., Jaiswal, A. K., & Kumaresan, P. (2016). A Low Cost Prototype for Multiple Access Security System. International Journal of Applied Engineering Research, 11(13), 7907-7913. |
352. |
Girish V K, Madhan R, Jagadeesh Gopal (2016). Sensor Detection Of Trains For National Train Enquiry System, International Journal of Pharmacy & Technology, 8(4), 22182 – 22185. |
353. |
Suryapal singh, Ashish Singh and Arjun Lamba (2016) , GLCM and Gabor Wavelet Feature Extraction based Brain Tumour Detection Using Medical Images, International Journal of Pharmacy and Technology, 8(4), 25505-25510. |
354. |
Ellappa, V., Kamalakannan, J., Babel, H., Dhamarikar, A. (2016). Access control mechanism in cloud. International Journal of Pharmacy and Technology, 8(4), 25611-25617 |
355. |
Vanmathi, C., Prabu, S. (2016). Steganography: A comparative study,analysis of key issues and current trends. International Journal of Pharmacy and Technology,8(3), 4696-4715 |
356. |
Vani M.P (2016).Incorporation Of Internet of Things with Cloud Auditing, International Journal of Pharmacy & Technology, 8(4), 25779-25786 |
357. |
Senthilkumaran U., Balamurugan B., Eswaran G., Mageswari U., (2016). Sentiment analysis of twitter data using intelligent related word identification. International Journal of Pharmacy & Technology, 8(4), 26393-26401. |
358. |
Shreelekhya G., Yazhini, Senthilkumaran U., Manikandan N., (2016). Methods for evaluating software architecture-A Survey. International Journal of Pharmacy & Technology, 8(4), 25720-25733. |
359. |
Sivaranjini V., Senthilkumaran U., Manikandan N., (2016). Optimizing the location deployment for emergency meeting scheduling in disaster relief management. International Journal of Pharmacy & Technology, 8(4), 25714-25719. |
360. |
Deni Avinash A.B., SenthilKumaran U., Manikandan N., (2016). Automated summarization of academic papers and generation of presentation slides. International Journal of Pharmacy & Technology, 8(4), 25710-25713. |
361. |
Manikandan N., Senthilkumaran U., Kumar P.J., (2016). Effective use of multiple cores for face recognition in personal computers. International Journal of Pharmacy & Technology, 8(4), 25734-25741. |
362. |
Senthilkumar M., Manikandan N., Senthilkumaran U., Samy R., (2016). Weather data analysis using hadoop. International Journal of Pharmacy & Technology, 8(4), 21827-21834. |
363. |
Thirumalai C.S., Senthil Kumar M., (2016). Secured e-mail system using base 128 encoding scheme. International Journal of Pharmacy & Technology, 8(4), 21797-21806. |
364. |
Thirumalai C.S., Senthil Kumar M., (2016). Spanning tree approach for error detection and correction. International Journal of Pharmacy & Technology, 8(4), 5009-5020. |
365. |
Chandrasegar T., Senthilkumar M., Silambarasan R., Westphall, C.B., (2016). Analyzing the strength of Pell’s RSA. International Journal of Pharmacy & Technology, 8(4), 21869-21874. |
366 |
Uma, K., Ashwini, S., & Kiruthika, S. (2016).Survey on Machine learning algorithms, International Journal of Computer Science & Wireless Security (IJCSWS), 3(5):225-228. |
367 |
Mishra, Sangeet, Asis Kumar Tripathy, and Pallavi Joshi. (2016).Making a Cloud Data Secure and Effective for Better Performance of Services. Indonesian Journal of Electrical Engineering and Computer Science. 2(3): 695- 702 |
368 |
S. Sinduja, Dharmendra Singh Rajput, (2016). Analysis Of Imbalance Dataset Using Classification Techniques, International Journal of Advanced Research Trends in Engineering and Technology, 4(19):517 – 522. |
369 |
Rajput, D. S., & Gour, R. (2016). An IoT Framework for healthcare monitoring systems. International Journal of Computer Science and Information Security, 14(5):451-455. |
370 |
Sruthi, M., & Kavitha, B. R. (2016). A Survey on IoT Platform. International Journal of Scientific Research and Modern Education.1(1): 468 – 473 |
371 |
Chowdhary, C. L., Sai, G. V. K., & Acharjya, D. P. (2016). Decreasing False Assumption for Improved Breast Cancer Detection. Journal of Science And Arts, 2(35):157-176. |
372 |
K.Santhi., M.Deepa.,M.Lawanya Shri.,M. B. BenjulaAnbu Malar,(2016). A Novel Method for Key Aggregation On data Sharing in Cloud Storage Environment, International journal of Advanced Research in Science and Engineering, 5(special issue no:1):142-148. |
373 |
Santra, A. K. (2016). Stochastic Multifacility Location Problem under Triangular Area Constraint with Euclidean Norm. International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), 4(3):111-116. |
374 |
Mohan Vamsi M., Shantharajah S.P. (2016). Adaptive Neural Fuzzy Interface System for Cloud Computing, International Journal of Advanced Research in Computer Science and Software Engineering, 6(10):92-96. |
375 |
Sara Archana R, Prabadevi B, (2016).Social Network for Allocating and Sharing Cloud Resources using Trust Relationship. International Journal of Computer Systems, 3(5): 394 – 396. |
376 |
Deepika A, Prabadevi. (2016). A Decentralized Framework for Cloud Resources Provisioning with Malware Detection, International journal of Computer Systems, 3(5):388-390. |
377 |
Ananthy E, Prabadevi B, (2016).Gain Factor Trust - A Trust Evaluation Framework in Online Social Networks, International Journal of Computer Systems, 3(5):391-393. |
378 |
Rajput, D. S., & Khare, N. (2016). Fuzzy soft set decision-making model for social networking sites. International Journal of Social Network Mining, 2(3): 256-266. |
379 |
Kaavya, S., & Priya, G. L. (2016). Static Shot based Keyframe Extraction for Multimedia Event Detection. International Journal of Computer Vision and Image Processing (IJCVIP), 6(1): 28-40. |
380 |
Prasanna, M., & Iyapparaja, M. (2016). Optimistic Investigation on Open Source Testing Tools for Testing Applications. International Research Journal of Engineering and Technology (IRJET), 3(12):633 – 635. |
381 |
Prasanna, M., Iyapparaja, M., Dhenesh V Subramanian, (2016). Certain Investigations on Testing Tools for Regressing Testing, International Research Journal of Engineering and Technology (IRJET), 3(12):630 – 632. |
382 |
Rama Prabha K.P, Jayanthi R. (2016). Performance Issues of TCP in Wireless Networks and Performance Enhancement Using TCP Vegas, Global Journal of Engineering Science and Researches, 3(7):72-80. |
383 |
Jagadeesh,G., Ramaprabha,K., MohanVamsi P.M. (2016). Enhancing Software Quality in Web Applications using Fault Tree Algorithm (FTA). International Journal of Advanced Research in Computer Science and Software Engineering.6(4):448 – 452 |
384 |
Victor, N., Lopez, D., & Abawajy, J. H. (2016). Privacy models for big data: a survey. International Journal of Big Data Intelligence, 3(1), 61-75. |
385 |
Neelu Khare, Kumaran U,Mohan Vamsi M, (2016). Knowledge Acquisition and Privacy Preserving in Cloud using Simultaneous Diagonalization Algorithm, International Journal of Advanced Research in Computer Science and Software Engineering.6(9): 137 – 140. |
386 |
Kaluri, R., & Li, G. (2016). A review on how to do the research in an effective way. International Journal of Engineering Science Invention Research & Development.2 (9): 633 – 635. |
387 |
Asha Jerlin. M, Jayakumar Sadhasivam, Nithya. S, (2016). Intelligent Interior Mapping using Wall Following Behaviour, International Journal of Trend in Research and Development.3(6):112-114. |
388 |
Swarna Priya, RM., Aarthy S. L.,Sujatha , R., Srinivas Koppu, Madhusudhana Rao, (2016). Reconstruction of 3D Realistic Models from Multiple Images – A Survey, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering,5(12):8886 – 8891 |
389 |
Asha Joseph, John Singh K (2016). A Survey on Latest Trends and Challenges in Cyber Forensics, International Journal of Advances in Electronics and Computer Science, Special Issue, 75-78. |
390 |
Kunal Gagneja, K., John Singh, (2016). Quantum Encryption using Lattice on Streaming Video in VLSI. International Journal of Advances in Electronics and Computer Science, Special Issue, 118-121. |
391 |
M.Prabukumar.L., Agilandeeswari., Srinivas Koppu., Madhusudhana Rao., Geethanajali, S. (2016). Vehicle License Plate Recognition Based on Concentric Windows and Deep Neural Networks, International J of Advanced Research in Electrical, Electronics and Instrumentation Engg, 5(12):8950 – 8956 |
392 |
Agilandeeswari, L., & Ganesan, K. (2016). False-positive free Hilbert and multi-resolution-based image watermarking technique using firefly optimisation algorithm. International Journal of Information Privacy, Security and Integrity, 2(4): 257-280. |
393 |
M P Gopinath, S Prabu, Srinivas Koppu, Madhusudhana Rao, Kamalakannan J. (2016). Automatic Region Growing Algorithm based on Combined Filtering Technique to Detect Breast Cancer, International J of Advanced Research in Electrical, Electronics and Instrumentation Engg 5(12):8878 – 8885. |
394 |
S Ramani, P., Swarnalatha, L., Ramanathan., Srinivas Koppu., Madhusudhana Rao. (2016).Symmetric Private Key Encryption and Decryption based on Matrix, International J of Advanced Research in Electrical, Electronics and Instrumentation Engg, 5(12):8985 – 8991. |
395 |
Venugopal P., Rajeev Pankaj N., Satheesh Kumar., Srinivas Koppu .,Madhusudhana Rao. (2016). Detection of Enemy Intervention in Border and Battle Fields Using Smart Dust Technology, International J of Advanced Research in Electrical, Electronics and Instrumentation Engg, 5(12):8833 – 8843 |
396 |
Ramya, G., Priya, G., & Mon, F. A. (2016). Isolating Tainted Nodule. Imperial Journal of Interdisciplinary Research, 2(11):1870-1973. |
397 |
Bandaru Venkata Hemanth Kumar., Ramya, G.(2016). Clustered Information Retrieval Using Image Query, International Journal of Innovative Research in Computer |
and Communication Engineering, 3(6):5503 – 5507. |
|
398 |
Devi, G. U., Sowmitha, M. K., Jidhesh, R., & Jangir, A.(2016).Improved Eaack For Intrusion Detection System. International Journal of Research in Engineering and Technology, 5(5): 28 – 33. |
399 |
Prathamesh Vijay Tarare ,AnurajMalav,G., Usha Devi. (2016). Modified Ant Colony System Algorithm For IP- Traceback Problem, International Journal of Research in Engineering and Technology, 5(5):19-23 |
400 |
Judith Nita, M., Rajaprabha. MN. (2016). Implementation of Shared Authority Based Privacy Preserving Authentication Protocol in Cloud Computing, International Journal of Innovative Research in Computer and Communication Engineering, 4(4):6780 – 6785. |
401 |
Thenmozhi B., Rajaprabha, MN.(2016). Automatic Averting From Cyberbullying Using Efficient Polarity Count Algorithm, International Journal of Innovative Research in Computer and Communication Engineering, 4(4): 6834 – 6840. |
402 |
Bimal Kumar Ray, (2016). A technique for piecewise linear approximation of 2D digital curve, International Journal of Computer Graphics, 7(1):1-16. |
403 |
V. Shanthi., Godithi Ramya Sree., Senthil Kumaran. (2016). Confidential Communication and Secret Data Storing by Embedding Files–Survey, International Journal of Research in Engineering and Technology, 3(11): 459 – 465. |
404 |
Mangayarkarasi, R.,Vanitha, M.(2016). A Survey of suboptimal polygonal approximation methods, International Journal of Communication and Computer Technologies, 4(16):4083 – 4090. |
405 |
M. Lawanya Shri., M.B.Benjula Anbumalar., K. Santhi, Deepa. M., (2016).Task Scheduling Based On Efficient Optimal Algorithm In Cloud Computing Environment, International Journal of Advanced Technology in Engineering and Science, 4(special issue no:1):306-310. |
406 |
Subha, S. (2006). A Literature Survey of CPU Exclusive Caches, International Journal of Advanced Scientific Technologies, Engineering and Management, 2(7):9-10. |
407 |
Tamizharasi, G. S., Manjula, R., Monisha, K., & Balamurugan, B. (2016). A Secure and Efficient Framework for Health Data Management in E-Health Clouds. International Journal of Computer Science and Information Security, 14(9):1078-1085. |
408 |
Vasumathy, M., Thirugnanam, M., & Sumathy, S. (2016). A framework for automatic intrude object identification in paediatric foreign body aspired radiography images. International Journal of Image Mining, 2(1): 57 – 67. |
409 |
Elavarassi M, Elango N.M, (2016). A Review On Recovering And Examining Computer Forensics Evidences. Asian Journal of Computer Science Engineering, 1(2):22 – 24. |