School of Computer Science Engineering and Information Systems (SCORE)

Publications

2023

SL. NO. TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL
1 FLPK-BiSeNet: Federated Learning Based on Priori Knowledge and Bilateral Segmentation Network for Image Edge Extraction Teng L., Qiao Y., Shafiq M., Srivastava G., Javed A.R., Gadekallu T.R., Yin S. IEEE Transactions on Network and Service Management
2 The Metaverse for Cognitive Health: A Paradigm Shift Ramu S.P., Srivastava G., Chengoden R., Victor N., Maddikunta P.K.R., Gadekallu T.R. IEEE Consumer Electronics Magazine
3 A Generalizable Deep Neural Network Method for Detecting Attacks in Industrial Cyber-Physical Systems Sakhnini J., Karimipour H., Dehghantanha A., Yazdinejad A., Gadekallu T.R., Victor N., Islam A. IEEE Systems Journal
4 Cluster-Based Protocol for Prioritized Message Communication in VANET Saha S., Kumar V.V., Niveditha V.R., Kannan V.A., Gunasekaran K., Venkatesan K. IEEE Access
5 Digital Twin: Exploring the Intersection of Virtual and Physical Worlds Menon D., Anand B., Chowdhary C.L. IEEE Access
6 From Assistive Technologies to Metaverse - Technologies in Inclusive Higher Education for Students with Specific Learning Difficulties: A Review Yenduri G., Kaluri R., Rajput D.S., Lakshmanna K., Gadekallu T.R., Mahmud M., Brown D.J. IEEE Access
7 Plant and Salamander Inspired Network Attack Detection and Data Recovery Model Sharma R.K., Issac B., Xin Q., Gadekallu T.R., Nath K. Sensors
8 GAN with CCSO: generative adversarial network-driven CAViaR competitive swarm optimizer for medical video super resolution Nathiya S., Sujatha R. Multimedia Tools and Applications
9 Exponential Chimp Optimization Algorithm based Deep Neuro-Fuzzy Network with MapReduce framework for fake news detection in big data analytics Kanchanamala P., Selva Rani B., Vairamuthu S. International Journal of Adaptive Control and Signal Processing
10 RetU-Net: An Enhanced U-Net Architecture for Retinal Lesion Segmentation Sundar S., Sumathy S. International Journal on Artificial Intelligence Tools
11 A Multi-channel Convolutional Neural Network for Multilabel Sentiment Classification Using Abilify Oral User Reviews Trueman T.E., Jayaraman A.K., Jasmine S., Ananthakrishnan G., Narayanasamy P. Informatica (Slovenia)
12 A Survey on Soft Computing Techniques for Federated Learning- Applications, Challenges and Future Directions Supriya Y., Gadekallu T.R. Journal of Data and Information Quality
13 Blind nonlinear unmixing using nonnegative matrix factorization based bi-objective autoencoder Bhakthan S.M., Loganathan A., Bansal A. Indonesian Journal of Electrical Engineering and Computer Science
14 Customer churning analysis using machine learning algorithms Prabadevi B., Shalini R., Kavitha B.R. International Journal of Intelligent Networks
15 Deep Learning Perspectives to Detecting Intrusions in Wireless Sensor Networks Abhale A.B., Jayaram Reddy A. International Journal of Intelligent Systems and Applications in Engineering
16 From Fake Reviews to Fake News: A Novel Pandemic Model of Misinformation in Digital Networks Govindankutty S., Gopalan S.P. Journal of Theoretical and Applied Electronic Commerce Research
17 Maximizing network efficiency by optimizing channel allocation in wireless body area networks using machine learning techniques Rao V.C.S., Shanmathi M., Rajkumar M., Haleem S.L.A., Amirthalingam V., Vanathi A. Internet Technology Letters
18 Multi-image Feature Map-Based Watermarking Techniques Using Transformer Palani A., Loganathan A. International Journal of Electrical and Electronics Research
19 Performance analysis of smart optimization antenna for wireless networks Abraham J., Suriyan K., Jackson B., Natarajan M., Lakshmanaperumal T.M. International Journal of Electrical and Computer Engineering
20 Artificial Intelligence for Cognitive Health Assessment: State-of-the-Art, Open Challenges and Future Directions Javed A.R., Saadia A., Mughal H., Gadekallu T.R., Rizwan M., Maddikunta P.K.R., Mahmud M., Liyanage M., Hussain A. Cognitive Computation
21 Internet of things in Healthcare: a conventional literature review Singh B., Lopez D., Ramadan R. Health and Technology
22 Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses Muhammad Z., Anwar Z., Javed A.R., Saleem B., Abbas S., Gadekallu T.R. Technologies
23 Integrating forest cover change and carbon storage dynamics: Leveraging Google Earth Engine and InVEST model to inform conservation in hilly regions Kafy A.-A., Saha M., Fattah M.A., Rahman M.T., Duti B.M., Rahaman Z.A., Bakshi A., Kalaivani S., Nafiz Rahaman S., Sattar G.S. Ecological Indicators
24 Design and Development of IoT and Deep Ensemble Learning Based Model for Disease Monitoring and Prediction Venkatachala Appa Swamy M., Periyasamy J., Thangavel M., Khan S.B., Almusharraf A., Santhanam P., Ramaraj V., Elsisi M. Diagnostics
25 Brain Tumor Class Detection in Flair/T2 Modality MRI Slices Using Elephant- Herd Algorithm Optimized Features Rajinikanth V., Vincent P.M.D.R., Gnanaprakasam C.N., Srinivasan K., Chang C.-Y. Diagnostics
26 Remora Namib Beetle Optimization Enabled Deep Learning for Severity of COVID-19 Lung Infection Identification and Classification Using CT Images Shanthi A., Koppu S. Sensors
27 Optimization algorithms in security and privacy-preserving data disturbance for collaborative edge computing social IoT deep learning architectures Boopathi M., Gupta S., Zabeeulla A.N.M., Gupta R., Vekriya V., Pandey A.K. Soft Computing
28 Pest Detection and Classification in Peanut Crops Using CNN, MFO, and EViTA Algorithms Venkatasaichandrakanthan d P., Iyapparaja M. IEEE Access
29 Breast Cancer Classification In Histopathological Images Using Federated Learning Framework Peta J., Koppu S. IEEE Access
30 Optimization using Internet of Agent based Stacked Sparse Autoencoder Model for Heart Disease Prediction Baviskar V., Verma M., Chatterjee P., Singal G., Gadekallu T.R. Expert Systems
31 Metamaterial Inspired Quad-Port Multi- Antenna System for Millimeter Wave 5G Applications Krishnamoorthy R., Kumar U.S., Swathi G., Begum M.A., Nancharaiah B., Sagar K.V.D. Journal of Infrared, Millimeter, and Terahertz Waves
32 Digital image and video watermarking: methodologies, attacks, applications, and future directions Aberna P., Agilandeeswari L. Multimedia Tools and Applications
33 Data Rate Aware Reliable Transmission Mechanism in Wireless Sensor Networks using Bayesian Regularized Neural Network approach Pundir M., Sandhu J.K., Gupta D., Gadekallu T.R., Juneja A., Gulzar Y., Nauman A. Physical Communication
34 Context-Aware Emotion Detection from Low-resource Urdu Language Using Deep Neural Network Bashir M.F., Javed A.R., Arshad M.U., Gadekallu T.R., Shahzad W., Beg M.O. ACM Transactions on Asian and Low- Resource Language Information Processing
35 A Decision Model for Ranking Asian Higher Education Institutes Using an NLP-Based Text Analysis Approach Prabadevi B., Deepa N., Ganesan K., Srivastava G. ACM Transactions on Asian and Low- Resource Language Information Processing
36 Scene Graph Semantic Inference for Image and Text Matching Pei J., Zhong K., Yu Z., Wang L., Lakshmanna K. ACM Transactions on Asian and Low- Resource Language Information Processing
37 Multimodal Biometrics Authentication in Healthcare Using Improved Convolution Deep Learning Model Balaji S., Rahamathunnisa U. International Journal on Artificial Intelligence Tools
38 Early Predictive Model for Detection of Plant Leaf Diseases Using MobileNetV2 Architecture Mahesh T.R., Vinoth Kumar V., Sivakami R., Manimozhi I., Krishnamoorthy N., Swapna B. International Journal of Intelligent Systems and Applications in Engineering
39 Intrusion Detection System in Industrial Cyber-Physical System Using Clustered Federated Learning Jayagopal V., Elangovan M., Singaram S.S., Shanmugam K.B., Subramaniam B., Bhukya S. SN Computer Science
40 Smart farming using cloud-based Iot data analytics Turukmane A.V., Pradeepa M., Reddy K.S.S., Suganthi R., Riyazuddin Y.M., Tallapragada V.V.S. Measurement: Sensors
41 A Jamming Attacks Detection Approach Based on CNN based Quantum Leap Method for Wireless Sensor Network Sheela M.S., Balasubramauf M., Jayakanth J.J., Rajalakskmi R., Manivaunau K., Surest D. International Journal on Recent and Innovation Trends in Computing and Communication
42 Artificial Bee Colony Optimized Recurrent Neural Network-Based Port Container Throughput Forecast Jayaprakash P.O., Raja K.T., Sree Dharinya S., Janaki N. International Journal of Intelligent Systems and Applications in Engineering
43 Digital interference signal filtering on laser interface for optical fiber communication Zhang S., Gadekallu T.R. EAI Endorsed Transactions on Scalable Information Systems
44 Big Data Analytics, Processing Models, Taxonomy of Tools, V's, and Challenges: State-of-Art Review and Future Implications Big Data Analytics, Processing Models, Taxonomy of Tools, V's, and Challenges: State-of-Art Review and Future Implications Wireless Communications and Mobile Computing
45 Antimicrobial, antioxidant, anticancer, and antithrombotic, competency of saponins from the root of Decalepis hamiltonii Gitanjali J., Dinesh Ram D.S., R K., Amalan V., Alahmadi T.A., Alharbi S.A., Kandasamy S., Shanmuganthan R., Vijayakumar N. Environmental Research
46 A Novel Data Poisoning Attack in Federated Learning based on Inverted Loss Function Gupta P., Yadav K., Gupta B.B., Alazab M., Gadekallu T.R. Computers and Security
47 A Framework of Faster CRNN and VGG16- Enhanced Region Proposal Network for Detection and Grade Classification of Knee RA Srinivasan S., Gunasekaran S., Mathivanan S.K., Jayagopal P., Khan M.A., Alasiry A.,Marzougui M., Masood A. Diagnostics
48 Asymmetric Consortium Blockchain and Homomorphically Polynomial-Based PIR for Secured Smart Parking Systems Haritha T., Anitha A. Computers, Materials and Continua
49 Performance evaluation of deep learning techniques for lung cancer prediction Deepapriya B.S., Kumar P., Nandakumar G., Gnanavel S., Padmanaban R., Anbarasan A.K., Meena K. Soft Computing
50 An Entity Extraction and Categorization Technique on Twitter Streams Narayanasamy S.K., Chang M. International Journal of Information Technology and Decision Making
51 ASYv3: Attention-enabled pooling embedded Swin transformer-based YOLOv3 for obscenity detection Samal S., Zhang Y.-D., Gadekallu T.R., Balabantaray B.K. Expert Systems
52 A meta heuristic optimization algorithm (Lion-BES-XGB) for water quality prediction K K., J V. Urban Water Journal
53 Processing of digital mammogram images using optimized ELM with deep transfer learning for breast cancer diagnosis Chakravarthy S.R.S., Bharanidharan N., Rajaguru H. Multimedia Tools and Applications
54 Detection of Arrhythmia Heartbeats from ECG Signal Using Wavelet Transform- Based CNN Model pandey S.K., Shukla A., Bhatia S., Gadekallu T.R., Kumar A., Mashat A., Shah M.A., Janghel R.R. International Journal of Computational Intelligence Systems
55 Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology Savithri M., Pradeepa M., Prasad D.R., Gangodkar D., Rajalakshmi R., Shafi S., Sinchana N.M., Prasanna Kumar K.R., Selvam N. Wireless Communications and Mobile Computing
56 High Utility Periodic Frequent Pattern Mining in Multiple Sequences Chen C.-M., Zhang Z., Wu J.M.-T., Lakshmanna K. CMES - Computer Modeling in Engineering and Sciences
57 Detection and Counter Measure of Packet Misrouting by GPS-Free Positioning of Ad-Hoc Nodes Sathianesan G.W., Gnanavel S., Salini R., Raji V., Vijay Anand R., Uddin M.S. Mobile Information Systems
58 A robust malware traffic classifier to combat security breaches in industry 4.0 applications Mangayarkarasi R., Vanmathi C., Ravi V. Concurrency and Computation: Practice and Experience
59 RETRACTED ARTICLE: Industrial-IoT- hardware security-improvement using plan load optimization method in cloud Basheer S., Gopu M., Mathew R.M., Bivi M.A., Prabu M. International Journal of System Assurance Engineering and Management
60 Strategies for classifying water quality in the Cauvery River using a federated learning technique J V., K K., P G.M., C G., Subramaniam P.R., Rangarajan S. International Journal of Cognitive Computing in Engineering
61 COVID -19 Predictions using Transfer Learning based Deep Learning Model with Medical Internet of Things Angulakshmi M., Deepa M., Anand M., Vanitha M., Sumaiya Thaseen I., Karthikeyan P. International Journal on Recent and Innovation Trends in Computing and Communication
62 Detecting the Anti-Social Activity on Twitter using EGBDT with BCM Chinthamu N., Gooda S.K., Shenbagavalli P., Krishnamoorthy N., Selvan S.T. International Journal on Recent and Innovation Trends in Computing and Communication
63 SHBO-based U-Net for image segmentation and FSHBO-enabled DBN for classification using hyperspectral image Subba Reddy T., Krishna Reddy V.V., Vijaya Kumar Reddy R., Kolli C.S., Sitharamulu V., Chandrababu M. Imaging Science Journal
64 Phonetic-based Forward Online Transliteration Tool from English to Tamil Language Anbukkarasi S., Elangovan D., Periyasamy J., Sathishkumar V.E., Sree Dharinya S., Sandeep Kumar M., Prabhu J. International Journal of Reliability, Quality and Safety Engineering
65 Optimisation of SPARQL queries over the RDF data in the cloud environment Dharmaraj C.R., Tripathy B.K. International Journal of Advanced Intelligence Paradigms
66 A pattern mixture model with long short-term memory network for acute kidney injury prediction Fathima Begum M., Narayan S. Journal of King Saud University - Computer and Information Sciences
67 Precipitation prediction by integrating Rough Set on Fuzzy Approximation Space with Deep Learning techniques[Formula presented] Manna T., A. A. Applied Soft Computing
68 Vision Transformers, Ensemble Model, and Transfer Learning Leveraging Explainable AI for Brain Tumor Detection and Classification Hossain S., Chakrabarty A., Gadekallu T.R., Alazab M., Piran M.J. IEEE Journal of Biomedical and Health Informatics
69 Smart contract token-based privacy-preserving access control system for industrial Internet of Things Wang W., Huang H., Yin Z., Gadekallu T.R., Alazab M., Su C. Digital Communications and Networks
70 Sonar glass?Artificial vision: Comprehensive design aspects of a synchronization protocol for vision based sensors Balakrishnan A., Ramana K., Ashok G., Viriyasitavat W., Ahmad S., Gadekallu T.R. Measurement: Journal of the International Measurement Confederation
71 Optimization-Driven Machine Learning Approach for the Prediction of Hydrochar Properties from Municipal Solid Waste Velusamy P., Srinivasan J., Subramanian N., Mahendran R.K., Saleem M.Q., Ahmad M., Shafiq M., Choi J.-G. Sustainability (Switzerland)
72 Non-Gaussian Traffic Modelling for Multicore Architecture Using Wavelet Based Rosenblatt Process Chaurasia A., Sharma V.S., Chowdhary C.L., Basheer S., Gadekallu T.R. IEEE Access
73 DeepMist: Towards Deep Learning Assisted Mist Computing Framework for Managing Healthcare Big Data Bebortta S., Tripathy S.S., Basheer S., Chowdhary C.L. IEEE Access
74 Smart Decision-Making and Communication Strategy in Industrial Internet of Things Gunasekaran K., Vinoth Kumar V., Kaladevi A.C., Mahesh T.R., Rohith Bhat C., Venkatesan K. IEEE Access
75 Exergoenvironmental evaluation of kalina power generation system Maheswari G.U., Ganesh N.S., Srinivas T., Reddy B.V. Energy Sources, Part A: Recovery, Utilization and Environmental Effects
76 An Intelligent Waste Management Application Using IoT and a Genetic Algorithm?Fuzzy Inference System Thaseen Ikram S., Mohanraj V., Ramachandran S., Balakrishnan A. Applied Sciences (Switzerland)
77 A Deep Learning Approach for Kidney Disease Recognition and Prediction through Image Processing Kumar K., Pradeepa M., Mahdal M., Verma S., RajaRao M.V.L.N., Ramesh J.V.N. Applied Sciences (Switzerland)
78 Secure PBFT Consensus-Based Lightweight Blockchain for Healthcare Application Hegde P., Maddikunta P.K.R. Applied Sciences (Switzerland)
79 MBRSDTC: Design of a multimodal bioinspired model to improve resource scheduling efficiency with differential task-level constraints Brahmam M.G., Vijay Anand R. Expert Systems
80 Robust Graph Neural-Network-Based Encoder for Node and Edge Deep Anomaly Detection on Attributed Networks ? Daniel G.V., Chandrasekaran K., Meenakshi V., Paneer P. Electronics (Switzerland)
81 HCoF: Hybrid Collaborative Filtering Using Social and Semantic Suggestions for Friend Recommendation Ramakrishna M.T., Venkatesan V.K., Bhardwaj R., Bhatia S., Rahmani M.K.I., Lashari S.A., Alabdali A.M. Electronics (Switzerland)
82 A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication Agilandeeswari L., Prabukumar M., Alenizi F.A. Multimedia Tools and Applications
83 Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithm Rajyalakshmi V., Lakshmanna K. International Journal of Network Management
84 An anomaly detection on blockchain infrastructure using artificial intelligence techniques: Challenges and future directions? A review Chithanuru V., Ramaiah M. Concurrency and Computation: Practice and Experience
85 Integrated publish/subscribe and push-pull method for cloud based IoT framework for real time data processing Sai Lohitha N., Pounambal M. Measurement: Sensors
86 Gaussian kernelized feature selection and improved multilayer perceptive deep learning classifier for software fault prediction Sivavelu S., Palanisamy V. Indonesian Journal of Electrical Engineering and Computer Science
87 Uncertainty Quantification to Improve the Classification of Melanoma and Basal Skin Cancer Using ResNet Model Deepa D., Muthukumaran V., Vinodhini V., Selvaraj S., Sandeep Kumar M., Prabhu J. Journal of Uncertain Systems
88 An Improved MangoNet Architecture Using Harris Hawks Optimization for Fruit Classification with Uncertainty Estimation Rajalaxmi R.R., Saradha M., Fathima S.K., Sathish Kumar V.E., Sandeep Kumar M., Prabhu J. Journal of Uncertain Systems
89 Rainfall prediction using ensembled-LSTM and dense networks Sinha U., Thakur V., Jain S., Parimala M., Kaspar S. International Journal of Engineering Systems Modelling and Simulation
90 A systematic review of Explainable Artificial Intelligence models and applications: Recent developments and future trends Saranya A., Subhashini R. Decision Analytics Journal
91 A Systematic Review of Transformer-Based Pre-Trained Language Models through Self- Supervised Learning Kotei E., Thirunavukarasu R. Information (Switzerland)
92 A Comprehensive Survey on Certificate- Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems Sripathi Venkata Naga S.K., Yesuraj R., Munuswamy S., Arputharaj K. Sensors
93 A Scientometric Analysis of Deep Learning Approaches for Detecting Fake News Dhiman P., Kaur A., Iwendi C., Mohan S.K. Electronics (Switzerland)
94 A Survey of Explainable Artificial Intelligence for Smart Cities Javed A.R., Ahmed W., Pandya S., Maddikunta P.K.R., Alazab M., Gadekallu T.R. Electronics (Switzerland)
95 AITel: eHealth Augmented Intelligence based Telemedicine Resource Recommendation Framework for IoT devices in Smart cities Ahmed S.T., Kumar V., Kim J. IEEE Internet of Things Journal
96 Blockchain for the metaverse: A Review Huynh-The T., Gadekallu T.R., Wang W., Yenduri G., Ranaweera P., Pham Q.-V., da Costa D.B., Liyanage M. Future Generation Computer Systems
97 Securing Multimedia Using a Deep Learning Based Chaotic Logistic Map Rupa C., Harshitha M., Srivastava G., Gadekallu T.R., Maddikunta P.K.R. IEEE Journal of Biomedical and Health Informatics
98 An anonymization-based privacy- preserving data collection protocol for digital health data Andrew J., Eunice R.J., Karthikeyan J. Frontiers in Public Health
99 An authentication approach in SDN- VANET architecture with Rider-Sea Lion optimized neural network for intrusion detection Pulligilla M.K., Vanmathi C. Internet of Things (Netherlands)
100 An edge communication based probabilistic caching for transient content distribution in vehicular networks Gupta D., Rani S., Tiwari B., Gadekallu T.R. Scientific Reports
101 Particle Swarm-Based Federated Learning Approach for Early Detection of Forest Fires Supriya Y., Gadekallu T.R. Sustainability (Switzerland)
102 UsCoTc: Improved Collaborative Filtering (CFL) recommendation methodology using user confidence, time context with impact factors for performance enhancement Mahesh T.R., Vinoth Kumar V., Lim S.-J. PLoS ONE
103 Performance investigation on novel combined power generation and refrigeration system Uma Maheswari G., Ganesh N.S., Srinivas T., Reddy B.V. Energy and Environment
104 High-Performance Artificial Intelligence Recommendation of Quality Research Papers Using Effective Collaborative Approach Venkatesan V.K., Ramakrishna M.T., Batyuk A., Barna A., Havrysh B. Systems
105 Efficient Data Preprocessing with Ensemble Machine Learning Technique for the Early Detection of Chronic Kidney Disease Venkatesan V.K., Ramakrishna M.T., Izonin I., Tkachenko R., Havryliuk M. Applied Sciences (Switzerland)
106 Deep Ensemble-Based Approach Using Randomized Low-Rank Approximation for Sustainable Groundwater Level Prediction Manna T., Anitha A. Applied Sciences (Switzerland)
107 Experience Replay Optimisation via ATSC and TSC for Performance Stability in Deep RL Osei R.S., Lopez D. Applied Sciences (Switzerland)
108 A Forecasting Approach to Cryptocurrency Price Index Using Reinforcement Learning Mariappan L.T., Pandian J.A., Kumar V.D., Geman O., Chiuchisan I., N?stase C. Applied Sciences (Switzerland)
109 Homogeneous Adaboost Ensemble Machine Learning Algorithms with Reduced Entropy on Balanced Data Ramakrishna M.T., Venkatesan V.K., Izonin I., Havryliuk M., Bhat C.R. Entropy
110 Detection and Grade Classification of Diabetic Retinopathy and Adult Vitelliform Macular Dystrophy Based on Ophthalmoscopy Images Srinivasan S., Nagarnaidu Rajaperumal R., Mathivanan S.K., Jayagopal P., Krishnamoorthy S., Kardy S. Electronics (Switzerland)
111 Hybrid Whale and Gray Wolf Deep Learning Optimization Algorithm for Prediction of Alzheimer?s Disease Dhakhinamoorthy C., Mani S.K., Mathivanan S.K., Mohan S., Jayagopal P., Mallik S., Qin H. Mathematics
112 Identification of traffic signs for advanced driving assistance systems in smart cities using deep learning Dhawan K., Srinivasa Perumal R., Nadesh R.K. Multimedia Tools and Applications
113 Biodiversity in a forest ecosystem in India using environmental DNA sequence analysis of pathogen-hostile eucalyptus trees Ram S.R., Narayanan L., Krishnan S., Robinson H. Global Nest Journal
114 Artificial intelligence with earthworm optimization assisted waste management system for smart cities Rajalakshmi J., Sumangali K., Jayanthi J., Muthulakshmi K. Global Nest Journal
115 Object Sub-Categorization and Common Framework Method using Iterative AdaBoost for Rapid Detection of Multiple Objects Rao B.N.K., Ranjana R., Challa N.P., Chakravarthi S.S., Vellingiri J. Journal of Scientific and Industrial Research
116 Flexible and secure continues data transmission among multiple users in cloud environment Elumalai E., Muruganandam D. Indonesian Journal of Electrical Engineering and Computer Science
117 A Novel Framework on Security and Energy Enhancement Based on Internet of Medical Things for Healthcare 5.0 Natarajan R., Lokesh G.H., Flammini F., Premkumar A., Venkatesan V.K., Gupta S.K. Infrastructures
118 Human Detection and Action Recognition for Search and Rescue in Disasters Using YOLOv3 Algorithm Valarmathi B., Kshitij J., Dimple R., Srinivasa Gupta N., Harold Robinson Y., Arulkumaran G., Mulu T. Journal of Electrical and Computer Engineering
119 A Performance Enhancement of Deepfake Video Detectio Ikram S.T., Sood D., Priya V., Arulkumar V., Chambial S. International Journal of Electrical and Computer Engineering Systems
120 A Vision Transformer Approach for Traffic Congestion Prediction in Urban Areas Ramana K., Srivastava G., Kumar M.R., Gadekallu T.R., Lin J.C., Alazab M., Iwendi C. IEEE Transactions on Intelligent Transportation Systems
121 A framework to distinguish healthy/cancer renal CT images using the fused deep features Rajinikanth V., Vincent P.M.D.R., Srinivasan K., Ananth Prabhu G., Chang C.-Y. Frontiers in Public Health
122 Deep belief network-based approach for detecting Alzheimer's disease using the multi-omics data Mahendran N., Vincent P M D.R. Computational and Structural Biotechnology Journal
123 Preserving Privacy of Classified Authentic Satellite Lane Imagery Using Proxy Re-Encryption and UAV Technologies Nagasree Y., Rupa C., Akshitha P., Srivastava G., Gadekallu T.R., Lakshmanna K. Drones
124 Deep Learning-Based Metaheuristic Weighted K-Nearest Neighbor Algorithm for the Severity Classification of Breast Cancer Sannasi Chakravarthy S.R., Bharanidharan N., Rajaguru H. IRBM
125 SRC: Superior Robustness of COVID-19 Detection from Noisy Cough Data Using GFCC Swain B.K., Khan M.Z., Chowdhary C.L., Alsaeedi A. Computer Systems Science and Engineering
126 Local-Ternary-Pattern-Based Associated Histogram Equalization Technique for Cervical Cancer Detection Srinivasan S., Raju A.B.K., Mathivanan S.K., Jayagopal P., Babu J.C., Sahu A.K. Diagnostics
127 TAKEN: A Traffic Knowledge-Based Navigation System for Connected and Autonomous Vehicles Kamath B N., Fernandes R., Rodrigues A.P., Mahmud M., Vijaya P., Gadekallu T.R., Kaiser M.S. Sensors
128 Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy Muhammad Z., Amjad F., Iqbal Z., Javed A.R., Gadekallu T.R. Journal of Ambient Intelligence and Humanized Computing
129 Metaverse for Healthcare: A Survey on Potential Applications, Challenges and Future Directions Chengoden R., Victor N., Huynh-The T., Yenduri G., H.Jhaveri R., Alazab M., Bhattacharya S., Hegde P., Maddikunta P.K.R., Gadekallu T.R. IEEE Access
130 SDOT: Secure Hash, Semantic Keyword Extraction, and Dynamic Operator Pattern-Based Three-Tier Forensic Classification Framework Joseph D.P., Viswanathan P. IEEE Access
131 Novel Hybrid Optimization Techniques to Enhance Reliability from Reverse Osmosis Desalination Process Baseer M.A., Vinoth Kumar V., Izonin I., Dronyuk I., Velmurugan A.K., Swapna B. Energies
132 A Novel Approach for Continuous Authentication of Mobile Users Using Reduce Feature Elimination (RFE): A Machine Learning Approach kumari S., Singh K., Khan T., Ariffin M.M., Mohan S.K., Baleanu D., Ahmadian A. Mobile Networks and Applications
133 SEDIS?A Rumor Propagation Model for Social Networks by Incorporating the Human Nature of Selection Govindankutty S., Gopalan S.P. Systems
134 Secured MCDM Model for Crowdsource Business Intelligence Nallakaruppan M.K., Johri I., Somayaji S., Bhatia S., Malibari A.A., Alabdali A.M. Applied Sciences (Switzerland)
135 SBMYv3: Improved MobYOLOv3 a BAM attention-based approach for obscene image and video detection Samal S., Zhang Y.-D., Gadekallu T.R., Nayak R., Balabantaray B.K. Expert Systems
136 Filter-Based Ensemble Feature Selection and Deep Learning Model for Intrusion Detection in Cloud Computing Kavitha C., Saravanan M., Gadekallu T.R., Nimala K., Kavin B.P., Lai W.-C. Electronics (Switzerland)
137 Diabetic Retinopathy Detection: A Blockchain and African Vulture Optimization Algorithm-Based Deep Learning Framework Uppamma P., Bhattacharya S. Electronics (Switzerland)
138 Forest Fire Identification in UAV Imagery Using X-MobileNet Namburu A., Selvaraj P., Mohan S., Ragavanantham S., Eldin E.T. Electronics (Switzerland)
139 Federated Learning Approach for Early Detection of Chest Lesion Caused by COVID-19 Infection Using Particle Swarm Optimization Kandati D.R., Gadekallu T.R. Electronics (Switzerland)
140 IoMT with Deep CNN: AI-Based Intelligent Support System for Pandemic Diseases Thandapani S., Mahaboob M.I., Iwendi C., Selvaraj D., Dumka A., Rashid M., Mohan S. Electronics (Switzerland)
141 An Ensemble Learning Approach for Reversible Data Hiding in Encrypted Images with Fibonacci Transform Panchikkil S., Vegesana S.P., Manikandan V.M., Donta P.K., Maddikunta P.K.R., Gadekallu T.R. Electronics (Switzerland)
142 Trajectory Planning and Collision Control of a Mobile Robot: A Penalty-Based PSO Approach Pandey K.K., Kumbhar C., Parhi D.R., Mathivanan S.K., Jayagopal P., Haque A. Mathematical Problems in Engineering
143 A Distributed Framework for Predictive Analytics Using Big Data and MapReduce Parallel Programming Natesan P., Sathishkumar V.E., Mathivanan S.K., Venkatasen M., Jayagopal P., Allayear S.M. Mathematical Problems in Engineering
144 Fault prediction using fuzzy convolution neural network on IoT environment with heterogeneous sensing data fusion Rajput D.S., Meena G., Acharya M., Mohbey K.K. Measurement: Sensors
145 Deep Learning Speech Synthesis Model for Word/Character-Level Recognition in the Tamil Language Rajendran S., Raja K.T., Nagarajan G., Dass S.A., Kumar S.M., Jayagopal P. International Journal of e- Collaboration
146 Deep Learning and Medical Image Processing Techniques for Diabetic Retinopathy: A Survey of Applications, Challenges, and Future Trends Uppamma P., Bhattacharya S. Journal of Healthcare Engineering
147 A review on soft computing approaches for predicting maintainability of software: State-of-the-art, technical challenges, and future directions Yenduri G., Gadekallu T.R. Expert Systems
148 A Survey on Deep Learning Models Embed Bio-Inspired Algorithms in Cardiac Disease Classification Pandiyan N., Narayan S. Open Biomedical Engineering Journal
149 A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment Chen C.-M., Li Z., Kumari S., Srivastava G., Lakshmanna K., Gadekallu T.R. Vehicular Communications
150 Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks Babu E.S., Barthwal A., Kaluri R. Computer Communications
151 Distributed three-way formal concept analysis for large formal contexts Chunduri R.K., Cherukuri A.K. Journal of Parallel and Distributed Computing
152 The Laplacian Energy of Hesitancy Fuzzy Graphs in Decision-Making Problems Rajagopal Reddy N., Khan M.Z., Sharief Basha S., Alahmadi A., Alahmadi A.H., Chowdhary C.L. Computer Systems Science and Engineering
153 Securing social platform from misinformation using deep learning Roy P.K., Tripathy A.K., Weng T.-H., Li K.-C. Computer Standards and Interfaces
154 Solitons of dispersive wave steered from Navier?Bernoulli and Love's hypothesis in cylindrical elastic rod with compressible Murnaghan's materials Silambarasan R., K?l?çman A. Mathematics and Computers in Simulation
155 Load balancing and service discovery using Docker Swarm for microservice based big data applications Singh N., Hamid Y., Juneja S., Srivastava G., Dhiman G., Gadekallu T.R., Shah M.A. Journal of Cloud Computing
156 Deep Learning for Wind Speed Forecasting Using Bi-LSTM with Selected Features Subbiah S.S., Paramasivan S.K., Arockiasamy K., Senthivel S., Thangavel M. Intelligent Automation and Soft Computing
157 A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network Theresa W.G., Gayathri A., Rama P. Intelligent Automation and Soft Computing
158 Multiparameter optimization system with DCNN in precision agriculture for advanced irrigation planning and scheduling based on soil moisture estimation Kumar P., Udayakumar A., Anbarasa Kumar A., Senthamarai Kannan K., Krishnan N. Environmental Monitoring and Assessment
159 Dual attention guided deep encoder- decoder network for change analysis in land use/land cover for Dakshina Kannada District, Karnataka, India Naik N., Chandrasekaran K., Sundaram V.M., Panneer P. Environmental Earth Sciences
160 Normalized hellinger feature selection and soft margin boosting classification for water quality prediction Karuppannan K., Jayagopal V. Expert Systems
161 Smart IoMT Framework for Supporting UAV Systems with AI Shankar N., Nallakaruppan M.K., Ravindranath V., Senthilkumar M., Bhagavath B.P. Electronics (Switzerland)
162 Maliciously roaming person's detection around hospital surface using intelligent cloud-edge based federated learning Gokulakrishnan S., Jarwar M.A., Ali M.H., Kamruzzaman M.M., Meenakshisundaram I.,Jaber M.M., Kumar R.L. Journal of Combinatorial Optimization
163 Autonomous vehicles in 5G and beyond: A survey Hakak S., Gadekallu T.R., Maddikunta P.K.R., Ramu S.P., M P., De Alwis C., Liyanage M. Vehicular Communications
164 From Beginning to BEGANing: Role of Adversarial Learning in Reshaping Generative Models Bhandari A., Tripathy B., Adate A., Saxena R., Gadekallu T.R. Electronics (Switzerland)

2022

SL. NO. TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL
1 Blockchain for Internet of Underwater Things: State-of-the-Art, Applications, Challenges, and Future Directions Bhattacharya S., Victor N., Chengoden R., Ramalingam M., Selvi G.C., Maddikunta P.K.R., Donta P.K., Dustdar S., Jhaveri R.H., Gadekallu T.R. Sustainability (Switzerland)
2 Security Framework for Internet of Things based Software Defined Networks using Blockchain Rani S., Babbar H., Srivastava G., Gadekallu T.R., Dhiman G. IEEE Internet of Things Journal
3 Blockchain-Based Two-Stage Federated Learning With Non-IID Data in IoMT System Lian Z., Zeng Q., Wang W., Gadekallu T.R., Su C. IEEE Transactions on Computational Social Systems
4 Automatic 3D Facial Landmark-Based Deformation Transfer on Facial Variants for Blendshape Generation Ingale A.K., Leema A.A., kim H.S., Udayan J.D. Arabian Journal for Science and Engineering
5 Multi-tier block truncation coding model using genetic auto encoders for gray scale images Rajasoundaran S., Santhosh Kumar S.V.N., Selvi M., Ganapathy S., Kannan A. Multimedia Tools and Applications
6 Two-phase classification: ANN and A-SVM classifiers on motor imagery BCI Mary Judith A., Baghavathi Priya S., Mahendran R.K., Gadekallu T.R., Ambati L.S. Asian Journal of Control
7 Polygonal approximation for digital image boundary using firefly algorithm Raja K.T., Ray B.K. Journal of Electronic Imaging
8 Modelling of different On-Chip inductors for radio frequency integrated circuits Muneeswaran D., Subramani J., Pandi T., Chenniappan N., Shanmugam M. Comptes Rendus de L'Academie Bulgare des Sciences
9 Web Hazard Identification and Detection Using Deep Learning - A Comparative Study Sivanantham S., Krishnamoorthy V., Karthikeyan D., Sakthivel M., Mohanraj V., Akshaya V. Journal of Pharmaceutical Negative Results
10 Categorical Data Clustering Using Harmony Search Algorithm for Healthcare Datasets Sharma A., Kumar P., Babulal K.S., Obaid A.J., Patel H. International Journal of E-Health and Medical Communications
11 Ensuring prompt cloud service provider based on service level agreement using fuzzy logics and decision support system Karthikeyan P., Sathiyamoorthy E. International Journal of Intelligent Enterprise
12 Information security protection for eHealth records using temporal hash signature Charanya R., Saravanaguru R.A.K., Aramudhan M. International Journal of Intelligent Enterprise
13 Secure Communication Model for Dynamic Task Offloading in Multi-Cloud Environment Usharani C., Krishna P.V., Akki P., Saritha V., Gitanjali J. International Journal on Recent and Innovation Trends in Computing and Communication
14 ILAT (Software as a Service): Interactive Learning Application Tool for Autism Screening and Assessment in children with Autism Spectrum Disorder Arivuselvan K., Nadesh R.K., Perumal R.S. International Journal on Recent and Innovation Trends in Computing and Communication
15 Edge Computing and Blockchain in Smart Agriculture Systems Prasad Ch.G.V.N., Mallareddy A., Pounambal M., Velayutham V. International Journal on Recent and Innovation Trends in Computing and Communication
16 Mixed Game-Based AoI Optimization for Combating COVID-19 With AI Bots Yang Y., Wang W., Yin Z., Xu R., Zhou X., Kumar N., Alazab M., Gadekallu T.R. IEEE Journal on Selected Areas in Communications
17 Covert communication for cooperative NOMA with two phases detection Peng H., Tian Z., Li X., Wang W., Nauryzbayev G., Rabie K., Gadekallu T.R. Alexandria Engineering Journal
18 Spatiotemporal Assessment of Satellite Image Time Series for Land Cover Classification Using Deep Learning Techniques: A Case Study of Reunion Island, France Navnath N.N., Chandrasekaran K., Stateczny A., Sundaram V.M., Panneer P. Remote Sensing
19 Skin lesion classification of dermoscopic images using machine learning and convolutional neural network Shetty B., Fernandes R., Rodrigues A.P., Chengoden R., Bhattacharya S., Lakshmanna K. Scientific Reports
20 Conceptualising a channel-based overlapping CNN tower architecture for COVID-19 identification from CT-scan images Tiwari R.S., D L., Das T.K., Srinivasan K., Chang C.-Y. Scientific Reports
21 Smart Water Resource Management Using Artificial Intelligence?A Review Krishnan S.R., Nallakaruppan M.K., Chengoden R., Koppu S., Iyapparaja M., Sadhasivam J., Sethuraman S. Sustainability (Switzerland)
22 A Study of the Impacts of Air Pollution on the Agricultural Community and Yield Crops (Indian Context) Pandya S., Gadekallu T.R., Maddikunta P.K.R., Sharma R. Sustainability (Switzerland)
23 Dingo Optimization Based Cluster Based Routing in Internet of Things Aravind K., Maddikunta P.K.R. Sensors
24 Security in IoT Mesh Networks based on Trust Similarity Kavitha A., Reddy V.B., Singh N., Gunjan V.K., Lakshmanna K., Khan A.A., Wechtaisong C. IEEE Access
25 Energy Efficient End Device Aware Solution Through SDN in Edge-Cloud Platform Patra S.S., Govindaraj R., Chowdhury S., Shah M.A., Patro R., Rout S. IEEE Access
26 Survey on the Applications of Blockchain in Agriculture L.B K. Agriculture (Switzerland)
27 Incorporation of Energy Efficient Computational Strategies for Clustering and Routing in Heterogeneous Networks of Smart City Venkatesan V.K., Izonin I., Periyasamy J., Indirajithu A., Batyuk A., Ramakrishna M.T. Energies
28 Framework for Handling Rare Word Problems in Neural Machine Translation System Using Multi-Word Expressions Garg K.D., Shekhar S., Kumar A., Goyal V., Sharma B., Chengoden R., Srivastava G. Applied Sciences (Switzerland)
29 Simulating crop yield estimation and prediction through geospatial data for specific regional analysis Mathivanan S.K., Jayagopal P. Earth Science Informatics
30 Distributed-Ledger-Based Blockchain Technology for Reliable Electronic Voting System with Statistical Analysis Ch R., Kumari D J., Gadekallu T.R., Iwendi C. Electronics (Switzerland)
31 Detection and Classification of Tomato Crop Disease Using Convolutional Neural Network Sakkarvarthi G., Sathianesan G.W., Murugan V.S., Reddy A.J., Jayagopal P., Elsisi M. Electronics (Switzerland)
32 A Composite Approach of Intrusion Detection Systems: Hybrid RNN and Correlation-Based Feature Optimization Gautam S., Henry A., Zuhair M., Rashid M., Javed A.R., Maddikunta P.K.R. Electronics (Switzerland)
33 DocCompare: An Approach to Prevent the Problem of Character Injection in Document Similarity Algorithm Namburu A., Surendran A., Balaji S.V., Mohan S., Iwendi C. Mathematics
34 Optimized face-emotion learning using convolutional neural network and binary whale optimization Muthamilselvan T., Brindha K., Senthilkumar S., Saransh, Chatterjee J.M., Hu Y.-C. Multimedia Tools and Applications
35 Terahertz Micro-Strip Patch Antenna Design and Modelling for 6G Mobile Communication Jeyakumar P., Anandpushparaj J., Thanapal P., Meenatchi S., Dhamodaran M. Journal of Electrical Engineering and Technology
36 The Effectual Spectrum Defragmentation Algorithm with Holding Time Sensitivity in Elastic Optical Network (EON) Selva Kumar S., Kamalakannan J., Seetha R., Asha N., Raja K.T., Sree Dharinya S., Sucharitha M., Kalaivani S. International Journal of Optics
37 A Hybrid Deep Learning Based Assist System for Detection and Classification of Breast Cancer from Mammogram Images Narayanan L., Krishnan S., Robinson H. International Arab Journal of Information Technology
38 Heterogeneous sensor data fusion acquisition model for medical applications Dhanke J., Pradeepa M., Karthik R., Rampur V., Poonguzhali I., Chittapragada H. Measurement: Sensors
39 Survival Study on Different Water Quality Prediction Methods Using Machine Learning Kalaivanan K., Vellingiri J. Nature Environment and Pollution Technology
40 A High Secured Steganalysis Using QVDHC Model Akki P., Gitanjali J., Iwendi C., Sumathy S., Waheed A. International Journal on Recent and Innovation Trends in Computing and Communication
41 Modelling microscale impacts assessment of urban expansion on seasonal surface urban heat island intensity using neural network algorithms Saha M., Kafy A.-A., Bakshi A., Faisal A.-A., Almulhim A.I., Rahaman Z.A., Al Rakib A., Fattah M.A., Akter K.S., Rahman M.T., Zhang M., Rathi R. Energy and Buildings
42 Principal component analysis on face recognition using artificial firefirefly swarm optimization algorithm Asha N., Syed Fiaz A.S., Jayashree J., Vijayashree J., Indumathi J. Advances in Engineering Software
43 Digital Twins for Healthcare 4.0 - Recent Advances, Architecture, and Open Challenges Alazab M., Khan L.U., Koppu S., Ramu S.P., M I., Boobalan P., Baker T., Maddikunta P.K.R., Gadekallu T.R., Aljuhani A. IEEE Consumer Electronics Magazine
44 Curve-Aware Model Predictive Control (C-MPC) Trajectory Tracking for Automated Guided Vehicle (AGV) over On-Road, In-Door, and Agricultural-Land Manikandan S., Kaliyaperumal G., Hakak S., Gadekallu T.R. Sustainability (Switzerland)
45 Rice plant disease classification using dilated convolutional neural network with global average pooling Senthil Pandi S., Senthilselvi A., Gitanjali J., ArivuSelvan K., Gopal J., Vellingiri J. Ecological Modelling
46 Analysis on the Bus Arrival Time Prediction Model for Human-Centric Services Using Data Mining Techniques Shanthi N., Sathishkumar V.E., Upendra Babu K., Karthikeyan P., Rajendran S., Allayear S.M. Computational Intelligence and Neuroscience
47 Design and Analysis of Multilayered Neural Network-Based Intrusion Detection System in the Internet of Things Network Sangeetha S.K.B., Mani P., Maheshwari V., Jayagopal P., Sandeep Kumar M., Allayear S.M. Computational Intelligence and Neuroscience
48 An Efficient Signal Processing Algorithm for Detecting Abnormalities in EEG Signal Syamsundararao T., Selvarani A., Rathi R., Vini Contrast Media and Molecular Imaging
49 Computational and Mathematical Methods in Medicine Glioma Brain Tumor Detection and Classification Using Convolutional Neural Network Saravanan S., Kumar V.V., Sarveshwaran V., Indirajithu A., Elangovan D., Allayear S.M. Computational and Mathematical Methods in Medicine
50 A High-Capacity Reversible Data-Hiding Scheme for Medical Image Transmission Using Modified Elias Gamma Encoding Manikandan V.M., Murthy K.S.R., Siddineni B., Victor N., Maddikunta P.K.R., Hakak S. Electronics (Switzerland)
51 Optimal resource scheduling algorithm for cell boundaries users in heterogenous 5G networks Gatti R., Arjun Kumar G.B., Sunil Kumar K.N.,Palle S., Gadekallu T.R. Physical Communication
52 Influences of Aqueous Nanofluid Emulsion on Diesel Engine Performance, Combustion, and Emission: IoT (Emission Monitoring System) Venkatesh B., Babu J.C., Mathivanan S.K., Jayagopal P., Prasanna S.,Uddin M.S. Advances in Materials Science and Engineering
53 Deep Learning Based Load Forecasting with Decomposition and Feature Selection Techniques Subbiah S.S., Kumar S.P. Journal of Scientific and Industrial Research
54 Identifying peanut maturity based on Hyper Spectral Invariant Scaled Feature Selection using Adaptive Dense Net Recurrent Neural Network M B., C N. Measurement: Sensors
55 An overview of internet engineering task force mobility management protocols: approaches and its challenges Mahenthiran P., Muruganadam D. International Journal of Electrical and Computer Engineering
56 Cardiac disease detection using cuckoo search enabled deep belief network P N., Narayan S. Intelligent Systems with Applications
57 Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture Chaganti R., Varadarajan V., Gorantla V.S.,Gadekallu T.R., Ravi V. Future Internet
58 Design of resource matching model of intelligent education system based on machine learning Xiang C.-Z., Fu N.-X., Gadekallu T.R. EAI Endorsed Transactions on Scalable Information Systems
59 Towards computational solutions for precision medicine based big data healthcare system using deep learning models: A review Thirunavukarasu R., C G.P.D., R G., Gopikrishnan M., Palanisamy V. Computers in Biology and Medicine
60 Tear film breakup time-based dry eye disease detection using convolutional neural network Vyas A.H., Mehta M.A., Kotecha K., Pandya S., Alazab M., Gadekallu T.R. Neural Computing and Applications
61 Federated Learning for intrusion detection system: Concepts, challenges and future directions Agrawal S., Sarkar S., Aouedi O., Yenduri G., Piamrat K., Alazab M., Bhattacharya S., Maddikunta P.K.R., Gadekallu T.R. Computer Communications
62 A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis Rehman M.U., Shafique A., Ghadi Y.Y., Boulila W., Jan S.U., Gadekallu T.R., Driss M., Ahmad J. IEEE Transactions on Network Science and Engineering
63 Optimization driven model and segmentation network for skin cancer detection Anup Kumar K., Vanmathi C. Computers and Electrical Engineering
64 ECDSA-Based Water Bodies Prediction from Satellite Images with UNet Ch A., Ch R., Gadamsetty S., Iwendi C., Gadekallu T.R., Water (Switzerland)
65 Green-Tech CAV: Next Generation Computing for Traffic Sign and Obstacle Detection in Connected and Autonomous Vehicles Kumar V.D.A., Raghuraman M., Kumar A., Rashid M., Hakak S., Reddy M.P.K. IEEE Transactions on Green Communications and Networking
66 6G Driven Fast Computational Networking Framework for Healthcare Applications Srinivasu P.N., Ijaz M.F., Shafi J., Wozniak M., Sujatha R. IEEE Access
67 Privacy Preserving Attribute-Focused Anonymization Scheme for Healthcare Data Publishing Onesimu J.A., Karthikeyan J., Eunice J., Pomplun M., Dang H. IEEE Access
68 Dynamic resource provisioning and secured file sharing using virtualization in cloud azure Perumal K., Mohan S., Frnda J., Divakarachari P.B. Journal of Cloud Computing
69 A Web-Based Model to Predict a Neurological Disorder Using ANN Almazroi A.A., Alamin H., Sujatha R., Jhanjhi N.Z. Healthcare (Switzerland)
70 Addressing Binary Classification over Class Imbalanced Clinical Datasets Using Computationally Intelligent Techniques Kumar V., Lalotra G.S., Sasikala P., Rajput D.S., Kaluri R., Lakshmanna K., Shorfuzzaman M., Alsufyani A., Uddin M. Healthcare (Switzerland)
71 Multiconvolutional Transfer Learning for 3D Brain Tumor Magnetic Resonance Images Sangeetha S.K.B., Muthukumaran V., Deeba K., Rajadurai H., Maheshwari V., Dalu G.T. Computational Intelligence and Neuroscience
72 Investigation of Applying Machine Learning and Hyperparameter Tuned Deep Learning Approaches for Arrhythmia Detection in ECG Images Shanmugavadivel K., Sathishkumar V.E., Kumar M.S., Maheshwari V., Prabhu J., Allayear S.M. Computational and mathematical methods in medicine
73 Analysis on COVID-19 Infection Spread Rate during Relief Schemes Using Graph Theory and Deep Learning Palanivinayagam A., Panneerselvam R.K., Kumar P.J., Rajadurai H., Maheshwari V., Allayear S.M. Computational and Mathematical Methods in Medicine
74 IoT-Cloud-Based Smart Healthcare Monitoring System for Heart Disease Prediction via Deep Learning Nancy A.A., Ravindran D., Raj Vincent P.M.D., Srinivasan K., Gutierrez Reina D. Electronics (Switzerland)
75 Genetic Clustered Federated Learning for COVID-19 Detection Kandati D.R., Gadekallu T.R. Electronics (Switzerland)
76 Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach Selvaraj N.P., Paulraj S., Ramadass P., Kaluri R., Shorfuzzaman M., Alsufyani A., Uddin M. Electronics (Switzerland)
77 SWIN transformer based contrastive self- supervised learning for animal detection and classification Agilandeeswari L., Meena S.D. Multimedia Tools and Applications
78 Improved COVID-19 detection with chest x- ray images using deep learning Gupta V., Jain N., Sachdeva J., Gupta M., Mohan S., Bajuri M.Y., Ahmadian A. Multimedia Tools and Applications
79 Utilizing satellite and UAV data for crop yield prediction and monitoring through deep learning Mathivanan S.K., Jayagopal P. Acta Geophysica
80 Traffic flow prediction in inland waterways of Assam region using uncertain spatiotemporal correlative features Muthukumaran V., Natarajan R., Kaladevi A.C., Magesh G., Babu S. Acta Geophysica
81 Comprehensive analysis on sensor node fault management schemes in wireless sensor networks Babu N., Santhosh Kumar S.V.N. International Journal of Communication Systems
82 Edge computing network resource allocation based on virtual network embedding Zhan K., Chen N., Santhosh Kumar S.V.N., Kibalya G., Zhang P., Zhang H. International Journal of Communication Systems
83 An Enhanced Triadic Color Scheme for Content-Based Image Retrieval Sangeetha S.K.B., Mathivanan S.K., Pandi T., Arivu Selvan K., Jayagopal P., Teshite Dalu G. Mathematical Problems in Engineering
84 G-Sep: A Deep Learning Algorithm for Detection of Long-Term Sepsis Using Bidirectional Gated Recurrent Unit Rajmohan R., Kumar T.A., Julie E.G., Robinson Y.H., Vimal S., Kadry S., Crespo R.G. International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
85 A narrative review of medical image processing by deep learning models: Origin to COVID-19 Mareeswari V., Vijayan R., Sathiyamoorthy E., Ephzibah E.P. International Journal of Advanced Technology and Engineering Exploration
86 Evaluation of Dietary Habits in Relation to Covid-19 Mortality Rate Using Machine Learning Techniques Sujatha R., Chatterjee J.M., Thorunitha S.S., Nadhiya S. Journal of System and Management Sciences
87 A Deep Multimodal Adversarial Cycle- Consistent Network for Smart Enterprise System Li P., Laghari A.A., Rashid M., Gao J., Gadekallu T.R., Javed A.R., Yin S. IEEE Transactions on Industrial Informatics
88 Energy efficient fault tolerance techniques in green cloud computing: A systematic survey and taxonomy Bharany S., Badotra S., Sharma S., Rani S., Alazab M., Jhaveri R.H., Reddy Gadekallu T. Sustainable Energy Technologies and Assessments
89 Color contour texture based peanut classification using deep spread spectral features classification model for assortment identification Balasubramaniyan M., Navaneethan C. Sustainable Energy Technologies and Assessments
90 Incentive techniques for the Internet of Things: A survey Maddikunta P.K.R., Pham Q.-V., Nguyen D.C., Huynh-The T., Aouedi O., Yenduri G., Bhattacharya S., Gadekallu T.R. Journal of Network and Computer Applications
91 A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environment Khan A.A., Laghari A.A., Gadekallu T.R., Shaikh Z.A., Javed A.R., Rashid M., Estrela V.V., Mikhaylov A. Computers and Electrical Engineering
92 A new blockchain and fog computing model for blood pressure medical sensor data storage Mani V., Ghonge M.M., Chaitanya N.K., Pal O., Sharma M., Mohan S., Ahmadian A. Computers and Electrical Engineering
93 An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems Padinjappurathu Gopalan S., Chowdhary C.L., Iwendi C., Farid M.A., Ramasamy L.K. Sensors (Basel, Switzerland)
94 Relevant-Based Feature Ranking (RBFR) Method for Text Classification Based on Machine Learning Algorithm Jasti V.D.P., Kumar G.K., Kumar M.S., Maheshwari V., Jayagopal P., Pant B., Karthick A., Muhibbullah M. Journal of Nanomaterials
95 Multi-objective multi-verse optimizer based unsupervised band selection for hyperspectral image classification Sawant S.S., Prabukumar M., Loganathan A., Alenizi F.A., Ingaleshwar S. International Journal of Remote Sensing
96 Implementation of Combined Machine Learning with the Big Data Model in IoMT Systems for the Prediction of Network Resource Consumption and Improving the Data Delivery Sugadev M., Rayen S.J., Harirajkumar J., Rathi R., Anitha G., Ramesh S., Ramaswamy K. Computational Intelligence and Neuroscience
97 An Empirical Analysis of an Optimized Pretrained Deep Learning Model for COVID-19 Diagnosis Sangeetha S.K.B., Kumar M.S., Deeba K., Rajadurai H., Maheshwari V., Dalu G.T. Computational and Mathematical Methods in Medicine
98 Weather-based maize yield forecast in Saudi Arabia using statistical analysis and machine learning Jayagopal P., Muthukumaran V., Koti M.S., Kumar S.S., Rajendran S., Mathivanan S.K. Acta Geophysica
99 Comprehensive survey on data dissemination protocols for efficient reprogramming in Internet of Things Shanmugapriya R., Santhosh Kumar S.V.N. Concurrency and Computation: Practice and Experience
100 Feature Learning-Based Generative Adversarial Network Data Augmentation for Class-Based Few-Shot Learning Subedi B., Sathishkumar V.E., Maheshwari V., Kumar M.S., Jayagopal P., Allayear S.M. Mathematical Problems in Engineering
101 Recent Advancements in Privacy-aware Protocols of Source Location Privacy in Wireless Sensor Networks: a Survey Roy P.K., Tripathy A.K., Singh S.K., Li K.-C. Computer Science and Information Systems
102 COVID-19 Classification Using Medical Image Synthesis by Generative Adversarial Networks Nandhini Abirami R., Durai Raj Vincent P.M., Rajinikanth V., Kadry S. International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
103 Ensemble of Artificial Intelligence Techniques for Bacterial Antimicrobial Resistance (AMR) Estimation Using Topic Modeling and Similarity Measure Chakriswaran P., Vincent D.R., Kadry S. International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
104 Design of telemedicine information query system based on wireless sensor network Qian G., Gadekallu T.R. EAI Endorsed Transactions on Pervasive Health and Technology
105 An Empirical Study to Demonstrate that EdDSA can be used as a Performance Improvement Alternative to ECDSA in Blockchain and IoT Guruprakash J., Koppu S. Informatica (Slovenia)
106 Impact of Real-Time Information for Travellers: A Systematic Review Akhla A.A.N., Ling T.C., Shibghatullah A.S., Mon C.S., Cherukuri A.K., Yen C.L., Yi L.C. Journal of Information and Knowledge Management
107 An Investigation on the Impact of Technological Enablement on the Success of Entrepreneurial Adoption among Higher Education Students: A Comparative Study Keoy K.H., Thong C.L., Cherukuri A.K., Koh Y.J., Chit S.M., Lee L., Genaro J., Kwek C.L. Journal of Information and Knowledge Management
108 Guest Editorial: Security and Privacy Issues in Industry 4.0 Applications Alazab M., Gadekallu T.R., Su C. IEEE Transactions on Industrial Informatics
109 Assessing the impacts of vegetation cover loss on surface temperature, urban heat island and carbon emission in Penang city, Malaysia Rahaman Z.A., Kafy A.-A., Saha M., Rahim A.A., Almulhim A.I., Rahaman S.N., Fattah M.A., Rahman M.T., S K., Faisal A.-A., Al Rakib A. Building and Environment
110 A survey on COVID-19 impact in the healthcare domain: worldwide market implementation, applications, security and privacy issues, challenges and future prospects Shakeel T., Habib S., Boulila W., Koubaa A., Javed A.R., Rizwan M., Gadekallu T.R., Sufiyan M. Complex and Intelligent Systems
111 Cloud-based email phishing attack using machine and deep learning algorithm Butt U.A., Amin R., Aldabbas H., Mohan S., Alouffi B., Ahmadian A. Complex and Intelligent Systems
112 Health Informatics: Engaging Modern Healthcare Units: A Brief Overview Yogesh M.J., Karthikeyan J. Frontiers in Public Health
113 Medicine Drug Name Detection Based Object Recognition Using Augmented Reality Rupa C., Srivastava G., Ganji B., Tatiparthi S.P., Maddala K., Koppu S., Chun-Wei Lin J. Frontiers in Public Health
114 A Sequential Machine Learning-cum- Attention Mechanism for Effective Segmentation of Brain Tumor Ali T.M., Nawaz A., Ur Rehman A., Ahmad R.Z., Javed A.R., Gadekallu T.R., Chen C.-L., Wu C.-M. Frontiers in Oncology
115 Early Prediction of Lung Cancers Using Deep Saliency Capsule and Pre-Trained Deep Learning Frameworks Ramana K., Kumar M.R., Sreenivasulu K., Gadekallu T.R., Bhatia S., Agarwal P., Idrees S.M. Frontiers in Oncology
116 Fusion of Federated Learning and Industrial Internet of Things: A survey Boobalan P., Ramu S.P., Pham Q.-V., Dev K., Pandya S., Maddikunta P.K.R., Gadekallu T.R., Huynh-The T. Computer Networks
117 IoT enabled HELMET to safeguard the health of mine workers Singh N., Gunjan V.K., Chaudhary G., Kaluri R., Victor N., Lakshmanna K. Computer Communications
118 Healthcare Data Security Using Lightweight Protocol for Cyber Physical System Roy P.K., Singh A., Desai J.V., Singh S.K. IEEE Transactions on Network Science and Engineering
119 Collision avoidance approaches for autonomous mobile robots to tackle the problem of pedestrians roaming on campus road Manikandan N.S., Kaliyaperumal G. Pattern Recognition Letters
120 Ultra Super Fast Authentication Protocol for Electric Vehicle Charging Using Extended Chaotic Maps Wang W., Han Z., Alazab M., Gadekallu T.R., Zhou X., Su C. IEEE Transactions on Industry Applications
121 Improved Metaheuristic-Driven Energy- Aware Cluster-Based Routing Scheme for IoT-Assisted Wireless Sensor Networks Lakshmanna K., Subramani N., Alotaibi Y., Alghamdi S., Khalafand O.I., Nanda A.K. Sustainability (Switzerland)
122 Integration of Blockchain Technology and Federated Learning in Vehicular (IoT) Networks: A Comprehensive Survey Javed A.R., Hassan M.A., Shahzad F., Ahmed W., Singh S., Baker T., Gadekallu T.R. Sensors
123 IoT-Based Intelligent System for Internal Crack Detection in Building Blocks Babu J.C., Kumar M.S., Jayagopal P., Journal of Nanomaterials
124 Capability and Robustness of Novel Hybridized Artificial Intelligence Technique for Sediment Yield Modeling in Godavari River, India Yadav A., Joshi D., Kumar V., Mohapatra H., Iwendi C., Gadekallu T.R. Water (Switzerland)
125 E-commerce review sentiment score prediction considering misspelled words: a deep learning approach Jain S., Roy P.K. Electronic Commerce Research
126 A Modified Deep Learning Framework for Arrhythmia Disease Analysis in Medical Imaging Using Electrocardiogram Signal Anbarasi A., Ravi T., Manjula V.S., Brindha J., Saranya S., Ramkumar G., Rathi R. BioMed Research International
127 Prediction Performance of Deep Learning for Colon Cancer Survival Prediction on SEER Data Gupta S., Kalaivani S., Rajasundaram A., Ameta G.K., Oleiwi A.K., Dugbakie B.N. BioMed Research International
128 A Transfer Learning Approach with a Convolutional Neural Network for the Classification of Lung Carcinoma Humayun M., Sujatha R., Almuayqil S.N., Jhanjhi N.Z. Healthcare (Switzerland)
129 Harris Hawk Optimization: A Survey onVariants and Applications Tripathy B.K., Reddy Maddikunta P.K., Pham Q.-V., Gadekallu T.R., Dev K., Pandya S., Elhalawany B.M. Computational Intelligence and Neuroscience
130 Barnacles Mating Optimizer with Deep Transfer Learning Enabled Biomedical Malaria Parasite Detection and Classification Dutta A.K., Mageswari R.U., Gayathri A., Dallfin Bruxella J.M., Ishak M.K., Mostafa S.M., Hamam H. Computational Intelligence and Neuroscience
131 Cancer Detection and Prediction Using Genetic Algorithms Bhandari A., Tripathy B.K., Jawad K., Bhatia S., Rahmani M.K.I., Mashat A. Computational Intelligence and Neuroscience
132 Deep Learning-Based Privacy-Preserving Data Transmission Scheme for Clustered IIoT Environment Lakshmanna K., Kavitha R., Geetha B.T., Nanda A.K., Radhakrishnan A., Kohar R. Computational Intelligence and Neuroscience
133 PCA-Based Incremental Extreme Learning Machine (PCA-IELM) for COVID-19 Patient Diagnosis Using Chest X-Ray Images Kumar V., Biswas S., Rajput D.S., Patel H., Tiwari B. Computational Intelligence and Neuroscience
134 Novel Vision Transformer?Based Bi-LSTM Model for LU/LC Prediction?Javadi Hills, India Mohanrajan S.N., Loganathan A. Applied Sciences (Switzerland)
135 Automated sarcasm detection and classification using hyperparameter tuned deep learning model for social networks Vinoth D., Prabhavathy P. Expert Systems
136 Diagnosing Breast Cancer Based on the Adaptive Neuro-Fuzzy Inference System Chidambaram S., Ganesh S.S., Karthick A., Jayagopal P., Balachander B., Manoharan S. Computational and Mathematical Methods in Medicine
137 Diagnosis of Brain Tumor Using Light Weight Deep Learning Model with Fine- Tuning Approach Shelatkar T., Urvashi D., Shorfuzzaman M., Alsufyani A., Lakshmanna K. Computational and Mathematical Methods in Medicine
138 A Review on Deep Learning Techniques for IoT Data Lakshmanna K., Kaluri R., Gundluru N., Alzamil Z.S., Rajput D.S., Khan A.A., Haq M.A., Alhussen A. Electronics (Switzerland)
139 An effective deep learning model for grading abnormalities in retinal fundus images using variational auto-encoders Sundar S., Sumathy S. International Journal of Imaging Systems and Technology
140 IoT Based Smart Assist System to Monitor Entertainment Spots Occupancy and COVID 19 Screening During the Pandemic Narayanan K.L., Krishnan R.S., Robinson Y.H. Wireless Personal Communications
141 Tumor Detection on Microarray Data Using Grey Wolf Optimization with Gain Information Sree Devi K.D., Karthikeyan P., Moorthy U., Deeba K., Maheshwari V., Allayear S.M. Mathematical Problems in Engineering
142 Bio-Inspired PSO for Improving Neural Based Diabetes Prediction System Khan M.Z., Mangayarkarasi R., Vanmathi C., Angulakshmi M. Journal of ICT Standardization
143 Fault-Based Test Case Prioritization of Regression Testing Using Genetic Algorithm Priya T., Prasanna M. International Journal of e-Collaboration
144 Secure voting system for elections El-Gburi J., Srivastava G., Mohan S. International Journal of Computer Aided Engineering and Technology
145 Mobile Collaborative Secrecy Performance Prediction for Artificial IoT Networks Xu L., Zhou X., Li X., Jhaveri R.H., Gadekallu T.R., Ding Y. IEEE Transactions on Industrial Informatics
146 Water optimization technique for precision irrigation system using IoT and machine learning Maria Manuel Vianny D., John A., Kumar Mohan S., Sarlan A., Adimoolam, Ahmadian A. Sustainable Energy Technologies and Assessments
147 Humidity sensor based on fibre bragg grating for predicting microbial induced corrosion Raju B., Kumar R., Senthilkumar M., Sulaiman R., Kama N., Dhanalakshmi S. Sustainable Energy Technologies and Assessments
148 Authorship identification using ensemble learning Abbasi A., Javed A.R., Iqbal F., Jalil Z., Gadekallu T.R., Kryvinska N. Scientific Reports
149 AACF - Accessible Application-Centric Framework for the Internet of Things Backhauled Smart City Applications Cui Y., Song X., Liu J., Chen K., Shi G., Zhou J., Gs T. IEEE Transactions on Network Science and Engineering
150 A Novel Technique to Detect and Track Multiple Objects in Dynamic Video Surveillance Systems Adimoolam M., Mohan S., John A., Srivastava G. International Journal of Interactive Multimedia and Artificial Intelligence
151 Evaluating the Impact of Summer Drought on Vegetation Growth Using Space-Based Solar-Induced Chlorophyll Fluorescence Across Extensive Spatial Measures Pandiyan S., Govindjee G., Meenatchi S., Prasanna S., Gunasekaran G., Guo Y. Big Data
152 OTP-ER: an ordered transmission paradigm for effective routing in IoT based wireless sensor networks Jothi Kumar C., Deeban Chakravarthy V., Ramana K., Maddikunta P.K.R., Xin Q., Surya Narayana G. Optical and Quantum Electronics
153 Comparative analysis of FSO, OFC and diffused channel links in photonics using artificial intelligence based S-band, C- band and L-band of the attenuation metrics Karpagarajesh G., Santhana Krishnan R., Harold Robinson Y., Vimal S., Thamizharasan S., Subbulakshmi P., Kaliappan M. Optical and Quantum Electronics
154 Lower Back Pain Classification using Parameter Tuning Lenka S., Victor N. Research Journal of Pharmacy and Technology
155 Past, present and future of gene feature selection for breast cancer classification - a survey Chowdhary C.L., Khare N., Patel H., Koppu S., Kaluri R., Rajput D.S. International Journal of Engineering Systems Modelling and Simulation
156 Predicting Microscale Land Use/Land Cover Changes Using Cellular Automata Algorithm on the Northwest Coast of Peninsular Malaysia Rahaman Z.A., Kafy A.-A., Faisal A.-A., Al Rakib A., Jahir D.M.A., Fattah M.A., Kalaivani S., Rathi R., Mallik S., Rahman M.T. Earth Systems and Environment
157 Cyberbullying detection: an ensemble learning approach Roy P.K., Singh A., Tripathy A.K., Das T.K. International Journal of Computational Science and Engineering
158 An enhanced and hybrid fingerprint minutiae feature extraction method for identifying and authenticating the patient?s noisy fingerprint Raghavan R., John Singh K. International Journal of System Assurance Engineering and Management
159 A Privacy-Enhanced Retrieval Technology for the Cloud-Assisted Internet of Things Wang T., Yang Q., Shen X., Gadekallu T.R., Wang W., Dev K. IEEE Transactions on Industrial Informatics
160 Data Freshness Optimization Under CAA in the UAV-Aided MECN: A Potential Game Perspective Wang W., Srivastava G., Lin J.C., Yang Y., Alazab M., Gadekallu T.R. IEEE Transactions on Intelligent Transportation Systems
161 A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks Liyanage M., Pham Q.-V., Dev K., Bhattacharya S., Maddikunta P.K.R., Gadekallu T.R., Yenduri G. Journal of Network and Computer Applications
162 Secure routing for LEO satellite network survivability Li H., Shi D., Wang W., Liao D., Gadekallu T.R., Yu K. Computer Networks
163 Heart rate and blood pressure measurement based on photoplethysmogram signal using fast Fourier transform Sharma A., Tanwar R.S., Singh Y., Sharma A., Daudra S., Singal G., Gadekallu T.R., Pancholi S. Computers and Electrical Engineering
164 Covid-19 fake news sentiment analysis Iwendi C., Mohan S., khan S., Ibeke E., Ahmadian A., Ciano T. Computers and Electrical Engineering
165 XGBRS Framework Integrated with Word2Vec Sentiment Analysis for Augmented Drug Recommendation Paliwal S., Mishra A.K., Mishra R.K., Nawaz N., Senthilkumar M. Computers, Materials and Continua
166 Imbalanced Classification in Diabetics Using Ensembled Machine Learning Kumar M.S., Khan M.Z., Rajendran S., Noor A., Dass A.S., Prabhu J. Computers, Materials and Continua
167 A novel unsupervised ensemble framework using concept-based linguistic methods and machine learning for twitter sentiment analysis Bibi M., Abbasi W.A., Aziz W., Khalil S., Uddin M., Iwendi C., Gadekallu T.R. Pattern Recognition Letters
168 Bio-Imaging-Based Machine Learning Algorithm for Breast Cancer Detection Safdar S., Rizwan M., Gadekallu T.R., Javed A.R., Rahmani M.K.I., Jawad K., Bhatia S. Diagnostics
169 Hypertuned Deep Convolutional Neural Network for Sign Language Recognition Mannan A., Abbasi A., Javed A.R., Ahsan A., Gadekallu T.R., Xin Q. Computational Intelligence and Neuroscience
170 Performance Evaluation of Seis Tutor Using Cognitive Intelligence-Based "kirkpatrick Model" Singh N., Gunjan V.K., Kadiyala R., Xin Q., Gadekallu T.R. Computational Intelligence and Neuroscience
171 Diagnosis of Retinal Diseases Based on Bayesian Optimization Deep Learning Network Using Optical Coherence Tomography Images Subramanian M., Kumar M.S., Sathishkumar V.E., Prabhu J., Karthick A., Ganesh S.S., Meem M.A. Computational Intelligence and Neuroscience
172 Real-Time Twitter Spam Detection and Sentiment Analysis using Machine Learning and Deep Learning Techniques Rodrigues A.P., Fernandes R., Aakash A., Abhishek B., Shetty A., Atul K., Lakshmanna K., Shafi R.M. Computational Intelligence and Neuroscience
173 Multimodal Medical Image Fusion of Positron Emission Tomography and Magnetic Resonance Imaging Using Generative Adversarial Networks Nandhini Abirami R., Durai Raj Vincent P.M., Srinivasan K., Manic K.S., Chang C.-Y. Behavioural Neurology
174 Multiobjectives for Optimal Geographic Routing in IoT Health Care System Aravind K., Maddikunta P.K.R. Complexity
175 Perimeter Degree Technique for the Reduction of Routing Congestion during Placement in Physical Design of VLSI Circuits Lakshmanna K., Shaik F., Gunjan V.K., Singh N., Kumar G., Shafi R.M. Complexity
176 Pansharpening scheme using spatial detail injection?based convolutional neural networks Saxena N., Saxena G., Khare N., Rahman M.H. IET Image Processing
177 COVID-19 health analysis and prediction using machine learning algorithms for Mexico and Brazil patients Iwendi C., Huescas C.G.Y., Chakraborty C., Mohan S. Journal of Experimental and Theoretical Artificial Intelligence
178 Incentive Mechanisms for Smart Grid: State of the Art, Challenges, Open Issues, Future Directions Bhattacharya S., Chengoden R., Srivastava G., Alazab M., Javed A.R., Victor N., Maddikunta P.K.R., Gadekallu T.R. Big Data and Cognitive Computing
179 A Study on Diverse Methods and Performance Measures in Sentiment Analysis Rani M.S., Sumathy S. Recent Patents on Engineering
180 Test Case Generation for Arduino Programming Instructions using Functional Block Diagrams Padmanabhan M. Trends in Sciences
181 Non-invasive Detection of Parkinson?s Disease Using Deep Learning Chowdhary C.L., Srivatsan R. International Journal of Image, Graphics and Signal Processing
182 Tiling algorithm with line-based transform for rapid ship detection and wake feature extraction in ALOS-2 SAR sensor data Selvaraj D., Krishnamurthy E., Sasikumar D., Sivankutty L., Kaliyaperumal G. International Journal of Applied Science and Engineering
183 A review on smart city - IoT and deep learning algorithms, challenges Rajyalakshmi V., Lakshmanna K. International Journal of Engineering Systems Modelling and Simulation
184 An adaptive neuro-fuzzy inference for blockchain-based smart job recommendation system Ephzibah E.P., Sujatha R., Chatterjee J.M. International Journal of Information and Decision Sciences
185 Henry MaxNet: tversky index based feature selection and competitive swarm henry gas solubility optimization integrated Deep Maxout network for intrusion detection in IoT Boopathi M. International Journal of Intelligent Robotics and Applications
186 Smart Agricultural Decision Support Systems for Predicting Soil Nutrition Value Using IoT and Ridge Regression Sudha M.K., Manorama M., Aditi T. Agris On-line Papers in Economics and Informatics
187 Towards reliable electronic exam networks El-Gburi J., Srivastava G., Mohan S. International Journal of Computer Aided Engineering and Technology
188 Evolution of Industry and Blockchain Era: Monitoring Price Hike and Corruption using BIoT for Smart Government and Industry 4.0 Hasan M.K., Akhtaruzzaman M., Kabir S.R., Gadekallu T.R., Islam S., Magalingam P., Hassan R., Alazab M., Alazab M.A. IEEE Transactions on Industrial Informatics
189 Catalysis of neural activation functions: Adaptive feed-forward training for big data applications Sarkar S., Agrawal S., Baker T., Maddikunta P.K.R., Gadekallu T.R. Applied Intelligence
190 A Multistage Heterogeneous Stacking Ensemble Model for Augmented Infant Cry Classification Joshi V.R., Srinivasan K., Vincent P.M.D.R., Rajinikanth V., Chang C.-Y. Frontiers in Public Health
191 Computational techniques for the automated detection of mycobacterium tuberculosis from digitized sputum smear microscopic images: A systematic review Kotei E., Thirunavukarasu R. Progress in Biophysics and Molecular Biology
192 Resource Search Method of Mobile Intelligent Education System Based on Distributed Hash Table Shen Y.-B., Gadekallu T.R. Mobile Networks and Applications
193 CONTROL-CORE: A Framework for Simulation and Design of Closed- Loop Peripheral Neuromodulation Control Systems Kathiravelu P., Arnold M., Fleischer J., Yao Y., Awasthi S., Goel A.K., Branen A., Sarikhani P., Kumar G., Kothare M., Mahmoudi B. IEEE Access
194 A new lightweight conditional privacy preserving authentication and key ? agreement protocol in social internet of things for vehicle to smart grid networks Agilandeeswari L., Paliwal S., Chandrakar A., Prabukumar M. Multimedia Tools and Applications
195 A supervised learning-based approach for focused web crawling for IoMT using global co-occurrence matrix Rajiv S., Navaneethan C. Expert Systems
196 Identifying region specific seasonal crop for leaf borne diseases by utilizing deep learning techniques Jayagopal P., Rajendran S., Mathivanan S.K., Sathish Kumar S.D., Raja K.T., Paneerselvam S. Acta Geophysica
197 A Deep Convolutional Neural Network Based Approach for Effective Neonatal Cry Classification Ashwini K., Durai Raj Vincent P.M. Recent Advances in Computer Science and Communications
198 Similarity Learning-Based Supervised Discrete Hash Signature Scheme for authentication of smart home scenario Sudha K.S., Jeyanthi N. International Journal of Information Technology (Singapore)
199 Industry 5.0: A survey on enabling technologies and potential applications Maddikunta P.K.R., Pham Q.-V., B P., Deepa N., Dev K., Gadekallu T.R., Ruby R., Liyanage M. Journal of Industrial Information Integration
200 EPPDA: An Efficient Privacy- Preserving Data Aggregation Federated Learning Scheme Song J., Wang W., Gadekallu T.R., Cao J., Liu Y. IEEE Transactions on Network Science and Engineering
201 Hand gesture recognition based on a Harris Hawks optimized Convolution Neural Network Gadekallu T.R., Srivastava G., Liyanage M., M. I., Chowdhary C.L., Koppu S., Maddikunta P.K.R. Computers and Electrical Engineering
202 Risk monitoring strategy for confidentiality of healthcare information Rizwan M., Shabbir A., Javed A.R., Srivastava G., Gadekallu T.R., Shabir M., Hassan M.A. Computers and Electrical Engineering
203 Detection of tyre defectsusingweighted quality-based convolutional neural network Rajeswari M., Julie E.G., Robinson Y.H., Joseph E., Arun A.S., Sebastian E., Kumar R., Long H.V., Son L.H. Soft Computing
204 Banana Plant Disease Classification Using Hybrid Convolutional Neural Network Narayanan K.L., Krishnan R.S., Robinson Y.H., Julie E.G., Vimal S., Saravanan V., Kaliappan M. Computational Intelligence and Neuroscience
205 Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review Majid M., Habib S., Javed A.R., Rizwan M., Srivastava G., Gadekallu T.R., Lin J.C.-W. Sensors
206 Privacy Preserving Multi-Party Key Exchange Protocol for Wireless Mesh Networks Roy A.K., Nath K., Srivastava G., Gadekallu T.R., Lin J.C.-W. Sensors
207 CAPSO: Chaos Adaptive Particle Swarm Optimization Algorithm Duan Y., Chen N., Chang L., Ni Y., Santhosh Kumar S.V.N., Zhang P. IEEE Access
208 Situation-aware BDI Reasoning to Detect Early Symptoms of Covid 19 using Smartwatch Saleem K., Saleem M., Zeeshan R., Javed A.R., Alazab M., Gadekallu T.R., Suleman A. IEEE Sensors Journal
209 Hash-Based Deep Learning Approach for Remote Sensing Satellite Imagery Detection Gadamsetty S., Ch R., Ch A., Iwendi C., Gadekallu T.R. Water (Switzerland)
210 A neural network aided attuned scheme for gun detection in video surveillance images Manikandan V.P., Rahamathunnisa U. Image and Vision Computing
211 An Intrusion Detection and Prevention Protocol for Internet of Things Based Wireless Sensor Networks Krishnan R., Krishnan R.S., Robinson Y.H., Julie E.G., Long H.V., Sangeetha A., Subramanian M., Kumar R. Wireless Personal Communications
212 Hybrid Energy-based Secured clustering technique for Wireless Sensor Networks Saveetha P., Robinson Y.H., Shanmuganathan V., Kadry S., Nam Y. Journal of Internet Technology
213 Analysis of breast cancer prediction and visualisation using machine learning models Magesh G., Swarnalatha P. International Journal of Cloud Computing
214 Big data in healthcare made simple to save people's lives Anand R.V., Meenakshisundaram I., Jothikumar R., Chaitanya P.K. International Journal of Cloud Computing
215 InfusedHeart: A Novel Knowledge- Infused Learning Framework for Diagnosis of Cardiovascular Events Pandya S., Gadekallu T.R., Reddy P.K., Wang W., Alazab M. IEEE Transactions on Computational Social Systems
216 Transfer learning approach in deep neural networks for uterine fibroid detection Sundar S., Sumathy S. International Journal of Computational Science and Engineering
217 A Novel Model Based on Window-Pass Preferences for Data-Emergency-Aware Scheduling in Computer Networks Jemmali M., Denden M., Boulila W., Jhaveri R.H., Srivastava G., Gadekallu T.R. IEEE Transactions on Industrial Informatics
218 A survey on blockchain for big data: Approaches, opportunities, and future directions Deepa N., Pham Q.-V., Nguyen D.C., Bhattacharya S., Prabadevi B., Gadekallu T.R., Maddikunta P.K.R., Fang F., Pathirana P.N. Future Generation Computer Systems
219 Location Recommendation Based on Mobility Graph With Individual and Group Influences Pan X., Cai X., Song K., Baker T., Gadekallu T.R., Yuan X. IEEE Transactions on Intelligent Transportation Systems
220 An Empirical Model to Predict the Diabetic Positive Using Stacked Ensemble Approach Sivashankari R., Sudha M., Hasan M.K., Saeed R.A., Alsuhibany S.A., Abdel-Khalek S. Frontiers in Public Health
221 Geo Spatial Based Real Time Monitoring on Eutrophic Evaluation of Porunai River Basin for Pollution Risk Assessment Gopikumar S., Banu J.R., Harold Robinson Y., Raja S., Vimal S., Pelusi D., Kaliappan M. European Journal of Remote Sensing
222 FL-PMI: Federated Learning-Based Person Movement Identification through Wearable Devices in Smart Healthcare Systems Arikumar K.S., Prathiba S.B., Alazab M., Gadekallu T.R., Pandya S., Khan J.M., Moorthy R.S. Sensors
223 A Joint Resource Allocation, Security with Efficient Task Scheduling in Cloud Computing Using Hybrid Machine Learning Techniques Bal P.K., Mohapatra S.K., Das T.K., Srinivasan K., Hu Y.-C. Sensors
224 Construction of Sports Safety Information Mining Platform Based on Multimedia Data Sharing Technology Cao X.-Z., Gadekallu T.R. Mobile Networks and Applications
225 Sentiment analysis for user reviews using Bi-LSTM self-attention based CNN model Bhuvaneshwari P., Rao A.N., Robinson Y.H., Thippeswamy M.N. Multimedia Tools and Applications
226 A neuro-fuzzy based healthcare framework for disease analysis and prediction Nagarajan R., Thirunavukarasu R. Multimedia Tools and Applications
227 Crop Classification for Agricultural Applications in Hyperspectral Remote Sensing Images Agilandeeswari L., Prabukumar M., Radhesyam V., Phaneendra K.L.N.B., Farhan A. Applied Sciences (Switzerland)
228 An intelligent machine learning-based sarcasm detection and classification model on social networks Vinoth D., Prabhavathy P. Journal of Supercomputing
229 Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier Ikram S.T., Priya V., Anbarasu B., Cheng X., Ghalib M.R., Shankar A. Journal of Supercomputing
230 A Contemporary Review on Utilizing Semantic Web Technologies in Narayanasamy S.K., Srinivasan K., Hu Y.-C., Electronics (Switzerland)
231 An empirical intrusion detection system based on XGBoost and bidirectional long- short term model for 5G and other telecommunication technologies Karthikraja C., Senthilkumar J., Hariharan R., Usha Devi G., Suresh Y., Mohanraj V. Computational Intelligence
232 COVID-19 Detection Based on Lung Ct Scan Using Deep Learning Techniques Kogilavani S.V., Prabhu J., Sandhiya R., Kumar M.S., Subramaniam U., Karthick A., Muhibbullah M., Imam S.B.S. Computational and Mathematical Methods in Medicine
233 Hybrid Fuzzy AHP and Fuzzy TOPSIS Decision Model for Aquaculture Species Selection Padma T., Shantharajah S.P., Ramadoss P. International Journal of Information Technology and Decision Making
234 Multilevel controller-assisted intrinsically modified ant colony optimization heuristic- based load-balancing model for mega cloud infrastructures Govardhan P., Srinivasan P. International Journal of Communication Systems
235 Attention Aware Deep Learning Model for Wireless Capsule Endoscopy Lesion Classification and Localization Muruganantham P., Balakrishnan S.M. Journal of Medical and Biological Engineering
236 Cooperative and feedback based authentic routing protocol for energy efficient IoT systems Gayathri A., Prabu A.V., Rajasoundaran S., Routray S., Narayanasamy P., Kumar N., Qi Y. Concurrency and Computation: Practice and Experience
237 Deep Convolutional Nets Learning Classification for Artistic Style Transfer Dinesh Kumar R., Golden Julie E., Harold Robinson Y., Vimal S., Dhiman G., Veerasamy M. Scientific Programming
238 Developing an optimal MapReduce function for wireless sensor networks in a secure way Vedhanayagam P. International Journal of Computer Aided Engineering and Technology
239 Certificateless Aggregated Signcryption Scheme for Cloud-Fog Centric Industry 4.0 Dohare I., Singh K., Ahmadian A., Mohan S., Reddy M P.K. IEEE Transactions on Industrial Informatics
240 Federated learning enabled digital twins for smart cities: Concepts, recent advances, and future directions Ramu S.P., Boopalan P., Pham Q.-V., Maddikunta P.K.R., Huynh-The T., Alazab M., Nguyen T.T., Gadekallu T.R. Sustainable Cities and Society
241 Exergoeconomic Analysis of a Novel Zeotropic Mixture Power System Ganesh N.S., Maheswari G.U., Srinivas T., Reddy B.V. International Journal of Precision Engineering and Manufacturing - Green Technology
242 Evaluation of drought using satellite solar-induced chlorophyll fluorescence during crop development stage over Xinjiang, China Pandiyan S., Navaneethan C., Vijayan R., Gunasekaran G., Khan K.Y., Guo Y. Measurement: Journal of the International Measurement Confederation
243 Efficient resource allocation in fog computing using QTCS model Iyapparaja M., Alshammari N.K., Kumar M.S., Krishnan S.S.R., Chowdhary C.L. Computers, Materials and Continua
244 A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep Learning Akshay Kumaar M., Samiayya D., Vincent P.M.D.R., Srinivasan K., Chang C.-Y., Ganesh H. Frontiers in Public Health
245 Detecting COVID-19-Related Fake News Using Feature Extraction Khan S., Hakak S., Deepa N., Prabadevi B., Dev K., Trelova S. Frontiers in Public Health
246 A Comprehensive Survey on Computer Forensics: State-of-the-art,Tools, Techniques, Challenges, and Future Directions Javed A.R., Ahmed W., Alazab M., Jalil Z.,Kifayat K., Gadekallu T.R. IEEE Access
247 Prediction of heart abnormalities using deep learning model and wearabledevices in smart health homes Shafi J., Obaidat M.S., Krishna P.V., Sadoun B., Pounambal M., Gitanjali J. Multimedia Tools and Applications
248 Predicting attributes based movie success through ensemble machine learning Gupta V., Jain N., Garg H., Jhunthra S., Mohan S., Omar A.H., Ahmadian A. Multimedia Tools and Applications
249 DOA tracking for seamless connectivity in beamformed IoT- based drones Balamurugan N.M., Mohan S., Adimoolam M., John A., reddy G T.,Wang W. Computer Standards and Interfaces
250 Stealth assessment strategy in distributed systems using optimal deep learning with game based learning Rajendran D., Prasanna S. Journal of Supercomputing
251 Forecasting COVID-19: Vector Autoregression-Based Model Rajab K., Kamalov F., Cherukuri A.K. Arabian Journal for Science and Engineering
252 Self-organizing Maps and Bayesian Regularized Neural Network for Analyzing Gasoline and Diesel Price Drifts Sujatha R., Chatterjee J.M., Priyadarshini I., Hassanien A.E., Mousa A.A.A., Alghamdi S.M. International Journal of Computational Intelligence Systems
253 Heart failure patient survival analysis with multi kernel support vector machine Sujatha R., Chatterjee J.M., Jhanjhi N.Z., Tabbakh T.A., Almusaylim Z.A. Intelligent Automation and Soft Computing
254 Prediction of suitable candidates for covid-19 vaccination Sujatha R., Venkata Siva Krishna B., Chatterjee J.M., Naidu P.R., Jhanjhi N.Z., Charita C., Mariya E.N., Baz M. Intelligent Automation and Soft Computing
255 Cnn based driver drowsiness detection system using emotion analysis Varun Chand H., Karthikeyan J. Intelligent Automation and Soft Computing
256 Energy Optimization for Green Communication in IoT Using Harris Hawks Optimization Dev K., Maddikunta P.K.R., Gadekallu T.R., Bhattacharya S., Hegde P., Singh S. IEEE Transactions on Green Communications and Networking
257 An analysis on polygonal approximation techniques for digital image boundary Raja K.T., Ray B.K. Journal of Mobile Multimedia
258 Genetic algorithm-conditional mutual information maximization based feature selection for bot attack classification in iot devices Kavitha G., Elango N.M. Journal of Mobile Multimedia
259 Temporal Weighted Averaging for Asynchronous Federated Intrusion Detection Systems Agrawal S., Chowdhuri A., Sarkar S., Selvanambi R., Gadekallu T.R. Computational Intelligence and Neuroscience
260 Toward an Autonomous Incubation System for Monitoring Premature Infants Alqaheri H., Sujatha R., Chatterjee J.M., Shooriya S., Kumar S.A., Satish N. Studies in Informatics and Control
261 Wavelet enabled ranking and clustering-based band selection and three-dimensional spatial feature extraction for hyperspectral remote sensing image classification Manoharan P., Vaddi R. Journal of Applied Remote Sensing
262 Clinical Decision Support System for Detection of Dengue: A Case Comparison Using AHP and Fuzzy AHP Mohapatro A., Mahendran S.K., Das T.K. Journal of Cases on Information Technology
263 An IoT and artificial intelligence-based patient care system focused on COVID-19 pandemic Goar V.K., Yadav N.S., Chowdhary C.L., Kumaresan P., Mittal M. International Journal of Networking and Virtual Organisations
264 A comprehensive survey on aspect- based sentiment analysis Yadav K., Kumar N., Maddikunta P.K.R., Gadekallu T.R. International Journal of Engineering Systems Modelling and Simulation

2021

SL. NO. TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL
1 Review on implementation of IoT for environmental condition monitoring in the agriculture sector Arun Kumar K., Karthikeyan J. Journal of Ambient Intelligence and Humanized Computing
2 Improving the Classification of Alzheimer's Disease Using Hybrid Gene Selection Pipeline and Deep Learning Mahendran N., Vincent P.M.D.R., Srinivasan K., Chang C.-Y. Frontiers in Genetics
3 Low-Light Image Enhancement Based on Generative Adversarial Network Nandhini Abirami R., Durai Raj Vincent P.M. Frontiers in Genetics
4 A deep learning framework with an embedded-based feature selection approach for the early detection of the Alzheimer's disease Mahendran N., P M D.R.V. Computers in Biology and Medicine
5 Fault-Resilience for Bandwidth Management in Industrial Software- Defined Networks Jhaveri R.H., Ramani S.V., Srivastava G., Gadekallu T.R., Aggarwal V. IEEE Transactions on Network Science and Engineering
6 Ontology-Enabled Emotional Sentiment Analysis on COVID-19 Pandemic-Related Twitter Streams Narayanasamy S.K.,Srinivasan K., Mian Qaisar S., Chang C.-Y. Frontiers in Public Health
7 Genetic CFL: Hyperparameter Optimization in Clustered Federated Learning Agrawal S., Sarkar S., Alazab M., Maddikunta P.K.R., Gadekallu T.R., Pham Q.-V. Computational Intelligence and Neuroscience
8 Deep learning-based transfer learning for classification of skin cancer Jain S., Singhania U., Tripathy B., Nasr E.A., Aboudaif M.K., Kamrani A.K. Sensors
9 The smart pill sticker: Introducing a smart pill management system based on touch- point technology Kataria G., Dhyani K., Patel D., Srinivasan K., Malwade S., Syed Abdul S. Health Informatics Journal
10 A hybrid learning approach for the stage- wise classification and prediction of COVID-19 X-ray images Adimoolam M., Govindharaju K., John A., Mohan S., Ahmadian A., Ciano T. Expert Systems
11 Dynamic Private Modulus Based Password Conditional Privacy Preserving Authentication and Key-Agreement Protocol for VANET Paliwal S., Cherukuri A.K., Gao X.-Z. Wireless Personal Communications
12 Exploring Internet Meme Activity during COVID-19 Lockdown Using Artificial Intelligence Techniques Priyadarshini I., Chatterjee J.M., Sujatha R., Jhanjhi N., Karime A., Masud M. Applied Artificial Intelligence
13 Optimal Feature Selection and Hybrid Classification for Autism Detection in Young Children Guruvammal S.,Chellatamilan T., Deborah L.J. Computer Journal
14 ResMem-Net: memory based deep CNN for image memorability estimation Praveen A., Noorwali A., Samiayya D., Khan M.Z., Durai R.V.P.M., Bashir A.K., Alagupandi V. PeerJ Computer Science
15 Computational trust evaluation algorithm for cloud models using fuzzy logic approach Thakare V.R., John S.K. International Journal of Ad Hoc and Ubiquitous Computing
16 Lion plus firefly algorithm for ternary- based anomaly detection in semantic graphs in smart cities Reddy M.S.K., Rajput D.S. International Journal of Ad Hoc and Ubiquitous Computing
17 Recent advances in blockchain technology: A survey on applications and challenges Hakak S., Khan W.Z., Gilkar G.A., Assiri B., Alazab M., Bhattacharya S., Reddy G.T. International Journal of Ad Hoc and Ubiquitous Computing
18 A hybrid threat model for system-centric and attack-centric for effective security design in SDLC Viswanathan G., Prabhu P.J. Web Intelligence
19 A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT) Swapna Sudha K., Jeyanthi N. Cybernetics and Information Technologies
20 A systematic analysis of identity based encryption (IBE) Karrothu A., Norman J. International Journal of Knowledge-Based and Intelligent Engineering Systems
21 A Three-Tier Authentication Scheme for Kerberized Hadoop Environment Hena M., Jeyanthi N. Cybernetics and Information Technologies
22 Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models Ikram S.T., Cherukuri A.K., Poorva B., Ushasree P.S., Zhang Y., Liu X., Li G. Cybernetics and Information Technologies
23 Detection and localisation of cars in indoor parking through UWB radar-based sensing system Rajendran S., Mathivanan S.K., Somanathan M.S., Geetha M., Jayagopal P., Venkatasen M., Mani P., Christopher J. International Journal of Ultra Wideband Communications and Systems
24 Isolated word-based spoken dialogue system using odia phones Swain B.K., Mohanty S., Chowdhary C.L. Recent Advances in Computer Science and Communications
25 Remote monitoring of indoor/outdoor movement in epidemiological situations utilising UWB transceivers Rajendran S., Jayagopal P., Mathivanan S.K., Prasanna S., Manivannan S.S., Kumar P.J.,Venkatasen M., Mani P. International Journal of Ultra Wideband Communications and Systems
26 High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem Jayabalasamy G., Koppu S. Journal of King Saud University - Computer and Information Sciences
27 Adaptive practical Byzantine fault tolerance consensus algorithm in permission blockchain network Navaroj G.I., Julie E.G., Robinson Y.H. International Journal of Web and Grid Services
28 Socioeconomic impact due to COVID-19: An empirical assessment Gupta V., Santosh K.C., Arora R., Ciano T., Kalid K.S., Mohan S. Information Processing and Management
29 Recent advances in evolving computing paradigms: Cloud, edge, and fog technologies Angel N.A., Ravindran D., Vincent P.M.D.R., Srinivasan K., Hu Y.-C. Sensors
30 5G Data Offloading Using Fuzzification with Grasshopper Optimization Technique Balaji V.R., Kalavathi T., Vellingiri J., Rajkumar N., Padhy V.P. Computer Systems Science and Engineering
31 Blockchain and PUF-based Lightweight Authentication Protocol for Wireless Medical Sensor Networks Wang W., Qiu C., Yin Z., Srivastava G., Gadekallu T.R., Alsolami F., Su C. IEEE Internet of Things Journal
32 Reinforced resource management in vehicular fog computing using deep beacon power control protocol Kumar T.A., Rajmohan R., Julie E.G., Robinson Y.H., Vimal S., Kadry S. International Journal of Web and Grid Services
33 A peer-to-peer blockchain based interconnected power system Ahmed M.M., Hasan M.K., Shafiq M., Qays M.O., Gadekallu T.R., Nebhen J., Islam S. Energy Reports
34 Context-sensitive lexicon for imbalanced text sentiment classification using bidirectional LSTM Pavan Kumar M.R., Jayagopal P. Journal of Intelligent Manufacturing
35 Cascading 1D-Convnet Bidirectional Long Short Term Memory Network with Modified COCOB Optimizer: A Novel Approach for Protein Secondary Structure Prediction Sonsare P.M., C G. Chaos, Solitons and Fractals
36 Secure-Enhanced Federated Learning for AI-Empowered Electric Vehicle Energy Prediction Wang W., Fida M.H., Lian Z., Yin Z., Pham Q., Gadekallu T.R., Dev K., Su C. IEEE Consumer Electronics Magazine
37 Improved whale optimization based band selection for hyperspectral remote sensing image classification Manoharan P., Boggavarapu P.K.L.N. Infrared Physics and Technology
38 Enhanced Border and Hole Detection for Energy Utilization in Wireless Sensor Networks Robinson Y.H., Lawrence T.S., Julie E.G., Kumar R., Thong P.H., Son L.H. Arabian Journal for Science and Engineering
39 SmartPharma: Blockchain Enabled Internet of Things for Smart Pharmaceutical Traceability System Kavitha Margret M., Golden Julie E., Harold Robinson Y., Vijayanandh D., Vimal S., Kadry S., El- Sherbeeny A.M., El- Meligy M.A. IETE Journal of Research
40 Big data integration enhancement based on attributes conditional dependency and similarity index method Kolisetty V.V., Rajput D.S. Mathematical Biosciences and Engineering
41 A Two-stage Text Feature Selection Algorithm for Improving Text Classification Ashokkumar P., Siva Shankar G., Srivastava G., Maddikunta P.K.R., Gadekallu T.R. ACM Transactions on Asian and Low- Resource Language Information Processing
42 TAMIZHI: Historical Tamil-Brahmi Script Recognition Using CNN and MobileNet Dhivya S., Usha Devi G. ACM Transactions on Asian and Low- Resource Language Information Processing
43 Study on Automated Approach to Recognize Characters for Handwritten and Historical Document Dhivya S., Usha Devi G. ACM Transactions on Asian and Low- Resource Language Information Processing
44 Image and signal processing in the underwater environment Reddy P.C.S., Pradeepa M., Venkatakiran S., Walia R., Saravanan M., Pillai V.J. Journal of Nuclear Energy Science and Power Generation Technology
45 Fundamentals, present and future perspectives of speech enhancement Das, N., Chakraborty, S., Chaki, J., Padhy, N., Dey, N. International Journal of Speech Technology
46 Pattern analysis based acoustic signal processing: a survey of the state-of-art Chaki, J. International Journal of Speech Technology
47 B Smart Technologies in Engineering Applications of Cyber Physical System in Healthcare: Sensing, Imaging, Computing and Networking Dukiya, R., Perumal, K. Recent Advances in Computer Science and Communications
48 Federated Learning for Cybersecurity: Concepts, Challenges and Future Directions Alazab M., R M S.P., M P., Reddy P., Gadekallu T.R., Pham Q. IEEE Transactions on Industrial Informatics
49 Blockchain for Edge of Things: Applications, Opportunities, and Challenges Gadekallu T.R., Pham Q., Nguyen D.C., Maddikunta P.K.R., Deepa N., B P., Pathirana P.N., Zhao J., Hwang W. IEEE Internet of Things Journal
50 Distributed authentication framework for Hadoop based bigdata environment Hena M., Jeyanthi N. Journal of Ambient Intelligence and Humanized Computing
51 FogQSYM: An Industry 4.0 Analytical Model for Fog Applications Iyapparaja M., Kumar M.S., Krishnan S.S.R.,Chowdhary C.L., Yoon B., Singh S., Cho G.H. Computers, Materials and Continua
52 SCB-HC-ECC'Based Privacy Safeguard Protocol for Secure Cloud Storage of Smart Card'Based Health Care System Senthilkumar S., Brindha K., Kryvinska N., Bhattacharya S., Reddy Bojja G. Frontiers in Public Health
53 An intelligent tutoring system for new student model using fuzzy soft set-based hybrid optimization algorithm Chandrasekhar U., Khare N. Soft Computing
54 Interoperable permissioned-blockchain with sustainable performance Punathumkandi S., Sundaram V.M., Panneer P. Sustainability (Switzerland)
55 Evaluation of risk causing factors for the incidence of neck and shoulder pain in adolescents using fuzzy analytic hierarchy process Padma T., Shantharajah S.P. International Journal of Information and Decision Sciences
56 A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions Javed A.R., Jalil Z., Zehra W., Gadekallu T.R., Suh D.Y., Piran M.J. Engineering Applications of Artificial Intelligence
57 A new fuzzy adaptive algorithm to classify imbalanced data Patel H., Rajput D.S., Stan O.P., Miclea L.C. Computers, Materials and Continua
58 Multi-class imbalanced image classification using conditioned GANs Pavan Kumar M.R., Jayagopal P. International Journal of Multimedia Information Retrieval
59 Automatic hate speech detection in english-odia code mixed social media data using machine learning techniques Mohapatra S.K., Prasad S., Bebarta D.K., Das T.K., Srinivasan K., Hu Y.- C. Applied Sciences (Switzerland)
60 FBDR-Fuzzy Based DDoS Attack Detection and Recovery Mechanism for Wireless Sensor Networks Pajila P.J.B., Julie E.G., Robinson Y.H. Wireless Personal Communications
61 Feature based opinion analysis on social media tweets with association rule mining and multi-objective evolutionary algorithms Meesala S.R., Subramanian S. Concurrency and Computation: Practice and Experience
62 A survey on challenges in transforming No-SQL Data to SQL data and storing in cloud storage based on user requirement Shantharajah S.P., Maruthavani E. International Journal of Performability Engineering
63 Effectiveness of contact tracing using KNN for COVID-19 Venkatasen M., Mathivanan S.K., Mani P., Jayagopal P., Thanapal P., Somanathan M.S., Upendra Babu K., Elangovan D. Journal of Mobile Multimedia
64 Protein classification using machine learning and statistical techniques Gupta C.L.P., Bihari A., Tripathi S. Recent Advances in Computer Science and Communications
65 ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs Khan T., Singh K., Hasan M.H., Ahmad K., Reddy G.T., Mohan S., Ahmadian A. Future Generation Computer Systems
66 PPSF: A Privacy-Preserving and Secure Framework using Blockchain-based Machine-Learning for IoT-driven Smart Cities Kumar P., Kumar R., Srivastava G., Gupta G.P., Tripathi R., Gadekallu T.R., Xiong N. IEEE Transactions on Network Science and Engineering
67 AACFAccessible Application-Centric Framework for the Internet of Things Backhauled Smart City Applications Cui Y., Song X., Liu J., Chen K., Shi G., Zhou J., Tamizharasi G. IEEE Transactions on Network Science and Engineering
68 Data-centric routing and caching approach for mobile and social sensing applications Shynu P.G., Al-Turjman F. Computers and Electrical Engineering
69 Identify glomeruli in human kidney tissue images using a deep learning approach Shubham S., Jain N., Gupta V., Mohan S., Ariffin M.M., Ahmadian A. Soft Computing
70 Security in Next Generation Mobile Payment Systems: A Comprehensive Survey Ahmed W., Rasool A., Javed A.R., Kumar N., Gadekallu T.R., Jalil Z.,Kryvinska N. IEEE Access
71 Security Enhanced Sentence Similarity Computing Model Based on Convolutional Neural Network Sun Q., Huang X., Kibalya G., Kumar N., Kumar S.V.N.S., Zhang P., Xie D. IEEE Access
72 Delineation of field boundary from multispectral satellite images through U-Net segmentation and template matching M S.K., Jayagopal P. Ecological Informatics
73 Fuzzy Guided Autonomous Nursing Robot through Wireless Beacon Network Narayanan K.L., Krishnan R.S., Son L.H., Tung N.T., Julie E.G., Robinson Y.H., Kumar R., Gerogiannis V.C. Multimedia Tools and Applications
74 Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks Rajasoundaran S., Kumar S.V.N.S., Selvi M., Ganapathy S., Rakesh R., Kannan A. Wireless Networks
75 A hadoop based framework integrating machine learning classifiers for anomaly detection in the internet of things Thaseen I.S., Mohanraj V., Ramachandran S., Sanapala K., Yeo S.-S. Electronics (Switzerland)
76 Hybrid Inception v3 XGBoost Model for Acute Lymphoblastic Leukemia Classification Ramaneswaran S., Srinivasan K., Vincent P.M.D.R., Chang C.-Y. Computational and Mathematical Methods in Medicine
77 Expert system for stable power generation prediction in microbial fuel cell Srinivasan K., Garg L., Chen B.-Y., Alaboudi A.A., Jhanjhi N.Z., Chang C.-T., Prabadevi B., Deepa N. Intelligent Automation and Soft Computing
78 A Review on Deep Learning Architecture and Methods for MRI Brain Tumour Segmentation Angulakshmi M., Deepa M. Current medical imaging
79 Literature review on software testing techniques and test suite reduction frameworks/tools Asha N., Mani P. International Journal of Advanced Intelligence Paradigms
80 Multilevel thresholding based follicle detection and classification of polycystic ovary syndrome from the ultrasound images using machine learning Gopalakrishnan C., Iyapparaja M. International Journal of Systems Assurance Engineering and Management
81 Improving the accuracy of item recommendations by combining collaborative and content-based recommendations: A hybrid approach Parasuraman D., Elumalai S. International Journal of Advanced Intelligence Paradigms
82 Fuzzy based feature engineering architecture for sentiment analysis of medical discussion over online social networks Pavan Kumar C.S., Dhinesh Babu L.D. Journal of Intelligent and Fuzzy Systems
83 Machine learning based deep job exploration and secure transactions in virtual private cloud systems Rajasoundaran S., Prabu A.V., Routray S., Kumar S.V.N.S., Malla P.P., Maloji S., Mukherjee A., Ghosh U. Computers and Security
84 Deep neural networks based approach for battery life prediction Bhattacharya S., Maddikunta P.K.R., Meenakshisundaram I., Gadekallu T.R., Sharma S., Alkahtani M., Abidi M.H. Computers, Materials and Continua
85 Investigation of digital video broadcasting application employing the modulation formats like QAM and PSK using OWC, FSO, and LOS-FSO channels Karpagarajesh G., Santhana Krishnan R., Harold Robinson Y., Vimal S., Kadry S., Nam Y. Alexandria Engineering Journal
86 An intelligent hybrid system for forecasting stock and forex trading signals using optimized recurrent flann and case-based reasoning Bebarta D.K., Das T.K., Chowdhary C.L., Gao X.- Z. International Journal of Computational Intelligence Systems
87 Storage and Proximity Management for Centralized Personal Health Records Using an IPFS-based Optimization Algorithm Mubashar A., Asghar K., Javed A.R., Rizwan M., Srivastava G., Gadekallu T.R., Wang D., Shabbir M. Journal of Circuits, Systems and Computers
88 Industrial-IoT-hardware security- improvement using plan load optimization method in cloud Basheer S., Gopu M., Mathew R.M., Bivi M.A., Prabu M. International Journal of Systems Assurance Engineering and Management
89 Language dialect based speech emotion recognition through deep learning techniques Rajendran S., Mathivanan S.K., Jayagopal P., Venkatasen M., Pandi T., Sorakaya Somanathan M., Thangaval M., Mani P. International Journal of Speech Technology
90 Design and development of ternary-based anomaly detection in semantic graphs using metaheuristic algorithm Reddy M.S.K., Rajput D.S. International Journal of Digital Crime and Forensics
91 GraphCrypto: Next generation data security approach towards sustainable smart city building Mishra A.K., Puthal D., Tripathy A.K. Sustainable Cities and Society
92 Classification and categorization of COVID-19 outbreak in Pakistan Ayoub A., Mahboob K., Javed A.R., Rizwan M., Gadekallu T.R., Abidi M.H., Alkahtani M. Computers, Materials and Continua
93 Deep Learning Assisted Neonatal Cry Classification via Support Vector Machine Models Ashwini K., Vincent P.M.D.R., Srinivasan K., Chang C.-Y. Frontiers in Public Health
94 Scalable algorithm for generation of attribute implication base using FPgrowth and spark Chunduri R.K., Cherukuri A.K. Soft Computing
95 Cloud- and IoT-based deep learning technique-incorporated secured health monitoring system for dead diseases Malarvizhi Kumar P., Hong C.S., Chandra Babu G., Selvaraj J., Gandhi U.D Soft Computing
96 A review on h-index and its alternative indices Bihari A., Tripathi S., Deepak A Journal of Information Science
97 Sparse Bayesian learning based channel estimation in FBMC/OQAM industrial IoT networks Wang H., Li X., Jhaveri R.H., Gadekallu T.R., Zhu M., Ahanger T.A., Khowaja S.A. Computer Communications
98 Machine learning prediction models for chronic kidney disease using national health insurance claim data in Taiwan Krishnamurthy S., Kapeleshh K.S., Dovgan E., Lu'trek M., Gradi'ek Pileti' B., Srinivasan K., Li Y.-C., Gradi'ek A., Syed-Abdul S. Healthcare (Switzerland)
99 Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks Santhosh Kumar S.V.N., Palanichamy Y., Selvi M., Ganapathy S., Kannan A., Perumal S.P. Wireless Networks
100 Hybrid Cache Management in Ad Hoc Networks Krishnan C.G., Robinson Y.H., Julie E.G., Bamini A.M.A., Kumar R., Thong P.H., Son L.H Wireless Personal Communications
101 Detection of Diabetic Retinopathy Using a Fusion of Textural and Ridgelet Features of Retinal Images and Sequential Minimal Optimization Classifier Ramasamy L.K., Padinjappurathu S.G., Kadry S., Dama'evi'ius R PeerJ Computer Science
102 An approach to merge domain ontologies using granular computing Priya M., Aswani Kumar C. Granular Computing
103 A hybrid feature selection model based on improved squirrel search algorithm and rank aggregation using fuzzy techniques for biomedical data classification Nagarajan G., Dhinesh Babu L.D. Network Modeling Analysis in Health Informatics and Bioinformatics
104 Naive Bayes and deep learning model for wireless intrusion detection systems Rajadurai H., Gandhi U.D. International Journal of Engineering Systems Modelling and Simulation
105 A Review on Various Applications of Reputation Based Trust Management Govindaraj R., Govindaraj P., Chowdhury S., Kim D., Tran D.-T., Le A.N. International Journal of Interactive Mobile Technologies
106 Rating Prediction Method for ItemBased collaborative Filtering Recommender Systems Using Formal Concept Analysis Chemmalar Selvi G., Lakshmi Priya G.G. EAI Endorsed Transactions on Energy Web
107 Early tumor diagnosis in brain MR images via deep convolutional neural network model Das T.K., Roy P.K., Uddin M., Srinivasan K., Chang C.-Y., Syed-Abdul S. Computers, Materials and Continua
108 Performance comparison of deep cnn models for detecting driver's distraction Srinivasan K., Garg L., Datta D., Alaboudi A.A., Jhanjhi N.Z., Agarwal R., Thomas A.G. Computers, Materials and Continua
109 Machine translation using deep learning for universal networking language based on their structure Ali M.N.Y., Rahman M.L., Chaki J., Dey N., Santosh K.C. International Journal of Machine Learning and Cybernetics
110 Multi-criteria-based approach for job scheduling in industry 4.0 in smart cities using fuzzy logic Kumar P.M., Babu G.C., Selvaraj A., Raza M., Luhach A.K., Díaz V.G Soft Computing
111 Iterative weighted EM and iterative weighted EM'-index for scientific assessment of scholars Bihari A., Tripathi S., Deepak A. Scientometrics
112 Deep CNN and Deep GAN in Computational Visual PerceptionDriven Image Analysis Nandhini Abirami R., Durai Raj Vincent P.M., Srinivasan K., Tariq U., Chang C.-Y. Complexity
113 Performance Assessment of Certain Machine Learning Models for Predicting the Major Depressive Disorder among IT Professionals during Pandemic times Vincent P.M.D.R., Mahendran N., Nebhen J., Deepa N., Srinivasan K., Hu Y.-C. Computational Intelligence and Neuroscience
114 Shadow detection from images using fuzzy logic and PCPerturNet Chaki J. IET Image Processing
115 Dispersed dummy selection approach for location-based services to preempt user-profiling Manju A.B., Sumathy S. Concurrency Computation
116 Identity preserving multi-pose facial expression recognition using fine tuned VGG on the latent space vector of generative adversarial network Abirami R.N., Vincent P.M.D.R Mathematical Biosciences and Engineering
117 A Spectrum Defragmentation Algorithm Using Jellyfish Optimization Technique in Elastic Optical Network (EON) Selvakumar S., Manivannan S.S. Wireless Personal Communications
118 Sentiment Analysis on Twitter Data by Using Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) Gandhi U.D., Malarvizhi Kumar P., Chandra Babu G., Karthick G. Wireless Personal Communications
119 Eeccrn: Energy enhancement with css approach using q-learning and coalition game modelling in crn Shanmuganathan V., Kalaivani L., Kadry S., Suresh A., Harold Robinson Y., Lim S Information Technology and Control
120 IoT based smart health monitoring with CNN using edge computing Vimal S., Harold Robinson Y., Kadry S., Long H.V., Nam Y. Journal of Internet Technology
121 A study of computational trust models in cloud security Thakare V.R., Singh J.K International Journal of Grid and High Performance Computing
122 Public Key Encryption with Equality Test for Industrial Internet of Things Based on Near-Ring Muthukumaran V., Manimozhi I., Sundar P.P.V., Karthikeyan T., Gopu M. International Journal of e-Collaboration
123 PPHE-automatic detection of sensitive attributes in a privacy preserved Hadoop environment using data mining techniques Umapathy K., Khare N International Journal of Computer Aided Engineering and Technology
124 K-means clustering-based radio neutron star pulsar emission mechanism Shrimali S., Pandey A., Chowdhary C.L Recent Advances in Computer Science and Communications
125 An analytical hierarchical processbased weighted assessment of factors contributing precipitation Vaishnavi B., Karthikeyan J., Yarrakula K. International Journal of Intelligent Enterprise
126 Cloud based extensible business management suite and data predictions Dukiya R., Perumal K. Recent Advances in Computer Science and Communications
127 An efficient attribute reduction and fuzzy logic classifier for heart disease and diabetes prediction Gadekallu T.R., Gao X.-Z. Recent Advances in Computer Science and Communications
128 A Machine Learning Way to Classify Autism Spectrum Disorder Sujatha R., Aarthy S.L., Chatterjee J.M., Alaboudi A., Jhanjhi N.Z International Journal of Emerging Technologies in Learning
129 Fuzzy deep learning-based crop yield prediction model for sustainable agronomical frameworks Elavarasan D., Durai Raj Vincent P.M Neural Computing and Applications
130 Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model Movassagh A.A., Alzubi J.A., Gheisari M., Rahimi M., Mohan S., Abbasi A.A., Nabipour N. Journal of Ambient Intelligence and Humanized Computing
131 Providing diagnosis on diabetes using cloud computing environment to the people living in rural areas of India Rajput D.S., Basha S.M., Xin Q., Gadekallu T.R., Kaluri R., Lakshmanna K., Maddikunta P.K.R. Journal of Ambient Intelligence and Humanized Computing
132 Whale optimization-based band selection technique for hyperspectral image classification Phaneendra Kumar B.L.N., Manoharan P. International Journal of Remote Sensing
133 Identifying and classifying plant disease using resilient LF-CNN B.V. G., G. U.D. Ecological Informatics
134 A method of progression detection for glaucoma using K-means and the GLCM algorithm toward smart medical prediction Vimal S., Robinson Y.H., Kaliappan M., Vijayalakshmi K., Seo S Journal of Supercomputing
135 An approach to forecast impact of Covid-19 using supervised machine learning model Mohan S., John A., Abugabah A., Adimoolam M., Kumar Singh S., kashif Bashir A., Sanzogni L. Software - Practice and Experience
136 Performance assessment of supervised classifiers for designing intrusion detection systems: A comprehensive review and recommendations for future research Panigrahi R., Borah S., Bhoi A.K., Ijaz M.F.,Pramanik M., Jhaveri R.H., Chowdhary C.L. Mathematics
137 A Threat Categorization of Risk-Based approach for analyzing Security Threats early phase in SDLC Viswanathan G., Jayagopal P Arabian Journal for Science and Engineering
138 Band selection strategies for hyperspectral image classification based on machine learning and artificial intelligent techniques 'Survey Sawant S.S., Manoharan P., Loganathan A. Arabian Journal of Geosciences
139 Development of Fuzzy Enabled Coverage Hole Detection Algorithm in Wireless Sensor Networks Robinson Y.H., Lawrence T.S., Julie E.G., Vimal S. Wireless Personal Communications
140 Enhanced Energy Proficient Encoding Algorithm for Reducing Medium Time in Wireless Networks Robinson Y.H., Julie E.G., Jacob I.J., Lawrence T.S., Saravanan V., Darney P.E Wireless Personal Communications
141 Inherent Security-aware Resource Utilizing Methodology for Cloud Environments Gopala Krishnan C., Golden Julie E., Harold Robinson Y. Wireless Personal Communications
142 ANFIS PD Plus I Control On Simscape Model of Nonlinear Physical System Umamaheswari K., Prabhakar G., Viji K., Thanapal P. Control Engineering and Applied Informatics
143 A new venture to image encryption using combined chaotic system and integer wavelet transforms Subashanthini S., Pounambal M. International Journal of Cloud Computing
144 A study and analysis of forecasts in resource allocation using ARIMA in cloud environment Rajalakshmi L., Sathiyamoorthy E Turkish Journal of Computer and Mathematics Education
145 An intelligent network intrusion detection system using particle swarm optimization (PSO) and deep network networks (DNN) Preethi D., Khare N. International Journal of Swarm Intelligence Research
146 Classification of cricket videos using finite state machines Ellappan V., Rajkumar R. International Journal of Information Technology and Management
147 Deep learning based recurrent neural networks to enhance the performance of wind energy forecasting: A review Paramasivan S.K. Revue d'Intelligence Artificielle
148 Landslide Hazard Zonation Mapping using Power Method based AHP for Saklespur, India Sreedevi N., Karthikeyan J. ndian Journal of Ecology
149 Some algorithms under non-parametric framework versus an unsupervised approach Ray B.K. Computer Science Review
150 Quantum-inspired ensemble approach to multi-attributed and multi-agent decision-making M.S. I., Cherukuri A.K. Applied Soft Computing
151 CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network using CNN and Attention-based GRU Rehman A., Ur Rehman S., Khan M., Alazab M., G T.R. IEEE Transactions on Network Science and Engineering
152 COVID19: Forecasting Air Quality Index and Particulate Matter (PM2.5) Mangayarkarasi R., Vanmathi C., Khan M.Z., Noorwali A., Jain R., Agarwal P. Computers, Materials and Continua
153 Deep Learning-Based Hookworm Detection in Wireless Capsule Endoscopic Image Using AdaBoost Lakshminarayanan K., Muthukumaran N., Robinson Y.H., Computers, Materials and Continua
154 Performance assessment of a novel power generation system Ganesh N.S., Maheswari G.U., Srinivas T., Reddy B.V. IET Renewable Power Generation
155 Blockchain-based Secure Healthcare Application for Diabetic-Cardio Disease Prediction in Fog Computing Shynu P.G., Menon V.G., Kumar R., Kadry S., Nam Y. IEEE Access
156 A Bayesian regularized neural network for analyzing bitcoin trends Sujatha R., Mareeswari V., Chatterjee J.M., Mousa A.A.A., Hassanien A.E. IEEE Access
157 BCD-WERT: a novel approach for breast cancer detection using whale optimization based efficient features and extremely randomized tree algorithm Abbas S., Jalil Z., Javed A.R., Batool I., Khan M.Z., Noorwali A., Gadekallu T.R., Akbar A. PeerJ Computer Science
158 Deep Neural Network to Predict Answer Votes on Community Question Answering Sites Roy P.K. Neural Processing Letters
159 Smart Animal Detection and Counting Framework for Monitoring Livestock in an Autonomous Unmanned Ground Vehicle Using Restricted Supervised Learning and Image Fusion Meena S.D., Agilandeeswari L. Neural Processing Letters
160 Spam review detection using self attention based CNN and bi-directional LSTM Bhuvaneshwari P., Rao A.N., Robinson Y.H. Multimedia Tools and Applications
161 A secured distributed detection system based on IPFS and blockchain for industrial image and video data security Kumar R., Tripathi R., Marchang N., Srivastava G., Gadekallu T.R., Xiong N.N. Journal of Parallel and Distributed Computing
162 Integrated Ranking Algorithm for Efficient Decision Making Deepa N., Prabadevi B., Srivastava G. International Journal of Information Technology and Decision Making
163 An effective data mining techniques based optimal paddy yield cultivation: a rational approach Vinoth B., Elango N.M. Paddy and Water Environment
164 3-Dimensional Manifold and Machine Learning Based Localization Algorithm for Wireless Sensor Networks Robinson Y.H., Vimal S., Julie E.G., Lakshmi Narayanan K., Rho S. Wireless Personal Communications
165 Machine Learning Based Detection and a Novel EC-BRTT Algorithm Based Prevention of DoS Attacks in Wireless Sensor Networks Lakshmi Narayanan K., Santhana Krishnan R., Golden Julie E., Harold Robinson Y., Shanmuganathan V. Wireless Personal Communications
166 Ternary-based feature level extraction for anomaly detection in semantic graphs: an optimal feature selection basis Reddy M.S.K., Rajput D.S. Sadhana - Academy Proceedings in Engineering Sciences
167 Remote health patient monitoring system for early detection of heart disease Babu G.C., Shantharajah S.P. International Journal of Grid and High Performance Computing
168 DARE-SEP: A Hybrid Approach of Distance Aware Residual Energy-Efficient SEP for WSN Naeem A., Javed A.R., Rizwan M., Abbas S., Lin J.C., Gadekallu T.R. IEEE Transactions on Green Communications
169 Heart disease prediction system using ensemble of machine learning algorithms Rajendran N.A., Vincent D.R. Recent Patents on Engineering
170 Hybrid approach for semantic similarity calculation between Tamil words Karuppaiah D., Durai Raj Vincent P.M. International Journal of Innovative Computing and Applications
171 LIS4: Lesk Inspired Sense Specific Semantic Similarity using WordNet Kandasamy S., Cherukuri A.K. Journal of Information and Knowledge Management
172 Data mining of paddy cultivation patterns and water resource management in late samba season of Tamilnadu Vinoth B., Elango N.M. SSRG International Journal of Engineering Trends and Technology
173 A fine-tuned feature descriptor for pedestrian action recognition in autonomous vehicles Ushapreethi P., Priya G.G.L. International Journal of Vehicle Information and Communication Systems
174 Robustness for authentication of the human using face, Ear, and Gait multimodal biometric system Singh L.K., Khanna M., Thawkar S., Gopal J. International Journal of Information System Modeling and Design
175 Adoption of E-Learning during Lockdown in India Mathivanan S.K., Jayagopal P., Ahmed S., Manivannan S.S., Kumar P.J., Raja K.T., Dharinya S.S., Prasad R.G. International Journal of Systems Assurance Engineering and Management
176 Real-time 3D reconstruction techniques applied in dynamic scenes: A systematic literature review Ingale A.K., J. D.U. Computer Science Review
177 Regularized deep clustering approach for effective categorization of maize diseases Gokulnath B.V., Gandhi U.D. Journal of Ambient Intelligence and Humanized Computing
178 Optimal 5G network slicing using machine learning and deep learning concepts Abidi M.H., Alkhalefah H., Moiduddin K., Alazab M., Mohammed M.K., Ameen W., Gadekallu T.R. Computer Standards and Interfaces
179 Field-programmable gate arrays in a low power vision system Suresh P., Saravanakumar U., Iwendi C., Mohan S., Srivastava G. Computers and Electrical Engineering
180 Recognition of food type and calorie estimation using neural network Kumar R.D., Julie E.G., Robinson Y.H., Vimal S., Seo S. Journal of Supercomputing
181 An intrusion detection system using optimized deep neural network architecture Ramaiah M., Chandrasekaran V., Ravi V., Kumar N. Transactions on Emerging Telecommunications Technologies
182 Roughsets-based approach for predicting battery life in iot Kaluri R., Rajput D.S., Xin Q., Lakshmanna K., Bhattacharya S., Gadekallu T.R., Maddikunta P.K.R. Intelligent Automation and Soft Computing
183 Tyre inspection through multi-state convolutional neural networks Sivamani C., Rajeswari M., Julie E.G., Robinson Y.H., Shanmuganathan V., Kadry S., Nam Y. Intelligent Automation and Soft Computing
184 An Effective Traceback Network Attack Procedure for Source Address Verification Balraj S., Leelasankar K., Ayyanar A., Yesudhas H.R., Kumar R., Long H.V., Hoang Son L. Wireless Personal Communications
185 Enhanced QoS Through Optimized Architecture for Video Streaming Applications in Heterogeneous Networks Duraimurugan S., Avudaiammal R., Vincent P.M.D.R. Wireless Personal Communications
186 Image retrieval using intensity gradients and texture chromatic pattern: Satellite images retrieval Jacob I.J., Paulraj B., Darney P.E., Long H.V., Tuan T.M., Yesudhas H.R., Shanmuganathan V., Eanoch G.J. International Journal of Data Warehousing and Mining
187 Human action recognition in videos using convolution long short-term memory network with spatio-temporal networks Sarabu A., Santra A.K. Emerging Science Journal
188 A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques Singh G., Khare N. International Journal of Computers and Applications
189 A hybrid approach towards content-based image retrieval for colored images using enhanced first type of pessimistic covering based lower approximation multi-granular rough sets R R., K J.S. Evolutionary Intelligence
190 Trust-aware routing framework for internet of things Sankar S., Somula R., Lakshmana Kumar R., Srinivasan P., Amala Jayanthi M. International Journal of Knowledge and Systems Science
191 E-farming management system using data mining techniques Kaviarasan S., Vanitha M. International Journal of Intelligent Unmanned Systems
192 An efficient privacy-preserving deep learning scheme for medical image analysis Andrew Onesimu J., Karthikeyan J. Journal of Information Technology Management
193 Machine Learning Assisted Information Management Scheme in Service Concentrated IoT Manogaran G., Alazab M., Saravanan V., Rawal B.S., Shakeel P.M., Sundarasekar R., Nagarajan S.M., Kadry S.N., Montenegro-Marin C.E. IEEE Transactions on Industrial Informatics
194 An ensemble machine learning approach through effective feature extraction to classify fake news Hakak S., Alazab M., Khan S., Gadekallu T.R., Maddikunta P.K.R., Khan W.Z. Future Generation Computer Systems
195 Novel framework of GIS based automated monitoring process on environmental biodegradability and risk analysis using Internet of Things Gopikumar S., Banu J.R., Robinson Y.H., Shanmuganathan V., Kadry S., Rho S. Environmental Research
196 A reinforced random forest model for enhanced crop yield prediction by integrating agrarian parameters Elavarasan D., Vincent P.M.D.R. Journal of Ambient Intelligence and Humanized Computing
197 Analysis and evaluation of the regional air quality index forecasting based on web-text sentiment analysis method Gao K., Anandhan P., Kumar R. Environmental Impact Assessment Review
198 Prediction modelling of COVID using machine learning methods from B-cell dataset Jain N., Jhunthra S., Garg H., Gupta V., Mohan S., Ahmadian A., Salahshour S., Ferrara M. Results in Physics
199 An Emotion Care Model using Multimodal Textual Analysis on COVID-19 Gupta V., Jain N., Katariya P., Kumar A., Mohan S., Ahmadian A., Ferrara M. Chaos, Solitons and Fractals
200 A social immunity based approach to suppress rumors in online social networks Srinivasan S., L D D.B. International Journal of Machine Learning and Cybernetics
201 Secrecy Outage Probability of Relay Selection Based Cooperative NOMA for IoT Networks Li H., Chen Y., Zhu M., Sun J., Do D.-T., Menon V.G., P. G. S. IEEE Access
202 Multi-objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities Alazab M., Lakshmanna K., G T.R., Pham Q.-V., Reddy Maddikunta P.K. Sustainable Energy Technologies and Assessments
203 Accessing Covid19 epidemic outbreak in Tamilnadu and the impact of lockdown through epidemiological models and dynamic systems Rajendran S., Jayagopal P. Measurement: Journal of the International Measurement Confederation
204 Keyword weight optimization using gradient strategies in event focused web crawling Rajiv S., Navaneethan C. Pattern Recognition Letters
205 SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles Kumar R., Kumar P., Tripathi R., Gupta G.P., Gadekallu T.R., Srivastava G. Computer Networks
206 Unmanned Aerial Vehicles in Smart Agriculture: Applications, Requirements, and Challenges Maddikunta P.K.R., Hakak S., Alazab M., Bhattacharya S., Gadekallu T.R., Khan W.Z., Pham Q. IEEE Sensors Journal
207 Adaptive beam formation and channel allocation using substance near multicast protocol and CS-iEHO Velusamy Y., Manickam R., Chinnaswamy S., Eanoch G.J., Yesudhas H.R., Kumar R., Long H.V. Soft Computing
208 Sustainable task scheduling strategy in cloudlets Mukherjee D., Nandy S., Mohan S., Al-Otaibi Y.D., Alnumay W.S. Sustainable Computing: Informatics and Systems
209 EMMM: Energy-efficient mobility management model for context-aware transactions over mobile communication Yadav A.K., Singh K., Ahmadian A., Mohan S., Hussain Shah S.B., Alnumay W.S. Sustainable Computing: Informatics and Systems
210 Energy-efficient cluster head selection through relay approach for WSN Rathore P.S., Chatterjee J.M., Kumar A., Sujatha R. Journal of Supercomputing
211 Exploration of sentiment analysis and legitimate artistry for opinion mining Kumar R.S., Saviour Devaraj A.F., Rajeswari M., Julie E.G., Robinson Y.H., Shanmuganathan V. Multimedia Tools and Applications
212 Learning automata and reservation based secure smart parking system: Methodology and simulation analysis Waheed A., Krishna P.V., J G., Sadoun B., Obaidat M. Simulation Modelling Practice and Theory
213 A bio-inspired defensive rumor confinement strategy in online social networks Srinivasan S., Dhinesh B.L.D. Journal of Organizational and End User Computing
214 Longitudinal strain waves propagating in an infinitely long cylindrical rod composed of generally incompressible materials and its Jacobi elliptic function solutions Silambarasan R., Baskonus H.M., Vijay Anand R., Dinakaran M., Balusamy B., Gao W. Mathematics and Computers in Simulation
215 Performance of deep learning vs machine learning in plant leaf disease detection Sujatha R., Chatterjee J.M., Jhanjhi N.Z., Brohi S.N. Microprocessors and Microsystems
216 Route manipulation aware Software-Defined Networks for effective routing in SDN controlled MANET by Disney Routing Protocol J M., S P., P J., V M., B S.K., P S. Microprocessors and Microsystems
217 A pragmatic approach to understand hebbian cell assembly Cherukuri A.K., Shivhare R., Abraham A., Li J., Jonnalagadda A. International Journal of Cognitive Informatics and Natural Intelligence
218 Word sense disambiguation in Tamil using indo-wordnet and cross-language semantic similarity Karuppaiah D., Durai Raj Vincent P.M. International Journal of Intelligent Enterprise
219 Topological properties of multigranular rough sets on intuitionistic fuzzy approximation spaces Reddy A.J., Tripathy B.K. International Journal of Intelligent Enterprise
220 A new dominant point detection technique for polygonal approximation of digital planar closed curves Kalaivani S., Ray B.K. International Journal of Intelligent Enterprise
221 Finding location of fake and phantom source for source location privacy in wireless sensor network Rimjhim, Roy P.K., Singh J.P. International Journal of Communication Networks and Distributed Systems
222 Efficient learning from two-class categorical imbalanced healthcare data Mathews L., Seetha H. International Journal of Healthcare Information Systems and Informatics
223 Palmprint Recognition Using Hessian Matrix and Two-Component Partition Method Chaki J., Dey N. International Journal of Digital Crime and Forensics
224 Design and Evaluation of Wi-Fi Offloading Mechanism in Heterogeneous Networks Vinoth Kumar V., Ramamoorthy S., Dhilip Kumar V., Prabu M., Balajee J.M. International Journal of e-Collaboration
225 Robust attack detection approach for iiot using ensemble classifier Priya V., Thaseen I.S., Gadekallu T.R., Aboudaif M.K., Nasr E.A. Computers, Materials and Continua
226 Distinct two-stream convolutional networks for human action recognition in videos using segment-based temporal modeling Sarabu A., Santra A.K. Data
227 Face Analysis Using Row and Correlation Based Local Directional Pattern Perumal S.R., Mouli C.P.V.S.S.R. Electronic Letters on Computer Vision and Image Analysis

2020

SL.
NO.
TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL
1 Deep learning to filter SMS Spam Roy P.K., Singh J.P., Banerjee S. Future Generation Computer Systems
2 An efficient XGBoost–DNN-based classification model for network intrusion detection system Devan P., Khare N. Neural Computing and Applications
3 Quantum Aspects of High Dimensional Conceptual Space: a Model for Achieving Consciousness Ishwarya M.S., Kumar C.A. Cognitive Computation
4 Hybrid context enriched deep learning model for fine-grained sentiment analysis in textual and visual semiotic modality social data Kumar A., Srinivasan K., Cheng W.-H., Zomaya A.Y. Information Processing and Management
5 A novel automata and neural network based fault diagnosis system for PLC controlled manufacturing systems Ghosh A., Wang G.-N., Lee J. Computers and Industrial Engineering
6 SVM-enabled intelligent genetic algorithmic model for realizing efficient universal feature selection in breast cyst image acquired via ultrasound sensing systems Chang C.-Y., Srinivasan K., Chen M.-C., Chen S.-J. Sensors (Switzerland)
7 Predicting drug responsiveness with deep learning from the effects on gene expression of Obsessive–Compulsive Disorder affected cases Sekaran K., Sudha M. Computer Communications
8 Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT Vimal S., Khari M., Dey N., Crespo R.G., Harold Robinson Y. Computer Communications
9 LNR-PP: Leaf Node Count and RSSI Based Parent Prediction Scheme to Support QoS in Presence of Mobility in 6LoWPAN Suganya P., C.H. P.R. Computer Communications
10 An efficient public key secure scheme for cloud and IoT security Thirumalai C., Mohan S., Srivastava G. Computer Communications
11 Periodic waves of the non dissipative double dispersive micro strain wave in the micro structured solids Gao W., Silambarasan R., Baskonus H.M., Anand R.V., Rezazadeh H. Physica A: Statistical Mechanics and its Applications
12 AVRM: adaptive void recovery mechanism to reduce void nodes in wireless sensor networks Ayyasamy A., Julie E.G., Robinson Y.H., Balaji S., Kumar R., Son L.H., Thong P.H., Priyadarshini I. Peer-to-Peer Networking and Applications
13 A hybrid meta-heuristic approach for optimization of routing and spectrum assignment in Elastic Optical Network (EON) Selvakumar S., Manivannan S.S. Enterprise Information Systems
14 Bio-inspired dual cluster heads optimized routing algorithm for wireless sensor networks Visu P., Praba T.S., Sivakumar N., Srinivasan R., Sethukarasi T. Journal of Ambient Intelligence and Humanized Computing
15 Quality assessment of tire shearography images via ensemble hybrid faster region-based convnets Chang C.-Y., Srinivasan K., Wang W.-C.,
Ganapathy G.P., Vincent D.R., Deepa N.
Electronics (Switzerland)
16 An algorithmic approach to rank the disambiguous entities in Twitter streams for effective semantic search operations Senthil Kumar N., Dinakaran M. Sadhana - Academy Proceedings in Engineering Sciences
17 A neuro-fuzzy approach to detect rumors in online social networks Srinivasan S., Dhinesh Babu L.D. International Journal of Web Services Research
18 Genetic algorithm influenced top-n recommender system to alleviate new user cold start problem Moses S.J., Babu D.L.D. International Journal of Swarm Intelligence Research
19 Analysing thalamus and its sub nuclei in MRI brain image to distinguish schizophrenia subjects using back propagation neural network ArivuSelvan K., Sathiya Moorthy E. International Journal of Internet Technology and Secured Transactions
20 Fundamentals, present and future perspectives of speech enhancement Das N., Chakraborty S., Chaki J., Padhy N., Dey N. International Journal of Speech Technology
21 Predicting bipolar disorder and schizophrenia based on non- overlapping genetic phenotypes using deep neural network Karthik S., Sudha M. Evolutionary Intelligence
22 Learnability of interestingness with semantic similarity and reasoning in the knowledge base of decision support systems Rajendran S., Prabhu J. International Journal of Web Portals
23 Effective feature selection using hybrid Ga-EHO for classifying big data siot Iyapparaja M., Deva Arul S. International Journal of Web Portals
24 Optimal feature selection through a cluster-based DT learning (CDTL) in heart disease prediction Magesh G., Swarnalatha P. Evolutionary Intelligence
25 Bi-level user authentication for enriching legitimates and eradicating duplicates in cloud infrastructure Thandeeswaran R., Saleem Durai M.A. International Journal of Computer Aided Engineering and Technology
26 A framework for ranking hospitals based on customer perception using rough set and soft set techniques Mohapatro A., Mahendran S.K., Das T.K. International Journal of Healthcare Information Systems and Informatics
27 Survey on IoT security and challenges of IoT forensics Joseph A., John Singh K. Test Engineering and Management
28 Anaphora and coreference resolution: A review Sukthanker R., Poria S., Cambria E., Thirunavukarasu R. Information Fusion
29 Fuzzy Logic based Smart Irrigation System using Internet of Things Krishnan R.S., Julie E.G., Robinson Y.H., Raja S., Kumar R., Thong P.H., Son L.H. Journal of Cleaner Production
30 Unsupervised band selection based on weighted information entropy and 3D discrete cosine transform for hyperspectral image classification Sawant S.S., Manoharan P. International Journal of Remote Sensing
31 Ultrasonic sensors-assisted corrosion studies on surface coated AlSi9Cu3 alloy die castings Hu Y.-C., Selvaraj S.K., Subramanian M., Srinivasan K., Narayanan S. Coatings
32 Early detection of diabetic retinopathy using pca-firefly based deep learning model Gadekallu T.R., Khare N., Bhattacharya S., Singh S., Maddikunta P.K.R., Ra I.-H., Alazab M. Electronics (Switzerland)
33 A novel PCA-firefly based XGBoost classification model for intrusion detection in networks using GPU Bhattacharya S., Siva Ramakrishnan S., Praveen Kumar Reddy M., Kaluri R., Singh S., Thippa Reddy G., Alazab M., Tariq U. Electronics (Switzerland)
34 Improving quality-of-service in fog computing through efficient resource allocation Mani S.K., Meenakshisundaram I. Computational Intelligence
35 Deep learning techniques for traffic flow prediction in intelligent transportation system: A survey George S., Santra A.K. Test Engineering and Management
36 Evolving dictionary based sentiment scoring framework for patient authored text Kumar C.S.P., Babu L.D.D. Evolutionary Intelligence
37 Enhancing blockchain performance using parallel merkle root and parallel proof of work Thilagavathi M., Lopez D. Journal of Advanced Research in Dynamical and Control Systems
38 Pattern analysis based acoustic signal processing: a survey of the state-of-art Chaki J. International Journal of Speech Technology
39 SMSS: Does social, mobile, spatial and sensor data have high impact on big data analytics Govardanan C.S., Gnanapandithan L.P.G. International Journal of Intelligent Enterprise
40 An efficient crop identification using deep learning Agila N., Senthil Kumar P. International Journal of Scientific and Technology Research
41 An Efficient Technique for Three- Dimensional Image Visualization through Two-Dimensional Images for Medical Data Gunasekaran G., Venkatesan M. Journal of Intelligent Systems
42 A New Representation of Intuitionistic Fuzzy Systems and Their Applications in Critical Decision Making Son L.H., Ngan R.T., Ali M., Fujita H., Abdel- Basset M., Giang N.L., Manogaran G., Priyan
M.K.
IEEE Intelligent Systems
43 Realizing a Stacking Generalization Model to Improve the Prediction Accuracy of Major Depressive Disorder in Adults Mahendran N., Durai Raj Vincent P.M., Srinivasan K., Sharma V., Jayakody
D.K.
IEEE Access
44 A new integrated approach based on the iterative super-resolution algorithm and expectation maximization for face hallucination Lakshminarayanan K., Krishnan R.S., Julie E.G., Robinson Y.H., Kumar R., Son L.H., Hung T.X.,
Samui P., Thi Ngo P.T., Bui D.T.
Applied Sciences (Switzerland)
45 A two-fold fusion fuzzy framework to restore non-uniform illuminated blurred image Chaki J. Optik
46 An efficient hybrid fuzzy‐clustering driven 3D‐ modeling of magnetic resonance imagery for enhanced brain tumor diagnosis Kanniappan S., Samiayya D., Durai Raj Vincent P.M., Srinivasan K., Jayakody D.N.K., Reina D.G., Inoue A. Electronics (Switzerland)
47 An improved long short-term memory networks with Takagi-Sugeno fuzzy for traffic speed prediction considering abnormal traffic situation George S., Santra A.K. Computational Intelligence
48 A novel methodology for the development of an optimal
agricultural crop field using Internet of Things
Manikandan R., Prasanna S., Ashwin M., Sathish Kumar L., Pandiyan S. Computational Intelligence
49 Earlier detection of rumors in online social networks using certainty-factor- based convolutional neural networks Santhoshkumar S., Dhinesh Babu L.D. Social Network Analysis and Mining
50 Exploring breast cancer classification of histopathology images from computer vision and image processing algorithms to deep learning Chowdhary C.L., Shynu P.G., Gurani V.K. International Journal of Advanced Science and Technology
51 A review on the significance of machine learning for data analysis in big data Kolisetty V.V., Rajput D.S. Jordanian Journal of
Computers and Information Technology
52 Exploring digital signal processing concepts using on-line graphical DSP simulator Sasi G., Thanapal P., Arvind Shriram R.K.,
Balaji V.S., Elamaran V.
International Journal of Advanced Science and
Technology
53 Social internet of things using big data analytics and security aspects - a review Deva Arul S., Iyapparaja M. Electronic Government
54 Classification of heart disease using cluster based DT learning Mohan S., Thirumalai C., Rababah A. Journal of Computer Science
55 Optimal feature extraction and classification-oriented medical insurance prediction model: machine Chowdhury S., Mayilvahanan P., Govindaraj R. International Journal of
Computers and Applications
56 An improved trusted on-demand multicast routing with qos for wireless networks Gopal J., Vellingiri J., Gitanjali J., Arivuselvan K., Sudhakar S. International Journal of Advanced Trends in Computer Science and Engineering
57 Low power area efficient adaptive FIR filter for hearing aids using distributed arithmetic architecture Praveen Sundar P.V., Ranjith D., Karthikeyan T., Vinoth Kumar V., Jeyakumar B. International Journal of Speech Technology
58 A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks Numan M., Subhan F., Khan W.Z., Hakak S., Haider S., Reddy G.T., Jolfaei A., Alazab M. IEEE Access
59 Analysis of Dimensionality Reduction Techniques on Big Data Reddy G.T., Reddy M.P.K., Lakshmanna K., Kaluri R., Rajput IEEE Access
60 A deep neural networks based model for uninterrupted marine environment monitoring G. T.R., R.M. S.P., Parimala M., Chowdhary C.L., M. P.K.R., Hakak S., Khan W.Z. Computer Communications
61 Hyperspectral band selection based on metaheuristic optimization approach Sawant S., Manoharan P. Infrared Physics and Technology
62 Hyperspectral image classification using CNN with spectral and spatial features integration Vaddi R., Manoharan P. Infrared Physics and Technology
63 A novel user interaction middleware component system for ubiquitous soft computing environment by using fuzzy agent computing system Vasanthi R., Jayavadivel R., Prasadh K., Vellingiri J., Akilarasu G., Sudhakar S., Balasubramaniam P.M. Journal of Ambient Intelligence and Humanized Computing
64 Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything R.M S.P., Bhattacharya S., Maddikunta P.K.R., Somayaji S.R.K., Lakshmanna K., Kaluri R., Hussien A., Gadekallu T.R. Journal of Parallel and Distributed Computing
65 A review on classification of imbalanced data for wireless sensor networks Patel H., Singh Rajput D., Thippa Reddy G.,
Iwendi C., Kashif Bashir A., Jo O.
International Journal of Distributed Sensor Networks
66 An Effective Congestion Control Scheme for MANET with Relative Traffic Link Matrix Routing Krishnamoorthy D., Vaiyapuri P., Ayyanar A., Harold Robinson Y., Kumar R., Long H.V., Son L.H. Arabian Journal for Science and Engineering
67 Attention Mechanism with Gated Recurrent Unit Using Convolutional Neural Network for Aspect Level Opinion Mining Rani M.S., Subramanian S. Arabian Journal for Science and Engineering
68 A quantum approach in LiFi security using quantum key distribution Vinoth Kumar V., Karthikeyan T., Praveen Sundar P.V., Magesh G., Balajee J.M. International Journal of Advanced Science and Technology
69 28 GHZ printed antenna for 5G communication with improved gain
using array
Kavitha M., Dinesh Kumar T., Gayathri A., Koushick V. International Journal of Scientific and
Technology Research
70 A survey on workload prediction models in cloud based on spot instances for proactive auto scaling strategy Secaran R.Y., Sathiyamoorthy E. Journal of Critical Reviews
71 An approach for facial recognition using deep learning Gopal J., Menon S.R., Vellingiri J., Arivuselvan K., Kamalakannan J. Journal of Advanced Research in Dynamical and Control Systems
72 Dimensionality reduction of fuzzy soft sets using fpso algorithm Chandrasekhar U., Khare N. International Journal of Advanced Science
73 Dynamic thresholding based ancient character recognition using enhanced convolution neural network Balasubramanie P., Vellingiriraj E.K., Logesh Babu R., Dinakaran M. International Journal of Advanced Science and Technology
74 Event recognition and classification in sports video using HMM Ellappan V., Rajkumar R. International Journal of Computer Aided Engineering and Technology
75 Probabilistic approach for channel selection in centralized cognitive
scheme utilizing invasive weed optimization
Sumathi D., Manivannan S.S. International Journal of Advanced Trends in
Computer Science and Engineering
76 Tricky information applicable answer interest optimization by intellect methods Mohankumar P., Vijayan R., Mareeswari V. International Journal of Scientific and Technology Research
77 A stacked ensemble learning model for intrusion detection in wireless network Rajadurai H., Gandhi U.D. Neural Computing and Applications
78 Crop Yield Prediction Using Deep Reinforcement Learning Model for
Sustainable Agrarian Applications
Elavarasan D., Durairaj Vincent P.M. IEEE Access
79 A Multidirectional LSTM Model for Predicting the Stability of a Smart Grid Alazab M., Khan S., Krishnan S.S.R., Pham Q.-V., Reddy M.P.K., Gadekallu T.R. IEEE Access
80 Review of Health Prognostics and Condition Monitoring of Electronic Components Bhargava C., Sharma P.K., Senthilkumar M., Padmanaban S., Ramachandaramurthy V.K., Leonowicz Z., Blaabjerg F., Mitolo M. IEEE Access
81 KeySplitWatermark: Zero Watermarking Algorithm for Software Protection against Cyber-Attacks Iwendi C., Jalil Z., Javed A.R., Thippa Reddy G., Kaluri R., Srivastava G., Jo O. IEEE Access
82 Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN Thangaramya K., Kulothungan K., Indira Gandhi S., Selvi M., Santhosh Kumar S.V.N., Arputharaj K. Soft Computing
83 Green communication in IoT networks using a hybrid optimization algorithm Maddikunta P.K.R., Gadekallu T.R., Kaluri R., Srivastava G., Parizi R.M., Khan M.S. Computer Communications
84 Deep neural networks to predict diabetic retinopathy Gadekallu T.R., Khare N., Bhattacharya S., Singh S., Maddikunta P.K.R., Srivastava G. Journal of Ambient Intelligence and Humanized Computing
85 Cost optimization of secure routing with untrusted devices in software defined networking Yazdinejad A., Parizi R.M., Dehghantanha A., Srivastava G., Mohan S., Rababah A.M. Journal of Parallel and Distributed Computing
86 SMO-DNN: Spider monkey optimization and deep neural network
hybrid classifier model for intrusion detection
Khare N., Devan P., Chowdhary C.L.,
Bhattacharya S., Singh G., Singh S., Yoon B.
Electronics (Switzerland)
87 Realizing an integrated multistage support vector machine model for augmented recognition of unipolar depression Srinivasan K., Mahendran N., Vincent D.R., Chang C.-Y., Syed-Abdul S. Electronics (Switzerland)
88 Precision agriculture and farming using Internet of Things based on wireless sensor network Sanjeevi P., Prasanna S., Siva Kumar B., Gunasekaran G., Alagiri I., Vijay Anand R. Transactions on Emerging Telecommunications
Technologies
89 Realizing the resolution enhancement of tube-to-tube plate friction welding microstructure images via hybrid sparsity model for improved weld interface defects diagnosis Srinivasan K., Deepa N., Durai Raj Vincent P.M., Senthil Kumaran S. Journal of Internet Technology
90 A novel solution for economizing water by a mix of technologies with a low cost approach Rajalakshmi N.R., Baskar M., Jayalakshmi P., Thiagarajan R., Mohan I. International Journal of Advanced Science and Technology
91 Hybrid optimization algorithm for providing big data classification Margret M.K., Devi S.S., Goldenjulie E., Vijayanandh D., Robinson Y.H. International Journal of Advanced Science and Technology
92 Privacy preserving sensitive data publishing using (k,n,m) anonymity approach Victor N., Lopez D. Journal of Communications Software and Systems
93 Flood inundation mapping of lower Godavari river basin using remote
sensing and GIS
Vaishnavi B., Yarrakula K., Karthikeyan J. Indian Journal of Ecology
94 Automated road safety surveillance system using hybrid cnn-lstm approach Babitha D., Ismail M., Chowdhury S., Govindaraj R., Prakash K.B. International Journal of Advanced Trends in Computer Science and Engineering
95 Skeleton-based STIP feature and discriminant sparse coding for human action recognition Ushapreethi P., Lakshmi Priya G.G. International Journal of Intelligent Unmanned
Systems
96 Transfer learning techniques for emotion classification on visual features of images in the deep learning network Tamil Priya D., Divya Udayan J. International Journal of Speech Technology
97 A hybrid model collaborative movie recommendation system using K- means clustering with ant colony optimisation Sandeep Kumar M., Prabhu J. International Journal of Internet Technology and Secured Transactions
98 Energy aware task scheduling using hybrid firefly - GA in big data Senthilkumar M., Ilango P. International Journal of Advanced Intelligence Paradigms
99 Biometric based multi-authority inner product encryption for electronic health record Exceline C.E., Norman J. EAI Endorsed Transactions on Pervasive Health and Technology
100 Outfit selection recommendation system using classification techniques Gupta N.S., Thanishvi D.S., Valarmathi B. International Journal on Emerging Technologies
101 Evolution of privacy preservation models in location-based services Manju A.B., Subramanian S. Advances in Science, Technology and
Engineering Systems
102 SDPBDVC: Secure data processing on big data using visual cryptography Brindha K., Jeyanthi N. International Journal of Services, Technology and Management
103 Word based language model using long short term memory for disabilities Guruvammal S., Chellatamilan T., Deborah L.J. International Journal of Psychosocial Rehabilitation
104 Crime prediction using machine learning and testing with classification models Kavithakumari K.S., Uma K., Rameshkumar C., Bashakhaja M. International Journal of Psychosocial Rehabilitation
105 Machinelearning and deep learning techniques in diagnosing alzheimers disease-a review Sudha B., Srinivasan K. International Journal of Advanced Science and Technology
106 Adaptive filtering and artificial intelligence methods on fetal ECG extraction Pradeepa M., Kumaraperumal S. Journal of Critical Reviews
107 A Centralized Cluster-Based Hierarchical Approach for Green Communication in a Smart Healthcare System Yang G., Jan M.A., Menon V.G., Shynu P.G., Aimal M.M., Alshehri M.D. IEEE Access
108 An Adaptive and Flexible Brain Energized Full Body Exoskeleton with IoT Edge for Assisting the Paralyzed Patients Jacob S., Alagirisamy M., Menon V.G., Kumar B.M., Jhanjhi N.Z., Ponnusamy V., Shynu P.G., Balasubramanian V. IEEE Access
109 ITFDS: Channel-aware integrated time and frequency-based downlink LTE scheduling in MANET Tuan L.M., Son L.H., Long H.V., Priya L.R., Soundar K.R., Robinson Y.H., Kumar R. Sensors (Switzerland)
110 Survey on Land Use/Land Cover (LU/LC) change analysis in remote sensing and GIS environment: Techniques and Challenges MohanRajan S.N., Loganathan A., Manoharan P. Environmental Science and Pollution Research
111 A machine learning forecasting model for COVID-19 pandemic in India Sujath R., Chatterjee J.M., Hassanien A.E. Stochastic Environmental Research and Risk Assessment
112 An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture Swarna Priya R.M., Maddikunta P.K.R., Parimala M., Koppu S., Gadekallu T.R., Chowdhary C.L., Alazab M. Computer Communications
113 Computational system to classify Cyber Crime offenses using machine learning Ch R., Gadekallu T.R., Abidi M.H., Al-Ahmari A. Sustainability (Switzerland)
114 A New Supervised Clustering Framework Using Multi Discriminative Parts and Expectation–Maximization Approach for a Fine-Grained Animal Breed Classification (SC-MPEM) Sundaram D.M., Loganathan A. Neural Processing Letters
115 An AI-based intelligent system for healthcare analysis using Ridge- Adaline Stochastic Gradient Descent Classifier Deepa N., Prabadevi B., Maddikunta P.K., Gadekallu T.R., Baker T., Khan M.A., Tariq U. Journal of Supercomputing
116 Predicting autism spectrum disorder from associative genetic markers of phenotypic groups using machine learning Sekaran K., Sudha M. Journal of Ambient Intelligence and Humanized Computing
117 Blended multi-modal deep convnet features for diabetic retinopathy severity prediction Bodapati J.D., Veeranjaneyulu N., Shareef S.N., Hakak S., Bilal M., Maddikunta P.K.R., Jo O. Electronics (Switzerland)
118 Internet of Green Things with autonomous wireless wheel robots against green houses and farms Ram C.R.S., Ravimaran S., Krishnan R.S., Julie E.G., Robinson Y.H., Kumar R., Son L.H., Thong P.H., Thanh N.Q., Ismail M. International Journal of Distributed Sensor Networks
119 An integrated intrusion detection system using correlation-based
attribute selection and artificial neural network
Sumaiya Thaseen I., Saira Banu J., Lavanya
K., Rukunuddin Ghalib M., Abhishek K.
Transactions on Emerging
Telecommunications Technologies
120 A distributed collaborative trust service recommender system for secure cloud computing Benjula Anbu Malar M.B., Prabhu J. Transactions on Emerging Telecommunications
Technologies
121 An empirical model in intrusion detection systems using principal component analysis and deep learning models Rajadurai H., Gandhi U.D. Computational Intelligence
122 Extraction of qualitative behavior rules for industrial processes from reduced concept lattice Dias S.M., Zárate L.E.,Song M.A.J., Vieira N.J., Kumar C.A. Intelligent Data Analysis
123 Enhanced adaptive distributed energy- efficient clustering (EADEEC) for wireless sensor networks Poluru R.K., Praveen Kumar Reddy M., Basha
S.M., Patan R., Kallam S.
Recent Advances in Computer Science and Communications
124 Preserving learnability and intelligibility at the point of care with assimilation of different speech recognition techniques Rajendran S., Jayagopal P. International Journal of Speech Technology
125 Intrusion detection in software defined networking using snort and mirroring Sampath N., Sadhasivam J., Jayavel S., Chindarmony N.S., Sharma S. SSRG International Journal of Engineering Trends and Technology
126 Chest X-ray investigation: A convolutional neural network approach Das T.K., Lal Chowdhary C., Gao X.Z. Journal of Biomimetics, Biomaterials and Biomedical Engineering
127 Gaussian hybrid fuzzy clustering and radial basis neural network for automatic brain tumor classification in MRI images Sathish P., Elango N.M. Evolutionary Intelligence
128 Prediction of user interest fluctuation using fuzzy neural networks in web
search
N C S., Ch P.R. International Journal of Intelligent Unmanned
Systems
129 A comparative study on transformation of UML/OCL to other specifications Thangaraj J., Ulaganathan S. Recent Advances in Computer Science and
Communications
130 A weighted assignment approach using recommendation routing for
congestion control in wireless sensor networks-WEAR
Somayaji S.R.K., Thangavelu A.K. Recent Advances in Computer Science and Communications
131 Comprehensive data analysis and prediction on IPL using machine
learning algorithms
Amala Kaviya V.S., Mishra A.S., Valarmathi
B.
International Journal on Emerging Technologies
132 Survey of genetic algorithm approach in machine learning Sadhasivam J., Jayavel S., Rathore A. SSRG International Journal of Engineering
Trends and Technology
133 Decision-making in cognitive paradoxes with contextuality and quantum formalism M.S I., Cherukuri A.K. Applied Soft Computing Journal
134 Graph based feature extraction and hybrid classification approach for facial expression recognition Krithika L.B., Priya G.G.L. Journal of Ambient Intelligence and Humanized Computing
135 Invariant Features-Based Fuzzy Inference System for Animal Detection and Recognition Using Thermal Images Meena D., Agilandeeswari L. International Journal of Fuzzy Systems
136 Performance Prediction and Interpretation of a Refuse Plastic Fuel Fired Boiler Shaha A.P., Singamsetti M.S., Tripathy B.K., Srivastava G., Bilal M., Nkenyereye L. IEEE Access
137 ECMCRR-MPDNL for Cellular Network Traffic Prediction with Big Data Dommaraju V.S., Nathani K., Tariq U., Al-Turjman F., Kallam S., Reddy M P.K., Patan R. IEEE Access
138 Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networks Krishnan R.S., Julie E.G., Robinson Y.H., Kumar R.,Thong P.H., Son L.H. Computers and Security
139 Failure assessment of pressure vessels made of plain carbon steel by using modified inherent flaw model in DL based industry optimization intelligent processing Joemax Agu M., Gopikumar S., Vimal S., Harold Robinson Y. Measurement: Journal of the International Measurement Confederation
140 An efficient segmentation and classification system in medical images using intuitionist possibilistic fuzzy C-mean clustering and fuzzy SVM algorithm Chowdhary C.L., Mittal M., Kumaresan P., Pattanaik P.A., Marszalek Z. Sensors (Switzerland)
141 Intelligent animal detection system using sparse multi discriminative-neural network (SMD-NN) to mitigate animal-vehicle collision Meena S.D., Loganathan A. Environmental Science and Pollution Research
142 Multilayer Convolutional Neural Network to Filter Low Quality Content from Quora Roy P.K. Neural Processing Letters
143 Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignment Xu X., Han M., Nagarajan S.M., Anandhan P. Computer Communications
144 Deep learning disease prediction model for use with intelligent robots Koppu S., Maddikunta P.K.R., Srivastava G. Computers and Electrical Engineering
145 Energy efficiency maximization algorithm for underwater Mobile sensor networks Pasupathi S., Vimal S., Harold-Robinson Y., Khari M., Verdú E., Crespo R.G. Earth Science Informatics
146 Hyperspectral image classification using fuzzy-embedded hyperbolic sigmoid nonlinear principal component and weighted least squares approach Phaneendra Kumar B.L.N., Prabukumar M. Journal of Applied Remote Sensing
147 FSSCaps-DetCountNet: Fuzzy soft sets and CapsNet-based detection and counting network for monitoring animals from aerial images Sundaram D.M., Loganathan A. Journal of Applied Remote Sensing
148 Traffic Prediction Using Multifaceted Techniques: A Survey George S., Santra A.K. Wireless Personal Communications
149 Affective emotion classification using feature vector of image based on visual concepts Priya D.T., Udayan J.D. International Journal of Electrical Engineering
Education
150 A novel smart meal planner website with online store and dietician consultancy-for this modern era-from the human-computer interaction practitioners’ perspective Vellingiri J., Suraj A., Gopal J., Gitanjali J. International Journal of Advanced Trends in
Computer Science and Engineering
151 Channel-based encrypted binary arithmetic coding in wireless sensor networks Subramanian B., Yesudhas H.R., Enoch G.J. Ingenierie des Systemes d'Information
152 Social economic impact of COVID-19 outbreak in India M S.K., V M., J P., M P., P J., P S., M.B B.A.M., Jothikumar R. International Journal of Pervasive Computing and Communications
153 Enhanced resemblance measures for integration in image-rich information networks Jothikumar R., Kumar T.R., Jayalakshmi P., Baskar M., Thiagarajan R., Mohan I. Journal of Critical Reviews
154 Impact of multimedia competencies of faculties on the effectiveness of engineering lectures Ushapreethi P. Journal of Critical Reviews
155 Survey of various algorithms used in twitter for sentiment analysis Sadhasivam J.,Kalivaradhan R.B., Jayavel S. SSRG International Journal of Engineering Trends and Technology
156 Machine learning and artificial intelligence based Diabetes Mellitus detection and self- management: A systematic review Chaki J., Thillai Ganesh S., Cidham S.K., Ananda Theertan S. Journal of King Saud University - Computer and Information Sciences
157 Mechanism of the effect of traditional Chinese medicine fumigation on blood lactic acid in exercise body Gang R., Nagarajan S.M., Anandhan P. Journal of Ambient Intelligence and Humanized Computing
158 EC-ElGamal and Genetic Algorithm-Based Enhancement for Lightweight Scalable Blockchain in IoT Domain Guruprakash J., Koppu S. IEEE Access
159 Latency Evaluation of SDFGs on Heterogeneous Processors Using Timed Automata Rajadurai S., Alazab M., Kumar N., Gadekallu T.R. IEEE Access
160 Fuzzy Inspired Deep Belief Network for the Traffic Flow Prediction in Intelligent Transportation System Using Flow Strength Indicators George S., Santra A.K. Big data
161 N-Sanitization: A semantic privacy- preserving framework for unstructured medical datasets Iwendi C., Moqurrab S.A., Anjum A., Khan S., Mohan S., Srivastava G. Computer Communications
162 Application of active remote sensing in confirmation rights and identification of mortgage supply-demand subjects of rural land in Guangdong Province Hu S., Fu Z., Jackson Samuel R.D., Anandhan P. European Journal of Remote Sensing
163 Energy-aware grid-based data aggregation scheme in routing protocol for agricultural internet of things Sankar S., Srinivasan P., Luhach A.K., Somula R., Chilamkurti N. Sustainable Computing: Informatics and Systems
164 A novel predicate based access control scheme for cloud environment using open stack swift storage Anilkumar C., Subramanian S. Peer-to-Peer Networking and Applications
165 Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions Preethi D., Khare N. Peer-to-Peer Networking and Applications
166 A novel grid and place neuron's computational modeling to learn spatial semantics of an environment Shrivastava R., Kumar P., Tripathi S., Tiwari V., Rajput D.S., Gadekallu T.R., Suthar B., Singh S., Ra I.-H. Applied Sciences (Switzerland)
167 Suspicious activity detection using deep learning in secure assisted living IoT environments Vallathan G., John A., Thirumalai C., Mohan S.K., Srivastava G., Lin J.C.-W. Journal of Supercomputing
168 Tree-based convolutional neural networks for object classification in segmented satellite images Robinson Y.H., Vimal S., Khari M., Hernández F.C.L., Crespo R.G. International Journal of High Performance Computing Applications
169 Multispectral and hyperspectral images based land use / land cover change prediction analysis: an extensive review Navin M.S., Agilandeeswari L. Multimedia Tools and Applications
170 Deep learning based genome analysis and NGS-RNA LL identification with a novel hybrid model Ramamurthy M., Krishnamurthi I., Vimal S., Robinson Y.H. BioSystems
171 Stochastic approach for channel selection in cognitive radio networks using optimization techniques Sumathi D., Manivannan S.S. Telecommunication Systems
172 Forest data visualization and land mapping using support vector machines and decision trees Radhakrishnan S., Lakshminarayanan A.S., Chatterjee J.M., Hemanth D.J. Earth Science Informatics
173 Fragmented handwritten digit recognition using grading scheme and fuzzy rules Chaki J., Dey N. Sadhana - Academy Proceedings in
Engineering Sciences
174 EM- and EM’-index Sequence: Construction and Application in Scientific Assessment of Scholars Bihari A., Tripathi S., Deepak A., Kumar P. Measurement
175 A survey on plant disease prediction using machine learning and deep learning techniques Gokulnath B.V., Usha Devi G. Inteligencia Artificial
176 ACO-based enhanced energy-efficient intelligent routing protocol for MANET Jayalakshmi P., Saravanan R. International Journal of Grid and Utility
Computing
177 An efficient computational model for assessing the stability characteristics of electro-active natural bio-resources Jhawar D., Sharma P., Sharma A., Srinivasan K., Chen B.-Y. Recent Advances in Computer Science and Communications
178 A framework for multimedia event classification with convoluted texture feature Kanagaraj K., Lakshmi Priya G.G. Recent Advances in Computer Science and Communications
179 Irrigation control system-data gathering in WSN using IOT Kumar K.A., Jayaraman K. International Journal of Communication Systems
180 A study on data de-duplication schemes in cloud storage Kumar P.M., Usha Devi G., Basheer S., Parthasarathy P. International Journal of Grid and Utility Computing
181 An enhanced two factor authentication for e-healthcare system Likitha S., Saravanan R. International Journal of Internet Manufacturing
and Services
182 Comprehensive review on land use/land cover change classification in remote sensing Navin M.S., Agilandeeswari L. Journal of Spectral Imaging
183 PMCAR: proactive mobility and congestion aware route prediction mechanism in IoMT for delay sensitive medical applications to ensure reliability in COVID-19 pandemic situation Pandi S., Ch P.R. International Journal of Pervasive Computing and Communications
184 IoT role in prevention of COVID-19 and health care workforces behavioural intention in India - an empirical examination R V.A., J P., P J K., SS M., Rajendran S., Kumar K.R., S S., Jothikumar R. International Journal of Pervasive Computing and Communications
185 Learning models for concept extraction from images with drug labels for a unified knowledge base utilizing NLP and IoT tasks Rajendran S., Prabhu J. International Journal of Information Technology and Web Engineering
186 Performance evaluation of transactions in blockchain based on workload using queueing model Santhi K., Lawanya Shri M. Journal of Green Engineering
187 Fast hash-based high secure hiding technique for digital data security Shrimali S., Kumar A., John Singh K. Electronic Government
188 Hybrid coherent encryption scheme for multimedia big data management using cryptographic encryption methods Stephen Dass A., Prabhu J. International Journal of Grid and Utility Computing
189 Defining theoretical foundations to unified metamodel for model
reusability
Thangaraj J., Ulaganathan S. Recent Advances in Computer Science and
Communications
190 Boosted-DEPICT: an effective maize disease categorization framework using deep clustering Gokulnath B.V., Usha Devi G. Neural Computing and Applications
191 R-CNN and wavelet feature extraction for hand gesture recognition with EMG signals Shanmuganathan V., Yesudhas H.R., Khan M.S., Khari M., Gandomi A.H. Neural Computing and Applications
192 A heuristic angular clustering framework for secured statistical data aggregation in sensor networks Krishnasamy L., Dhanaraj R.K., Gopal D.G., Gadekallu T.R., Aboudaif M.K., Nasr E.A. Sensors (Switzerland)
193 Analytical study of hybrid techniques for image encryption and decryption Chowdhary C.L., Patel P.V., Kathrotia K.J., Attique M., Kumaresan P., Ijaz M.F. Sensors (Switzerland)
194 Improved diver communication system by combining optical and electromagnetic trackers Kataria A., Ghosh S., Karar V., Gupta T., Srinivasan K., Hu Y.-C. Sensors (Switzerland)
195 Prevention of Hello Flood Attack in IoT using combination of Deep Learning with Improved Rider Optimization Algorithm Aditya Sai Srinivas T., Manivannan S.S. Computer Communications
196 Penetration testing framework for smart contract Blockchain Bhardwaj A., Shah S.B.H., Shankar A., Alazab M., Kumar M., Gadekallu T.R. Peer-to-Peer Networking and Applications
197 COVID-19 patient health prediction using boosted random forest algorithm Iwendi C., Bashir A.K., Peshkar A., Sujatha R., Chatterjee J.M., Pasupuleti S., Mishra R., Pillai S., Jo O. Frontiers in Public Health
198 A new framework for hyperspectral image classification using Gabor embedded patch based convolution neural network Boggavarapu L.N.P.K., Manoharan P. Infrared Physics and Technology
199 CNN based hyperspectral image classification using unsupervised band selection and structure-preserving spatial features Vaddi R., Manoharan P. Infrared Physics and Technology
200 A hybrid optimization approach for hyperspectral band selection based on wind driven optimization and modified cuckoo search optimization Sawant S., Manoharan P. Multimedia Tools and Applications
201 A hybrid CFS filter and RF-RFE wrapper-based feature extraction
for enhanced agricultural crop yield prediction modeling
Elavarasan D., Durai Raj Vincent P.M.,
Srinivasan K., Chang C.- Y.
Agriculture (Switzerland)
202 Integrating encryption techniques for secure data storage in the cloud Seth B., Dalal S., Jaglan V., Le D.-N., Mohan S.,
Srivastava G.
Transactions on Emerging Telecommunications
Technologies
203 Person identification with aerial imaginary using SegNet based semantic segmentation Manickam R., Kumar Rajan S., Subramanian C., Xavi A., Eanoch G.J., Yesudhas H.R. Earth Science Informatics
204 HEALTH of THINGS MODEL for CLASSIFYING HUMAN HEART SOUND SIGNALS USING CO- OCCURRENCE MATRIX and SPECTROGRAM Arora V., Ng E.Y.-K., Leekha R.S., Verma K., Gupta T., Srinivasan K. Journal of Mechanics in Medicine and Biology
205 A comparative study about workload prediction from one time forecast with cyclic forecasts using ARIMA model for cloud environment Yuvha Secaran R., Sathiyamoorthy E. EAI Endorsed Transactions on Energy Web
206 A modified cuckoo search algorithm based in this issue: Spectral preprocessing to compensate for packaging film / using neural nets to invert the prosail canopy model optimal band subset selection approach for hyperspectral image classification Sawant S.S., Prabukumar M., Samiappan S. Journal of Spectral Imaging
207 A novel method for deduplication of information storage managing in cloud computing Santhi K., Lawanya Shri M., Gangadevi E., Meenatchi S., Navaneethan C. International Journal of Psychosocial Rehabilitation
208 A secure and privacy-preserving approach to protect user data across cloud based online social networks Khare N., Kumaran U. International Journal of Grid and High Performance Computing
209 A survey of band selection techniques for hyperspectral image
classification
Sawant S.S., Prabukumar M. Journal of Spectral Imaging
210 An adaptive service monitoring system in a cloud computing environment Sathiyamoorthy E., Karthikeyan P. International Journal of Grid and High Performance Computing
211 Exquisite Analysis of Popular Machine Learning–Based Phishing Detection Techniques for Cyber Systems Das M., Saraswathi S., Panda R., Mishra A.K., Tripathy A.K. Journal of Applied Security Research
212 Innovative shopping through mobile using Google’s arcore Sathish Kumar P., Chandra Prakash S., Ajith Kumar K., Shri M.L., Santhi K., Mon F.A. International Journal of Psychosocial Rehabilitation
213 Monitoring and analysis of the recovery rate of Covid-19 positive cases to prevent dangerous stage using IoT and sensors Kumar K.R., Iyapparaja M., Niveditha V.R., Magesh S., Magesh G., Marappan S. International Journal of Pervasive Computing and Communications
214 Secure virtual machine migration technique using blockchain Lawanya Shri M., Santhi K., Gangadevi E., Meenatchi S., Navaneethan C. International Journal of Psychosocial Rehabilitation
215 Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack Anbu Malar M.B.B., J P. International Journal of Pervasive Computing and Communications
216 Service-Oriented Broker for Effective Provisioning of Cloud Services – a Survey Nagarajan R., Thirunavukarasu R. International Journal of Computing and Digital
Systems
217 A novel optimal feature selection technique for medical data classification using ANOVA based whale optimization Moorthy U., Gandhi U.D. Journal of Ambient Intelligence and Humanized Computing
218 Thermoeconomic investigation on advanced Kalina power generation system Uma Maheswari G., Shankar Ganesh N.,
Srinivas T., Reddy B.V.
Energy Reports
219 Optimization of routing-based clustering approaches in wireless
sensor network: Review and open research issues
Manuel A.J., Deverajan G.G., Patan R., Gandomi A.H. Electronics (Switzerland)
220 Antlion re-sampling based deep neural network model for classification of imbalanced multimodal stroke dataset Thippa Reddy G., Bhattacharya S., Maddikunta P.K.R., Hakak S., Khan W.Z., Bashir A.K., Jolfaei A., Tariq U. Multimedia Tools and Applications
221 Compression based clustering technique for enhancing accuracy in web scale videos Pillai K.G.R., Radhakrishnan K., Ramakrishnan D., Yesudhas H.R., Eanoch G.J., Kumar R., Long
H.V., Son L.H.
Multimedia Tools and Applications
222 A new 3D convolutional neural network (3D-CNN) framework for
multimedia event detection
Kanagaraj K., Priya G.G.L. Signal, Image and Video Processing
223 An intelligent ensemble of long-short- term memory with genetic algorithm for network anomaly identification Thaseen I.S., Chitturi A.K., Al-Turjman F., Shankar A., Ghalib M.R., Abhishek K. Transactions on Emerging Telecommunications
Technologies
224 Hybrid optimization routing management for autonomous underwater vehicle in the internet of underwater things Robinson Y.H., Vimal S., Julie E.G., Khari M., Expósito-Izquierdo C., Martínez J. Earth Science Informatics
225 High-performance implementation of a two-bit geohash coding technique for nearest neighbor search Varalakshmi M., Kesarkar A.P., Lopez D. Concurrency Computation
226 Auto encoder based dimensionality reduction and classification using convolutional neural networks for hyperspectral images Ramamurthy M., Robinson Y.H., Vimal S., Suresh A. Microprocessors and Microsystems
227 A novel approach for merging ontologies using formal concept analysis Priya M., Kumar C.A. International Journal of Cloud Computing
228 A queuing theory model for e-health cloud applications Kumar M.S., Raja M.I. International Journal of Internet Technology and
Secured Transactions
229 An approach to feature selection in intrusion detection systems using machine learning algorithms Kavitha G., Elango N.M. International Journal of e-Collaboration
230 An early prevention method for node failure in wireless sensor networks Krishnan S.S.R., Thangavelu A. International Journal of Internet Technology and
Secured Transactions
231 An effective prediction model for online course dropout rate Narayanasamy S.K., Elçi A. International Journal of Distance Education
Technologies
232 Automated intelligent public lighting system Senthilkumar S., Brindha K., Jena A. International Journal of Internet Technology and
Secured Transactions
233 Chronological and exponential-based Lion optimisation for optimal resource allocation in cloud Devagnanam J., Elango N.M. International Journal of Grid and Utility
Computing
234 Coverless VoIP steganography using hash and hash Deepikaa S., Saravanan R. Cybernetics and Information Technologies
235 Data storage security in the cloud environment using the honey pot
system
Malar B.A., Prabhu J. International Journal of e-Collaboration
236 Efficient clustering of water distribution network using affinity propagation Somisetti V.S.S., Palla S.H. Ingenierie des Systemes d'Information
237 EFS-LSTM (Ensemble-based feature selection with LSTM) classifier for intrusion detection system Preethi D., Khare N. International Journal of e-Collaboration
238 Enhancing the mobility support in internet of things Sankar S., Srinivasan P. International Journal of Fuzzy System
Applications
239 Generative adversarial networks: a survey on applications and challenges Pavan Kumar M.R., Jayagopal P. International Journal of Multimedia Information
Retrieval
240 Hybrid machine learning model for healthcare monitoring systems Nallakaruppan M.K., Kumaran U.S. International Journal of Internet Technology and
Secured Transactions
241 Hybrid swarm intelligence for feature selection on IoT-based infrastructure Nallakaruppan M.K., Kumaran U.S. International Journal of Cloud Computing
242 Supervised Machine Learning Classification Algorithmic Approach for Finding Anomaly Type of Intrusion Detection in Wireless Sensor Network Ashwini B. Abhale, Manivannan S.S. Optical Memory and Neural Networks (Information Optics)
243 Survey of methodologies for quantifying software reliability Viswanathan G., Prabhu J. International Journal of Internet Technology and
Secured Transactions
244 A method of landfill leachate management using internet of things for sustainable smart city development Gopikumar S., Raja S., Robinson Y.H., Shanmuganathan V., Chang H., Rho S. Sustainable Cities and Society
245 Deep learning and medical image processing for coronavirus (COVID-19) pandemic: A survey Bhattacharya S., Reddy Maddikunta P.K., Pham Q.-V., Gadekallu T.R., Krishnan S S.R., Chowdhary C.L., Alazab M., Jalil Piran M. Sustainable Cities and Society
246 Forecasting of the SARS-CoV-2 epidemic in India using SIR model, flatten curve and herd immunity Venkatasen M., Mathivanan S.K., Jayagopal P., Mani P., Rajendran S., Subramaniam U.S., Ramalingam A.C., Rajasekaran V.A., Indirajithu A., Sorakaya Somanathan M. Journal of Ambient Intelligence and Humanized Computing
247 A physical memristor based Muthuswamy–Chua–Ginoux system Ginoux J.-M., Muthuswamy B., Meucci R., Euzzor S., Di Garbo A., Ganesan K. Scientific Reports
248 Multiclass model for agriculture development using multivariate statistical method Deepa N., Khan M.Z., Prabadevi B., Vincent
D.R.P.M., Maddikunta P.K.R., Gadekallu T.R.
IEEE Access
249 Pilot decontamination using asynchronous fractional pilot
scheduling in massive MIMO systems
Zahoor M.I., Dou Z., Shah S.B.H., Khan I.U.,
Ayub S., Gadekallu T.R.
Sensors (Switzerland)
250 A secure data deduplication system for integrated cloud-edge networks Shynu P.G., Nadesh R.K., Menon V.G., Venu P., Abbasi M., Khosravi M.R. Journal of Cloud Computing
251 Predictive model for battery life in IoT networks Maddikunta P.K.R., Srivastava G., Gadekallu IET Intelligent Transport Systems
252 Security and privacy of UAV data using blockchain technology Ch R., Srivastava G., Reddy Gadekallu T., Maddikunta P.K.R., Bhattacharya S. Journal of Information Security and Applications
253 Detection of the triple riding and speed violation on two-wheelers using deep learning algorithms Mallela N.C., Volety R., R S.P., R. K N. Multimedia Tools and Applications
254 Biometric template security using DNA codec based transformation Jacob I.J., Betty P., Darney P.E., Raja S., Robinson Y.H., Julie E.G. Multimedia Tools and Applications
255 Medical information retrieval systems for e-Health care records using fuzzy based machine learning model L A.J.P., Sengan S., G K K., J V., Gopal J.,
Velayutham P., V S.
Microprocessors and Microsystems
256 Modelling Spatial Drivers for LU/LC Change Prediction Using Hybrid Machine Learning Methods in Javadi Hills, Tamil Nadu, India MohanRajan S.N., Loganathan A. Journal of the Indian Society of Remote Sensing
257 Social and QoS based trust model for secure clustering for wireless body area network Ramaswamy S., Norman J. International Journal of Electrical Engineering
Education
258 Constrained multifacility location problems – A review Santra A.K. International Journal of Industrial Engineering : Theory Applications and Practice
259 Defensive modeling of fake news through online social networks Shrivastava G., Kumar P., Ojha R.P., Srivastava P.K., Mohan S., Srivastava G. IEEE Transactions on Computational Social Systems
260 Heart sound interference cancellation from lung sound using dynamic neighbourhood learning-particle swarm optimiser based optimal recursive least square algorithm Mekala A.M., Chandrasekaran S. International Journal of Biomedical Engineering and Technology
261 Energy-aware multipath routing protocol for internet of things using
network coding techniques
Sankar S., Srinivasan P., Ramasubbareddy S.,
Balamurugan B.
International Journal of Grid and Utility
Computing
262 Intelligent prediction approach for diabetic retinopathy using deep learning based convolutional neural networks algorithm by means of retina photographs Thomas G.A.S., Robinson Y.H., Julie E.G., Shanmuganathan V., Rho S., Nam Y. Computers, Materials and Continua
263 Machine Learning Based Computational Gene Selection Models: A Survey, Performance Evaluation, Open Issues, and Future Research
Directions
Mahendran N., Durai Raj Vincent P.M., Srinivasan K., Chang C.-Y. Frontiers in Genetics
264 Reinforced XGBoost machine learning model for sustainable intelligent agrarian applications Elavarasan D., Vincent D.R. Journal of Intelligent and Fuzzy Systems
265 Context-aware resource management and alternative pricing model to improve enterprise cloud adoption Balaji M., Ch A.K. Concurrency Computation
266 Adaptive Decentralized Tracking Control for Nonlinear Large-Scale Systems Chandran K., Zhang W., Murugesan R.,
Prasanna S., Baseera A., Pandiyan S.
International Journal of Uncertainty, Fuzziness
and Knowlege-Based Systems
267 Pattern Mining Approaches Used in Social Media Data Chaki J., Dey N., Panigrahi B.K., Shi F., Fong S.J., Sherratt R.S. International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
268 Multi-modal prediction of breast cancer using particle swarm optimization with non-dominating sorting Vijayalakshmi S., John A., Sunder R., Mohan S., Bhattacharya S., Kaluri R., Feng G., Tariq U. International Journal of Distributed Sensor Networks
269 A unique data identification system for wireless sensor networks based on enhanced arithmetic coding Subramanian B., Yesudhas H.R., Eanoch G.J. Ingenierie des Systemes d'Information
270 Web application for traffic monitoring and guidance Sujatha R., Teja A., Naveen P., Chatterjee J.M., Aarthy S.L., Hassanien A.E. Journal of System and Management Sciences
271 A comparative study on delay-tolerant network routing protocols Angulakshmi M., Deepa M., Vanitha M., Mangayarkarasi R., Nagarajan I. International Journal of Intelligent Unmanned Systems
272 Computational approach for character identification and retrieval of grantha inscription Dhivya S., Usha Devi G., Deepanjali S., Tom R.J., Kumar S. International Journal of Advanced Trends in Computer Science and Engineering

2019

Sl.No TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL ISBN/ISSN NUMBER
1 IoT based fall detection and ambient assisted system for the elderly Chandra I., Sivakumar N., Gokulnath C.B., Parthasarathy P. Cluster Computing 1386-7857
2 Periodicity Mining, "a Time Inference over High Utility Item set mining" - A study Arunkumar M.S, Suresh P, Gunavathi C, Preethi S International Journal of Recent Technology and Engineering 2277-3878
3 Real time sentiment analysis of e-commerce websites using machine learning algorithms Sudheer K., Valarmathi B. International Journal of Mechanical Engineering and Technology 0976-6340
4 Analyzing Gene Expression Data By Using Crfm-Covering Rough Set Fuzzy C-Medoids Clustering Approach   Journal of Web Engineering 1540-9589
5 Comparative study on dimensionality reduction for disease diagnosis using fuzzy classifier R.Sujatha , E.P.Ephzibah, Sree Dharinya , G. Uma Maheswari, V.Mareeswari, Vamsi Pamidimarri International Journal of Engineering & Technology 2227-524X
6 ANALYSING EFFECTIVE METHODOLOGIES USED FOR TEXT CLUSTERING USING WEIGHTED ALGORITHMS S.Sree Dharinya ARPN Journal of Engineering and Applied Sciences 1819-6608
7 Analysis and comparison of routing attacks and preventive measures in IoT environment Aditya Sai Srinivas T., Manivannan S.S. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
8 Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm Srinivas Koppu,Madhu Viswanatham Vankadara Evolutionary Intelligence 1864-5909
9 High Utility Infrequent Itemset Mining Using a Customized Ant Colony Algorithm M.S. Arunkumar, P.Suresh, C.Gunavathi International Journal of Parallel Programming 0885-7458
10 Integration of fuzzy DEMATEL and FMCDM approach for evaluating knowledge transfer effectiveness with reference to GSD project outcome Gopal J., Sangaiah A.K., Basu A., Gao X.Z. International Journal of Machine Learning and Cybernetics 1868-8071
11 Adaptive mechanism for distributed query processing and data loading using the RDF data in the cloud Ranichandra Dharmaraj C., Tripathy B. International Journal of Communication Systems 1074-5351
12 Investigation on different clustering techniques in wireless sensor networks Meenatchi S., Prabu S. International Journal of Advanced Intelligence Paradigms 1755-0386
13 Analysis of performance measures to improve the quality of service in cloud based e-government web portal Priya V., Subha S., Balamurugan B. Electronic Government 1740-7494
14 an overview of web socket: the future real time communication Dr.M.P.vani bhumji International journal of engineering and technology 2395-0056
15 Adaptive cruise control and cooperative cruise control in real life traffic situation Ravikumar C.V., Venugopal P., Jagannadha Naidu K., Satheesh Kumar S., Koppu S. International Journal of Mechanical Engineering and Technology 0976-6340
16 Encrypted image-based data hiding technique using elliptic curve ElGamal cryptography Jayanthi R., John Singh K. International Journal of Reasoning-based Intelligent Systems 1755-0556
17 A Fuzzy Linguistic Approach-Based Non-malicious Noise Detection Algorithm for Recommendation System Sharon Moses J., Dhinesh Babu L.D. International Journal of Fuzzy Systems 1562-2479
18 A case study on partial homomorphic encryption: Breast cancer diagnosis Sushmetha N., Vairamuthu S., Selvarani B. International Journal of Pure and Applied Mathematics 1311-8080
19 Optimization of QoS parameters using scheduling techniques in heterogeneous network Chandra I., Prabha K.H., Sivakumar N. Personal and Ubiquitous Computing 1617-4909
20 DTCF: Deadline task consolidation first for energy minimisation in cloud data centres Sanjeevi P., Viswanathan P. International Journal of Networking and Virtual Organisations 1470-9503
21 A fuzzy-based decision-making broker for effective identification and selection of cloud infrastructure services Nagarajan R., Thirunavukarasu R. Soft Computing 1432-7643
22 A case study on commending user in social media based on user information and rating of product in interface forums Deepa M., Santhi K., Lawnyashri M., Malar M.B.B.A., Priya G., Mon F.A. International Journal of Civil Engineering and Technology 0976-6308
23 Density Based Traffic Management Using IoT M Pounambal K Lalitha International Journal of Pure and Applied Mathematics 1314-3395
24 Coagulation attacks over networked UAVs: concept, challenges, and research aspects Vishal Sharma., Dushantha Nalin K. Jayakody., Kathiravan Srinivasan., Ravinder Kumar International Journal of Engineering & Technology 2227-524X
25 Energy-efficient border intrusion detection using pipeline monitoring system Jeevitha K., Manivannan S.S. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
26 Optimized approach for data sharing in WRN using NS2 simulation Shalini R., Manivannan S.S. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
27 Dimensionality reduced local directional number pattern for face recognition Srinivasa perumal ramalingam., Chandra mouli paturu venkata subbu sita rama Journal of Ambient Intelligence and Humanized Computing 1868-5137
28 Hybrid rough fuzzy soft classifier based multi-class classification model for agriculture crop selection Deepa N., Ganesan K. Soft Computing 1432-7643
29 Machine learning based approach for pothole detection Karmel A., Adhithiyan M., Senthil Kumar P. International Journal of Civil Engineering and Technology 0976-6308
30 Heart disease classification system using optimised fuzzy rule based algorithm Reddy G.T., Khare N. International Journal of Biomedical Engineering and Technology 1752-6418
31 Optimized feature extraction for precise sign gesture recognition using Self-Improved Genetic Algorithm Kaluri R., Reddy C.H.P. International Journal of Engineering and Technology Innovation 2223-5329
32 Concept Lattice Simplification in Formal Concept Analysis Using Attribute Clustering K. S., Ch. A.K. Journal of Ambient Intelligence and Humanized Computing 1868-5137
33 Stock Prediction Using Machine-Learning Algorithms Jayavel, Senthil Rathore, Arpit Sadhasivam, Jayakumar International Journal of Engineering and Advanced Technology 22498958
34 Agent Based Hybrid Routing Protocol for Vehicular Ad Hoc Networks Dr. P.S.Nithyadharshini1 , Dr. SanthiyaKumari2 and * Dr. M.Pounambal3 International Journal of Pure and Applied Mathematics 1314-3395
35 An empirical study on peer-to-peer sharing of resources in mobile cloud environment Nadesh R.K., Aramudhan M. International Journal of Electrical and Computer Engineering 2088-8708
36 A survey of block chain technology for digitization in india Manikandan N., Vijayakumar K., Anusha K. International Journal of Civil Engineering and Technology 0976-6308
37 Software Effort Estimation Techniques E J Sai Pavan Chowdary R Charanya International Journal for Research in Applied Science & Engineering Technology (IJRASET) 23219653
38 TSCBA-A Mitigation System for ARP Cache Poisoning Attacks Prabadevi, B; Jeyanthi, N; Cybernetics and Information Technologies 1311-9702
39 Analytical Model for Sybil Attack Phases in Internet of Things Mishra A.K., Tripathy A.K., Puthal D., Yang L.T. IEEE Internet of Things Journal 2327-4662
40 A walk-through: complete survey on blood pressure monitoring devices and applications Jeyanthi, N; Thandeeswaran, R; Gokulnath, BV; Biomedical Research 0970-938X
41 Haloop approach for concept generation in formal concept analysis Chunduri R.K., Cherukuri A.K. Journal of Information and Knowledge Management 0219-6492
42 A cloud broker framework for infrastructure service discovery using semantic network Nagarajan R., Thirunavukarasu R., Shanmugam S. International Journal of Intelligent Engineering and Systems 2185-310X
43 A framework to mitigate ARP sniffing attacks by cache poisoning Prabadevi B., Jeyanthi N. International Journal of Advanced Intelligence Paradigms 1755-0386
44 Recommendation systems: A beginner's perspective Selva Rani B., Ananda Kumar S. International Journal of Pure and Applied Mathematics 1311-8080
45 Region-specific multi-attribute white mass estimation-based mammogram classification Padmavathy T.V., Vimalkumar M.N., Sivakumar N. Personal and Ubiquitous Computing 1617-4909
46 Intrusion detection model using feature extraction and LPBoost technique Thaseen I.S., Kumar Ch.A. International Journal of Internet Technology and Secured Transactions 1748-569X
47 Detection of Intrusion by Stochastic Gradient Descent and K-means Clustering Suraj Saha., Riya Shaji., Abhijeet Giri., John Singh. K Research article -
48 A framework for prediction using rough set and real coded genetic algorithm Rathi R., Acharjya D.P. Arabian journal of science and engineering 2193-567X
49 Decision support systems - An overview Rahamathunnisa U., Chellappa B. International Journal of Mechanical Engineering and Technology 0976-6340
50 An automated detection of human disease using supervised learning method Manivannan S.S., Lakshmi S.K. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
51 TRAM-based VM handover with dynamic scheduling for improved QoS of cloud environment Nadesh R.K., Aramudhan M. International Journal of Internet Technology and Secured Transactions 1748-569X
52 A Fuzzy-Based Intelligent Cloud Broker with MapReduce Framework to Evaluate the Trust Level of Cloud Services Using Customer Feedback Nagarajan R., Thirunavukarasu R., Shanmugam S. International Journal of Fuzzy Systems 1562-2479
53 Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing Shynu P.G., Singh K.J. International Journal of Embedded Systems 1741-1068
54 Energy-Aware task scheduling using hybrid Firefly-BAT (FFABAT) in Big data Senthilkumar M. Cybernetics and Information Technologies 1311-9702
55 Intelligent intrusion detection system using temporal analysis and type-2 fuzzy neural classification Rama Prabha K.P., Jeyanthi N. International Journal of Internet Technology and Secured Transactions 1748-569X
56 Arranging job flow on hadoop Navaneethan C., Meenatchi S., Iyapparaja M., Thanapal P. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
57 Maching language prediction algorithm for crypto currency Prasanna M., Iyapparaja M., Thanapal P., Navaneethan C., Meenatchi S. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
58 The sequence way of performance analysis for device to device communication Meenatchi S., Navaneethan C., Iyapparaja M., Thanapal P., Suganya P. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
59 Case study on big data inspection in pharmaceutical services Iyapparaja M., Prasanna M., Thanapal P., Meenatchi S., Navaneethan C. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
60 BMAQR: Balanced multi attribute QoS aware replication in HDFS Kumar P.J., Ilango P. International Journal of Internet Technology and Secured Transactions 1748-569X
61 Angle Based Energy and Power Efficient Node Detection Routing Protocol for MANET Jayalakshmi Periyasamy., R. Saravanan. Recent Patents on Computer Science 1874-4796
62 Vehicular Cloud for Smart Driving Using Internet of Things Vijayarangam S., Megalai J., Krishnan S., Nagarajan S., Devi M.R., Lokesh S. Journal of Medical Systems 0148-5598
63 Visualizing trade-off between performance and energy in parallel computations Maheswari G.U., Subha S. Journal of Computational and Theoretical Nanoscience 1546-1955
64 Walsh Hadamard kernel-based texture feature for multimodal MRI brain tumour segmentation Angulakshmi M., Lakshmi Priya G.G. International Journal of Imaging Systems and Technology 0899-9457
65 Multi-Layer Cluster Based Energy Aware Routing Protocol for Internet of Things Sankar, S.; Srinivasan, P. Cybernetics and Information Technologies 1311-9702
66 An intelligent neuro-genetic framework for effective intrusion detection Rama Prabha K.P., Jeyanthi N. International Journal of Reasoning-based Intelligent Systems 1755-0556
67 An improved carry save adder design S Subha International Journal of Advanced Science and Research 2455-4227
68 A novel recommender system based on FFT with machine learning for predicting and identifying heart diseases Narayan S., Sathiyamoorthy E. Neural Computing and Applications 0941-0643
69 Calorie Measurement Predicting the Nutrient Content of Food using image Analysis Thamarai, Nivetha, P.M. Durai Raj Vincent, S.S. Manivannan Research Journal of Pharmacy and Technology 0974-3618
70 Internet of Things Based Digital Lock System S Sankar., P Srinivasan Journal of Computational and Theoretical Nanoscience 1546-1955
71 The significance of holographic data storage in cost effective and faster data transfer rates Bhavani S., Chhabra S. International Journal of Civil Engineering and Technology 0976-6308
72 Region-based colour image spatial fusion steganographic system PV Krishna., P Viswanathan International Journal of Multimedia Intelligence and Security 2042-3462
73 Link stable routing with minimal delay nodes for MANETs P Jayalakshmi., R Saravanan International Journal of Social and Humanistic Computing 1752-6124
74 Providing privacy and dimensional search on longitudinal data using safe computing: A case study Deepa M., Santhi K., Lawnya Shri M., Benjula Anbu Malar M.B., Priya G., Mon F.A. International Journal of Civil Engineering and Technology 0976-6308
75 Fuzzy Logic Based Energy Aware Routing Protocol for Internet of Things S.Sankar., P.Srinivasan International Journal Intelligent Systems and Applications 2074-904X
76 A reference model for testing internet of things based applications Jacob P.M., Mani P. Journal of Engineering Science and Technology 1823-4690
77 A review on graph-based semi-supervised learning methods for hyperspectral image classification Sawant S.S., Prabukumar M. Egyptian Journal of Remote Sensing and Space Science 1110-9823
78 Quantum aspects of high dimensional formal representation of conceptual spaces M S Ishwarya., Aswani Kumar Cherukuri Artificial Intelligence 1694-0814
79 Ant colony optimization algorithm with Internet of Vehicles for intelligent traffic control system Kumar P.M., Devi G U., Manogaran G., Sundarasekar R., Chilamkurti N., Varatharajan R. Computer Networks 1389-1286
80 Software architecture pattern selection model for internet of things based systems Jacob P.M., Mani P. IET Software 1751-8806
81 Secure wireless communication and surveillance system Swarnalatha P., Anandakumar S., Vairamuthu S., Priya S.R.M., Sathyaraj R. International Journal of Civil Engineering and Technology 0976-6308
82 Self service software Vijay Anand R., Prabhu J., Jayalakshmi P. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
83 Semantic filtering and event extraction of twitter streams through RDF and SPARQL Kumar N.S., Dinakaran M. International Journal of Computer Information Systems and Industrial Management Applications 2150-7988
84 Smart green resource conservation approach for smart IoT cloud Shanmugam G.S., Shantharajah S.P., Sriman Narayana Iyengar N.C. Journal of Computational and Theoretical Nanoscience 1546-1955
85 Smart home-control and monitoring system for power and security management Gami M., Brindha K., Sudha S., Thandeeswaran R., Priya M. International Journal of Civil Engineering and Technology 0976-6308
86 Secure big data storage using training dataset filtering-K nearest neighbour classification with elliptic curve cryptography Ezhilarsan E., Dinakaran M. Journal of Computational and Theoretical Nanoscience 1546-1955
87 Scalable formal concept analysis algorithms for large datasets using Spark Chunduri R.K., Cherukuri A.K. Journal of Ambient Intelligence and Humanized Computing 1868-5137
88 An improved tumour identification with Gabor Wavelet segmentation Chowdhary C.L., Das T.K., Gurani V., Ranjan A. Research Journal of Pharmacy and Technology 0974-3618
89 An efficient implementation of mobile Raspberry Pi Hadoop clusters for Robust and Augmented computing performance Srinivasan K., Chang C.-Y., Huang C.-H., Chang M.-H., Sharma A., Ankur A. Journal of Information Processing Systems 1976-913X
90 Three-dimensional discrete cosine transform-based feature extraction for hyperspectral image classification Prabukumar M., Sawant S., Samiappan S., Agilandeeswari L. Journal of Applied Remote Sensing 1931-3195
91 Spam review detection on e-commerce sites Nandhini G., Muthamilselvan T., Alagiri I., Thanapal P. International Journal of Civil Engineering and Technology 0976-6308
92 Survey on data analytics techniques in healthcare using IOT platform Babu G.C., Shantharajah S.P. International Journal of Reasoning-based Intelligent Systems 1755-0556
93 Role based access control design using three-way formal concept analysis Subramanian C.M., Cherukuri A.K., Chelliah C. International Journal of Machine Learning and Cybernetics 1868-8071
94 Removing leaf petioles and auto locating apex-base points using straight line interpolation and bisection Visu P., Sivakumar N., Kumaresan P., Yokesh Babu S., Ramesh P.S. Multimedia Tools and Applications 1380-7501
95 Query expansion using named entity disambiguation for a question-answering system Kandasamy S., Cherukuri A.K. Concurrency Computation 1532-0626
96 Public key cryptography using sphere and spheroid John Singh K., Gagneja K. International Journal of Communication Networks and Distributed Systems 1754-3916
97 A new Quantum Tunneling Particle Swarm Optimization algorithm for training feedforward neural networks Geraldine Bessie Amali D., Dinakaran M. International Journal of Intelligent Systems and Applications 2074-904X
98 Providing cyber security using machine learning for social networks Sheba Pari N., Chandrababu M., Senthil Kumar K. Indian Journal of Public Health Research and Development 0976-0245
99 Smart home observing and control security system: A case study Santhi K., Deepa M., Shri M.L., Malar M.B.B.A., Priya G., Mon F.A. International Journal of Civil Engineering and Technology 0976-6308
100 Evaluating the performance of supervised classification models: Decision tree and Naïve Bayes Using KNIME Basha S.M., Rajput D.S., Poluru R.K., Bharath Bhushan S., Basha S.A.K. International Journal of Engineering and Technology(UAE) 2227-524X
101 Lattice based Conceptual Spaces to Explore Cognitive Functionalities for Prosthetic Arm MS Ishwarya., Aswani Kumar Cherukuri Artificial Intelligence 1694-0814
102 On the positioning likelihood of UAVs in 5G networks Sharma V., Jayakody D.N.K., Srinivasan K. Physical Communication 1874-4907
103 Curvelet transform based feature extraction and selection for multimedia event classification Kanagaraj K., Priya G.G.L. Journal of King Saud University - Computer and Information Sciences 1319-1578
104 Online social networking services and spam detection approaches in opinion mining – A review Rani M.S., Sumathy S. International Journal of Web Based Communities 1477-8394
105 Design and implementation of energy efficient reconfigurable networks (WORN-DEAR) for BAN in IOT environment (BIOT) Kumaresan P., Prabukumar M. International Journal of Reasoning-based Intelligent Systems 1755-0556
106 Diagnosing sudden and gradual drifts in business process Thanapal P., Meenatchi S., Navaneethan C., Iyapparaja M., Prasanna M. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
107 Public key encryption for SAFE transfer of one time password Thirumalai C., Budugutta S. International Journal of Pure and Applied Mathematics 1311-8080
108 Cluster-based EA-PATM protocol for energy consumption in hierarchical WSNs Meenatchi S., Prabu S. International Journal of Reasoning-based Intelligent Systems 1755-0556
109 Online compilers for android using mobile cloud computing Vijayan R., Mareeswari V., Gunesekaran G., Balasubramanian V., Senthil Kumar R. International Journal of Civil Engineering and Technology 0976-6308
110 Parsing based sarcasm detection from literal language in tweets Basha S.M., Rajput D.S. Recent Patents on Computer Science 2213-2759
111 Predicting dispersion of radionuclides through parallel approach Uma Maheswari, G., Subha, S ProProgress in Industrial Ecology, An International Journal 1476-8917
112 Future of Storage Technologies Bhavani S, Charanya R, Mahadevan R, Malathy E, Priya M International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
113 Octagonal picture languages Govindaraj R., Mahendran A. International Journal of Reasoning-based Intelligent Systems 1755-0556
114 Nano drive: Privacy preserving decentralized storage Seetha R., Malisetty N. International Journal of Mechanical Engineering and Technology 0976-6340
115 MAFONN-EP: A Minimal Angular Feature Oriented Neural Network based Emotion Prediction system in image processing Krithika L.B., Lakshmi Priya G.G. Journal of King Saud University - Computer and Information Sciences 1319-1578
116 IoT based smart garbage collector for smart cities Rajaprabha M.N., Jayalakshmi P., Anand R.V., Asha N. International Journal of Civil Engineering and Technology 0976-6308
117 A survey: energy-efficient sensor and VM selection approaches in green computing for X-IoT applications Mekala M.S., Viswanathan P. International Journal of Computers and Applications 1206-212X
118 Forecasting yield by integrating agrarian factors and machine learning models A survey Dhivya Elavarasan, Durai Raj Vincent, Vishal Sharma, Albert Y. Zomaya, Kathiravan Srinivasan Computers and Electronics in Agriculture 0168-1699
119 Proficient information method for inconsistency detection in multiple data sources Bazeer Ahamed B., Ramkumar T. International Journal of Artificial Intelligence 0974-0635
120 Properties of multigranular rough sets on fuzzy approximation spaces and their application to rainfall prediction Tripathy B.K., Bhambhani U. International Journal of Intelligent Systems and Applications 2074-904X
121 Machine Learning and Deep Learning Methods in Heart Disease (HD) Research Kusuma S, Divya Udayan J International Journal of Pure and Applied Mathematics 0972-9828
122 Integrated Intrusion Detection Model Using Chi-Square Feature Selection and Ensemble of Classifiers I. Sumaiya Thaseen., Ch. Aswani Kumar., Amir Ahmad Arabian Journal for Science and Engineering 1319-8025
123 A scaled-down neural conversational model for chatbots Mathur S., Lopez D. Concurrency Computation 1532-0626
124 Image anonymization using clustering with pixelization Ria. Elin Thomas., Sharmila K. Banu., B. K. Tripathy International Journal of Engineering & Technology 2227-524X
125 Internet of Things based Ambient assisted living for Elderly People Health Monitoring S. Sankar., P. Srinivasan., R. Saravanakumar Research Journal of Pharmacy and Technology 0974-3618
126 Energy and Load Aware Routing Protocol for Internet of Things S Sankar., P Srinivasan International Journal of Advances in Applied Sciences 2252-8814
127 A study of handwritten characters recognition through neural networks using data mining approaches Bothra G., Bhattacharya S., Deepa P. International Journal of Mechanical Engineering and Technology 0976-6340
128 Comparison of multi-criteria recommendation system for improving accurate prediction Sandeepkumar M., Prabhu J. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
129 A survey, design and analysis of IoT security and QoS challenges Kesavan M., Prabhu J. International Journal of Information System Modeling and Design 1947-8186
130 A review on various sniffing attacks and its mitigation techniques Prabadevi B., Jeyanthi N. Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
131 Predicting user behaviour on E-Commerce site using Ann Srinivas A.S., Ramasubbareddy S., Manivannan S.S., Govinda K. International Journal of Engineering and Technology(UAE) 2227-524X
132 Non-Intrusive Transaction Aware Filtering During Enterprise Application Modernization Ravikumar Ramadoss., N. M. Elango., Satheesh Abimannan., Ching-Hsien Hsu Journal of Supercomputing 0920-8542
133 Privacy-preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing P.G. Shynu., K. John Singh International Journal of Embedded Systems 1741-1068
134 Band clustering using expectation-maximization algorithm and weighted average fusion-based feature extraction for hyperspectral image classification Prabukumar M., Shrutika S. Journal of Applied Remote Sensing 1931-3195
135 Classification of breast abnormality using decision tree based on GLCM features in mammograms Kamalakannan J., Babu M.R. International Journal of Computer Aided Engineering and Technology 1757-2657
136 An amoeboid approach for identifying optimal citation flow in big scholarly data network Nivash J.P., Dhinesh Babu L.D. International Journal of Communication Systems 1074-5351
137 PFB+- tree for big data memory management system Santhi K., Chellatamilan T., Valarmathi B. Indian Journal of Public Health Research and Development 0976-0245
138 Performing item-based recommendation for mining multi-source big data by considering various weighting parameters Thillainayagam V., Kunjithapatham S., Thirunavukarasu R. International Journal of Engineering and Technology(UAE) 2227-524X
139 A supervised aspect level sentiment model to predict overall sentiment on tweeter documents Basha S.M., Rajput D.S. International Journal of Metadata, Semantics and Ontologies 1744-2621
140 A Diabetes Case Management Study in a Rural Setting in India Radhakrishnan, S.Email Author, Rajakumar, C.A., Radhakrishnan, B. Professional Case Management 19328087
141 Predicting justice delivery time using Machine learning Megha Kanwar ,Prabhavathy.P International Journal of Pure and Applied Mathematics 1314-3395
142 A Cloud Based Natural Hazard Detection and Warning System Nishanth A, Vanmathi C International Journal of Research and Scientific Innovation (IJRSI) 2321-2705
143 Smart Home Automation in Air Conditioning using Data Mining and Image Processing Ishaan Arora, Vanmathi C, International Journal of Engineering Trends and Technology (IJETT) 2231-5381
144 Detecting Streaming of Twitter Spam Using Hybrid Method Senthil Murugan N., Usha Devi G. Wireless Personal Communications 0929-6212
145 A complete survey on blood pressure monitoring devices and applications Thandeeswaran R Jeyanthi N, Gokulnath BV Biomedical Research 0970-938X
146 Advanced Vehicle Safety and Monitoring System, Akhil Sharma, Vanmathi C International Journal of Engineering Science Invention Research & Development 2349-6185
147 Transportation Service System for Grocery Kart using Genetic Algorithm Deepank Kartikey, Vanmathi C International Journal of Engineering Trends and Technology (IJETT) 2231-5381
148 Weighing Type Rain Gauge with Weather Monitoring System Rajkumar R, Vanmathi C, International Journal of Research and Scientific Innovation (IJRSI) 2321-2705
149 Design and development of exponential lion algorithm for optimal allocation of cluster resources in cloud Devagnanam J., Elango N.M. Cluster Computing 1386-7857
150 ENCRYPTION AND DECRYPTION OF GRAY SCALE IMAGES USING SCALABLE CODING MECHANISM K.UMA International Journal of Mechanical Engineering and Technology (IJMET) 0976-6340
151 Comparative study on dimensionality reduction for disease diagnosis using fuzzy classifier Sujatha, R., Ephzibah, E.P., Dharinya, S., Uma Maheswari, G., Mareeswari, V., Pamidimarri, V. International Journal of Engineering and Technology(UAE) 2227524X
152 Analyzing Gene Expression Data By Using Crfm-Covering Rough Set Fuzzy C-Medoids Clustering Approach Avulapalli Jayaram Reddy, B.K Tripathy Journal of Web Engineering 1540-9589
153 WhaleRank: An optimisation based ranking approach for software requirements prioritisation Anand R.V., Dinakaran M. International Journal of Environment and Waste Management 1478-9876
154 Predictive mathematical model for solving multi-criteria decision-making problems Deepa N., Ganesan K., Sethuramasamyraja B. Neural Computing and Applications 0941-0643
155 Performance analysis of pre-cancerous mammographic image enhancement feature using non-subsampled shearlet transform Padmavathy T.V., Vimalkumar M.N., Nagarajan S., Babu G.C., Parthasarathy P. Multimedia Tools and Applications 1380-7501
156 In-Mapper combiner based MapReduce algorithm for processing of big climate data Manogaran G., Lopez D., Chilamkurti N. Future Generation Computer Systems 0167-739X
157 An Interval valued fuzzy soft set based optimization algorithm for high yielding seed selection Sooraj T.R., Tripathy B.K. International Journal of Fuzzy System Applications 2156-177X
158 Design of I-shaped dual C-slotted rectangular microstrip patch antenna (I-DCSRMPA) for breast cancer tumor detection Padmavathy T.V., Venkatesh P., Bhargava D., Sivakumar N. Cluster Computing 1386-7857
159 IOT BASED SMART GARBAGE COLLECTOR FOR SMART CITIES M N Rajaprabha, P Jayalakshmi, R Vijay Anand and N Asha International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
160 Energy saving offloading scheme for mobile cloud computing using CloudSim Thanapal P., Durai M.A.S. International Journal of Advanced Intelligence Paradigms 1755-0386
161 Walsh Hadamard kernel‐based texture feature for multimodal MRI brain tumour segmentation M. Angulakshmi, G. G Lakshmi Priya International Journal of Imaging Systems and Technology 1098-1098
162 Brain tumour segmentation from MRI using superpixels based spectral clustering Angulakshmi, M., Lakshmi Priya, G.G Journal of King Saud University - Computer and Information Sciences. Elsevier 1319-1578
163 An intelligent decision support system to prevent and control of dengue Lopez D., Manogaran G., Varatharajan R., Abbas K.M. Journal of Ambient Intelligence and Humanized Computing 1868-5137
164 Experimenting with runtime and energy tradeoffs in high-performance computing G Uma Maheswari, S Subha , Progress in Industrial Ecology12(1-2), pp. 154-163 1476-8917
165 Resourceful Investigte Encryption Method using Data Hunt in Mobile Cloud Service A. S. Syed Navaz , Asha. N , Vanmathi Chandrasekaran , J. Jayashree ARPN Journal of Engineering and Applied Sciences 1819-6608
166 Embarrassingly parallel GPU based matrix inversion algorithm for big climate data assimilation Varalakshmi M., Kesarkar A.P., Lopez D. International Journal of Grid and High Performance Computing 1938-0259
167 A Review on Utilizing Queuing Models for Improving Performance in Cloud M. Sathish Kumar, M. Iyappa Raja Jour of Advance Research in Dynamical & Control Systems 1943-023X
168 RFID BASED AUTOMATED GATE SECURITY SYSTEM Asha. N, A. S. Syed Navaz, J. Jayashree and J. Vijayashree ARPN Journal of Engineering and Applied Sciences 1819-6608
169 Detecting spams in social networks using ML algorithms �€“ a review Murugan N.S., Devi G.U. International Journal of Environment and Waste Management 1478-9876
170 Face Recognition and Detection with New Image Enhancement Techniques A.S.Syed Navaz and Asha. N Jour of Adv Research in Dynamical & Control Systems 1943-023X
171 Applying Knowledge Based Heuristic Method for Efficient Test Automation Asha. N and Prasanna Mani Jour of Adv Research in Dynamical & Control Systems 1943-023X
172 Knowledge-based Acceptance Test driven agile Approach for Quality Software Development Asha. N and Prasanna Mani International Journal of Recent Technology and Engineering (IJRTE) 2277-3878
173 Efficient routing based on core relay intermediate nodes in MANET Jayalakshmi P., Saravanan R. Electronic Government 1740-7494
174 Earthquake analysis: Visualizing seismic data with python Tulsyan S., Bahl B., Kaya S., Reddy G.T. Lecture Notes in Computational Vision and Biomechanics 2212-9391
175 A novel approach to perform analysis and prediction on breast cancer dataset using R Basha S.M., Rajput D.S., Iyengar N.C.S.N., Caytiles R.D. International Journal of Grid and Distributed Computing 2005-4262
176 WIRELESS HEALTH ACQUISITION SYSTEM USING INTERNET OF THINGS Dr.K.Uma International Journal of Mechanical Engineering and Technology (IJMET) 0976-6340
177 RESOURCEFUL INVESTIGATE ENCRYPTION METHOD USING DATA HUNT IN MOBILE CLOUD SERVICE A. S. Syed Navaz, Asha. N, Vanmathi Chandrasekaran and J. Jayashree ARPN Journal of Engineering and Applied Sciences 1819-6608
178 Group Decision Making through Interval Valued Intuitionistic Fuzzy Soft Sets BK Tripathy., TR Sooraj., RK Mohanty., A Panigraghi International Journal of Fuzzy System Applications 2156-177X
179 Implementation of moving object detection and categorization from hevc compressed surveillance video Kruthi S., Kamalakannan J. International Journal of Mechanical Engineering and Technology 0976-6340
180 BGFS: Design and development of brain genetic fuzzy system for data classification Chandrasekar Ravi., Neelu Khare Journal of Intelligent Systems 0334-1860
181 Neighborhood Rough-Sets-Based Spatial Data Analytics Sharmila Banu K.., B. K. Tripathy Encyclopedia of Information Science and Technology, Fourth Edition -
182 A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks Rama Prabha K.P., Jeyanthi N. Wireless Personal Communications 0929-6212
183 Tracking eye center location based on inner product detector MythiliBoopathi , Nivetha R Journal of International Pharmaceutical Research 1674-0440
184 Smart City Based on Cloud Computing and IoT Mythili BoopathiS. Pati International Journal of Civil Engineering and Technology 0976-6308
185 Comparison of NoSQL Database and Traditional Database-An emphatic analysis M. Sandeep Kumar., Prabhu. J INTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION 2549-9610
186 A Survey of Big Data Analytics Using Machine Learning Algorithms usha moorthy., usha devi gandhi HCI Challenges and Privacy Preservation in Big Data Security 15225-28636
187 Future of storage technologies Bhavani, S., Charanya, R., Mahadevan, R., Malathy, E., Priya, M. International Journal of Civil Engineering and Technology 0976-6308
188 Robust Face Recognition Using Enhanced Local Binary Pattern Srinivasa Perumal R., Nadesh R. K., Senthil Kumar N. C Bulletin of Electrical Engineering and Informatics 2089-3191
189 Optimization of Seed Selection for Higher Product using Interval Valued Hesitant Fuzzy Soft sets BK Tripathy., Sooraj.T.R Songklanakarin Journal of Science and Technology 0125-3395
190 Experimenting with runtime and energy tradeoffs in high-performance computing Uma Maheswari, G., Subha, S Progress in Industrial Ecology 1476-8917
191 Enhancing security for end users in cloud computing environment using hybrid encryption technique Nadesh R.K., Srinivasa Perumal R., Shynu P.G., Gaurav Sharma1 International Journal of Engineering and Technology 0975-4024
192 ONLINE COMPILERS FOR ANDROID USING MOBILE CLOUD COMPUTING Vijayan R, Mareeswari V, Gunesekaran G,Balasubramanian V,Senthil Kumar R International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
193 Mapping USE Specifications into Spec# Jagadeeswaran T Senthilkumaran U Software Technologies: Applications and Foundations 0302-9743
194 A risk-centric defensive architecture for threat modelling in e-government application Venkatasen M., Mani P. Electronic Government 1740-7494
195 Model Reusability and Multidirectional Transformation using Unified Metamodel Jagadeeswaran T, Senthilkumaran U IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER) 1854-8419
196 Quick fix for obstacles emerging in management recruitment measure using IOT-based candidate selection Nallakaruppan, M.K., Senthil Kumaran, U. Service Oriented Computing and Applications 18632386
197 Verification of Cloud Based Information Integration Architecture using Colored Petri Nets Murale Narayanan., Aswani Kumar Cherukuri International Journal of Computer Network and Information Security -
198 Secure big data storage using training dataset filtering-K nearest neighbour classification with elliptic curve cryptography Ezhilarsan E, Dinakaran M Journal of Computational and Theoretical Nanoscience 15461955
199 D‐ConvNet: Deep learning model for enhancement of brain MR images Kathiravan Srinivasan, Vishal Sharma, DNK Jayakody, Durai Raj Vincent Basic & Clinical Pharmacology & Toxicology -
200 Robust design and validation of balanced tournaments via Hamiltonian path Kathiravan Srinivasan, Desh Deepak Pathak Ravinder Kumar, Durai Raj Vincent, Chuan-Yu Chang Journal of Information and Optimization Sciences 0252-2667
201 Semantic filtering and event extraction of twitter streams through RDF and SPARQL Kumar, NS, Dinakaran, M International Journal of Computer Information Systems and Industrial Management Applications 21507988
202 Design and development of microstrip patch antenna with circular and rectangular slot for structural health monitoring Padmavathy T.V., Bhargava D.S., Venkatesh P., Sivakumar N. Personal and Ubiquitous Computing 1617-4909
203 Propels in compiler construction for versatile figuring Ezilarasan, E, Dinakaran, M, Boominathan P, Krishnamoorthy, A, Naresh, K International Journal of Internet Technology and Secured Transactions 1748569
204 An adaptive fault tolerance mechanism in Grid computing Nithyadharshini P.S., Pounambal M., Nagaraju D., Saritha V. ARPN Journal of Engineering and Applied Sciences 1819-6608
205 PSPO: a framework for cost-effective service placement optimisation during enterprise modernisation on hybrid clouds Ravikumar Ramadoss., N.M. Elango., A. Satheesh., Ching-Hsien Hsu International Journal of Web and Grid Services 1741-1106
206 A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases Kumar P.M., Devi Gandhi U. Computers and Electrical Engineering 0045-7906
207 An optimized feature selection based on genetic approach and support vector machine for heart disease Gokulnath C.B., Shantharajah S.P. Cluster Computing 1386-7857
208 An Efficient and Secure Content Contribution and Retrieval content in Online Social Networks using Level-level Security Optimization and Content Visualization Algorithm Kumaran Umapathy., Neelu Khare Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
209 Performance Analysis of Clustering Algorithm in Data Mining in R Language Avulapalli Jayaram Reddy, Balakrushna Tripathy , Seema Nimje, Communications in Computer and Information Science 1865-0929
210 Load balancing prototype for cost proficient fault tolerant geo-distributed datacenters Anusha, K., Manikandan, N., Nallakaruppan, M.K., Rahamathunnissa, U. Journal of Advanced Research in Dynamical and Control Systems 1943-023X
211 Application of Soft Set in Game Theory B. K. Tripathy Sooraj., T. R. Radhakrishna., N. Mohanty Encyclopedia of Information Science and Technology, Fourth Edition -
212 Secure Group Key Sharing Protocols and Cloud System Vaishali Ravindra Thakar., John Singh K Encyclopedia of Information Science and Technology, Fourth Edition -
213 Secure data storage in cloud computing to avoiding some cipher text attack Gundala Swathi., Gundala Swathi JOURNAL OF INFORMATION and OPTIMIZATION SCIENCES 0252-2667
214 Optimal Decision Tree Fuzzy Rule-Based Classifier (ODT-FRC) For Heart Disease Prediction Using Improved Cuckoo Search Algorithm Subhashini Narayan, Jagadeesh Gobal International Journal of Business Intelligence and Data Mining 1743-8187
215 Brain tumour segmentation from MRI using superpixels based spectral clustering Angulakshmi M., Lakshmi Priya G.G. Journal of King Saud University - Computer and Information Sciences 1319-1578
216 Depth Impurity Pruned Strategies for Extracting High Utility Itemsets K. Santhi1*, B.Valarmathi2, T.Chellatamilan3 International Journal of Engineering & Technology 2227-524X
217 Software Project Management Risk Management Literature Review CHARANYA R International Journal for Research in Applied Science & Engineering Technology (IJRASET) -
218 Student performance dashboard using mining approach Suganya D., Kumar K., Ramesh P.S., Suganthan C. International Journal of Pure and Applied Mathematics 1311-8080
219 Predicting life time of heart attack patient using improved c4.5 classification algorithm Jothikumar R., Susi S., Sivakumar N., Ramesh P.S. Research Journal of Pharmacy and Technology 0974-3618
220 Scheduling tasks using Bat's algorithm in cloud sim Gitanjali J., Sathiyamoorthi E., Mummadisetti A., Dammu R.S., Kadari R.R. International Journal of Pure and Applied Mathematics 1311-8080
221 Survey on the role of IoT in intelligent transportation system Varun Chand H., Karthikeyan J. Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
222 Comparative study on dimensionality reduction for disease diagnosis using fuzzy classifier Sujatha R., Ephzibah E.P., Dharinya S., Uma Maheswari G., Mareeswari V., Pamidimarri V. International Journal of Engineering and Technology(UAE) 2227-524X
223 An empirical machine learning approach to extract and rank multi-word product names using iCIW approach Sivashankari R., Valarmathi B. Journal of Engineering Science and Technology 1823-4690
224 Parallel AES algorithm for performance improvement in data analytics security for IoT Manikandan N., Subha S. International Journal of Networking and Virtual Organisations 1470-9503
225 A Study of Handwritten Characters Recgnition through Neural Networks using Data Mining approaches Gaurav Bothra, Sweta Bhattacharya and Deepa P. International Journal of Mechanical Engineering and Technology 09766340
226 Secure medical data transmission by using collaborative neighbour based method in WBAN Devi L., Shantharajah S.P. World Review of Science, Technology and Sustainable Development 1741-2242
227 , Predicting dispersion of radionuclides through parallel approach G Uma Maheswari, S Subha Progress in Industrial Ecology 12(1-2), pp. 35-45 1476-8917
228 Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles Priyan M.K., Devi G.U. Cluster Computing 1386-7857
229 One-Dimension Force Balance System for Hypersonic Vehicle an experimental and Fuzzy Prediction Approach Kalaiarassan G., Krishan., Somanadh M., Thirumalai C., Senthil Kumar M. Materials Today: Proceedings 2214-7853
230 A SURVEY ON IMPLEMENTATION METHODS AND APPLICATIONS OF SENTIMENT Sudheer K and B.Valarmathi International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
231 Stout unidirectional face recognition system in hands of DRBF methodology Sudhan M., Dharun V.S., Swarna Priya R.M. International Journal of Pure and Applied Mathematics 1311-8080
232 Software Project Management Risk Management Literature Review CHARANYA R International Journal of Innovative Science and Research Technology(IJISRT) -
233 Secured cloud banking transactions using two-way verification process Anitha A., Varalakhshmi M., Mary Mekala A., Subashanthini., Thilagavathy M. International Journal of Civil Engineering and Technology 0976-6308
234 A rule based classifcation for vegetable production using rough set and genetic algorithm Rathi R., Acharjya D.P. International Journal of Fuzzy System Applications 2156-177X
235 Modified dimensionality reduced local directional pattern for facial analysis Srinivasa Perumal R, Chandra Mouli P.V.S.S.R Journal of Ambient Intelligence and Humanized Computing 1868-5137
236 Group and hierarchical key management for secure communications in internet of things Karrothu A., Norman J. International Journal of Communication Systems 1074-5351
237 Dr. Cloud- IOT Based Health Monitoring System Aditya Shukla, Vanmathi C International Journal of Scientific Research in Computer Sciences and Engineering 2456-3307
238 A survey on applications of internet of things in healthcare domain Mugauri P.C., Aravind K., Deshmukh A., Vhansure F., Kavitha B.R. Research Journal of Pharmacy and Technology 0974-3618
239 Security strategies for cloud identity management - a study Anilkumar C., Sumathy S. International Journal of Engineering and Technology(UAE) 2227-524X
240 RST invariant robust video watermarking algorithm using quaternion curvelet transform Agilandeeswari L., Ganesan K. Multimedia Tools and Applications 1380-7501
241 Robustness of DR-LDP over PCANet for face analysis Ramalingam S.P., Chandra Mouli P.V.S.S.R. International Journal of Multimedia Information Retrieval 2192-6611
242 Calorie measurement: predicting the nutrient content of food using image analysis Thamarai., Nivetha., Durai Raj Vincent P.M., Manivannan S.S. Research Journal of Pharmacy and Technology 0974-3618
243 An efficient method for secure 2D image visualization and transmission through chaotic confusion and pixel diffusion Gunasekaran G., Venkatesan M. Pertanika Journal of Science and Technology 0128-7680
244 Multi-class classification using hybrid soft decision model for agriculture crop selection Deepa N., Ganesan K. Neural Computing and Applications 0941-0643
245 Tri-texture feature extraction and region growing-level set segmentation in breast cancer diagnosis Aarthy S.L., Prabu S. International Journal of Biomedical Engineering and Technology 1752-6418
246 Spam filtering and phishing in facebook Gitanjali J., Jagadeesh G., Mummadisetti A., Dammu R.S., Kadari R.R. International Journal of Pure and Applied Mathematics 1311-8080
247 Impact of Gradient ascent and Boosting algorithm in classification Basha S.M., Rajput D.S., Vandhan V. International Journal of Intelligent Engineering and Systems 2185-310X
248 Generating various kolam patterns using new kolam picture grammar Govindaraj R., Mahendran A. International Journal of Internet Technology and Secured Transactions 1748-569X
249 HIoTPOT: Surveillance on IoT Devices against Recent Threats Gandhi U.D., Kumar P.M., Varatharajan R., Manogaran G., Sundarasekar R., Kadu S. Wireless Personal Communications 0929-6212
250 Hybrid IT architecture by gene-based cryptomata (HITAGC) for lightweight security services Thirumalai, C., Viswanathan, P. Service Oriented Computing and Applications 1863-2386
251 High utility itemset mining using partition utility list structure Arunkumar M.S., Suresh P., Gunavathi C. Journal of Computational and Theoretical Nanoscience 1546-1955
252 A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT) Gopinath, M.P., Arasi, G.S., Kavisankar, L., Sathyaraj, R., Karthi, S., Aarthy, S.L., & Balusamy, B. (2018) Neural Computing and Applications 0941-0643
253 Secure and Optimized Real-Time System for Internet of Medical Things Using MATuino and ThingSpeak Analytics Ranjani, J., A. Shanthoshini Selvapriya, and E. Vijayan Journal of Testing and Evaluation 00903973
254 Implementing self adaptiveness in whale optimization for cluster head section in Internet of Things Reddy M.P.K., Babu M.R. Cluster Computing 1386-7857
255 Buyagain grocery recommender algorithm for Online shopping of grocery and gourmet foods Moses S.J., Dhinesh Babu L.D. International Journal of Web Services Research 1545-7362
256 CONVENTIONAL IMPLEMENTATION OF LFS SYSTEM FOR DEVELOPMENT OF LINUX OPERATING SYSTEM M.Priya J. Raju International Journal of Pure and Applied Mathematics 13118080
257 Health data analytics using scalable logistic regression with stochastic gradient descent Manogaran G., Lopez D. International Journal of Advanced Intelligence Paradigms 1755-0386
258 Feature extraction using LR-PCA hybridization on twitter data and classification accuracy using machine learning algorithms Murugan N.S., Devi G.U. Cluster Computing 1386-7857
259 G-L fractional differential operator modified using auto-correlation function: Texture enhancement in images Hemalatha S & Margret Anouncia S Ain Shams Engineering Journal 2090-4479
260 Predictive Cloud resource management framework for enterprise workloads Balaji M., Aswani Kumar C., Rao G.S.V.R.K. Journal of King Saud University - Computer and Information Sciences 1319-1578
261 Advancing knowledge on Regulating and saving of the Animals Health with Sensor and Networks through IoT Subrata Chowdhury, P.Mayilvahanan, Ramya Govindaraj Jour of Adv Research in Dynamical & Control Systems -
262 Videocompression techniques: A review Singh J.K., Gagneja K., Raghuvanshi U. International Journal of Pure and Applied Mathematics 1311-8080
263 A Comparative Analysis on Smart Farming Techniques using Internet of Things (IoT) Pramod Mathew Jacob, Prasanna M, Parveen Sultana H Helix 2277-3495
264 Knowledge-based Acceptance Test driven agile Approach for Quality Software Development N. Asha, Prasanna Mani International Journal of Recent Technology and Engineering 2277-3878
265 A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system Manogaran G., Varatharajan R., Lopez D., Kumar P.M., Sundarasekar R., Thota C. Future Generation Computer Systems 0167-739X
266 A Descriptive Study on Contents Being Generalized in News Apps and Smartphone Users’ Attitude Towards Them Surendheran Kaliyaperumal OmniScience: A Multi-disciplinary Journal 2347-9949
267 Mining DNA Sequence Patterns with Constraints Using Hybridization of Firefly and Group Search Optimization Lakshmanna K., Khare N. Journal of Intelligent Systems 0334-1860
268 A Novel Genetic Algorithm for Solving Machine Part Cell Formation Problem considering alternative Process Plans Sowmiya N., Valarmathi B., Srinivasa Gupta N., Essaki Muthu P., Rajendran C. Materials Today: Proceedings 2214-7853
269 Outlet sales analysis using r and various machine learning algorithms Singh J.K., Gagneja K., Bhushan V. International Journal of Pure and Applied Mathematics 1311-8080
270 Improved scrum method through staging priority and cyclomatic complexity to enhance software process and quality Vijay Anand R., Dinakaran M. International Journal of Internet Technology and Secured Transactions 1748-569X
271 Wireless camera network with enhanced SIFT algorithm for human tracking mechanism Usha Devi G., Priyan M.K., Gokulnath C. International Journal of Internet Technology and Secured Transactions 1748-569X
272 LocPSORank-prediction of ranking of web services using location-based clustering and PSO algorithm Mareeswari V., Sathiyamoorthy E. International Journal of Web Services Research 1545-7362
273 A firefly inspired game dissemination and QoS-based priority pricing strategy for online social network games Raj E.D., Dhinesh Babu L.D. International Journal of Bio-Inspired Computation 1758-0366

 

2018

Sl.No TITLE OF PAPER NAME OF THE AUTHOR/S NAME OF JOURNAL ISBN/ISSN NUMBER
1 A Comparative Analysis of Firefly and FuzzyFirefly based Kernelized Hybrid C-Means Algorithms B.K. Tripathy, Anmol Agrawal, A. Jayaram Reddy 1 I.J. Intelligent Systems and Applications 2074-904X
2 IoT based machine learning techniques for climate predictive analysis Nallakaruppan, M.K., Senthil Kumaran, U. International Journal of Recent Technology and Engineering 22773878
3 Patients Health Monitoring System Using IOT Sudha Senthilkumar, Brindha.K, Charanya R, Abishek Kumar Indian Journal of Public Health Research & Development 0976-0245
4 Fragmented plant leaf recognition: Bag-of-features, fuzzy-color and edge-texture histogram descriptors with multi-layer perceptron Chaki J., Dey N., Moraru L., Shi F. Optik 0030-4026
5 Walsh Hadamard Transform for Simple Linear Iterative Clustering (SLIC)Superpixel based Spectral Clustering of Multimodal MRI Brain Tumour Segmentation M. Angulakshmi, G. G Lakshmi Priya Innovation and Research in BioMedical engineering- Elesiver 1959-0318
6 An efficient algorithm for dynamic task offloading using cloudlets in mobile cloud computing Shobha Rani, D., Pounambal, M., Saritha, V. International Journal of Communication Systems 1099-1131
7 A Big Data Recommendation Engine Framework Based on Local Pattern Analytics Strategy for Mining Multi-Sourced Big Data Venkatesan, T., Saravanan, K., Ramkumar, T. Journal of Information and Knowledge Management 0219-6492
8 CLAY-MIST: IoT-cloud enabled CMM index for smart agriculture monitoring system Mekala M.S., Viswanathan P. Measurement: Journal of the International Measurement Confederation 0263-2241
9 Sentiment analysis of Amazon products using ensemble machine learning algorithm Jayakumar Sadhasivam, Ramesh Babu Kalivaradhan International Journal of Mathematical, Engineering and Management Sciences 2455-7749
10 Implementation of Collage Grammar in Kolam Grammar to Generate Kolam Patterns in Picture Languages Ramya Govindaraj, M.Anand International Journal of Innovative Technology and Exploring Engineering (IJITEE) 22783075
11 Health Machine Sensors Network Controlling and Generating Trust Count in the Servers Platform through IoT Subrata Chowdhury, P. Mayilvahananan, Ramya Govindaraj International Journal of Recent Technology and Engineering (IJRTE) 2277-3878
12 A survey on internet of vehicles: Applications, technologies, challenges and opportunities Priyan M.K., Usha Devi G. International Journal of Advanced Intelligence Paradigms 1755-0386
13 Performance analysis of cloud computing using series of queues with Erlang service K.Santhi, R.Saravanan International Journal of Internet Technology and Secured Transactions 1748-5703
14 Accurate facial ethnicity classification using artificial neural networks trained with galactic swarm optimization algorithm Bagchi, C, Geraldine Bessie Amali, D, Dinakaran, M Advances in Intelligent Systems and Computing 21945357
15 A novel dyadic multiresolution wavelet image steganography using N-ary C. Vanmathi; S. Prabu International Journal of Internet Technology and Secured Transactions 1748-5703
16 Performance comparison of various feature descriptors in object category detection application using SVM classifier Kavitha B R , Ramya G, Priya G International Journal of Innovative Technology and Exploring Engineering 22783075
17 A roadmap towards implementing parallel aspect level sentiment analysis Basha S.M., Rajput D.S. Multimedia Tools and Applications 1380-7501
18 K-means and hierarchical based clustering in suicide analysis Sujatha, R., Sree Dharinya, S., Ephzibah, E.P., Thangam, R.K. International Journal of Engineering and Advanced Technology 22498958
19 AN ANALYSIS OF SECURITY ISSUES IN CLOUD COMPUTING M B BENJULA ANBU MALAR J PRABHU International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
20 A Suite of Load Balancing Algorithms and Service Broker Policies for Cloud: A Quantitative Analysis with Different User Grouping Factor in Cloud Kumar PJ, Suganya P, Komal Malhotra, Payal Yadav International Journal of Recent Technology and Engineering (IJRTE) 2277-3878
21 Reduction of Artefacts in JPEG-XR Compressed Images Kai-Lung Hua, Ho Thi Trang, Kathiravan Srinivasan, Yung-Yao Chen, Chun-Hao Chen, Vishal Sharma, Albert Y Zomaya MDPI Sensors 1424-8220
22 EFF-FAS: Enhanced Fruit Fly Optimization Based Search and Tracking By Flying Ad Hoc Swarm Vishal Sharma, Roberto Sabatini, Subramanian Ramasamy, Kathiravan Srinivasan, Rajesh Kumar International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) 1743-8225
23 A Comprehensive Survey On Various Semantic Based Video/Image Retrieval Techniques Tamil Priya D, Divya Udayan J International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2278-3075
24 Evaluating and Visualizing Influential Node Using Various Measures in Social Network Data G. Kavitha and N. M. Elango journal of Computational and Theoretical Nanoscience 1546-1955
25 Distribution of Frequency Words Using Hierarchical Clustering Method in R Shakila Basheer1, S. Mariyam Aysha Bivi2, G. Kavitha3 ∗, P. V. Praveen Sundar4, C. Kousalya3, and B. Lokeshwari3 Journal of Computational and Theoretical Nanoscience 1546-1955
26 Analysis and Visualize Text Mining Using Twitter Data in R Shakila Basheer1, Rincy Merlin Mathew2, G. Kavitha3 ∗, K. Nivetha3, S. Kalai Selvi3, and R. Sandhya3 Journal of Computational and Theoretical Nanoscience 1546-1955
27 Location-Based Collaborative Filtering for Web Service Recommendation Mareeswari Venkatachalaappaswamy, Vijayan Ramaraj, Saranya Ravichandran Recent Patents on Computer Science 2213-2759
28 Evaluating and Visualizing influential Node Using Various Measures in Social Network Data G.kavitha and N M ELango journal of Computational and Theoretical Nanoscience 1546-1955
29 Deep Learning for Short Answer Scoring Surya, K., Gayakwad, E., Nallakaruppan, M.K. International Journal of Recent Technology and Engineering 22773878
30 A survey on different continuous authentication systems Ayeswarya S., Norman J. International Journal of Biometrics 1755-8301
31 K-means and hierarchical based clustering in suicide analysis Sujatha.R,Sree Dharinya.S,Ephzibah,Kirubathangam.R International Journal of Engineering and Advanced Technology 2249-8958
32 Risk-based availability modelling and reputation management on fault tolerant cloud computing systems Deepa Mani; Anand Mahendran International Journal of Internet Technology and Secured Transactions (IJITST) 1748-569X
33 Decision-making tool for crop selection for agriculture development Deepa N., Ganesan K. Neural Computing and Applications 0941-0643
34 Predicting Autism Spectrum Disorder Using Machine Learning Algorithms with Jaundice Symptomatic Analysis Sharath Chandrika M B, Nallakaruppan M K, Siva Rama Krishnan S, Senthilkumar N C International Journal of Recent Technology and Engineering 2277-3878
35 Real-Time Classification of Twitter Trends using Support Vector Machine with Location Tracking Vijayan Ramaraj, G Gunasekaran, Prasanna Santhanam, S Meenatchi, Kishore Kumar K International Journal of Innovative Technology and Exploring Engineering 2278-3075
36 Semantic analysis - internet of things, study of past, present and future of IoT Snigdha Gharami, B.Prabadevi, Anupama Bhimnath Electronic Government , an International Journal 1740-7494
37 Pattern Analysis of Genetics and Genomics: A Survey of the State-of-art Jyotismita Chaki, Nilanjan Dey Multimedia Tools and Applications (Springer) 1380-7501
38 Pattern Mining Approaches used in Sensor-Based Biometric Recognition: A Review Jyotismita Chaki, Nilanjan Dey, Fuqian Shi , R. Simon Sherratt IEEE Sensors 1530-437X
39 A heuristic method for initial dominant point detection for polygonal approximations S. Kalaivani , Bimal Kumar Ray Soft Computing 1432-7643
40 A Survey and Analysis of various Objective Functions Defined for RPL in 6LoWPAN Suganya. P, Pradeep Reddy. C.H International Journal of Recent Technology and Engineering 2277-3878
41 Car Sales Prediction Using Machine Learning Algorithmns Madhuvanthi.K, Nallakaruppan.M.K, Senthilkumar N C, Siva Rama Krishnan S International Journal of Innovative Technology and Exploring Engineering 2278-3075
42 Comparative Performance Analysis of Various Classifiers for Cloud E-Health Users T. MuthamilSelvan,B. Balamurugan International Journal of E-Health and Medical Communications 1947-315X
43 Continuous Monitoring and Detection of Epileptic Seizures using Wearable Device Darshan Mehta, Tanay Deshmukh, Yokesh Babu Sundaresan,, P.Kumaresan Advances in Intelligent Systems and Computing Smart Innovations in Communication and Computational Sciences Proceedings of ICSICCS-2018, 2194-5357
44 Predicting Austim Spectrum Disorder Using Machine Learning Algorithms with Jaundice Symptomatic Analysis Sharath Chandrika M B, Nallakaruppan M K, Siva Rama Krishnan S, Senthilkumar N C International Journal of Recent Technology and Engineering 2277-3878
45 Stochastic Multifacility Location Problem under Triangular Area Constraint with Squared Euclidean Norm A. K. Santra Journal of Scientific & Industrial Research 0022-4456
46 Test Suite Reduction based on knowledge Reuse: An Adaptive Elitism Based Intellect approach (AEBI) using Clustering Technique Asha N and Prasanna Mani International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2278-3075
47 Prediction Intelligence System Based Real Time Monitoring of Yoga Performers Mani Prasanna, Thangavelu Arun Kumar, Sangaiah Arun Kumar, Mohamed Iqubal Jawid Nazir Recent Patents on Computer Science 1874-4796
48 Walsh Hadamard Transform for Simple Linear Iterative Clustering (SLIC) Superpixel Based Spectral Clustering of Multimodal MRI Brain Tumor Segmentation M Angulakshmi, GG Lakshmi Priya Innovation and Research in BioMedical engineering (IRBM) 1959-0318
49 Predictive analysis of stocks using data mining Magesh, G., Swarnalatha, P. Smart Innovation, Systems and Technologies 2190-3018
50 Classification of breast cancer based on thermal image using support vector machine Aarthy, S.L., Prabu, S. International Journal of Bioinformatics Research and Applications 1744-5485
51 Estimating the distance of a human from an object using 3D image reconstruction Swarna Priya, R.M., Gunavathi, C., Aarthy, S.L. Advances in Intelligent Systems and Computing 2194-5357
52 Big data analysis for anomaly detection in telecommunication using clustering techniques Gunavathi, C., Swarna Priya, R.M., Aarthy, S.L Advances in Intelligent Systems and Computing 2194-5357
53 VoIP Steganography Methods, a Survey S. Deepikaa, R. Saravanan CYBERNETICS AND INFORMATION TECHNOLOGIES 1311-9702
54 Flow based classification for specification based intrusion detection in software defined networking: Flowclassify Sampath N, Dinakaran M International Journal of Software Innovation 21667160
55 Performance Comparison of Various Feature Descriptors in Object Category Detection Application using SVM Classifier Kavitha B R , G. Ramya, G.Priya International Journal of Innovative Technology and Exploring Engineering 2278-3075
56 Energy-Efficient virtual machine selection based on resource ranking and utilization factor approach in cloud computing for IoT Mekala M.S., Viswanathan P. Computers and Electrical Engineering 0045-7906
57 Effective Classification of Major Depressive Disorder Patients using Machine Learning Techniques Nivedhitha M, Durairaj Vincent P M Recent patents on computer science 2213-2759
58 Machine learning on medical dataset Gopinath, M.P., Aarthy, S.L., Manchanda, A., Rishadh Advances in Intelligent Systems and Computing 2194-5357
59 Design of Secure Ehealth System Through Temporal Shadow using Blockchain R Charanya, Ra. K Saravanaguru, M Aramudhan International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2278-3075
60 K-means and hierarchical based clustering in suicide analysis Sujatha.R,Sree Dharinya.S,Ephzibah,Kirubathangam.R International Journal of Engineering and Advanced Technology 2249-8958
61 New Approach Data Encryption using Key Generation and DS-PEKS Algorithm Pratik Badala, Senthilkumar N C Research Journal of Engineering and Technology 0976-2973
62 Crime Pattern Matching based on Process Execution Context – An Evidence Acquisition Technique Asha Joseph and K. John Singh Journal of Advanced Research in Dynamical and Control Systems 1943-023X
63 Histogram-Equalized Hypercube Adaptive Linear Regression for Image Quality Assessment Balakrishnan, N., Shantharajah, S.P. Sadhana - Indian Academy of Engineering and Sciences 0256-2499
64 A Survey, International Journal of Advanced Intelligence Paradigms R. Jayanthi and K. John Singh International Journal of Advanced Intelligence Paradigms 0
65 Predicting ozone layer concentration using machine learning techniques Srinivas, A.S., Somula, R., Govinda, K., Manivannan, S.S. Springer Briefs in Applied Sciences and Technology 2191-530X
66 Healthcare Android Application Shakila Basheer, Nithya Sampath, Jayakumar Sadhasivam R. Ilampirai R. Ramya Bharathi V. Ilakkiya Journal of Computational and Theoretical Nanoscience 1546-1955
67 An empirical comparison of supervised learning algorithms and hybrid WDBN algorithm for MOOC courses Jayakumar Sadhasivam Ramesh Babu Kalivaradhan Journal of Ambient Intelligence and Humanized Computing 1868-5137
68 Image encryption techniques for data transmission in networks: A survey Jayanthi R., John Singh K. International Journal of Advanced Intelligence Paradigms 1755-0386
69 Accessibility Using Human Face Object and Text Recognition for Visually Impaired People V. Mareeswari, Vijayan Ramaraj, G. Uma Maheswari, R. Sujatha, Preethi. E International Journal of Innovative Technology and Exploring Engineering 22783075
70 Machine Learning Based Classification of Cervical Cancer Using K-Nearest Neighbour, Random Forest and Multilayer Perceptron Algorithms Shakila Basheer S. Mariyam Aysha Bivi S. Jayakumar Arpit Rathore Balajee Jeyakumar Journal of Computational and Theoretical Nanoscience 1546-1955
71 Review on recent developments in frequent itemset based document clustering, its research trends and applications D. S. Rajput International journal of data analysis techniques and strategies, InderScience 1755-8069
72 Ignition Pollution Check Yadav, V., Khatana, D., Bajoria, M., Nallakaruppan, M.K., Singh, S.P. International Journal of Innovative Technology and Exploring Engineering 22783075
73 Data cryptography based on musical notes on a fingerboard along with a dice Tripathy, A.K., Das, T.K., Navaneethan, C. Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
74 Comparison of particle swarm optimization and simulated annealing applied to travelling salesman problem Sumathi, M., Rahamathunnisa, U., Anitha, A., Das, D., Nallakaruppan, M.K. International Journal of Innovative Technology and Exploring Engineering 22783075
75 Location-Based Collaborative Filtering for Web Service Recommendation Venkatachalaappaswamy, M., Ramaraj, V., Ravichandran, S. Recent Patents on Computer Science 1874-4796
76 Classifying streaming of Twitter data based on sentiment analysis using hybridization Senthil Murugan N & Usha Devi G Neural Computing and Applications 0941-0643
77 Analyzing Financial Data and Mutual Funds Recommendation by Using Big Data Analytics Nithya Sampath Jayakumar Sadhasivam R. Raj Kumar M. Sathish Kumar Balajee Jeyakumar P. V. PraveenSundar Journal of Computational and Theoretical Nanoscience 1546-1955
78 An approach to aggregate the partial rank list of web services in e-business Mareeswari V., Sathiyamoorthy E. International Journal of e-Business Research 1548-1131
79 Securing one-time password generation using elliptic-curve cryptography with self-portrait photograph for mobile commerce application Ramasamy, P., Ranganathan, V., Palanisamy, V., Kadry, S. Multimedia Tools and Applications 1380-7501
80 Monitoring individual medical record by using wearable body sensors Gopal J,Sathiyamoorthy E,Mohammed Ayaz R Smart Innovation, Systems and Technologies 21903018
81 An Optimized Breast Cancer Diagnosis System Using a Cuckoo Search Algorithm and Support Vector Machine Classifier Manoharan prabukumar., Loganathan agilandeeswari., Arun kumar sangaiah Hybrid Intelligence for Image Analysis and Understanding 1868-5137
82 Intelligent intrusion detection techniques for secure communications in wireless networks: A survey Rama Prabha K.P., Jeyanthi N. International Journal of Advanced Intelligence Paradigms 1755-0386
83 32-Bit One Instruction Core: A Low-Cost,Reliable, and Fault-Tolerant Core for Multi-core Systems Venkatesha, S. and Parthasarathi, R Journal of Testing and Evaluation 0090-3973
84 Implementation of enhanced canny recognition algorithm and non – natural neural system based speech fusion for sightless persons Arunkumar, P., Shantharajah, S.P. Multimedia Tools and Applications 1380-7501
85 E-health cloud security using timing enabled proxy re-encryption V Vijayakumar, MK Priyan, G Ushadevi, R Varatharajan, G Manogaran, Prathamesh Vijay Tarare Mobile Networks and Applications 1383-469X
86 MMSI: A multi-mode service invocation algorithm to improve the connectivity in accessing cloud services in heterogeneous mobile cloud Nadesh R.K., Aramudhan M. International Journal of Advanced Intelligence Paradigms 1755-0386
87 A Comparative Study On Transformation of UML/OCL to Other Specifications Jagadeeswaran T, Senthilkumaran U Recent Patents on Computer Science 2213-2759
88 Health care arrangement system for Doctor-Patient Communications Angulakshmi.M, Sudha.S, Brindha.K Indian Journal for Public health and Research development 0976-0245
89 Accessibility using human face, object and text recognition for visually impaired people Mareeswari, V., Vijayan Ramaraj, , Uma Maheswari, G., Sujatha, R., Preethi, E International Journal of Innovative Technology and Exploring Engineering 2278-3075
90 Network Support Data Analysis for Fault Identification Using Machine Learning Parthasarathy Panchatcharam Shakila Basheer, Usha Devi Gandhi International Journal of Software Innovation 2166-7160
91 Accurate facial ethnicity classification using artificial neural networks trained with galactic swarm optimization algorithm Bagchi, C., Geraldine Bessie Amali, D., Dinakaran, M. Advances in Intelligent Systems and Computing 2194-5357
92 Agricultural leaf blight disease segmentation using indices based histogram intensity segmentation approach Kalaivani.S, Shantharajah.S.P, Padma.T, Multimedia Tools and Applications 1380-7501
93 Optimal body mass index cutoff point for cardiovascular disease and high blood pressure Chandra Babu, G., Shantharajah, S.P. Neural Computing and Applications 0941-0643
94 Gurumurthy S., Senthilkumar N.C., Ghalib M.R. A study of digital signal processing application for remote patient monitoring system using live EEG data transmission International Journal of Applied Engineering Research 0973-4562
95 Jeyanthi N., Thandeeswaran R., Vinithra J. RQA based approach to detect and prevent DDOS attacks in VoIP networks Cybernetics and Information Technologies 1311-9702
96 Angulakshmi M. A survey on multi-relational database based classification approaches International Journal of Applied Engineering Research 0973-4562

2017

S.No. Title Of Paper Name of the author/s Name of journal ISBN/ISSN Number
1 A Novel Women Chaperone "An Anti-Violation Technology" Prabhu J , Thanapal P , Vijayanand R , Kirubathagam R , Sundaravadivazhagan B International Journal of Pure and Applied Mathematics 1314-3395
2 Classification: Grouping The Users Based On Their Web Search Using Fuzzy Logic Senthilkumar N C, Ch Pradeep Reddy International Journal of Pure and Applied Mathematics 1314-3395
3 An Empirical Study Of Various Load Balancing Algorithms For Cloud Computing M Lawanyashri, S Subha. B Balamurugan International Journal of Pure and Applied Mathematics 1314-3395
4 An Improved Floating Point Addition Algorithm S Subha ARPN Journal of Engineering and Applied Sciences 1819-6608
5 Analysis Of Performance Measures To Handle Medical Ecommerce Shopping Cart Abandonment In Cloud, V Priya, S Subha, B Balamurugan Informatics in Medicine Unlocked-Elsevier, March 2017 2352-9148
6 Energy Aware Fruitfly Optimization Algorithm For Load Balancing In Cloud Computing Environments M. Lawanya Shri, S Subha, Balusamy International Journal of Intelligent Engineering and Systems, 2185-310
7 A Credential Data Privacy Preserving In Web Environment Using Secure Data Contribution Retrieval Algorithm” Kumaran U, Neelu Khare International Journal of Intelligent Engineering and Systems 2185-310
8 2D Chaotic Map Based On 2D Adaptive Grey Wolf Algorithm For Ultra Sound Medical Image Security Srinivas Koppu & Viswanatham International Journal of Intelligent Engineering and System 2185-310
9 3D Reconstruction Of A Scene From Multiple 2D Images Srinivas Koppu, Swarna Priya, R. M., Aarthy, S. L., Gunavathi, C., Venkatesh, P. & Gao, X. Z International Journal of Civil Engineering and Technology (IJCIET) 0976-6316
10 A Case Study : 3D City Generation Using Procedural Modeling Framework And Evaluations Trategies Divya Udayan J, M.Priya, R.Charanya, Tamil Priya. D And Boyu Gao International Journal of Civil Engineering & Technology (IJCIET) 0976-6316
11 Enchanced Id Based Ring Signature By Validating Time Slots In Cloud Environment Nithya S International Journal of Mechanical Engineering and Technology 0976-6340
12 A Case Study On Coactive Subject Modelling For Acclaiming Technical Articles Praveen Kumar Reddy M, Rajesh Kaluri, Kuruva Lakshmanna, Nagaraja G, Swamy T, Guokun Li International Journal of Mechanical Engineering and Technology (IJMET) 0976-6340
13   A Case Study On Cost Estimation Of Cloud Service Using Fuzzy Approach Srinivas Koppu, Joy Bhowmick., Madhu V. Satheesh S. And Tsung C.H International Journal of Pure and Applied Mathematics, 13118080
14 A Case Study: 3D City Generation Using Procedural Modeling Framework And Evaluation Strategies M.Priya International Journal of Civil Engineering and Technology (IJCIET) 0976-6308
15 A Case Study: Analysis Of Single Phase
And Hybrid Cascade Multilevel
Inverter With Pwm And Level
Inverters
M.Priya International Journal of Mechanical Engineering and Technology (IJMET) 0976-6340
16 A Case Study: Home Environment Monitoring System Using Internet Of Things R. Raghavan, John Singh. K, Thippa Reddy. G, Sudheer. K, Venkatesh. P And Stephen Olatunde Olabiyisi International Journal of Mechanical Engineering and Technology 0976-6359
17 A Case Study: Usb Device Charging And Fitness Monitor With Smart Safety Shoe And Iot John Singh. K, Sagar G. V, Sushmita Lenka, Belwin Edward. J, Jacob Raglend. I, Stephen Olatunde Olabiyisi, International Journal of Mechanical Engineering and Technology 0976-6359
18 A Comprehensive Overview On The Foundations Of Formal Concept Analysis K. Sumangali Ch. Aswani Kumar Knowledge Management & E-Learning 2073-7904
19 A Computer Aided System To Detect Breast Masses Using Digital Mammograms Sujatha,R., Gao, X.-Z.,Gopinath, M.P., Prabu, S.,Murali, S.,Mohanasundaram, R., Kumar, N.S. International journal of Civil Engineering and Technology 0976 - 6316
20 A Condorcet Voting Theory Based Ahp Approach For Mcdm Problems Sweta Bhattacharya, V. Raju Indonesian Journal of Electrical Engineering and Computer Science 2502-4752
21 A Fast Enhanced Secure Image Chaotic Cryptosystem Based On Hybrid Chaotic Magic Transform Srinivas Koppu & Viswanatham Modelling and Simulation in Engineering 16875591
22 A Framework For Attribute Selection In Marketing Using Rough Computing And Formal Concept Analysis T. K. Das IIMB Management Review 0970-3896
23 A Framework For Computational Offloading To Extend The Energy Of Mobile Devices In Mobile Cloud Computing. Thanapal, P., & Durai, M. S. International Journal of Embedded Systems 1741-1076
24 A Framework To Mitigate Arp Sniffing Attacks By Cache Poisoning B. Prabadevi, N. Jeyanthi International Journal of Advanced Intelligence Paradigms (Inderscience) 1755-0386
25 A Mobile Application Based Smart System For Supporting Yoga Activities And Health Monitoring Prasanna M, Arunkumar T, Arunkumar S Research Journal of Pharmacy and Technology 0974-360X
26 A Naive-Bayes Strategy For Sentiment Analysis On Demonetization And Indian Budget 2017-Case-Study Jasmine Norman, Mangayarkarasi R, Vanitha M, Praveen Kumar T, Umamaheswari G International Journal of Pure and Applied Mathematics 1314-3399
27 A New Algorithm For Password Encryption And Decryption M.Iyapparaja Journal of Advanced Research and Dynamical & Control Systems 1943-023X
28 A Novel Temporal Access Control Scheme For Outsourced Data In Cloud With User Revocation P. G. Shynu And K. John Singh Electronic Government, an International Journal, 1740-7508
29 A Novel Threshold Based Multi-Authority Access Control System In Cloud Storage Environment M.Lawanyashri International Journal of Pure and Applied Mathematics 1314-3399
30 A Prevention Model For Web Application Session Hijack Attacks In Wireless Networks Using Mac Appended Session Id S.S.Manivannan, E.Sathiyamoorthy Journal of Advanced Research in Dynamical and Control Systems 1943-023X
31 A Privacy-Preserving Secure Access Control Mechanism In Cloud M.Iyapparaja Journal of Advanced Research and Dynamical & Control Systems 1943-023X
32 A Real Time Monitoring System For Yoga Practitioners Prasanna M, Arunkumar T, Akshat Sharma, Nikhil Chaudhari International Journal of Intelligent Engineering and Systems 2185-3118
33 A Replica Detection Scheme Based On The Deviation In Distance Travelled Sliding Window For Wireless Sensor Networks Alekha Kumar Mishra, Asis Kumar Tripathy, Arun Kumar, And Ashok Kumar Turuk Wireless Communications and Mobile Computing, 1530-8677
34 A Review Of Soft Computing Techniques In Short-Term Load Forecasting Senthil Kumar P International Journal of Applied Engineering Research 0973-4562
35 A Review On Various Encoding Scehmes Used In Digital Dna Data Storage A.Swati, Forum Mathuria, S.Bhavani, E.Malathy, R.Mahadevan International Journal of Civil Engineering and Technology 0976-6308
36 A Study On Different Types Of Authentication Techniques In Data Security Dinesh Kumar D, K.Vijay, S.Bhavani, E.Malathy, R.Mahadevan International Journal of Civil Engineering and Technology 0976-6308
37 A Survey On Fault Detection Techniques In Different Machines - An Image Processing Approach U.Rahamathunnisa,Babu Chellappa Chetty And A.Clement King International Journal of Civil Engineering and Technology 0976-6316
38 A Survey On Feature Selection Methods In Microarray Gene Expression Data For Cancer Classification Gunavathi C, Premalatha K, Sivasubramanian K Research Journal of Pharmacy and Technology 0974-360X
39 An Access Control Models In Cloud Computing: A Review Priya G, Kavitha Br, Ramya G , Kumaresan P , Feslin Anish Mon International Journal of Pure and Applied Mathematics ISSN: 1311
40 An Analysis And Performance Evaluation Of Nosql Databases For Efficient Data Management In E-Health Clouds S L Aarthy Internation Journal of Pure and Applied Mathematics 13118080
41 An Approach For Dynamic Replica Allocation For Sparse (Urban/Sub-Urban) And Dense Regions (City Side) In Vanet Kumar P J, Manikandan, N., Suganya, P., Sureka, S International Journal of Civil Engineering and Technology 0976-6308
42 An Approach To Evaluate The Availability Of System In Cloud Computing Using Fault Tree Technique M.Deepa, M.Anand INASS 2185-3118
43 An Efficient And Secure Biometric Authentication Scheme For M-Commerce R. Thandeeswaran, Hamid Mcheick, Hemant Agrawal, Ajay Thakur, N. Jeyanthi, Rajan Slathia, International Journal of Civil Engineering and Technology 0976 - 6308
44 An Efficient Deep Learning Neural Network Based Brain Tumor Detection System Chinmayi, L Agilandeeswari, M Prabukumar, K Muralibabu International Journal of Pure and Applied Mathematics, 1314-3395
45 An Efficient Hybrid Approach For
Hyperspectral Image Classification,
L Agilandeeswari, M Prabukumar, S Sathishkumar International Journal of Pure and Applied Mathematics, 1314-3395
46 A Survey On Iot Related Patterns Siva Kumar N International Journal of Pure and Applied Mathematics 1314-3395
47 An Enhanced Abe Based Secure Access Control Scheme For E-Health Clouds P. G. Shynu And K. John Singh International Journal of Intelligent Engineering and Systems 2185-3118
48 An Enhanced Cp-Abe Based Access Control Algorithm For Point To Multi-Point Communication In Cloud Computing P. G. Shynu And K. John Singh Journal of Information Science and Engineering 1016-2364
49 An Enhanced Framework For Sign Gesture Recognition Using Hidden Markov Model And Adaptive Histogram Technique Rajesh Kaluri, Pradeep Reddy Ch International Journal of Intelligent Engineering and Systems 2185-3118
50 An Enhanced Virtual Backoff Algorithm For Wireless Sensor Networks Babu, P.R., Krishna, P.V., Saritha, V., Pounambal, M International Journal of Wireless and Mobile Computing 17411084
51 An Intelligent Approach Of Query Process Optimisation Using Cooperative Semantic Caching Techniqu P.Mohankumar Journal of Engineering science and Technology 1823-4690
52 An Overview Of Data Mining Techniques And Its Applications G.Kavitha,N.M.Elango International Journal of Civil Engineering and Technology 9766308
53 Analysis Of Using Sparse Matrix Storage Formats In Image Compression Techniques Banu,J.S, Babu.M.R, Thaseen,I.S And Balamurugan.P International Journal of Pure and Applied Mathematics 1311-8080
54 Analyzing Customer Sentiments Using Machine Learning Techniques Magesh G, Dr.P.Swarnalatha International Journal of Civil Engineering and Technology (IJCIET Journal) 0976 - 6316
55 Assessment And Optimisation Of User Imprecise Queries In Cloud Environments P.Mohankumar International journal of Intelligent Engineering and system 2185-3118
56 Automatic Brain Tumour Segmentation Techniques - A Review Angulakshmi.M, Lakshmi Priya. Gg International Journal of Imaging Systems and technology 1098-1098
57 Automatic Grading System For Mangoes Using Multiclass Svm Classifier L Agilandeeswari, M Prabukumar, Goel Shubham International Journal of Pure and Applied Mathematics 1311-1314
58 Availability Modelling Of Fault Tolerant Cloud Computing System M.Deepa, M.Anand INASS 2185-3118
59 An Evolutionary Secre Energy Efficient Routing Protocol In Iot Praveen Kumar Reddy, Rajasekhara Babu International Journal intelligent engineering and systems 1311063047
60 Big Data And Its Applications: A Survey Magesh G, Dr.P.Swarnalatha Research Journal of Pharmaceutical, Biological and Chemical Sciences 0975-8585
61 Big Data Management With Machine Learning Inscribed By Domain Knowlegde For Health Care Sujatha R., E.P.Ephzibah International Journal of Engineering & Technology 2227-524X
62 Biomarker Selection From Gene Expression Data For Tumour Categorization Using Bat Algorithm Gunavathi Chellamuthu, Premalatha Kandasamy, Sivasubramanian Kanagaraj International Journal of Intelligent Engineering & Systems 2185-3118
63 Bluetooth Based Low Power Data Acquisition System For Ban Kumaresan P Prabukumar M, International Journal of Pure and applied Mathematics - Special issue on Computer and Communication Editors 1311-8083
64 Case Study: A Line Following Robot For Hospital Management Kumaresan P,Priya.G,Kavitha B R, Ramya G, M.Lawanyashri International Journal of Pure and Applied Mathematics 1311-1314
65 Ciphertext-Scheme Based On Attribute Hybrid Encryption In Cloud Computing. Meenatchi, S., Navaneethan, C., Iyapparaja, M., Thanapal, P., & Prabhakaran, R., Jour of Adv Research in dynamic & Control System 1943-023X
66 Clustering Of Wireless Sensor Networks Nallakaruppan, M.K., Ilango, P., Deepa, N., Muthukumarappan, A. Research Journal of Pharmacy and Technology 9743618
67 Comparative Study On Performance Analysis Of Time Series Syed Muzamil Basha, Yang Zhenning, Dharmendra Singh Rajput, Iyengar N.Ch.S.N. And Ronnie D. Caytiles International Journal of Grid and Distributed Computing 2207-6379
68 Computer Numerical Control Machine Based On Machine Learning Kumaresan P Balavignesh G, Kavitha B R, Ramya Govindaraj, Venkatesan S International Journal of Pure and applied Mathematics - Special issue on Computer and Communication Editors 1311-8080
69 An Enhanced Trust Startegy For Online Social Networks Using Probalistic Reputation Features Raj E D, Babu L.D.D Neurocomputing 9252312
70 Concept Compression In Formal Concept Analysis Using Entropy-Based Attribute Priority K. Sumangali Ch. Aswani Kumar Applied Artificial Intelligence An International Journal 0883-9514
71 Context Residual Energy Based Trust Management In Mobile Adhoc Networks R. Vijayan, N. Jeyanthi International Journal of Communication Networks and Distributed Systems (Inderscience 1754-3916
72 Covering Rough Set Fuzzy C- Medoids (Crfm) Clustering Algorithm For Gene Expression Data

A.Jayaram Reddy

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

73

Crypto Currencies For Digital Currency Using Cipher Text And Sha 256

Sukhbir, C.P., Manivannan

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

74

Customized Services To Generate Test Suits For Testing Custom Software Application System Based On Knowledge Reuse

Asha N, Prasanna M

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

75

Decision Making Tool For Crop Selection For Agriculture Development

N. Deepa, K.Ganesan

Neural Computing and Applications

1433-3058

76

Detection Of Anaemia From Tongue Datasets By Image Processing

Sujatha, R., Aarthy, S.L., Charulatha, A.R. And

Sasikala, T.M.S

International Journal of Research in Pharmaceutical Sciences

0975-7538

77

Development Of Advanced Encryption Standard Architecture With Sbox Validity

Vanitha. M And S. Subha

Walailak Journal of Science and Technology

2228-835X

78

Discovery Of Drug And Medicine Using Datamining Techniques

Anish Chittora , A.Mary Mekala

Research Journal of Pharmacy and Technology

0974-3618

79

Domain Specific Predictive Analytics: A Case Study With R

Syed Muzamil Basha, Yang Zhenning,

Dharmendra Singh Rajput, Iyengar N.Ch.S.N. And

Ronnie D. Caytiles

International Journal of Multimedia and Ubiquitous Engineering

1975-0080

80

Dynamic Data Partitioning And Virtual Chunking For Effective Data Retrieval

M.Vanitha, R.Mangayarkarasi, Jasmine Norman,

R.Sakthivel, K.Baranitharan

International Journal of Pure and Applied Mathematics

1311-8080

81

Dynamic Energy Optimization Technique In Mobile Cloudlet For Mobile Cloud Computing Using Effective Offloading Algorithm

P.Priya, S.P.Shantharajah

Journal of Theoretical and Applied Information Technolog

1992-8645

82

Effective Evaluation Of Prediction Accuracy Using Optimization Algorithm,

Brindha.K, Sudha.S , Rathi.R And Charanya.S,

International Journal of Pure and Applied Mathematics

1311-8080

83

Effective Mining Approach To Produce Quality Search Results Using Proposed Approach

Elavarasan D, Durai Raj Vincent

International Journal of Intelligent Engineering and Systems

2185-3118

84

Energy Efficient Consumption For Quality Based Sleep Scheduling In Wireless Sensor Networks

A. S. Syed Navaz, N. Asha And D. Sumathi

ARPN Journal of Engineering and Applied Sciences

1819-6608

85

Energy Efficient Node Selection Algorithm Based On Node Performance Index And Random Waypoint Mobility Model In Internet Of Vehicles

P M Kumar, Ushadevi Gandhi, R Varatharajan,

Gunasekaran Manogaran, R Jidhesh, Thanjai Vadivel

Cluster Computing

1573-7543

86

Integration Of Fuzzy Dematel And Fmcdm Approach For Evaluating Knowledge Transfer Effectiveness With Reference To Gsd Project Outcome

Jagadeesh G, Arun Kumar S, X.Z.Gao

International Journal of Machine Learning and cybernetics

1868-8071

87

Enhanced Dtls With Coap-Based Authentication Scheme For The Internet Of Things In Healthcare Application

Pm Kumar, Ud Gandhi

The Journal of Supercomputing

0920-8542

88

Enhancing Trust In Mobile Adhoc Network Using Trust And Dynamic With Energy Efficient Multipath Routing Protocol

Vijayan R , Jeyanthi N

International Journal of Signal and Imaging Systems Engineering

1748-0698

89

Estimating Construction Data Using An Authenticated Application For Urban Planning

S.Sree Dharinya, Ephzibah.E.P, Divya Udayan,

R. Kirubathangam, & Charanya.R

International Journal of Civil Engineering and Technology (IJCIET)

9766308

90

Evaluating The Impact Of Feature Selection On Overall Performance Of Sentiment Analysis

Syed Muzamil Basha, Dharmendra Singh Rajput

ACM Digital Library

978-1-4503

91

Evolutionary And Neural Computing Based Decision Support System For Disease Diagnosis From Clinical Data Sets In Medical Practice,

M. Sudha

Journal of Medical Systems

1573-689X

92

Feature Selection For Privacy Preserving In Data Mining With Linear Regression Using Genetic Algorithm

Kumaran U, Neelu Khare

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

93

Flowagent: Software Defined Firewall Rule Generator For Network Intrusion Detection System

Nithya S

International Journal of Intelligent Engineering and Systems

2185-3118

94

Forward Secrecy Scheme For Data Sharing In Cloud

M. Lawanya Shri , G.Priya, M.B.Benjula Anbumalar,

Deepa Mani, K.Santhi

International Journal of Pure and Applied Mathematics

1311-8080

95

Handling Stakeholder Conflict By Agile Requirement Prioritization Using Apriori Technique

Rv Anand, M.Dinakaran

Computers & Electrical Engineering

0045-7906

96

Hb-Ppac: Hierarchy-Based Privacy Preserving Access Control Technique In Public Cloud

Sudha Senthilkumar,Madhu Viswanatham

International journal of High Performance computing and networking

1740-0570

97

Information Retrieval For Question Answering System Using Knowledge Based Query Reconstruction By Adapted Lesk And Latent Semantic Analysis

Saravanakumar K, Aswani Kumar Cherukuri

International Journal of Computer Science and Applications

0972-9038

98

Intelligent Decision Support System Based On Rough Set And Fuzzy Logic Approach For Efficacious Precipitation Forecast,

M. Sudha

Decision Science Letters

19295812

99

Intelligent Face Recognition And Navigation System Using Neural Learning For Smart Security In Internet Of Things

Pm Kumar, Ud Gandhi

Cluster Computing

1573-7543

100

Intrusion Detection Model Using Fusion Of Chi-Square Feature Selection And Multi Class Svm

I.Sumaiya Thaseen,

Journal of King Saud University-Computer and Information Sciences

1319-1578

101

A Hybrid Cluster Head Selection Model For Iot

Praveen Kumar Reddy M

springer

1058601712

102

K-Means Modification For Scalability

S.Bhavani,Sumit Patel, Dhanashri Patil, Yash Shah,

Rushikesh Babar, Abhishek Rathi

International Journal of Civil Engineering and Technology

0976-6308

103

Llvm Compiler

R.Bansal, Jasmine Norman,Mangayarkarasi R,Vanitha M,

Chandramouliswaran S

International Journal of Pure and Applied Mathematics

1311-8080

104

Luggage Tracking System Using Iot

Sudha Senthilkumar, Brindha.K, Rathi.R, Charanya. R, Mayank Jain

International Journal of Pure and Applied Mathematics

1314-3395

105

Metrics Based Evaluation For Disease Affection In Distinct Cities

M.Iyapparaja

Research Journal of Pharmacy and Technology

0974-3618

106

Multi-Voting And Binary Search Tree-Based Requirements Prioritisation For E-Service Software Project Development

Vijayanand R, Dinakaran M

Electronic Government, an International Journal

1740-7494

107

Network Life Time Uniformed By Mutual Nodes Cooperation And Life Nodes Relay In Wsn’S.

Thanapal, P., Prabhakaran, R., Meenatchi, S., Navaneethan, C.,

& Iyapparaja, M.

Jour of Adv Research in dynamic & Control System

1943-023X

108

Non-Intrusive Transaction Aware Filtering During Enterprise Application Modernizationra

Ramadoss, R., Elango, N.M., Abimannan, S., Hsu, C.-H.

Journal of Supercomputing

0920-8542

109

Soft Sequential Recognition Approach For User Activity Using A Wearable Device

Prabhavathy P

IJMET

9766359

110

Opinion Mining Services Using Machine Learning

Sujatha. R, M Sai Praneeth And M Lakshmi Deepak

Journal of Chemical and Pharmaceutical Sciences

0974-2115

111

Optimal Decision Tree Fuzzy Rule Based Classifier (Odt-Frc) For Heart Disease Prediction Using Improved Cuckoo Search Algorithm”

Subhashini Narayan , Jagadeesh Gobal

International Journal of Business Intelligence and Data Mining.

1943-023X

112

Optimizing Health Care Records By Preventing Duplication In Cloud

Sujatha R, Kaviya P.S

International Journal of Research in Pharmaceutical Sciences

0975-7538

113

Overview Of Securing Multimedia Content Using Efficient Encryption Methods And Modes

K. John Singh And Kunal Gagneja

International Journal of Advanced and Applied Sciences

2313-3724

114

Parallel Aes Algorithm For Performance Improvement In Data Analytics Security For Iot

Manikandan N, Subha S

International Journal of Networking and Virtual Organisations

1470-9503

115

Passive Incidental Alertness—Based Link Visualization For Secure Data Transmission In Manet

S.Uma, S.P.Shantharajah, C.Rani

Journal of Applied Security Research

1936-1610

116

Prediction Of Diabetes Using Data Mining Techniques

V. Mareeswari, Saranya R, Mahalakshmi R, Preethi E

Research Journal of Pharmacy and Technology

0974-3618

117

Preventing From Phishing Attack By
Implementing Url Pattern Matching
Technique In Web

U.Rahamathunnisa,N.Manikandan,U.Senthilkumaran

And C.Niveditha

International Journal of Civil Engineering and Technology

0976-6316

118

Rating Prediction Based On Social Sentiment From Textual Reviews

M. Deepa, K. Santhi, M. B. Benjulaanbu Malar,Priya .

G, M. Lawanya Shri

International Journal of Pure and Applied Mathematics

1311-8080

119

Robust Classification Of Hyperspectral Remote Sensing Images Combined With Multihypothesis Prediction And 3 Dimensional Discrete Wavelet Transform

Boggavarapu L N P, M Prabukumar

International Journal of Pure and Applied Mathematics,

1311-8080

120

Secret Image Enhanced Sharing Using Visual Cryptography

K.Brindha, N.Jeyanthi

Cybernetics and Information Technologies

1314-4081

121

Secured Sharing Data In Cloud Using Revocable Storage Identity Based Encryption

M.Iyapparaja

Journal of Advanced Research and Dynamical & Control Systems

1943-023X

122

Securing Portable Document Format File Using Extended Visual Cryptography To Protect Cloud Data Storage

K.Brindha, N.Jeyanthi

International Journal of Network Security

1816-3548

123

Security Algorithms In Cloud Computing: A Review,

M B Benjula Anbu Malar, Lawanyasri

International Journal of Pure and Applied Mathematics

1314-3395

124

Security Solution For Arp Cache Poisoning Attacks In Large Data Center Networks

B. Prabadevi, N. Jeyanthi

Cybernetics and Information Technologies

1311-9702

125

Smart Cooking Oil Analyzer Using Dielectric Constant Metric

Sriniavs Koppu., Rajesh D., Srinivasa Perumal R.,

Satheesh Kumar S., Rajeev Pankaj Nelapati

International Journal of Pure and Applied Mathematics,

1311-8080

126

Software Management Issues In Mobile Application Development

Deepa N, M. Senthilkumar, M.K.Nallakaruappn,

R.Chandrasekar, B R Kavitha ,Anand Muthukumarappan

International Journal of Civil Engineering and Technology (IJCIET)

0976-6308

127

Specification Based Intrusion Detection In Software Defined Networking

Nithya S

International Journal of Pure and Applied Mathematics

1314-3395

128

An Improved Multiplication Algorithm

Subha S

International Journal of Pure and Applied Mathematics

1311-8080

129

Stable Multipath Routing Protocol Using Different Route Selection Mechanism For Mobile Ad-Hoc Networks.

Alagiri, I., Muthamil Selvan, T., Thanapal, P.,

& Navaneethan C.

Inernational journal of pure and applied mathematics

1314-3395

130

Statistical Feature Ranking And Fuzzy Supervised Learning Approach In Modeling Regional Rainfall Prediction Systems

M. Sudha

AGRIS on-line Papers in Economics and Informatics

1804-1930

131

Stratified Sampling Method Based Training Pixels Selection For Hyper Spectral Remote Sensing Image Classification

M Radhesyam, Vaddi, Prabukumar M

International Journal of Pure and Applied Mathematics,

1314-3395

132

Successive Shape Based Image Registration

L Agilandeeswari, M Prabukumar, Chinmay,

K Muralibabu, Sudharani

International Journal of Pure and Applied Mathematics,

1314-3395

133

Survey About Segmentation Feature Extraction And Classification Of Disease Affected Leaf Using Digital Image

S.Kalaivani, S.P.Shantharajah

Journal of Advanced Research in Dynamical and Control System

1943-023X

134

Techiecardia-A System For Detection And Prediction Of Sudden Cardiac Arrests

M.Iyapparaja

Journal of Advanced Research and Dynamical & Control Systems

1943-023X

135

Test Case Generation For Embedded System Software Using Uml Interaction Diagram

Mani P, Prasanna M

Journal of Engineering Science and Technology

1823-4690

136

Swf Scheduled Workflow Integration Profile For The Connectivity Problems In Radiology Workflow

Prabadevi. B,

International Journal of Intelligent Engineering and Systems

9758585

137

Two Layered Optimized System Using Bluetooth And Hipherlan Interfaced Wireless Sensor Networks

M.Iyapparaja

Journal of Advanced Research and Dynamical & Control Systems

1943-023X

138

User Web Access Recording And Mining For Business Intelligence

Sindhuja, T.,S.S. Manivannan

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

139

Weighted Fuzzy Rule Based Sentiment Prediction Analysis On Tweets

Syed Muzamil Basha, Yang Zhenning,

Dharmendra Singh Rajput, Iyengar N.Ch.S.N

And Ronnie D. Caytiles

International Journal of Grid and Distributed Computing

2207-6379

140

Cloud Based Automated Framework For Semantic Rich Ontology Construction
And Similarity Computation For E-Health Applications

T. Muthamilselvan , B. Balamurugan

Informatics in Medicine Unlocked

2352-9148

141

Hybrid Approach For Data Classification In E-Health Cloud

T. Muthamilselvan , B. Balamurugan

International Journal of Intelligent Engineering and Systems

2185-3118

142

Role Of Automation In Waste Management And Recent Trends

Raghavendra Desai, M Parimala

International Journal of Environment and Waste Management

1478-9868

143

An Optimized Replica Allocation Algorithm Amidst Of Selfish Nodes In Manet

Kumar Pj, Ilango P

Wireless Personal Communication, Springer

0929-6212

144

Mqrc: Qos Aware Multimedia Data Replication In Cloud

Kumar Pj, Ilango P

International Journal of BioMedical Engineering and Technology

1752-6418

145

Upper Bound Tighter Item Caps For Fast Frequent Itemsets Mining For Uncertain Data Implemented Using Splay Trees

Shashikiran.V And S.Murali

International Journal of Pure and Applied Mathematics

1311-8080

146

Energy Efficient Cluster Head Selection Algorithm In Wireless Sensor Networks Using Ea-Fkpso Protocol

Meenatchi, S., & Prabu, S.

Jour of Adv Research in Dynamical & Control Systems.

1943-023X

147

Test Case Generation For Real Time System Software Using Specification Diagram

Prasanna M

international journal of intelligent engineering and systems

2185-3118

148

An Intelligent Lung Cancer Diagnosis System
Using Cuckoo Search Optimization And Support Vector Machine Classifier

Prabukumar M, Agilandeeswari, L. And Ganesan. K

Journal of Ambient Intelligence and Humanized Computing

1868-5137

149

Heart Disease Prediction System Using Ann, Rbf And Cbr

N. Sivakumar, R.Jothikumar, P.S.Ramesh & Suganthan

International Journal of Pure and Applied Mathematics

1314-3395

150

Applying Reversible Data Hiding For Medical Images In Hybrid Domain Using Haar And Modified Histogram

Vanmathi Chandrasekaran, Prabu Sevugan,

International Journal of Intelligent Engineering and Systems

2185-3118

151

Image Steganography Using Fuzzy Logic And Chaotic For Large Payload And High Imperceptibility

Vanmathi C., Prabu S

International Journal of Fuzzy Systems

1562-2479

152

A Comparative Study Of Statistical And Rough Computing Models In Predictive Data Analsis

A. Anitha, D. P. Acharjya

International Journal of Ambient Computing and Intelligence (IJACI)

1941-6237

153

Crop Suitability Prediction In Vellore District Using Rough Set On Fuzzy Approximation Space And Neural Network

A. Anitha, D. P. Acharjya

Neural Computing and Applications

0941-0643

154

Optimal View Point Selection In Direct Volume Rendering For 3D Visualization

Gunasekaran, G., & Venkatesan, M.

International Journal of Intelligent Engineering and Systems

2185-3118

155

An Efficient Technique For Three-Dimensional Image Visualization Through Two-Dimensional Images For Medical Data

Gunasekaran, G., & Venkatesan, M.

Journal of Intelligent Systems

2191-026X

156

A Novel Method For Smart Vehicle Safety

K.Uma, Anand Kannan,

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

157

Alert On Detection Of Hazardous Changes In Environmental Parameters Using Gsm

K.Uma

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

158

Smart Vehicle Safety Using Efficient Technique To The Vehicle Traveller’S

K.Uma

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

159

The Challenges And Issues On Big Data Analytics

K.Uma, Anand Kannan

Journal of Advanced Research in Dynamical and Control Systems

1943-023X

160

An Analysis Of Decision Theoretic Kernalized Rough Intuitionistic Fuzzy C-Means

Ryan Serrao, B.K.Tripathy And A.Jayaram Reddy

Advances in Intelligent Systems and Computing

2194-5357

161

Hocs : Host Oscommunication Service

Jayakumar Sadhasivam, Senthil Jayavel,

Balajee Jayakumar, Shoaib Merchant

International Journal of Civil Engineering and Technology

0976-6316

162

A Review On Polygonal Approximation Techniques Of The Digital Planar Curves

Kalaivani S

International Journal of pure and Applied Mathematics

1311-8080

163

Review Of Gaming And Its Evolution Over Networks

Jaya Kumar S

International Journal of Civil Engineering and Technology

0976-6316

164

Convoluted Local Binary Pattern Based Grouping Neural Network For Face Emotion Recognition

Krithika L B,Lakshmi Priya Gg

Journal of Engineering Science and Technology Review

1791-2377

165

A Case Study Of Carry Skip Adder And Design Of Feed-Forward Mechanism To Improve The Speed Of Carry Chain

Premson Y, Sakthivel.R,Vivek.T, Vanitha M

International Journal of Pure and Applied Mathematics

1311-8080

166

Performance Analysis Of Cloud Computing In Healthcare Systemusing Tandem Queues

K.Santhi, R.Saravanan

International Journal of Intelligent Engineering and Systems

2185-3118

167

Performance Analysis Of Cloud Computing Bulkservice Using Queueing Models

K.Santhi, R.Saravanan

International Journal of Applied Engineering Research

1311-8080

168

Performance Analysis Of Cloud Computing Using Batch Queueing Models In Healthcare Systems

K.Santhi, R.Saravanan

Research Journal of Pharmacy and Technology

0974-360X

169

Clustering Algorithm In Possibilistic Exponential Fuzzy C-Mean Segmenting Medical Images

Chiranji Lal Chowdhary

JOURNAL OF BIOMIMETICS, BIOMATERIALS AND BIOMEDICAL ENGINEERING

2296-9845

170

Modelling The H1Ni Influenza Using Mathematical And Neural Network Approaches

Daphne Lopez, Gunasekaran M, Jagan Mohan

Biomedical Research

0970-938X

171

Parametric Model To Predict H1N1 Influenza In Vellore District, Tamil Nadu, India

Daphne Lopez, Gunasekaran Monoharan

Handbook of Statistics

1992-8408

172

A Survey On Big Data Arcitectures And Machine Learning Algorithms In Healthcare

Gunasekaran M,Daphne Lopez

International Journal of Biomedical Engineering and Technology

1752-6418

173

A Gaussian Process Based Big Data Processing Framework In Cluster Computing Environment

Gunasekaran M,Daphne Lopez

Cluster Computing

1386-7857

174

Disease Surveillance System For Big Climate Data Processing And Dengue Transmission

Gunasekaran M,Daphne Lopez

International Journal of Amient Computing and Intelligence

1941-6237

175

Document Level Prioritization And Identificataion Of Dominant Multi-Word Named Products In Customer Reviews

Sivashankar,Valarmathi

Aab Journal of Science & Engineering

2191-4281

176

A Heuristic Approach To Machine-Part Cell Formation In The Presence Of Alternative Process Plans

Sowmiya N, Srinivasa Gupta, Valarmathi,

Poonambalam

International Journal of Advanced Manufacturing Technology

14333015

177

A Review Of Categorical Data Clustering Methodologies Based On Recent Studies

Sowmiya,Valarmathi

IIOAB Journal

9763104

178

Brain Tumour Segmentation From Mri Using Superpixels Based Spectral Clustering.

Angulakshmi, M., Gg Lakshmi Priya

Journal of King Saud University-Computer and Information Sciences

1319-1578

179

Procedural Restoration Of Texture And Restruing Geometry From Façade Image

Divya Udayan

IEEE access

21693536

180

A Study On Tailor-Made Security Schemes To Defend Iots

M N Rajaprabha, P Jayalakshmi,

R Vijay Anand

International Journal of Advance Research in Science and Engineering

2319-8354

181

Bike Sharing Prediction Using Deep Neural Networks

Thirumalai, Chandrasegar And Koppuravuri,

Ravisankar.

JOIV: International Journal on Informatics Visualization

2549-9610

182

Comparative Study On Various Graph Algorithms, . 414-419

Angulakshmi., Rathi,R., Sudha, S., Brindha,K.,

International journal of advance research in science and engineering

2319-8346

183

Honey Bee Foreaging Algorithm For Load Balancing In Cloud Computing Optimization

Sudha, S., Brindha,K., Rathi,R.,Angulakshmi.,

Jothi.,Thirani.,

International Journal of Engineering Science and Computing

2321-3361

184

A Case Study On Cognitively Improvised Min-Max Algorithm For Distributed Computer Systems,

Sudha, S., Brindha,K., Rathi,R.,Nishanth,A., Vivek,P.,

International Journal for Scientific Research & Development

906-911

185

A Case Study On Performance Analysis Of Routing Protocols In Mobile Adhoc Netwoks

Nallakaruppan.M.K, N. Deepa,Pranava Kumar.R,

Sudhanshu Gera,Arpit Chikara

International Journal for Science and Advance Research in Technology

2395-1052

186

Analysis Of Agricultural Data Using Big Data Analytics

Ravishankar K, Sidhardha K, Prabadevi B

Journal of chemical and pharmaceutical Sciences

0974-2115

187

A Data Security Self-Attribute System In Cloud Computing
and Communication Engineering

Kumaresan P Dhanesh Lokhande

International Journal of Innovative Research in Computer

2320-9798

188

A Modified Synthetic Division Algorithm

S Subha

International Journal of Computational and Applied Mathematics

2349-5103

189

A Novel Based Ranking Radically Influential Web Environment Users,

M B Benjula Anbu Malar

International Journal of Advance Research in Science and Engineering

2319-8354

190

A Novel Method Of Real Time City Scale Taxi Trip Distribution

M B Benjula Anbu Malar

International Journal of Advance Research in Science and Engineering

2319-8354

191

A Study On Travel Recommendation System

Angulakshmi , Rathi.R , Dr.Sudha Senthilkumar ,

Dr.K.Brindha , Rajat Tandon

International Journal of Engineering Science and Computing, December

2321 3361

192

A Survey On Trust Models In Cloud Computing

Kumaresan P Ramya Govindaraj Kavitha B R

International Journal of Advance research in Science and Engineering

2319-8354

193

A Synthetic Division Algorithm With Positive Remainder

S Subha

International Journal of Advanced Science and Research

2455-4227

194

Agriculture E-Commerce Website,

M B Benjula Anbu Malar

International Journal of Advance Research in Science and Engineering ,

2319-8354
195 Agronomic Disaster Management Using Artificial Intelligence – A Case Study M. Sudha International Journal of Computer Science and Business Intelligence 2364-4168
196 An Efficient And Secured Data Storage Scheme In Cloud Computing, M B Benjula Anbu Malar International Journal of Advance Research in Science and Engineering 2319-8354
197 Applications Of Iot In Green Environment Kumaresan P, Darshan K N, Kavitha B R, Ramya Govindaraj International Journal of Advance research in Science and Engineering 2319-8354
198 Big Data In Healthcare: A Review Magesh G, P.Swarnalatha Emerging trends in Computer Engineering and Research, IIOAB Journal 0976-3104
199 Cloud With Iot In Smart Parking Sujatha R, Rahul Gorai, Harshita Wadhwa, Shivani Tripathi International Journal of Innovative Research in Management, Engineering and Technology 2456-0448
200 Computational Intelligence Based Sports Success Prediction System Using Functional Pattern Growth Tree – A Case Study M. Sudha International Journal of Computational Intelligence Research 0974-1259
201 Content Based Image Retrieval Using Hadoop And Hipi Kumaresan P, Kavitha B R, Ramya Govindaraj International Journal of Advance research in Science and Engineering 2319-8354
202 Detection Of Phishing Pages Over The Internet Using Anti-Phishing Techniques P Jayalakshmi, M N Rajaprabha, R Vijay Anand International Journal of Advance Research in Science and Engineering 2319-8354
203 Expelling Undesired Targets From An Image
Exploiting Surface Synthesis And Dispersion
and Communication Engineering
Based Technique
Kumaresan P, Pratik Bhosale International Journal of Innovative Research in Computer 2320-9798
204 Framework For Reliable Re Encryption In Cloud Magesh G, P.Swarnalatha Journal of Chemical and Pharmaceutical Sciences 0974-2115
205 Fuzzy-Set Based Privacy Preserving Access Control Techniques In Cloud (Fb-Ppac) Brindha.K, Sudha.S ,Sushmitakumari International Journal of Artificial Intelligence 2252-8938
206 Gdfs Based Data Encryption Technique In Cloud Computing Environments M B Benjula Anbu Malar International Journal of Advance Research in Science and Engineering 2319-8354
207 Heart Disease Prediction Using Data Mining Techniques Nallakaruppan.M.K, N. Deepa, Moin Ahmed, Tanuja, Ajith Kumar,Pranava Kumar.R International Journal of Engineering Science and Computing 2321-3361
208 An Improved Tumour Identification With Gabor Wavelet Segmentation Ciranji Lal Choudahary Research 2321 3361

209

Inquiry Based E-Learning System Using Personalized Knowledge Search

P Jayalakshmi, M N Rajaprabha, R Vijay Anand

And K Venkatesan

International Journal of Advance Research in Science and Engineering

2319-8354

210

Instant Medical Care And Drug Suggestion Service Using Data Mining And Machine Learning Based Intelligent Self-Diagnosis Medical System

M. Sudha

International Journal of Advanced Life Sciences

2277-758X

211

Iris Recognition System

Magesh G, Ravee Sundararajan

International Research Journal of Engineering and Technology (IRJET)

2395-0056

212

Leaf Disease Detection Using Image Processing

Sujatha, R, Y Sravan Kumar And Garine Uma Akhil

Journal of Chemical and Pharmaceutical Sciences

0974-2115

213

Precision Agriculture Using Real Time
Environmental Parameters And Internet Of Things
and Communication Engineering

Kumaresan P Ketan Prakash Kandagale

International Journal of Innovative Research in Computer

2320-9798

214

Privacy Preserving And Secret Based Navigation Scheme In Vehicular Adhocnetwork : A Case Study

M B Benjula Anbu Malar

International Journal of Advance Research in Science and Engineering ,

2319-8354

215

Reconfigurable Interpolation Filter Architecture Design

Satheesh Kumar S, Venugopal P, Srinivas Koppu,

Rajeev Pankaj N, Rajesh Kaluri, Madhusudhana Rao

International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering

2278-8875

216

Reconstruction Of Per Packet Routing Path

M B Benjula Anbu Malar

International Journal of Advance Research in Science and Engineering

2319-8354

217

Smarter Way To Access Multiple Mobile Cloud Applications Without Interoperability Issues.

Thanapal, P., Marimuthu, K., Rajkumar, S., & Niranchana, R.

I.J. Wireless and Microwave Technologies

2076-1449

218

Temperature Controlled Dc Fan

Sudha, S., Brindha,K., Rathi,R.,Hardi,S., Kataria,S.,

International journal of advance research in science and engineering

498-506

219

User Authentication Framework With Improved Performance In Multi-Cloud Environment

R. Thandeeswaran, M A Saleem Durai

American Journal of Computer Science and Information Technology

2349-3917

220

Validation Of Automated Test Cases With Specification Path

Mani P, Prasanna M

Journal of statistics and Management Systems

0972-0510

221

Weather Modeling Using Data-Driven Adaptive Rough-Neuro-Fuzzy Approach

M. Sudha

Current World Environment

0973-4929

222

Assessment Of Unfair User Rating In Multidisciplinary System

V.Mareeswari, Bala Prasanth P

Research Journal of Pharmaceutical, Biological and Chemical Sciences

0975-8585

223

Pattern Recognition Using Pca Algorithms

Uma Maheswari G, Ephzibah E P, Mareeswari V

Research Journal of Pharmaceutical, Biological and Chemical Sciences

0975-8585

224

Fog Computing – Enhancing The Maximum Energy Consumption Of Data Servers

Priyanka C, Prabadevi, Jeyanthi N

IDL - International Digital Library Of Technology & Research

2349-302X

225

Anomaly Based Intrusion Detection Methods In Network Infrastructure – A Survey

Dhanabal L, S.P.Shantharajah, T. Padma

Asian Journal of Research in Social Sciences and Humanities

2249-7315

226

Survey Of Image Segmentation Algorithm For Medical Images: Challenges And Methodologies

P Chinmayi, M Prabukumar, L Agilandeeswari

RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES

0975-8585

227

Data Replication In Current Generation Computing Environment

Kumar Pj, Ilango P

International Journal of Engineering trends and Technology,

2231-5381

228

Data Replication In Conventional Computing Environment

Kumar Pj, Ilango P

International Journal of Computer Trends and Technology

2231-2803.

229

Case Study- Machine Learning Based On Scenario Analysis

Prabadevi. B, Vanmathi. C, Krithika. L. B,

Sudha. S, Vivek Akabote

International Journal of Scientific Research in Computer Science, Engineering and Information Technology

2456-3307

230

Precise Investigations Of Software Quality

Alice Auxilia .L, Asha .N, Vanmathi .C

International Journal of Engineering Science and Computing,

2321-3361

231

Intrusion Detection System Based On Artificial Intelligence

  1. Anitha,Sv Revathi, S Jeevanantham,
  2. Eliza Godwin

International Journal of Technology

2231-3915

232

Mooc : A Framework For Learners Using Learning Style

Jayakumar Sadhasivam And Ramesh Babu Kalivaradhan

International Education and Research Journal

2454-9916

233

Review On Sentiment Analysis A Learners’ Opinion

Jayakumar Sadhasivam And Ramesh Babu Kalivaradhan

IIOAB - Emerging trends in Computer Engineering and Research

0976-3104

234

Comparative Study On Web Based Software Project Management Tools

Jayakumar Sadhasivam

International Journal of Modern Computer Science

2320-7868

235

Data Load Balancing In A Big Data Heterogeneous Environment

P Jayalakshmi, M N Rajaprabha, R Vijay Anand

And K Venkatesan

International Journal of Advance Research in Science and Engineering

2319-8354

236

I Voting

P Jayalakshmi, M N Rajaprabha, R Vijay Anand

And K Venkatesan

International Journal of Advance Research in Science and Engineering

2319-8354

237

A Novel Method For Key Aggregation On Data Sharing In Cloud Stoeage Environment

K.Shanthi, M.Deepa, M.Lawanya Shri

International Journal of Advance Research in Science and Engineering

2319-8354

238

Implementation Of Morphological Image Processing Algorithm Using Mammograms

Tk Das, Cl Chowdhary

journal of chemical and proceessing

9742-115

239

A Review On Internet Of Things And Its Applications In Healthcare

Chiranji Lal Chowdhary

Journal of Chemical and Pharmaceutic al Sciences

0974-2115

2016

S.No. Publication details (incl complete bibliography)

1.

Raj, E. D., & Babu, L. D. (2016). A fuzzy adaptive resonance theory inspired overlapping

community detection method for online social networks.

Knowledge-Based Systems, 113, 75-87.

2.

Vijayakumar, P., Chang, V., Deborah, L. J., Balusamy, B., & Shynu, P. G. (2016).

Computationally efficient privacy preserving

anonymous mutual and batch authentication schemes for vehicular ad hoc networks.

Future Generation Computer Systems.

3.

Loganathan, A., & Kaliyaperumal, G. (2016). An adaptive HVS based video watermarking

scheme for multiple watermarks using BAM neural networks and fuzzy inference system.

Expert Systems with Applications, 63, 412-434.

4.

PVSSR, C. M. (2016). Dimensionality reduced local directional pattern (DR-LDP) for face recognition.

Expert Systems with Applications, 63, 66-73.

5.

Boobalan, M. P., Lopez, D., & Gao, X. Z. (2016). Graph clustering using k-Neighbourhood

Attribute Structural similarity.

Applied Soft Computing, 47, 216-223.

6.

Deepa, N., & Ganesan, K. (2016). Multi-class classification using hybrid soft decision model

for agriculture crop selection.

Neural Computing and Applications, 1-14.

7.

Lopez, D., & Sekaran, G. (2016). Climate change and disease dynamics-a big data perspective.

International Journal of Infectious Diseases, 45(1):23-24.

8.

Singh, P. K., Kumar, C. A., & Li, J. (2016). Knowledge representation using interval-valued

fuzzy formal concept lattice.

Soft Computing., 20(4), 1485-1502.

9.

Agilandeeswari, L., & Ganesan, K. (2016). A bi-directional associative memory based multiple

image watermarking on cover video.

Multimedia Tools and Applications, 75(12), 7211.

10.

Agilandeeswari, L., & Ganesan, K. (2016). A robust color video watermarking scheme based on hybrid embedding techniques.

Multimedia Tools Appl., 75(14), 8745-8780.

11.

Ahamed, B. B., & Ramkumar, T. (2016). An intelligent web search framework for performing efficient retrieval of data.

Computers & Electrical Engineering, 56, 289-299.

12.

Balakrishnan, S. M., & Sangaiah, A. K. (2016). Integrated QoUE and QoS approach for optimal service

composition selection in internet of services (IoS).

Multimedia Tools and Applications, 1-28.

13.

Sujatha, R., & Ezhilmaran, D. (2016). A new efficient SIF-based FCIL (SIF–FCIL) mining algorithm in

predicting the crime locations.

Journal of Experimental & Theoretical Artificial Intelligence, 28(3), 561-579.

14.

Pounambal, M., & Krishna, P. V. (2016). Efficient channel assignment method for multimedia

traffic in wireless mesh networks.

International Journal of Communication Systems, 29(5), 929-941.

15.

Singh, P. K., Aswani Kumar, C., & Gani, A. (2016). A comprehensive survey on formal concept

analysis, its research trends and applications. International Journal of Applied Mathematics and

Computer Science, 26(2), 495-516.

16.

Tripathy, A. K., Chinara, S., & Sarkar, M. (2016). An application of wireless brain–computer interface

for drowsiness detection.

Biocybernetics and Biomedical Engineering, 36(1), 276-284.

17.

Navaneethan, C., & Prabha, K. H. (2016). Optimizing Network Layer with Adaptive Modulation for

Time Varying Channel.

Wireless Personal Communications, 90(2), 1003-1019.

18.

Balasubramanian, V., Nagarajan, S. G., & Veerappagoundar, P. (2016). Mahalanobis distance-the

ultimate measure for sentiment analysis.

Int. Arab J. Inf. Technol., 13(2), 252-257.

19.

Nalinipriya, G., Maheswari, K. G., Balusamy, B., Kotteswari, K., & Kumar Sangaiah, A. (2016).

Availability modeling for multi-tier cloud environment. Intelligent Automation & Soft Computing, 1-8.

20.

Kumar, C. A., Mouliswaran, S. C., Li, J. H., & Chandrasekar, C. (2016). Role based access control design

using triadic concept analysis.

Journal of Central South University, 23(12), 3183-3191.

21.

Swathi, G., & Saravanan, R. (2016). A Framework for Efficient Routing in MANET using Index Routing

Tables-based Algorithms.

Defence Science Journal, 66(6), 568.

22.

Deepa, N., & Ganesan, K. (2016). Mahalanobis Taguchi system based criteria selection tool for

agriculture crops.

Sādhanā, 41(12), 1407-1414.

23.

Leo Dencelin X, Ramkumar, T. (2016). Analysis of multilayer perceptron machine learning

approach in classifying protein secondary structures.

Biomedical Research. Special Issue- Computational Life Science and Smarter Technological

Advancement, August 2016, S166-S173.

24.

Rajavel, D., & Shantharajah, S. P. (2016). Scrambling algorithm for encryption of text using

cube rotation artificial intelligence technique.

Biomedical Research. Special Issue-Computational Life Science and Smarter Technological

Advancement, August 2016, S251-S256.

25.

Das, T. K., & Nahar, K. M. (2016). A Voice Identification System using Hidden Markov Model.

Indian Journal of Science and Technology, 9(4).

26.

Manikandan, N., & Subha, S. (2016). Software Design Challenges in Time Series Prediction Systems

Using Parallel Implementation of Artificial Neural Networks.

The Scientific World Journal, 2016.

27.

Subha, S. (2016). A Power Saving Set Associative Cache Model. Indian Journal of Science and Technology, 9(6).

28.

Praveen Kumar Reddy M. & M. Rajasekhara Babu (2016). A scalable approach for improving dynamic

multithreaded applications on NUMA based architectures.

ARPN Journal of Engineering and Applied Sciences, 11(3), 1494-1503.

29.

Narayanan, M., & Cherukuri, A. K. (2016). A study and analysis of recommendation systems

for location-based social network (LBSN) with big data.

IIMB Management Review, 28(1), 25-30.

30.

Jayanthi R, Siva Rama Krishnan S, Rama Prabha K P., (2016). Spoofing Assault

Identification and Limiting Several Adversaries in Wireless Networks.

International Journal of Applied Engineering Research, 11(1), 286-289.

31.

Shynu, P. G., & Singh, K. J. (2016). A Comprehensive Survey and Analysis on Access

Control Schemes in Cloud Environment.

Cybernetics and Information Technologies, 16(1), 19-38.

32.

Subha, S. (2016). A literature survey on cpu cache reconfiguration. ARPN Journal of

Engineering and Applied Sciences. 11(5), 3008-3012.

33.

Prasanna, S., & Ezhilmaran, D. (2016). A Survey of Stock Price Prediction & Estimation

Using Data Mining Techniques.

International Journal of Applied Engineering Research, 11(6), 4097-4099.

34.

Vijayan, R., & Jeyanthi, N. (2016). A survey of trust management in mobile ad hoc networks.

International Journal of Applied Engineering Research, 11(4), 2833-2838.

35.

Thanapal P., Saleem Durai M A., (2016). A survey on application partitioning for mobile cloud computing.

International Journal of Pharmacy and Technology. 8(1), 10574-10589.

36.

Suganya P, (2016). A survey on various security measures used in cloud.

International Journal of Pharmacy and Technology. 8(1), 3644-3647

37.

Prathik, A., Uma, K., & Anuradha, J. (2016). An Overview of application of Graph theory.

International Journal of ChemTech Research, 9(2), 242-248.

38.

Anusha, K., & Sathiyamoorthy, E. (2016). Comparative study for feature selection

algorithms in intrusion detection system.

Automatic Control and Computer Sciences, 50(1), 1-9.

39.

Seetha R & Saravanan R. (2016). Digital Signature Schemes for group communication: A Survey.

International Journal of Applied Engineering Research, 11(6), 4416-4422.

40.

Rathi R., (2016). Hybridization of soft computing framework – a survey.

International Journal of Pharmacy & Technology, 8(1), 3594-3602.

41.

Das, T. K. (2016). Intelligent techniques in decision making: A survey.

Indian Journal of Science and Technology, 9(12).

42.

Anand, R. V., & Dinakaran, M. (2016). Popular Agile Methods in Software Development:

Review and Analysis. International Journal of Applied Engineering Research, 11(5), 3433-3437.

43.

Fiaz, A. S., Asha, N., Sumathi, D., & Navaz, A. S. (2016). Data Visualization: Enhancing

Big Data More Adaptable and Valuable.

International Journal of Applied Engineering Research, 11(4), 2801-2804.

44.

Thandeeswaran, R., & Durai, M. S. (2016). Wide-ranging Survey on Authentication Mechanisms.

International Journal of Applied Engineering Research, 11(6), 4114-4117.

45.

Sharon Moses J., Babu, L. D. (2016). A locality centred recommendation system combining

CNM clustering technique with fuzzy preference tree-based ranking algorithm.

International Journal of Business Intelligence and Data Mining, 11(1), 63-84.

46.

Siva Rama Krishnan S., karthik Balasubramanian, Arun Kumar T., Challenges in Data Aggregation

in Wireless Sensor Network – A Review. International Journal of Applied Engineering Research, 11(7), 5342-5345.

47.

Panneer, P., & Tripathy, B. K. (2016). Covering Rough Clustering Approach for Unstructured Activity Analysis.

International Journal of Intelligent Information Technologies (IJIIT), 12(2), 1-11.

48.

Kumar, K. S., & Deepa, K. (2016). Medical Query Expansion using UMLS. Indian Journal

of Science and Technology, 9(14).

49.

Bhushan, S. B. Reddy. C. H., Pradeep (2016). A network qos aware service ranking using

hybrid ahp-promethee

method in multi-cloud domain. International Journal of Engineering Research in Africa, 24.

50.

Senthil Kumar P., Daphne Lopez., (2016). A Review on Feature Selection Methods for High

Dimensional Data.

International Journal of Engineering and Technology, 8(2), 669-672.

51.

Hemalatha S., Margret Anouncia S., (2016). A Review on Human Identification Systems using

Biometrics Fingerprint Matching,

Internation Journal of Pharmacy and Technolog, 8(1), 3604-3610.

52.

Pushparaj R., Dinakaran M., (2016). An Energy aware routing for Manets using Dynamic power

threshold with load balancing.

World Applied Sciences Journal, 34(1), 120-127.

53.

SenthilKumar M, Ilango P., (2016). Analysis of DNA data using Hadoop Distributed File System.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(3).

54.

Dharinya, S. (2016). Analysis of document summarization and word classification in a smart

environment.

Indian Journal of Science and Technology, 9(19).

55.

Sangamithra A., Vani. M.P., (2016). Analysis of Network Security Spasms and Circumvention.

International Journal of Engineering and Technology, 8(2), 604-608.

56.

Thippa Reddy, G., & Khare, N. (2016). FFBAT-Optimized Rule Based Fuzzy Logic Classifier

for Diabetes.

In International Journal of Engineering Research in Africa (Vol. 24, pp. 137-152). Trans Tech Publications.

57.

Manogaran, G., Thota, C., & Kumar, M. V. (2016). Meta Cloud Data Storage architecture for

Big Data security

in cloud computing. Procedia Computer Science, 87, 128-133.

58.

Suganya P., Pradeep Reddy Ch., (2016). Potential threats caused by malicious nodes and various counter

measures available in MANET: A Survey. Research Journal of Pharmaceutical, Biological and

Chemical Sciences, 7(3), 1012-1016.

59.

Senthilkumar, M. N. M., & Senthilkumaran, U. (2016). Review of asymmetric key cryptography in wireless

sensor networks. International Journal of Engineering and Technology, 8(2), 859-862.

60.

Gunasekaran G., Venkatesan M., (2016). Review on Visualization Techniques for Medical Data and its Application.

Research Journal of Pharmaceutical, Biological and Chemical Science, 7(3), 169-173.

61.

Gagneja, K., & Singh, J. (2016). Survey and analysis of security issues on RSA algorithm for digital video data.

Journal of Discrete Mathematical Sciences and Cryptography, 19(1), 39-55.

62.

Rajesh kaluri, (2016). A Comparative study on image segmentation techniques. International Journal of Pharmacy

and Technology, 8(2), 12712-12717.

63.

Srinivas Koppu, Madhu Viswanathan, (2016). A Novel Chaotic Image Encryption System for color images based

Arnold Cat Map and Efficient Pixel Shuffling. International Journal of Pharmacy and Technology, 8(2), 13353-13361.

64.

Subha, S., & Sakthivel, R. (2016). A Power Saving Multiplication Algorithm. International Journal of Applied

Engineering Research, 11(9), 6200-6203.

65.

Manikandan N., Subha S., (2016). A Review on evaluating the usage of multiple cores effectively in personal

computer based applications. International Journal of Pharmacy & Technology, 8(2), 3916-3927.

66.

Dinakaran M., (2016). A Review on requirement of self sustainable natural farming and

application of information

and communication technology (Agro Informatics) for agriculture in India. International Journal

of Pharmacy & Technology, 8(2), 3944-3956.

67.

Nagaraja G., Pradeep Reddy Ch., (2016). A Survey on group key management frameworks for secure group

communication in mobile Ad hoc Networks. International Journal of Pharmacy & Technology, 8(2), 4121-4129.

68.

Srinivas Koppu, Madhu Viswanatham V., (2016). A Survey on security issues: Digital Images. International Journal

of Pharmacy & Technology, 8(2), 13420-13427.

69.

Santhi K., Saravanan R., (2016). A Survey on queueing models for cloud computing. International Journal of Pharmacy

& Technology, 8(2), 3964-3977.

70.

Manivannan S.S., (2016). A Systematic survey of routing attacks and counter measures in wireless networks.

International Journal of Pharmacy & Technology, 8(2), 3957-3963.

71.

Agilandeeswari, L., & Ganesan, K. (2016). An efficient hilbert and integer wavelet transform

based video watermarking.

Journal of Engineering Science and Technology, 11(3), 327-345.

72.

Kuruva Lakshmanna, Rajesh Kaluri, Thippa Reddy G., Nagaraja G., Dhenesh V Subramanian, (2016).

An enhanced algorithm for frequent pattern mining from Biological sequences. International

Journal of Pharmacy & Technology, 8(2), 12776-12784.

73.

Subha, S. (2016). An Improved Non-Restoring Algorithm. International Journal of Applied

Engineering Research, 11(8), 5452-5454.

74.

Rajesh Kaluri, Pradeep Reddy Ch., (2016). An overview of Human Gesture Recognition.

International Journal of Pharmacy & Technology, 8(2), 12037-12045.

75.

Arivu Selvan K., Sathiyamoorthy E., (2016). Automated Retrieval of medical images based on

distinct features using Fuzzy Logic approach.

International Journal of Pharmacy & Technology, 8(2), 13230-13239.

76.

Rahamathunnisa U., Saravanan R., (2016). Classificationn of Noise in Video – A Review.

International Journal of Pharmacy & Technology, 8(2), 3928-3932.

77.

Kumar, N. S., & Muruganantham, D. (2016). Disambiguating the Twitter Stream Entities and Enhancing

the Search Operation Using DBpedia Ontology: Named Entity Disambiguation for Twitter Streams.

International Journal of Information Technology and Web Engineering (IJITWE), 11(2), 51-62.

78.

Deepa M., Santhi K., Benjula Anbu Malar M.B., Lawanya Shri M., (2016).

Distributed Detection of malicious

nodes in wireless sensor networks under Byzantine Attack. International Journal of Pharmacy

& Technology, 8(2), 13546-13552.

79.

Lawanya Shri M., Benjula Anbu Malar M.B., Santhi K., Deepa M., (2016). E-Learning system

with Hierarchical

attribute set based encryption access control in cloud. International Journal of Pharmacy &

Technology, 8(2), 12785-12792.

80.

Mohankumar, S., & Balasubramanian, V. (2016). Identifying Effective Features and Classifiers for Short

Term Rainfall Forecast Using Rough Sets Maximum Frequency Weighted Feature Reduction Technique.

CIT. Journal of Computing and Information Technology, 24(2), 181-194.

   

81.

Dharmendra Singh Rajput, Praveen Kumar Reddy M, Shrivastava D.P., (2016).

Mining Frequent Termset for

Web document data using Genetic Algorithm. International Journal of

Pharmacy & Technology, 8(2), 4038-4054.

82.

Mohankumar P., Balamurugan, (2016). Optimality analysis of query processing using various

caching approaches –

A Review. International Journal of Pharmacy & Technology, 8(2), 3739-3751.

83.

Manivannan, S. S., & Sathiyamoorthy, E. (2016). Preventing health care web applications from

session hijack attacks

using session key authentication and distributed session id. ARPN Journal of Engineering and

Applied Sciences,11(13), 8257-8263.

84.

Perumal, V. (2016). Randomized Symmetric Crypto Spatial Fusion Steganographic System.

Journal of ICT Research and Applications, 10(1), 15-28.

85.

Durai Raj Vincent P M., (2016). RSA Encryption Algorithm – A Survey on its various forms and

its security level.

International Journal of Pharmacy & Technology, 8(2), 12230-12240.

86.

Durai Raj Vincent P M., (2016). Secured Healthcare Date exchange using proposed security scheme.

International Journal of Pharmacy & Technology, 8(2), 12144-12154.

87.

Prabukumar, M., & Ray, B. K. (2016). Semi-circular angle-based one bit circle generation algorithm

on a hexagonal grid.

International Journal of Computer Aided Engineering and Technology, 8(3), 199-216.

88.

Krithika, L. B. Lakshmi Priya G G. (2016). Student Emotion Recognition System (SERS)

for E-Learning

Improvement Based on Learner Concentration Metric. Procedia Computer Science, 85, 767-776.

89.

Kaushik Roy, Ramya G., (2016). Survey on mobile vulnerability issues and basic security policies.

International Journal of Pharmacy & Technology, 8(2), 3823-3833.

90.

Hemalatha, S., & Anouncia, S. M. (2016). A Computational Model for Texture

Analysis in Images with Fractional Differential Filter for Texture Detection. International

Journal of Ambient Computing and Intelligence, 7(2).

91.

Chowdhary, C. L., & Acharjya, D. P. (2016). A hybrid scheme for breast cancer detection using

intuitionistic fuzzy rough set technique.

International Journal of Healthcare Information Systems and Informatics, 11(2).

92.

Senthilkumar, M., & Ilango, P. (2016). A Survey on Job Scheduling in Big Data. Cybernetics

and Information Technologies, 16(3), 35-51.

93.

Malar, M. B. A., Shri, M. L., Deepa, M., & Santhi, K. (2016). Approach for Secure Authorized

Deduplication using Hybrid Cloud. International Journal of Applied Engineering Research,

11(15), 8480-8482.

94.

Ramachandran, P., & Dinakaran, M. (2016). Signal Strength and Residual Power Based Optimum

Transmission Power Routing for Mobile Ad hoc Networks. Procedia Computer Science, 92, 168-174.

95.

Parimala, M., & Lopez, D. (2016). Spatio-temporal graph clustering algorithm based on attribute

and structural similarity.

International Journal of Knowledge-based and Intelligent Engineering Systems, 20(3), 149-160.

96.

Das, A. J., Wahi, A., Kothari, I., & Raskar, R. (2016). Ultra-portable, wireless smartphone

spectrometer for rapid,

non-destructive testing of fruit ripeness. Scientific reports, 6, 32504.

97.

Anusha, K., & Sathiyamoorthy, E. (2016). OMAMIDS: Ontology Based Multi-Agent Model

Intrusion Detection System for Detecting

Web Service Attacks. Journal of Applied Security Research, 11(4), 489-508.

98.

Prabhavathy P, Tripathy BK, Venkatesan Meenakshi Sundaram, (2016). Covering based

refined Rough K-Means Algorithm,

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(5), 2142-2151.

99.

Senthil Kumar N, Kauser Ahamed P. (2016). Pervasive utilization of PSO techniques over

twitter data streams.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(5), 796-803.

100.

Anitha, A., & Acharjya, D. P. (2016). Customer Choice of Super Markets using Fuzzy

Rough Set on Two Universal Sets

and Radial Basis Function Neural Network. International Journal of Intelligent Information

Technologies (IJIIT), 12(3), 20-37.

101.

Vincent, P. D. R., & Sathiyamoorthy, E. (2016). A novel and efficient public key encryption

algorithm. International

Journal of Information and communication technology, 9(2), 199-211.

102.

Shivhare, R., & Kumar, C. A. (2016). On the cognitive process of abstraction. Procedia

Computer Science, 89, 243-252.

103.

Ramu, S. P., & Sevugan, P. (2016), An approach for efficient pre-processing of multi-temporal

hyperspectral satellite

imagery., The IIOAB Journal, 7(5), 12-20.

104.

Kumaran U., Neelu Khare, (2016). An Empirical study of security in Text mining for large

datasets. International

Journal of Control theory and applications, 9(6), 2737-2743.

105.

Prasanna, S., & Ezhilmaran, D. (2016). Association rule mining using enhanced apriori with

modified GA for stock

prediction. International Journal of Data Mining, Modelling and Management, 8(2), 195-207.

106.

Mani P., Prasanna M., (2016). A Study on functional specification based test case generation

for real-time systems.

International Journal of Engineering and Technology, 8(4), 1801-1806.

107.

Lakshmanna, K., & Khare, N. (2016). Constraint-based measures for DNA sequence mining

using group search

optimization algorithm. International Journal of Intelligent Engineering and systems, 9(3), 91-100.

108.

Radhakrishnan, S., & Devarasan, E. (2016). Computing the Probability on Socio Economic

Factors to Predict the Crime

Locations by Means of Joint Probability Based AMABC-FCIL. International Journal of Intelligent

Engineering & Systems, 9(3), 80-90.

109.

Bhushan, S. B., & Reddy, P. (2016). BB-LBA: biogeography-based load balancing algorithm in multi

cloud domain.

International Journal of Internet Protocol Technology, 9(2-3), 100-106.

110.

Balakrishnan, S. M., & Sangaiah, A. K. (2016). Aspect-oriented middleware framework for resolving

service discovery

issues in Internet of Things. International Journal of Internet Protocol Technology, 9(2-3), 62-78.

111.

Arivuselvan K., Sathiyamoorthy E., (2016). Analysing EEG sub-bands to distinguish between

individuals with neural

disorder using Back propagation neural network. International Journal of Pharma and

Bio sciences, 7(4), 80-87.

112.

Kumar, S., Saravanakumar, K., & Deepa, K. (2016). On Privacy and Security in Social Media–

A Comprehensive Study.

Procedia Computer Science, 78, 114-119.

113.

Pranusha Soma, Arivuselvan K., (2016). Automated Recognition of Emotions From Facial

Expressions using Back

propagation Neural networks. Research Journal of Pharmaceutical, Biological and Chemical Sciences,

7(4), 1895-1902.

114.

Magesh G., (2016). A review paper: Student attitude towards computer science. International

Journal of Pharmacy &

Technology, 8(3), 4653-4666.

115.

Angulakshmi M., (2016). Big Data Analytics – A Review. International Journal of Pharmacy &

Technology, 8(3), 4634-4639.

116.

Sudha Senthilkumar, Madhu Viswanatham, (2016). Survey on Data Access Control techniques in

cloud computing.

International Journal of Pharmacy & Technology, 8(3), 17442-17461.

117.

Kavitha G., (2016). Factors associated with improving quality of healthcare services. International

Journal of Pharmacy

& Technology, 8(3), 4844-4856.

118.

Praveen Kumar Reddy M., Nagaraja G., (2016). Creating trusted learning by using QR based

U learning System.

International Journal of Pharmacy & Technology, 8(3), 18268-18272.

119.

Rajeswari C., (2016). Performance analysis of sports persons using data mining based ranking

and classification

methods. International Journal of Pharmacy & Technology, 8(3), 18070-18097.

120.

Sree Dharinya S., Kirubathangam R., (2016). Analyzing a selection strategy for data De-duplication in large datasets.

International Journal of Pharmacy & Technology, 8(3), 16590-16595.

121.

Chandrasegar Thirumalai, (2016). Physicians drug encoding system using an efficient and secured linear public key

cryptosystem (ESLPKC). International Journal of Pharmacy & Technology, 8(3), 16296-16303.

122.

Prabhu J., (2016). A survey on slim process with developers in agile software. International Journal of

Pharmacy & Technology, 8(3), 15558-15565.

123.

Asha N., (2016). Customer segregation in banking organisation using knowledge management. International

Journal of Pharmacy & Technology, 8(3), 17645-17649.

124.

Vijay Anand R., Dinakaran M., (2016). Automation Framework to perform measure actions from NBI.

International Journal of Pharmacy & Technology, 8(3), 16261-16276.

125.

Chiranji Lal Chowdhary, (2016). A review of feature extraction application areas in medical imaging.

International Journal of Pharmacy & Technology, 8(3), 4501-4509.

126.

Navaneethan C., (2016). A Literature Review on energy saving along with precautions in wireless sensor network.

International Journal of Pharmacy & Technology, 8(3), 15408-15424.

127.

Sumangali K., (2016). Security in sensor networks and necessity for self destruction. International Journal

of Pharmacy & Technology, 8(3), 15566-15575.

128.

Rathi R., (2016). Hybridization of soft computing technique with Apriori for Association rule mining.

International Journal of Pharmacy & Technology, 8(3), 15820-15827.

129.

Kumaresan P., Prabukumar M., Yokesh Babu Sundaresan, (2016). An Adaptable web based light weight

framework for remote HVAC system using programmable thermostat. International Journal of

Pharmacy & Technology, 8(3), 16456-16466.

130.

Mohankumar P., Prasanna S., Gunasekaran G., (2016). Intelligence inference user satisfactory refinement

for E-Applications. International Journal of Pharmacy & Technology, 8(3), 15917-15931.

131.

Sudheer Karnam, Thippa Reddy G., Lakshmanna Kuruva, Rajesh Kaluri, Srinivas Koppu, (2016).

Dynamically improved weighted Apriori algorithm in Market analysis. International Journal

of Pharmacy & Technology, 8(3), 15658-15668.

132.

Siddharth Samal, Pradeep Reddy Ch., Bharath Bhushan S., (2016). Implementing a modified power

aware routing protocol using AODV protocol in MANET. International Journal of Pharmacy &

Technology, 8(3), 15600-15610.

133.

Vijayan R., (2016). An application for web navigation using speech engine for blind people.

International Journal of Pharmacy & Technology, 8(3), 15805-15819.

134.

Sudha M., (2016). Disease diagnosis using association rule mining based knowledge inference system.

International Journal of Pharmacy & Technology, 8(3), 16369-16379.

135.

Santhi K., Saravanan R., (2016). Facilitate refined keywords search over encrypted data on cloud.

International Journal of Pharmacy & Technology, 8(3), 15552-15557.

136.

Sudheer K., Thippa Reddy G., Lakshmanna K., (2016). An Android App to reduce battery power

consumption in smart phones. International Journal of Pharmacy & Technology, 8(3), 16164-16171.

137.

Vanitha M., (2016). Mutual Authentication using shared secret key generation. International Journal

of Pharmacy & Technology, 8(3), 16399-16411.

138.

Santhi K., Deepa M., Lawanya Shri M., Benjula Anbu Malar B., (2016). Efficient searching with multiple

keyword over encrypted cloud data by blind storage. International Journal of Pharmacy &

Technology, 8(3), 15704-15711.

139.

Prabhu J., Thanapal P., Vijay Anand R., (2016). Home Intruder Detection System. International

Journal of Pharmacy & Technology, 8(3), 15640-15650.

140.

Kumaresan P., Subha S., (2016). A Low cost multi-functional robot prototype for Intelligent services.

International Journal of Pharmacy & Technology, 8(3), 15370-15381.

141.

Suganya P., (2016). An approach for selection of replica nodes to support QOS requirement of

applications in VANET.

International Journal of Pharmacy & Technology, 8(3), 15789-15795.

142. 1

Nivash J P., Dhinesh Babu L D., (2016). An optimal IOT enabled data processing approach for effective

detection of remote air pollution. International Journal of Pharmacy & Technology, 8(3), 15496-15509.

143. 1.

Senthilkumaran U., Manikandan N., Senthilkumar M., (2016). Role of data mining on pharmaceutical

industry – a survey. International Journal of Pharmacy & Technology, 8(3), 16100-16106.

144. 1.

Kamalakannan J., Rajasekhara Babu, (2016). Segmentation techniques on Mammograms to detect breast abnormality:

A survey. International Journal of Pharmacy & Technology, 8(3), 16089-16099.

145. 1

Vanmathi C., Prabu S., (2016). Steganography: A Comparative study, analysis of key issues and current trends.

International Journal of Pharmacy & Technology, 8(3), 4696-4715.

146. 1.

Deepa Mani., Anand Mahendran, (2016). DDOS detection and mitigation for managed security of cloud resources.

International Journal of Pharmacy & Technology, 8(3), 15455-15470.

147. 1

Meenatchi S., Prabu S., (2016). A cluster based load balancing technique for increasing the wireless sensor network life time.

International Journal of Pharmacy & Technology, 8(3), 4716-4727.

148.

Pounambal M., Nithyadharshini P S., (2016). Distributed channel allocation in smart grid networks

using Particle Swarm Optimization.

International Journal of Pharmacy & Technology, 8(3), 18547-18558.

149.

Ranjith D., Balajee J., Kumar C., (2016). In premises of cloud computing and models.

International Journal of Pharmacy

& Technology, 8(3), 4685-4695.

150.

Reddy, G. T., & Khare, N. (2017). An Efficient System for Heart Disease Prediction Using Hybrid OFBAT

with Rule-Based Fuzzy Logic Model. Journal of Circuits, Systems and Computers, 26(04), 1750061.

151.

Paramasivan, S. K., & Lopez, D. (2016). Forecasting of wind speed using feature selection and neural networks.

International Journal of Renewable Energy Research (IJRER), 6(3), 833-837.

152.

Thakare, V. R., & Singh, K. J. (2016). A Study of Security and Privacy Issues at Service Models of Cloud Computing.

Indian Journal of Science and Technology, 9(38).

153.

Uma K., (2016). Ambient Air prominence information analysis collision/population. Journal of Chemical and

Pharmaceutical Sciences, 9(4), 2566-2569.

154.

Uma. K., (2016). Efficient finding of item sets in knowledge representation using RHUI extraction.

Journal of Chemical and Pharmaceutical Sciences, 9(4), 2599-2601.

155.

Chithapuram, C. U., Cherukuri, A. K., Jeppu, Y. (2016). Aerial vehicle guidance based on passive

machine learning technique.

International Journal of Intelligent Computing and Cybernetics, 9(3), 255-273.

156.

Praveen Kumar Reddy M., Rajasekhara Babu M., (2016). Improving performance of program

by finding good optimal

sequences using sequence selection approach. ARPN Journal of Engineering and Applied Sciences,

11(17), 10563-10570.

157.

Nithya, S., & Jayakumar, C. (2016). Automatic Firewall Rule Generator for Network Intrusion

Detection System based on

Multiple Minimum Support. Indian Journal of Science and Technology, 9(41).

158.

Krishnan, S. N., & Srinivasan, P. (2016). A QOS Parameter based Solution for Black hole

Denial of Service Attack in Wireless

Sensor Networks. Indian Journal of Science and Technology, 9(38).

159.

Rajesh Kaluri, Kuruva Lakshmanna, Thippa Reddy, Sudheer Karnam, Srinivas Koppu., (2016).

A Comparative study on selecting

and ranking the test cases in software testing. ARPN Journal of Engineering and

Applied Sciences, 11(1), 754-757.

160.

Kamalakannan, J., & Babu, R. M. (2016). Early detection of breast cancer using GLCM

feature extraction in Mammograms.

IIOAB JOURNAL, 7(5), 170-179.

161.

Ahamed, B., & Ramkumar, T. (2016). Data Integration-Challenges, Techniques and Future

Directions: A Comprehensive Study.

Indian Journal of Science and Technology, 9(44).

162.

Nagaraja, G., & Ch, P. R. (2016). A Reliable Group Key Management Framework Using

Fuzzy Logic for MANETs.

International Journal of Intelligent Engineering and Systems, 9(4), 107-115.

163.

Kaluri, R., & Reddy, P. (2016). Sign Gesture Recognition Using Modified Region Growing

Algorithm and Adaptive

Genetic Fuzzy Classifier. Int J Intell Eng Syst, 9, 225-233.

164.

Nagaraja, G., & Ch, P. R. (2016). Mitigate Lying and On-Off Attacks on Trust Based Group Key

Management Frameworks in MANETs.

International Journal of Intelligent Engineering and Systems, 9(4), 215-224.

165.

Parimala, M., & Lopez, D. Spatio-Temporal Modelling of Frequent Human Mobility Pattern to

Analyse the Dynamics of Epidemic Disease.

International Journal of Intelligent Engineering & Systems, 9(4), 167-178.

166.

Bhushan, S. B., & CH, P. R. A QoS Aware Cloud Service Composition Algorithm for Geo-Distributed Multi Cloud Domain.

International Journal of Intelligent Engineering & Systems, 9(4), 147-156.

167.

Lakshmanna, K., & Khare, N. (2016). FDSMO: frequent DNA sequence mining using FBSB and optimization.

International Journal of Intelligent Engineering & Systems, 9(4), 157-166.

168.

LawanyaShri, M., Balusamy, B., & Subha, S. (2016). Threshold-Based Workload Control for an Under-Utilized Virtual Machine

in Cloud Computing. International Journal of Intelligent Engineering & Systems, 9(4), 234-241.

169.

Anusha, K., & Sathiyamoorthy, E. (2016). A decision tree-based rule formation with combined PSO-GA algorithm for intrusion

detection system. International Journal of Internet Technology and Secured Transactions, 6(3), 186-202.

170.

Rajganesh, N., & Ramkumar, T. (2016). A Review on Broker Based Cloud Service Model. CIT. Journal of Computing and

Information Technology, 24(3), 283-292.

171.

Aarthy, S. L., & Prabu, S. (2016). A computerized approach on breast cancer detection and classification.

IIOAB JOURNAL, 7(5), 157-169.

172.

P J Kumar, Suganya P., (2016). Variable Replica allocation in VANET using node failure probability.

International Journal of Pharmacy & Technology, 8(4), 25990-25994.

173.

Sankar S., Srinivasan P., (2016). Internet of Things (IOT): A survey of empowering technologies, research opportunities and applications.

International Journal of Pharmacy & Technology, 8(4), 26117-26141.

174.

Srinivasan P., Nagamuthu Krishnan S.S., (2016). A recent survey on trust models for wireless sensor networks.

International Journal of Pharmacy & Technology, 8(4), 26163-26168.

175.

Vijaya C., Srinivasan P., (2016). A survey on resource scheduling in cloud computing.

International Journal of Pharmacy & Technology, 8(4), 26142-26162.

176.

Padmapriya, S., Kirubakaran, E., & Elango, N. M. (2016). Medical Image Classification using Hybrid classifier

by Extending the Attributes. Indian Journal of Science and Technology, 9(6).

177.

Uma, K., & Bangalore Morarji, A. R. Comparative Analysis of Current Engineering Education in Majority Countries.

Journal of Chemical and Pharmaceutical Sciences, 10(1), 293-296.

178.

Navaneethan C., Meenatchi S., Kumar P J., Suganya P., (2016). Comparison of RSA and MD5 algorithm.

International Journal of Pharmacy & Technology, 8(4), 26609-26615.

179.

Kumar P J., Suganya P., Navaneethan C., Meenatchi S., (2016). BigData social media analysis using R and Hadoop.

International Journal of Pharmacy & Technology, 8(4), 26616-16620.

180.

Divya Udayan J., HyungSeok Kim, (2016). Constrained Procedural Modeling of Real Buildings from single façade layout.

International Journal of Computer Vision and Signal Processing, 6(1), 33-46.

181.

Udayan, J. D. (2016). An Analysis of Reconstruction Algorithms Applied to 3D Building Modeling.

Indian Journal of Science and Technology, 9(33).

182.

Iyapparaja M., (2016). Coupling and Cohesion metrics based measurement of software reusable component strength.

International Journal of Pharmacy & Technology, 8(4), 21515-21526.

183.

Kumaran, U., & Khare, N. (2016). A Review on Privacy Preserving Data Mining using Secure Multiparty Computation.

Indian Journal of Science and Technology, 9(48).

184.

Ravi, C., & Khare, N. (2016). BGFS: Design and Development of Brain Genetic Fuzzy System for Data Classification.

Journal of Intelligent Systems.

185.

Ravi, C., & Khare, N. (2016). Review of Fuzzy Rule Based Classification systems. Research Journal of Pharmacy

and Technology, 9(8), 1299-1302.

186.

Deepa, N., & Ravi, C. (2016). Dimension Reduction Using Principal Component Analysis for Pharmaceutical

Domain. Research Journal of Pharmacy and Technology, 9(8), 1169-1173.

187.

Kaluri, R., & Reddy, C. P. (2016). A framework for sign gesture recognition using improved genetic algorithm and

adaptive filter. Cogent Engineering, 3(1), 1251730.

188.

Deepa, N., & Ganesan, K. (2016). A Brief Survey of Decision Making Methods and its Applications in Various

Domains. Research Journal of Pharmacy and Technology, 9(8), 1079-1082.

189.

Deepa, N., & Ganesan, K. (2016). Aqua Site Classification Using Neural Network Models. AGRIS on-line Papers

in Economics and Informatics, 8(4), 51.

190.

Deepika S., Ushadevi G., (2016). Performance analysis of topology based Ad-hoc wireless routing protocols using

Qualnet. International Journal of Pharmacy & Technology, 8(4), 25527-25533.

191.

Raman, I. (2016). Certain height-balanced subtrees of hypercubes. International Journal of Computer Mathematics:

Computer Systems Theory, 1(1), 32-41.

192.

Kuppusamy, L., Raman, I., & Krithivasan, K. (2016). On succinct description of certain context-free languages by

ins-del and matrix ins-del systems. International Journal of Foundations of Computer Science, 27(7), 775-786.

193.

Bhattacharya, S. (2016). A review of the application of automation technologies in healthcare domain. Research

Journal of Pharmacy and Technology, 9(12), 2343-2348.

194.

Singh, B., Bhattacharya, S., Chowdhary, C. L., & Jat, D. S. A review on internet of things and its applications in

healthcare. Journal of Chemical and Pharmaceutical Sciences. 10(1), 447-452.

195.

Srinivasa Gupta N., Valarmathi B., (2016). Opinion mining using intuitive scoring approach. International Journal

of Pharmacy & Technology, 8(4), 21527-21546.

196.

Sivashankari R., Valarmathi B., (2016). A Literature survey on entity extraction techniques in Bio-medical datasets.

International Journal of Pharmacy & Technology, 8(4), 5055-5066.

197.

Raghavan, R., & Singh, K. J. (2016). Necessity of different patterns of fingerprint and its applications: A study.

International Journal of Applied Engineering Research, 11(8), 5787-5790.

198.

Brindha, K., & Jeyanthi, N. (2016). DOVC: Data Obfuscation Visual Cryptography to Protect Cloud Storage.

International Journal of Soft Computing, 11(6), 374-381.

199.

Sundaresan, Y. B., & Kumaresan, P. (2016). A Comparative Analysis of Low Cost Solutions for Quiz Controller

and Classroom Access Control Systems. Research Journal of Pharmacy and Technology, 9(9), 1357-1362.

200.

Sundaresan, Y. B., Kumaresan, P., & Prabu, A. S. (2016). Anamolized Based Security for Private Information

Attacks on Social Network. International Journal of Applied Engineering Research, 11(13), 7914-7919.

201.

Ramya, G. (2016). Survey on various Classes of Picture Languages. International Journal of Applied Engineering

Research, 11(8), 5376-5381.

202.

Geraldine Bessie Amali D., Dinakaran M., (2016). Solution of the non linear least squares problem using a new gradient

based genetic algorithm, ARPN Journal of Engineering and Applied Sciences, 11(21), 12876-12882.

203.

Priya, R. S., Prabu, S., & Dharun, V. S. (2016). F-SIFT and FUZZY-RVM based efficient multi-temporal image

segmentation approach for remote sensing applications. Automatic Control and Computer Sciences, 50(3), 151-164.

204.

Senthilkumar M., Ilango P., (2016). Big data optimization for social networking tweet. International Journal

of Soft Computing, 11(5), 305-311.

205.

Rani, B. S. (2016). A Novice’s Perception of Partial Homomorphic Encryption Schemes. Indian Journal of

Science and Technology, 9(37).

206.

Pandiyan, S., & Perumal, V. (2016). A Survey on Various Problems and Techniques for Optimizing Energy

Efficiency in Cloud Architecture. Walailak Journal of Science and Technology (WJST), 14(10), 749-758.

207.

Sanjeevi, P., Balamurugan, G., & Viswanathan, P. (2016). The improved DROP security based on hard AI problem

in cloud. International Journal of Internet Protocol Technology, 9(4), 207-217.

208.

Sumathi, D., Velmurugan, T., Nandakumar, S., & Renugadevi, S. (2016). Dynamic Weight Assignment based

Vertical Handoff Algorithm for Load Optimization. Indian Journal of Science and Technology, 9(37).

209.

Ramaiah, M., & Ray, B. K. (2016). An iterative point elimination technique to retain significant vertices on

digital planar curves. International Journal of Computational Vision and Robotics, 6(4), 354-368.

210.

Shini, S. N. (2016). A survey on population based meta-heuristic techniques. International Journal of Chemical

and Pharmaceutical Analysis, 4(1), 7.

211.

Vanitha, M. (2016). Survey on Secured Password Authentication for IOT. Advances in Systems Science and

Applications, 16(3), 21-32.

212.

Thandeeswaran, R., & Durai, M. S. (2016). DPCA: Dual Phase Cloud Infrastructure Authentication.

International Journal of Communication Networks and Information Security, 8(3), 197.

213.

Pounambal, M. (2016). Survey on channel allocation techniques for Wireless Mesh Network to reduce

contention with Energy Requirement. Indian Journal of Science and Technology, 9(32).

214.

Gopal, D. G., & Saravanan, R. (2016). Selfish node detection based on evidence by trust authority and

selfish replica allocation in DANET. International Journal of Information and Communication Technology, 9(4), 473-491.

215.

Seetha, H., Murty, M. N., & Saravanan, R. (2016). Classification by majority voting in feature partitions.

International Journal of Information and Decision Sciences, 8(2), 109-124.

216.

Nirmala, M., Vidyavathi, M., Nivash, J. P., & Kumar, C. P.(2016). Scalable cloud computing based

healthcare application. International Journal of Pharmacy & Technology, 8(4), 25891-25901.

217.

Nirmala M., Pavan Kumar C S., Ansu Miriam Varghese, Neethu Santhosh. (2016). Text Encryption and

Decryption strategy using matrix operations. International Journal of Pharmacy & Technology, 8(4), 25910-25917.

218.

Thathera, H., Shashi, H., & Rajput, D. S. (2016). Green Computing: An Earth Friendly System,

International Journal of Pharmacy and Technology, 8(4):25540 – 25550.

219.

Gupta, S., AkashKataria, S. R., & Rajput, D. S. (2016). Information security issues in big data: solution

using ppdm (privacy preserving data mining), International Journal of Pharmacy & Technology, 8(4): 25551 – 25568.

220.

C. Ranichandra and B.K. Tripathy, 2016. A Study on Non Java Options for Mapreduce Programming with Hadoop.

Asian Journal of Information Technology, 15(16): 2999-3003.

221.

Nithya S., Asha Jerlin M., Jayakumar C. (2016). A Survey of software defined network. International

Journal of Pharmacy & Technology, 8(4), 25944-25958.

222.

Asha Jerlin, M., Nithya S., Coker Oswald, Jayakumar C., (2016). Layer two firewall in software defined network.

International Journal of Pharmacy & Technology, 8(4), 25365-25372.

223.

Asha Jerlin M., Jayakumar C., Prabhu J., (2016).EFE:Efficient feature extraction algorithm for dynamic

malware analysis in windows executables using API call sequence. International Journal of Pharmacy & Technology,

8(4), 25373-25383.

224.

Asha Jerlin M., Nithya S., Jayakumar C., Robin Rohit. (2016). A case study on advanced evasion techniques.

International Journal of Pharmacy & Technology, 8(4), 26599-26608.

225.

Alagiri I., (2016). Multipath life time prediction of node-to-node communication using multipoint relays

in OLSR protocol for mobile adhoc networks. International Journal of Pharmacy & Technology, 8(4), 26584-26598.

226.

Devendiran S., Manivannan K., Arun tom Mathew, Rajeswari C., (2016). Vibration signal based fault

diagnosis of gears using ensemble empirical mode decomposition and linguistic hedges neural fuzzy classifier with

selected features.

Journal of Chemical and Pharmaceutical Sciences, Special Issue 3, 47-57.

227.

Singh, B. (2016). Nurse’s attitude towards computerization in private hospitals of Tamil Nadu, India.

Research Journal of Pharmacy and Technology, 9(12), 2205-2210.

228.

Charanya, R., Aramudhan, M., & Saravananaguru, R. K. (2016). A Review on Access Control Issues in EHealth

Application in Cloud Computing. Indian Journal of Science and Technology, 9(42).

229.

Dharmendra Singh Rajput, Ramjeevan Singh Thakur, Ghanshyam Singh Thakur, (2016). A Computational model for

knowledge extraction in uncertain textual data using karnaugh map technique.

International Journal of Computing Science and Mathematics, 7(2).

230.

Ikram, S. T., & Cherukuri, A. K. (2016). Improving accuracy of intrusion detection model using PCA and optimized

SVM.

Journal of computing and information technology, 24(2), 133-148.

231.

Thaseen, S., & Kumar, C. A. (2016). Intrusion Detection Model using PCA and Ensemble of Classifiers.

Advances in Systems Science and Applications, 16(2), 15-38.

232.

Ramalingam, S. P., & Mouli, P. C. (2016). Two-level dimensionality reduced local directional pattern for

face recognition. International Journal of Biometrics, 8(1), 52-64.

233.

Priya V., Subha S., Balamurugan B., (2016). Quality-of-service in cloud computing: A Survey.

International Journal of Pharmacy & Technology, 8(4), 25742-25753.

234.

Singh, P. K., & Kumar, C. A. (2016). Analysis of composed fuzzy contexts through projection.

International Journal of Data Analysis Techniques and Strategies, 8(3), 206-219.

235.

Dinakaran M., Belgacem F.B.M. (2016). An experimental study to prevent packet hiding over wireless

networks using AONTS and swarm intelligent algorithm. International Journal of Pharmacy & Technology, 8(4),

25596-25605.

236.

Geraldine Bessie Amali D., Dinakaran M., (2016). A review of heuristic global optimization based

artificial neural network training approaches. International Journal of Pharmacy & Technology, 8(4), 21670-21679.

237.

Jayanthi, M. Prabadevi B., (2016). Multi-keyword ranked search over encrypted data supporting

synonym query. The IIOAB Journal, 7(1), 1.

238.

Susmita Subhadarshini Panda, Saravanan R., (2016). A secure approach to Spatial Image Steganography.

International Journal of Pharmacy & Technology, 8(2), 13384-13400.

239.

Harish H S., Vijayan R., (2016). A Secured and Reliable routing in opportunistic network in MANET

using Trust management scheme based on behaviour feedback. International Journal of Pharmacy &

Technology, 8(2), 12514-12522.

240.

Nagendramani P., Vijayan R., (2016). An analysis on the performance of various replica allocation

algorithms in cloud using Matlab. International Journal of Pharmacy & Technology, 8(2), 3892-3902.

241.

Hemavathi E., Srinivasa Perumal R., (2016). An approach for automatic vehicle plate recognition in

unconstrained environment. International Journal of Pharmacy & Technology, 8(2), 4013-4025.

242.

Ajay Mummadisetti, Rajeshwar Reddy Kadari, Rajeev Sushmanth Dammu, Durai Raj Vincent P M., (2016).

An effective approach of RSA & impact of wieners attack: Survey. International Journal of Pharmacy &

Technology, 8(2), 13093-13099

243.

Gopika D., Kumar P J., (2016). An innovative approach for user validation system using keylog and Sudoku

algorithm.

International Journal of Pharmacy & Technology, 8(2), 11732-11739.

244.

Ashutosh Sharma, Vijayan R., (2016). Correlative study of Video compression techniques – H.264/AVC.

International Journal of Pharmacy & Technology, 8(2), 12638-12646.

245.

Kaushik Roy, Brindha K., Sudha Senthil Kumar, (2016). Optimizing the executing time of compiler optimization

using code segmentation technique. International Journal of Pharmacy & Technology, 8(2), 12537-12551.

246.

Pavithra S., Lawanya Shri M., (2016). Privacy Preserving the Electronic Health Record using Encryption Protocol

in Cloud Computing. International Journal of Pharmacy & Technology, 8(2), 13261-13268.

247.

Sathiyamoorthy E., Jagadeesh G., Vaibhav Mahajan, (2016). Home Automation system over mobile network.

International Journal of Pharmacy & Technology, 8(3), 16352-16362.

248.

E. Vijayan, N.C. SenthilKumar, Siddhant Agnihotry, Mehaboob Subuhani, (2016). Effective Clustering in

Big Data for efficient knowledge discovery using parallel K-means and enhanced K-means algorithm.

International Journal of Pharmacy & Technology, 8(3), 18646-18652.

249.

Salman Ahmed G., (2016). A Framework for classification of medical data using Bijective soft set.

International Journal of Pharmacy & Technology, 8(3), 16559-16568.

250.

Vijayan E., Senthil Kumar N C., Navneet Shukla, Rudra Prasad Dwivedi, (2016). Architecture of parallel

database to make future database processing high. International Journal of Pharmacy & Technology, 8(3),

18640-18645.

251.

Navaneethan C., Ramkesh, (2016). Advanced Rail Fence Cipher Algorithm. International Journal

of Pharmacy & Technology, 8(3), 16539-16545.

252.

Akshay Gaikwad, Pradeep Reddy Ch., Bharath Bhushan S., (2016). A Keyed Hash message authentication

code technique for secure communication in VANETs. International Journal of Pharmacy & Technology, 8(3),

15620-15632.

253.

Vijayan E., SenthilKumar K., Shalini A.M., Suganya N., (2016). Image Segmentation and classification.

International Journal of Pharmacy & Technology, 8(3), 18325-18334.

254.

Thandeeswaran R., Ankita Vinod Mandekar, Jeyanthi N., (2016). Securing service set identifier of wireless

network. International Journal of Pharmaccy & Technology, 8(3), 16605-16610.

255.

Jidhesh R, Indusree J R, Sumathy S., (2016). Survey on congestion aware and adaptive routing protocols

in mobile ad hoc networks. International Journal of Pharmacy & Technology, 8(3), 16521-16538.

256.

Yuvan Shankar R K., Ramaprabha K P., Jayanthi R., (2016). Discovery against node isolation attack on

MANET and its node removal. International Journal of Pharmacy & Technology, 8(3), 16391-16398.

257.

Priya V., Sindhupaarkavi V., (2016). Convolution based Image Enhancement in unique finger impression.

International Journal of Pharmacy & Technology, 8(3), 15611-15619.

258.

Rajan Slathia, Jeyanthi N., (2016). Internet of Things in mobile health care (IOT-m Health). International

Journal of Pharmacy & Technology, 8(3), 15901-15916.

259.

Vijayan E., S., Hemalatha., S., Shweta Shaw, Alokananda Ghoshal, (2016). A new approach for collision free,

energy efficient, hybrid routing algorithm with the use of progressive adaptive concept.

International Journal of Pharmacy & Technology, 8(3), 18604-18610.

260.

Shakthi D.S., Prabadevi B., (2016). An approach to detect selfish and malicious node in Adhoc – MANETs.

International Journal of Pharmacy & Technology, 8(3), 16107-16117.

261.

Vijayan E., Senthilkumar K., Prernakumari, Sourabh Tolani, Prasenjeet Bhadra, (2016).

Convergence from SQL, NoSQL to NewSQL. International Journal of Pharmacy & Technology, 8(3), 18351-18355.

262.

Akshay Narayan Hegde, Vinay Kumar E., Vijayan R., (2016). Self-Routing: A Novel approach for

context based trust evaluation and malicious node detection in MANET. International Journal of Pharmacy &

Technology, 8(3), 15589-15599.

263.

Vijayan E., Senthil kumar K., Aishwarya Singh, Yasmeen Khatoon, (2016). Approach on big data using Hybrid cloud.

International Journal of Pharmacy & Technology, 8(3), 18344-18350.

264.

Shynu P.G., Lakshmipriya S., Pavithra J., (2016). A Novel Decentralised scheme for identity preserved access

control in cloud.

International Journal of Pharmacy & Technology, 8(3), 18141-18148.

265.

Sathya Sankaran, Sneha Ambhore, P.M. Durai Raj Vincent, (2016). Modified advanced encryption standard

with additional row transformation.

International Journal of Pharmacy & Technology, 8(3), 16436-16440.

266.

Koteswara Rao E., Vijayan R., (2016). Context based access optimizing system for Android mobile devices.

International Journal of Pharmacy & Technology, 8(3), 19071-19079.

267.

Manivannan S.S., Dhanashree P., Chandrasekaran C., (2016). Transport Plane [TP] simulator in

E-Utran LTE for Control Plane (CP).

International Journal of Pharmacy & Technology, 8(3), 16242-16253.

268.

Himanshu Dewangan, Angulakshmi M., Nagarajan I., (2016). Multiprocessing optimization –

parallel quick sort using OpenMp.

International Journal of Pharmacy & Technology, 8(3), 15633-15639.

269.

Harsha Sarah Thomas, Nancy Victor, (2016). An approach for Incremental frequent pattern mining

using modified Apriori Algorithm.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(6), 1049-1055.

270.

Uma, K., Radhakrishnan, P., & Vinoth, R. (2016). Compression of Compound Images using Fuzzy

Clustering Technique.

Indian Journal of Science and Technology, 9(S1).

271.

Uma, K., Vignesh, B., & Reynold, L. R. (2016). Encoding of Multifaceted Images using Pattern Matching Techniques.

Indian Journal of Science and Technology, 9(S1).

272.

Uma, K., Akram, K. W., & Vignesh, R. (2016). A Novel Method for Segmentation of Compound Images

using the Improved Fuzzy Clustering Technique.

Indian Journal of Science and Technology, 9(S1).

273.

Uma, K., Geetha, P., & Kannan, A. (2016). A novel segmentation of scanned compound images using fuzzy logic.

Journal of Medical Imaging and Health Informatics, 6(3), 763-768.

274.

Uma, K., & Kavitha, E. (2016). Comparison of Various Fingerprint Analysis Techniques.

Indian Journal of Science and Technology, 9(S1).

275.

Uma, K., & Reddy, G. R. (2016). Predicting Analysis of Data Mining Extraction Technique in

Secondary Education.

Indian Journal of Science and Technology, 9(S1).

276.

Uma, K., Pallavi, A. R., & Srilatha, S. (2016). Comparision of Blur Detection and Segmentation Techniques.

Indian Journal of Science and Technology, 9(S1).

277.

Aniket Sen, Prasun Jaiswal, Vikram, Prabadevi B. (2016). Improved K-Means clustering algorithm –

working with labelled datasets.

International Journal of Pharmacy & Technology, 8(4), 27091-27096.

278.

Mohamed Fahad M., Simama Hassan Mottur, Prasanna M., Mohammed Fazeel K., (2016). Prediction of

Life cycle models for software.

International Journal of Pharmacy & Technology, 8(4), 25763-25778.

279.

Girish Paul, Abhishek Chandan, Prasanna M., Abhishek Yadav, (2016). Voice based mail system for blind.

International Journal of Pharmacy & Technology, 8(4), 25754-25762.

280.

Shivam Kapil, Ashwini Kumar, Rishav Bansal, Nancy Victor, (2016). Social Network Forensics.

International Journal of Pharmacy & Technology, 8(4), 25843-25849.

281.

Ashish Gupta, Nancy Victor. (2016). Machine unlearning – An approach to make machine learning algorithms

forget data and authenticates ML level security. International Journal of Pharmacy & Technology, 8(4), 25807-25818.

282.

Ashish Gupta, Nancy Victor (2016). Real Time analysis of mobile GPS data. International Journal of Pharmacy &

Technology, 8(4), 25827-25834.

283.

Lokesh Sharma, Nancy Victor (2016). A Technique for classifying massive dataset using parallel ID3 approach.

International Journal of Pharmacy & Technology, 8(4), 25819-25826.

284.

Beryl Joylin A., Aswathi T., Nancy Victor, (2016). Sentiment analysis based on word-emoticon clusters.

International Journal of Pharmacy & Technology, 8(4), 25288-25296.

285.

Beryl Joylin A., Aswathi T., Suma P., Nancy Victor, (2016). Sentiment analysis on “Ebola” outbreak using twitter data.

International Journal of Pharmacy & Technology, 8(4), 25835-25842.

286.

Kumaran, U., Khare, N., & Suraj, A. S. (2016). Privacy preserving in data mining technical: A review. Research

Journal of Pharmacy and Technology, 9(11), 2023-2026.

287.

Sharathbabu B., Ayesha Banu S., Naveen Kumar S., Deepika S., (2016). Denoising ultrasound scan image from

speckle noise. International Journal of Pharmacy & Technology, 8(4), 26306-26311.

288.

Thanikaiselvan, V., Shastri, S., Ahmad, S., & Subashanthini, S. (2016). A New Pixel Value Based Steganography

Method for Data Security. Indian Journal of Science and Technology, 9(37).

289.

Kanugo, S., & Mekala, A. M. (2016). Particle Swarm Optimization based Edge Detection Algorithms for Computer

Tomography Images. Indian Journal of Science and Technology, 9(37).

290.

Shah, R., Subramaniam, S., Dasarathan, L., & Babu, D. (2016). Mitigating Malicious Attacks Using Trust Based

Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks. CIT. Journal of Computing and Information

Technology, 24(3), 237-252.

291.

Shubham D., Mithil P., Sumathy S., (2016). Fair resource allocation schemes for resource constrained cloud

computing environment. International Journal of Pharmacy & Technology, 8(4), 26260-26268.

292.

Shashank Joseph, Calvin Mugauri, Chunduru Anilkumar, Sumathy S., (2016). Access Control using attribute based

encryption in cloud computing: A survey. International Journal of Pharmacy & Technology, 8(4), 26282-26291.

293.

Meesala Shobha Rani, Sumathy S., (2016). Analysis of KNN, C5.0 and one class SVM for intrusion detection

system. International Journal of Pharmacy & Technology, 8(4), 26251-26259.

294.

Lawanya Shri M., Benjula Anbu Malar M B., Santhi K., Deepa M., Feslin Anish Mon., (2016). Threshold-based

virtual machine allocation in cloud environment. International Journal of Pharmacy & Technology, 8(4), 21547-21559.

295.

Nirmala M., Anshumati Gaikwad, Nittin Choudhary, Swati Bathla, (2016). A study on improving the

cloud security by virtualization. International Journal of Pharmacy & Technology, 8(4), 25885-25890.

296.

Nirmala M., Sharon Moses, Ankisetty Ramya, Ghanta Krishna Chaitanya., (2016). Managing and

Mitigating risks in Pharmaceutical supply chain management systems. International Journal of Pharmacy &

Technology, 8(4), 25864-25875.

297.

Nirmala M., Preethi E., Spoorti S Doddamani, Sharon Moses J, Chitturi Satya Pavan Kumar, (2016).

An approach to ensuring security in cloud-based social networks. International Journal of Pharmacy &

Technology, 8(4), 25918-25926.

298.

Tanu Maheshwari, Nirmala M., Dhinesh Babu L.D., Sharon Moses J., (2016). Extension of Rough set

K-Means using parallel mapreduce algorithm. International Journal of Pharmacy & Technology, 8(4), 25876-25884.

299.

Malge, A., Muthamil Selvan, T. (2016). A hybrid cloud approach for secure authorized deduplication.

International Journal of Pharmacy and Technology, 8(4), 25262-25272

300.

Hemanth, R.B., Vijayan, R. (2016). An enhanced ford-fulkerson algorithm to determine max-flow in large

mesh network using hadoop, International Journal of Pharmacy and Technology, 8(4), 25210-25220

301.

Das, S.K., Patil, M.D., Sumathy, S. (2016). Review On Neural Network Based Approaches For Intrusion

Detection System. International Journal of Pharmacy and Technology, 8(4), 26269-26281

302.

Ananya, Dutta, A., Sandhu, P.S., Thandeeswaran, R. (2016). A graph based message encryption algorithm.

International Journal of Pharmacy and Technology, 8(4), 26339-26345

303.

Benjula anbu Malar, M.B., Lawanya Shri, M., Deepa, M., Santhi, K., Mon, F.A. , (2016)Efficient system for

finding solution to recover bugs in software projects, International Journal of Pharmacy and Technology, 8(4), 21571-21579

304.

Khandelwal, R., Ellappan, V., Ajay, Hamsadhvani, A. (2016). Comparative study of algorithms to solve travelling

salesman problem. International Journal of Pharmacy and Technology,8(4), 25624-25631

305.

Kumar, P.J., Ellappan, V., Badala, P. (2016). Image duplication detection. International Journal of Pharmacy

and Technology, 8(4), 25632-25639

306.

Ellappan, V., Upadhayay, D., Yadav, R., Vandana (2016). Hand gesture recognition for physically disabled people.

International Journal of Pharmacy and Technology, 8(4), 25640-25647

307.

Dubey, A.K., Ellappan, V., Paul, R., Chopra, V. (2016). Comparative analysis of backtracking and genetic

algorithm in n queen’s problem. International Journal of Pharmacy and Technology, 8(4), pp. 25618-25623

308.

Aswini S., Kavya R S., Senthil kumaran U., (2016). Application of Internet of things and cloud computing for

health care – A survey. International Journal of Pharmacy & Technology, 8(4), 22009-22017.

309.

Aarthi B., Saranya R., Vaishnavi M., Senthil kumaran U., (2016). Agriculture facilitation using cloud computing

– survey. International Journal of Pharmacy & Technology, 8(4), 22028-22035.

310.

KV. Krishna, KV. Ganesh, Ashwini S., Senthil Kumaran U., (2016). A Survey on security methods in public id system.

International Journal of Pharmacy & Technology, 8(4), 21915-21922

311.

Suhasini K., Yamuna M., Senthil kumaran U., (2016). A review on various event management techniques.

International Journal of Pharmacy & Technology, 8(4), 5142-5149.

312.

Shreyas Kadu, Saryu Chugh, Nidhiben Bhatt, Nadesh R.K. (2016). Superintending of cloudlets in versatile

Ad-hoc ambience utilizing Qualnet – A review on performance analysis of routing mechanisms. International Journal

of Pharma and Bio sciences; Special issue SP02 “Healthcare Technology and management” 260-264.

313.

Keerthana A., Abirami B., Selva Kumar P., Rajaprabha M N., (2016). Dry eye monitors in computers & Mobiles –

Via Webcams & Front CAMs. International Journal of Pharmacy & Technology, 8(4), 26006-26012.

314.

Aman Shrivastav, Bharat Nalwaya, Sudish Kumar, Rajaprabha M N., (2016), Improvement on initial seed

selection for K-means algorithm.

International Journal of Pharmacy & Technology, 8(4), 26000-26005.

315.

Sunil Sigar, Senthil Kumar N., (2016). Effective processing of question generation from text. International

Journal of Pharmacy & Technology, 8(4), 25974-25980.

316.

Akshit Bhandari, Lavish Chhatwani, Shivali Chauhan, Senthil Kumar N., (2016).

An effective load balancing approach for handling big data.

International Journal of Pharmacy & Technology, 8(4), 25967-25973.

317.

Ayushi Jain, Saumya Bajpai, Shivali Jain, Uma Maheswari G., Jasmine Norman. (2016).

Providing and detecting steganographic content communication security.

International Journal of Pharmacy & Technology, 8(4), 26370-26375.

318.

Saurav K. Shaw, Mudit Jain, Jitesh Shaw, Durai Raj Vincent P M.,(2016).

A proposed design for secure hash algorithm-2 (SHA-2) using 640 bits.

International Journal of Pharmacy & Technology, 8(4), 26515-26523.

319.

Sudhir G., Lokesh S., Sathish Kumar K., Malathy E. (2016). Sharing file over cloud with privacy key generation.

International Journal of Pharmacy & Technology, 8(4), 25691-25698.

320.

Arjun Biyani, Ramya G., (2016). Recommendation engine for web products.

International Journal of Pharmacy & Technology, 8(4), 26019-26025.

321.

Prerna Kumari, Prasenjeet Bhadra, Ramya G., (2016). Study on performance issues in mobile application.

International Journal of Pharmacy & Technology, 8(4), 26292-26305.

322.

Shashi H., Honey Thathera, Ramya G., (2016). The Safeguarding concerns for mobile applications.

International Journal of Pharmacy & Technology, 8(4), 26032-26038.

323.

Himanshu Ewangan, Ramya G., (2016). Cross-platform mobile application development using Apache Cordova.

International Journal of Pharmacy & Technology, 8(4), 26026-26031.

324.

Nitish Chawla, Ramya G., (2016). Lookout Android Application. International Journal of

Pharmacy & Technology, 8(4), 26013-26018.

325.

Aditya Shivhare,Saurabh Kumar Pradhan, Manivannan S.S,(2016). Survey on Issues and Challenges in

biometric based authentication, International Journal of Pharmacy and Technology,4(8),26188-26192.

326.

E.Ragavan., C.Hariharan,N.Aravindraj, S.S.Manivannan., (2016). Real Time Water Quality Monitoring System,

International Journal of Pharmacy and Technology, 8(4), 26199-26205

327.

Ashwani Gupta, Nitin Katiyar, Brijendra Singh, Sweta Bhattacharya, (2016). Comparitive study on big data

architectures proposed for smart cities context, International Journal of Pharmacy and Technology,8(4), 25440-25451

328.

Yoginder Singh, Sweta Bhattacharya, Brijendra Singh, (2016). IoT: Framework for Smart City.

International Journal of Pharmacy and Technology, 8(4), 25432-25439.

329.

Pinaki Bhattacharjee, Sweta Bhattacharya, Govern Scholar Assessment Apparatus Employing Perusal Of Statistics,

International Journal of Pharmacy and Technology,8(4), 26312-26322

330.

Raju Kumar, Vijayan Ellappan, Kumar P.J, (2016), A Survey On Face Detection And Recognition Techniques

In Different Application Domain, International Journal of Pharmacy & Technology, 8(4), 25606 – 25610.

331.

Payal Nemade, Aarti Sharma, Eklendra Jadam, C.L.Chowdhary (2016), Survey On Grid Clustering Approach

With Intuitionistic Fuzzy Histogram, International Journal of Pharmacy & Technology, 8(4), 25475 – 25482.

332.

S. Kausal, V.K. Shukla, Eklendra Jadam, C.L.Chowdhary (2016), Learning Work On Online Educational Data

With Bi-Directional Mapping, International Journal of Pharmacy & Technology, 8(4), 25511 – 25520.

333.

Payal Nemade, Aarti Sharma, C.L.Chowdhary (2016), Study On Level Set Segmentation Based Classification

Using Mammograms, International Journal of Pharmacy & Technology, 8(4), 25483 – 25490.

334.

Gitanjali, J.,Abdul Khanadar, Bhanupriya Sharma, Shambhavi Srivastava (2016). Data mining from smart card

data using data clustering. International Journal of Applied Engineering Research, 11(1), 347-352.

335.

Hemalatha S., Giridharan L., (2016). A Steganographic Technique based region level sparse representation for

high density data hiding, International Journal of Pharmacy & Technology, 8(2), 12940-12949.

336.

Ajay, V. K., Desai, R., Gawannavar, M., & Nadesh, R. K. (2006). HGD: a rescue system for an alive human

gesture detection in disasters management-an experimental study. ARPN Journal of Engineering and

Applied Sciences, 11(11), 6826-6831.

337.

Hemalatha S., Santhosh Kumar S., (2016). Image Forgery Detection using Key-point Extraction and Segmentation.

International Journal of Pharmacy & Technology, 8(2), 13219-13229.

338.

Hemalatha S., Prasanna G., (2016). Robust Remote Authentication of Video Object through Steganographic mechanism.

International Journal of Pharmacy & Technology, 8(2), 12691-12700.

339.

Thanapal P, Muhammad Faizan M, (2016). Parental control for android smart phones. International Journal of

Pharmacy & Technology, 8(3), 16581-16589.

340.

Bharat Khatavkar, Nadesh R.K., (2016). A Comparative study and performance evaluations for using reactive

and hybrid routing approaches in intra and inter communication in VANET. International Journal of

Pharmacy & Technology, 8(3), 17776-17783.

341.

Priya V., Divya Vandana S., (2016). Chennai Rains Sentiment – An analysis of opinion about youngsters reflected

in tweets using Hadoop. International Journal of Pharmacy & Technology, 8(3), 16172-16180.

342.

Nadesh R.K., Akshaya Narayan Hegde, Vinay Kumar E., (2016). PANAS: A Personal Area Network for an

effective monitoring of an event in a pharmacy institute – An Empirical Study. International Journal of Pharmacy &

Technology, 8(3), 15932-15938.

343.

Priya V., Anupama Bhimnath, Sanjay M., (2016). Movement and motion modelling visitors of shopping mall.

International Journal of Pharmacy & Technology, 8(3), 16230-16241.

344.

Vijayan E., Senthilkumar N.C., Nirmal Kumar J., Mandakini Rastogi, Himika I., (2016). Cipher and Decipher of Image.

International Journal of Pharmacy & Technology, 8(3), 18653-18663.

345.

Vijayan E., Senthil kumar K., Aishwarya Singh, Yasmeen Khatoon, (2016). Approach on big data using Hybrid cloud.

International Journal of Pharmacy & Technology, 8(3), 18344-18350.

346.

Shynu P.G., Lakshmipriya S., Pavithra J., (2016). A Novel Decentralised scheme for identity preserved access control

in cloud. International Journal of Pharmacy & Technology, 8(3), 18141-18148.

347.

Baby C., Thippa Reddy G., (2016). Heart Disease prediction using Rule based Fuzzy Logic. International Journal of

Pharmacy & Technology, 8(3), 15471-15479.

348.

Nadesh, R. K., Arivuselvan, K., & Pathanjali, S. (2016). A Quantitative Review on Introducing the Election Process

with Cloud Based Electronic Voting and Measuring the Performance using Map Reduce. Indian Journal of Science

and Technology, 9(39).

349.

Bhavani S., Malathy E., Dorothy S., (2016). Prevailing parameters by Lease using Ant Colony Optimization.

Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(6), 1211-1219.

350.

Hardik Pandey, P J Kumar, Suganya P., (2016). Performance analysis of RBG Encryption algorithm.

International Journal of Pharmacy & Technology, 8(4), 25995-25999.

351.

Sundaresan, Y. B., Jaiswal, A. K., & Kumaresan, P. (2016). A Low Cost Prototype for Multiple Access Security System.

International Journal of Applied Engineering Research, 11(13), 7907-7913.

352.

Girish V K, Madhan R, Jagadeesh Gopal (2016). Sensor Detection Of Trains For National Train Enquiry System,

International Journal of Pharmacy & Technology, 8(4), 22182 – 22185.

353.

Suryapal singh, Ashish Singh and Arjun Lamba (2016) , GLCM and Gabor Wavelet Feature Extraction based Brain

Tumour Detection Using Medical Images, International Journal of Pharmacy and Technology, 8(4), 25505-25510.

354.

Ellappa, V., Kamalakannan, J., Babel, H., Dhamarikar, A. (2016). Access control mechanism in cloud. International

Journal of Pharmacy and Technology, 8(4), 25611-25617

355.

Vanmathi, C., Prabu, S. (2016). Steganography: A comparative study,analysis of key issues and current trends.

International Journal of Pharmacy and Technology,8(3), 4696-4715

356.

Vani M.P (2016).Incorporation Of Internet of Things with Cloud Auditing, International Journal of Pharmacy &

Technology, 8(4), 25779-25786

357.

Senthilkumaran U., Balamurugan B., Eswaran G., Mageswari U., (2016). Sentiment analysis of twitter data using

intelligent related word identification. International Journal of Pharmacy & Technology, 8(4), 26393-26401.

358.

Shreelekhya G., Yazhini, Senthilkumaran U., Manikandan N., (2016). Methods for evaluating software

architecture-A Survey. International Journal of Pharmacy & Technology, 8(4), 25720-25733.

359.

Sivaranjini V., Senthilkumaran U., Manikandan N., (2016). Optimizing the location deployment for

emergency meeting scheduling in disaster relief management. International Journal of Pharmacy & Technology, 8(4), 25714-25719.

360.

Deni Avinash A.B., SenthilKumaran U., Manikandan N., (2016). Automated summarization of academic

papers and generation of presentation slides. International Journal of Pharmacy & Technology, 8(4), 25710-25713.

361.

Manikandan N., Senthilkumaran U., Kumar P.J., (2016). Effective use of multiple cores for face recognition

in personal computers. International Journal of Pharmacy & Technology, 8(4), 25734-25741.

362.

Senthilkumar M., Manikandan N., Senthilkumaran U., Samy R., (2016). Weather data analysis using hadoop.

International Journal of Pharmacy & Technology, 8(4), 21827-21834.

363.

Thirumalai C.S., Senthil Kumar M., (2016). Secured e-mail system using base 128 encoding scheme.

International Journal of Pharmacy & Technology, 8(4), 21797-21806.

364.

Thirumalai C.S., Senthil Kumar M., (2016). Spanning tree approach for error detection and correction.

International Journal of Pharmacy & Technology, 8(4), 5009-5020.

365.

Chandrasegar T., Senthilkumar M., Silambarasan R., Westphall, C.B., (2016). Analyzing the strength of Pell’s RSA.

International Journal of Pharmacy & Technology, 8(4), 21869-21874.

366

Uma, K., Ashwini, S., & Kiruthika, S. (2016).Survey on Machine learning algorithms, International Journal

of Computer Science & Wireless Security (IJCSWS), 3(5):225-228.

367

Mishra, Sangeet, Asis Kumar Tripathy, and Pallavi Joshi. (2016).Making a Cloud Data Secure and Effective

for Better Performance of Services. Indonesian Journal of Electrical Engineering and Computer Science. 2(3): 695- 702

368

S. Sinduja, Dharmendra Singh Rajput, (2016). Analysis Of Imbalance Dataset Using Classification Techniques,

International Journal of Advanced Research Trends in Engineering and Technology, 4(19):517 – 522.

369

Rajput, D. S., & Gour, R. (2016). An IoT Framework for healthcare monitoring systems. International Journal

of Computer Science and Information Security, 14(5):451-455.

370

Sruthi, M., & Kavitha, B. R. (2016). A Survey on IoT Platform. International Journal of Scientific Research and

Modern Education.1(1): 468 – 473

371

Chowdhary, C. L., Sai, G. V. K., & Acharjya, D. P. (2016). Decreasing False Assumption for Improved Breast

Cancer Detection. Journal of Science And Arts, 2(35):157-176.

372

K.Santhi., M.Deepa.,M.Lawanya Shri.,M. B. BenjulaAnbu Malar,(2016). A Novel Method for Key

Aggregation On data Sharing in Cloud Storage Environment, International journal of Advanced Research

in Science and Engineering, 5(special issue no:1):142-148.

373

Santra, A. K. (2016). Stochastic Multifacility Location Problem under Triangular Area Constraint with

Euclidean Norm. International Journal on Recent and Innovation Trends in Computing and Communication

(IJRITCC), 4(3):111-116.

374

Mohan Vamsi M., Shantharajah S.P. (2016). Adaptive Neural Fuzzy Interface System for Cloud Computing,

International Journal of Advanced Research in Computer Science and Software Engineering, 6(10):92-96.

375

Sara Archana R, Prabadevi B, (2016).Social Network for Allocating and Sharing Cloud Resources using Trust Relationship.

International Journal of Computer Systems, 3(5): 394 – 396.

376

Deepika A, Prabadevi. (2016). A Decentralized Framework for Cloud Resources Provisioning with Malware

Detection, International journal of Computer Systems, 3(5):388-390.

377

Ananthy E, Prabadevi B, (2016).Gain Factor Trust - A Trust Evaluation Framework in Online Social Networks,

International Journal of Computer Systems, 3(5):391-393.

378

Rajput, D. S., & Khare, N. (2016). Fuzzy soft set decision-making model for social networking sites.

International Journal of Social Network Mining, 2(3): 256-266.

379

Kaavya, S., & Priya, G. L. (2016). Static Shot based Keyframe Extraction for Multimedia Event Detection.

International Journal of Computer Vision and Image Processing (IJCVIP), 6(1): 28-40.

380

Prasanna, M., & Iyapparaja, M. (2016). Optimistic Investigation on Open Source Testing Tools for Testing Applications.

International Research Journal of Engineering and Technology (IRJET), 3(12):633 – 635.

381

Prasanna, M., Iyapparaja, M., Dhenesh V Subramanian, (2016). Certain Investigations on Testing Tools for Regressing

Testing, International Research Journal of Engineering and Technology (IRJET), 3(12):630 – 632.

382

Rama Prabha K.P, Jayanthi R. (2016). Performance Issues of TCP in Wireless Networks and Performance

Enhancement Using TCP Vegas, Global Journal of Engineering Science and Researches, 3(7):72-80.

383

Jagadeesh,G., Ramaprabha,K., MohanVamsi P.M. (2016). Enhancing Software Quality in Web Applications using

Fault Tree Algorithm (FTA). International Journal of Advanced Research in Computer Science and Software

Engineering.6(4):448 – 452

384

Victor, N., Lopez, D., & Abawajy, J. H. (2016). Privacy models for big data: a survey. International Journal of

Big Data Intelligence, 3(1), 61-75.

385

Neelu Khare, Kumaran U,Mohan Vamsi M, (2016). Knowledge Acquisition and Privacy Preserving in Cloud using

Simultaneous Diagonalization Algorithm, International Journal of Advanced Research in Computer

Science and Software Engineering.6(9): 137 – 140.

386

Kaluri, R., & Li, G. (2016). A review on how to do the research in an effective way. International Journal of

Engineering Science Invention Research & Development.2 (9): 633 – 635.

387

Asha Jerlin. M, Jayakumar Sadhasivam, Nithya. S, (2016). Intelligent Interior Mapping using Wall Following

Behaviour, International Journal of Trend in Research and Development.3(6):112-114.

388

Swarna Priya, RM., Aarthy S. L.,Sujatha , R., Srinivas Koppu, Madhusudhana Rao, (2016). Reconstruction of

3D Realistic Models from Multiple Images – A Survey, International Journal of Advanced Research in Electrical,

Electronics and Instrumentation Engineering,5(12):8886 – 8891

389

Asha Joseph, John Singh K (2016). A Survey on Latest Trends and Challenges in Cyber Forensics,

International Journal of Advances in Electronics and Computer Science, Special Issue, 75-78.

390

Kunal Gagneja, K., John Singh, (2016). Quantum Encryption using Lattice on Streaming Video in VLSI.

International Journal of Advances in Electronics and Computer Science, Special Issue, 118-121.

391

M.Prabukumar.L., Agilandeeswari., Srinivas Koppu., Madhusudhana Rao., Geethanajali, S. (2016).

Vehicle License Plate Recognition Based on Concentric Windows and Deep Neural Networks, International J

of Advanced Research in Electrical, Electronics and Instrumentation Engg, 5(12):8950 – 8956

392

Agilandeeswari, L., & Ganesan, K. (2016). False-positive free Hilbert and multi-resolution-based image

watermarking technique using firefly optimisation algorithm. International Journal of Information Privacy,

Security and Integrity, 2(4): 257-280.

393

M P Gopinath, S Prabu, Srinivas Koppu, Madhusudhana Rao, Kamalakannan J. (2016). Automatic Region Growing

Algorithm based on Combined Filtering Technique to Detect Breast Cancer, International J of Advanced Research in

Electrical, Electronics and Instrumentation Engg 5(12):8878 – 8885.

394

S Ramani, P., Swarnalatha, L., Ramanathan., Srinivas Koppu., Madhusudhana Rao. (2016).Symmetric Private Key

Encryption and Decryption based on Matrix, International J of Advanced Research in Electrical, Electronics and

Instrumentation Engg, 5(12):8985 – 8991.

395

Venugopal P., Rajeev Pankaj N., Satheesh Kumar., Srinivas Koppu .,Madhusudhana Rao. (2016). Detection of Enemy

Intervention in Border and Battle Fields Using Smart Dust Technology, International J of Advanced Research in Electrical,

Electronics and Instrumentation Engg, 5(12):8833 – 8843

   

396

Ramya, G., Priya, G., & Mon, F. A. (2016). Isolating Tainted Nodule. Imperial Journal of Interdisciplinary Research,

2(11):1870-1973.

397

Bandaru Venkata Hemanth Kumar., Ramya, G.(2016). Clustered Information Retrieval Using Image Query,

International Journal of Innovative Research in Computer

 

and Communication Engineering, 3(6):5503 – 5507.

398

Devi, G. U., Sowmitha, M. K., Jidhesh, R., & Jangir, A.(2016).Improved Eaack For Intrusion Detection System.

International Journal of Research in Engineering and Technology, 5(5): 28 – 33.

399

Prathamesh Vijay Tarare ,AnurajMalav,G., Usha Devi. (2016). Modified Ant Colony System Algorithm For IP-

Traceback Problem, International Journal of Research in Engineering and Technology, 5(5):19-23

400

Judith Nita, M., Rajaprabha. MN. (2016). Implementation of Shared Authority Based Privacy Preserving Authentication

Protocol in Cloud Computing, International Journal of Innovative Research in Computer and Communication

Engineering, 4(4):6780 – 6785.

401

Thenmozhi B., Rajaprabha, MN.(2016). Automatic Averting From Cyberbullying Using Efficient Polarity Count Algorithm,

International Journal of Innovative Research in Computer and Communication Engineering, 4(4): 6834 – 6840.

402

Bimal Kumar Ray, (2016). A technique for piecewise linear approximation of 2D digital curve, International Journal of

Computer Graphics, 7(1):1-16.

403

V. Shanthi., Godithi Ramya Sree., Senthil Kumaran. (2016). Confidential Communication and Secret Data Storing by

Embedding Files–Survey, International Journal of Research in Engineering and Technology, 3(11): 459 – 465.

404

Mangayarkarasi, R.,Vanitha, M.(2016). A Survey of suboptimal polygonal approximation methods, International Journal

of Communication and Computer Technologies, 4(16):4083 – 4090.

405

M. Lawanya Shri., M.B.Benjula Anbumalar., K. Santhi, Deepa. M., (2016).Task Scheduling Based On Efficient

Optimal Algorithm In Cloud Computing Environment, International Journal of Advanced Technology in Engineering

and Science, 4(special issue no:1):306-310.

406

Subha, S. (2006). A Literature Survey of CPU Exclusive Caches, International Journal of Advanced Scientific Technologies,

Engineering and Management, 2(7):9-10.

407

Tamizharasi, G. S., Manjula, R., Monisha, K., & Balamurugan, B. (2016). A Secure and Efficient Framework for Health

Data Management in E-Health Clouds. International Journal of Computer Science and Information Security, 14(9):1078-1085.

408

Vasumathy, M., Thirugnanam, M., & Sumathy, S. (2016). A framework for automatic intrude object identification in

paediatric foreign body aspired radiography images. International Journal of Image Mining, 2(1): 57 – 67.

409

Elavarassi M, Elango N.M, (2016). A Review On Recovering And Examining Computer Forensics Evidences.

Asian Journal of Computer Science Engineering, 1(2):22 – 24.