ADVANCED METERING POWER LINE CARRIER COMMUNICATION (PLCC) NETWORKS

Done by

M.PRABHU, C.MATHANKUMAR, PRAVEENKUMAR

Border Alert System and Emergency Contact for Fisherman using RSSI

Done By

E.Krishnamoorthy, S.Manikandan, M.MohammedShalik

Breakdown Vehicle Alert System using RF based Wireless transmission

Done by

V.Kiran, M.Makesh, M.Mohammed Asadullah Khan

 

HAZARDOUS GAS DETECTION AND ALERTING USING SENSORS

Done By

AkshayaPriya.S, Keerthana.M, Jenifer.M

IOT ENABLED LIFESTYLE MONITORING AND ASSISTANCE SYSTEM FOR DIABETIC PATIENTS

Done by

G.Sharmila, R.Sushmitha

NATURAL TAMIL LANGUAGE PROCESSING

Done by

M.Adithyapriyadharshni, B.Anushiya, A.ArthiPriya

OFFLINE ANALYSIS SOFTWARE  FOR ANALYZING  AUTOMOTIVE TRIAL  DATA

Done By:

AbhishekSrivastava, M.Deepak, M.Gokul Raj

SMART PARKING SYSTEM FOR ANONYMOUS PLACE USING IOT

Done By

B.RavinderChoudry, Rene V.V.Sundar, R.Murugan


Research and Development

Book Publications

S.No. Name of the Faculty Name of the Book Name of the Publisher Year of Publication
1. Dr.E.A.Mary Anita Bharat Ratna Sir M.Visvesvaraya, ISBN-13 : 978-93-86258-08-3 VSRD Academic Publishing November 2016
2. Dr.G.Umarani srikanth A Novel Task Scheduling Model using Ant Colony Optimization, Advances In Computer Networks And Information Technology Volume I, (Book Chapter 6) United Scholars Publications January 2016
3. Dr.E.A.Mary Anita Securing Multicast Routing Protocols for Mobile Adhoc Networks EAN : 9783659249884 ISBN : 3659249882 Lambert Academic Publishing, Germany 2013
4. Dr.E.A.Mary Anita Soft Computing for Intelligent Transportation, pg 78-89.(Book Chapter) ISBN : 9788190491563 Charulatha Publications 2012
5. R.Geetha Object Oriented Programming Charulatha Publications 2003
6. R.Geetha System Software Charulatha Publications 2004

Sponsored Research – Completed

Project Title Funding Agency Project Coordinator Sanction Details Duration & Status
CISCO Network LAB under MODROBS Scheme AICTE Dr.E.A.Mary Anita Rs 8,90,000 sanctioned on 07/02/2014 1 year (2014-2015)Submitted UC on19/3/2015

 

Grants Received

2016-2017

 Title of the Proposal Funding Agency  Coordinators Sanction Details Status
Seminar on Engineer to Entrepreneur IEEE Dr.E.A.Mary Anita & Dr.L.Vijay Rs.4000 sanctioned on 11/07/2016 Conducted Seminar on 09.08.2016 Submitted UC
IEEE WIE Start up Grant – Seminar on “Avoiding plagiarism”   IEEE WIE Dr.E.A.Mary Anita, & Dr.G.Umarani Srikanth $200 (Rs.13,456) sanctioned on 24/06/2016 Conducted Seminar on 03/08/2016 Submitted Report

2015-2016

Title of the Proposal Funding Agency Coordinators Sanction Details Status
Workshop on Data Science Research DST- ICPS Dr.E.A.Mary Anita, & Dr.G.Umarani Srikanth Rs. 6,00,000 sanctioned on 06/04/2016 To be conducted during 15/12/2016 to 17/12/2016
Workshop on Mathematical Modelling of WSN IEEE Madras Section Dr.E.A.Mary Anita, & Dr.G.Umarani Srikanth Rs. 5000 sanctioned on 31/05/2016   Conducted on 28/07/2016 Submitted UC
ACM-W Networking Grant ACM Dr.E.A.Mary Anita & Dr.G.Umarani Srikanth $300 (Rs.19800) sanctioned on 4 /02/ 2016 Conducted on 23/3/2016 & 24/3/2016
National Level Workshop on “MATLAB and its Applications in Computational Intelligence” IEEE Madras Section Dr.E.A.Mary Anita, & Dr.G.Umarani Srikanth Rs. 5000 sanctioned on 7/10/2015 Conducted on 27/8/2015 Submitted UC

2014-2015

 Title of the Proposal Funding Agency  Coordinator Sanction Details Status

Science Expo 2014

Seminar Grant under Popularization of Science

TNSCST Dr.E.A.Mary Anita   Rs.20,000 sanctioned on 7/4/2015 Conducted  Science Expo on 28/11/2014 & 29/11/2014 Submitted UC
Tech Bridge Programme CSI Mrs. R.Geetha Rs.5000 sanctioned  on 28/4/2015 Conducted  Workshop on 24/09/2014

2013-2014

 Title of the Proposal Funding Agency  Coordinator Sanction Details Status
CISCO Network LAB under MODROBS Scheme   AICTE Dr.E.A.Mary Anita Rs.8,90,000 sanctioned on 07/02/2014   Submitted UC on 19/03/2015

2012-2013

 Title of the Proposal Funding Agency  Coordinators Sanction Details Status
National Conference on Cyber Security DRDO Dr.E.A.Mary Anita & Ms. H.Mercy Rs.30,000 sanctioned on 16/01/2013 Conducted on 27/03/2013 & 28/03/2013 Submitted UC                                    

CONSULTANCY PROJECTS

2016 – 2017

Sl.no. Name of the Organization Project Details Amount   (in Rs.)
1. SAEC CISCO NET Academy CISCO Courses Rs. 26,000
2. Harish Computers Website Creation Rs 71,000
3. Ratna Nursery And Primary School
4. Karunyam Prayer House
5. Sudha Stones
6. Shri Kanaiyalal Agarwal Bal – Niketan
7. Dreamerz Will
8. RKR Associates
9. SMP Auto Consultant Company
10. Premier Control And Drives
11. Crystal Pesticides Company
12. Dream Flower Beauty Parlour
13. Motherland Press, Parrys
14. Dynamic Systems
15. Satheesh Balaji School
16. Kkm Nursery And Primary Schiool, Thiruvannamalai
17. G.G.Engineering
18. Wahr Enterprises
19. Beloved Primary School
20. Vivekananda Engineering Company. No.147, Linghi Chetty Street, George Town, Chennai-1
21. Malar Pharmacy,8,Palliarasan Street, Anna Nagar East,Chennai-102
22. I Vesta Technologies,
28 A,D-Mundy Street,Vellore-632004
23. Rakshaw  Pharma, Nsk Complex, Aranthangi
24. Tanisha` Enterprises, No.191,Anandham Nagar, Thiruverkadu, Chennai-77
25. Arul Sweets, Nagpur, Maharashtra
26. Sri Dhanam Textiles, No.62,  Arcot Road, Valasarvakkam, Chennai-87
27. Yashwanth Automobiles, Pattalam, Chennai
28. St.John’s Primary And Nursery Matriculation School, No.152, Anbazhagan Street, Manali, Chennai-68
29. Sri Kumar Pharmacy, Avadi, Chennai
30. NCUBE Beacons, Bengaluru, Karnataka.
31. Jagadeesh Printers, 6,First Floor,Solai Amman Koil Lane, Purasaiwakkam, Chennai-07
32. Vivegam Tuition Institute, 52, Nehru Street, Kanagam Tara Mani Post, Chennai-600113
33. LTR Motors, Sengathur Nagar,
By Pass Road,Thiruthani-631209
34. I5 Photography, 4/75,Pasumpon Nagar, 3rd Main Road, Kalli Kuppam, Ambathur, Chennai-56
35. Sri Venkateswara Mobile Shop, 38,Karumariyamman Kovil Street, Kamaraj Nagar,Avadi,Chennai-71
36. Auto Consultancy, Mr.S.N.Sugumar, 147,Bells Road, Cheapauk, Chennai-05
37. GKM Hospital Hospital Management System Rs. 6,000
38. S. R. Lingam Dental Clinic
39. Dr.P Rathnasamy M.B.B.S., (E.N.T.) Clinic
40. Jeevan Trust Android Application Rs. 8,000
41. Petramount Technologies
42. V.M Enterprises
43. Nagarjuna Group, Bangalore, Karnataka Inventory Management  System Rs. 47,000
44. Success Training Academy, No.166,
5th Cross Street, Iyyappan Nagar, Chennai-93
45. Shri Raayan Bharath Gas Agency & S.R Enterprises, No.32/16, Egmore High Road, Egmore, Chennai-8
46. GLX
47. Step-In Funschool, 32, 2nd Cross Street, Senthil Nagar, Kolathur, Chennai-99
48. Sonn’s Publishing House, #151, Thiruvallur Puram, 2nd Street, Choolaimedu, Chennai-94
49. Rakkamma Stores, Kamarai Nagar, Main Street, Ernavur, Chennai-57
50. Murugan Stores
51. Munusamy Builders And Promoters
52. Insurance Company
53. Aiscs India Pvt Ltd
54. Voltas AC Service
55. Dell Showroom
56. Hari Electricals
57. Sri Krishna Nivas
58. Arcus Automation Private Limited
59. My Business Visual Private Limited
60. Government Taluk Office, Perambur
61. Sri Sai Gramiya Millets
62. Jayam Cable Tv Pvt Ltd
63. KLN Motor Agencies Pvt Ltd, 232, Poonamalle High Road, Kilpauk, Chennai-10
64. B.L Impex,15,First Floor, Godown Street, Chennai-01
65. Chennai Ford
66. G.R Material Supply
67. Fabricon,62,Kanniyamman Koil Street, Ambathur  Industrial Estate, Chennai Software Package, Quick Print  Solution Rs. 3,000
68. Speed Student Xerox
Student Activity Center-S.A.
Engineering College
69. RC Matriculation School Student Information System Rs. 9,500
70. Grace Matriculation Higher Secondary School
71. Chennai Higher Secondary School, Subbrayan Street
72. Salvation Matric Higher Secondary School
73. Dr. MGR University
74. Orbit College of Animation, Chennai
75. Spa Angel Beauty Care and Hair Saloon, Chennai – 81 Online Shopping Applications Rs. 6,500
76. SR Transport, 17,Vasantham Nagar,
Avadi,Chennai-71
77. Ranjanas Textile Paradise
78. Velicham Studios
79. V.G.R.Travels

2015 – 2016

Sl.no. Name of the Organization Project Details Amount  (in Rs.)
1. Eyeopen Technologies, Rajamanickam Enclave, 18th Main Road, Anna Nagar, Chennai- 600 040   Institution Management System   Rs.20,000
2. Chennai Logistics Corporation, 1/1 Hinduja towers, Ist Floor, Sriperumbadur, Chennai- 602 105 Smart Booking and Billing System   Rs.10,000
3. SAEC CISCO NET Academy CISCO Courses Rs.75,000

2014 – 2015

Sl.no. Name of the Organization Project Details Amount  (in Rs.)
1. Soft Square Solution Pvt Ltd 4/397, Radio Colony, Palavakkam, Chennai 600041. Health Care Information System on FORCE.COM Rs.50,000
2. VGN Homes Private Ltd. 333, Poonamallee High Road, Amaindakarai, Chennai – 600 029. Interactive Web Designing Rs.50,000
3. Vijayanta Model Higher Secondary School, HVF , Avadi, Chennai -54. School Management Software Rs.10,000
4. Shri Gomathi Vidyalaya Nursery & Primary School, Perumalpattu, Thrivalluvar Dist., Pin -602 024 Student Information Portal Rs.10,000
5. German Leprosy & TB Relief Association India(GLRA India) Old No.4, New No. 94, Gajapathy Street,Shenoy Nagar, Chennai – 600030. Patient Information Portal Nil

2013 – 2014

Sl.no. Name of the Organization Project Details Amount  (in Rs.)
1 Eyeopen Technologies Rajamanickam Enclave, 18th Main Road, Anna Nagar, Chennai- 600 040 Survey Game Rs.20,000
2 Nokia Solutions and Networking India Pvt. Ltd. Optical Inspection System For Measuring The Thickness Of Heat Sink Paste(Thermal Gel)         –

STAFF PUBLICATIONS

2016-2017

  S.No. Name of the Faculty Title of the Paper Paper Details
1. Dr.G.Umarani Srikanth Task Scheduling Using Probabilistic Ant Colony Heuristics The International Arab Journal of Information Technology, Vol. 13, No. 4, pp- 375-379 , July 2016,ISSN:1683-3198
2. Dr.V.Manjula Resilient Protocols for Detection and Benign Node Recovery of Node Replication Attack in WSN Transylvanian Review ,Vol XXIV,No. 9, pp  1377 – 1391, July2016,ISSN 1221-1249
3. Dr.V.Manjula Resilient Protocol for Clone Attack Detection in IoT using Graph Theory Transylvanian Review:Vol XXIV, No. 10, pp 1913 – 1923,August 2016,ISSN 1221-1249
4. Mr.C.Bala Krishnan A Survey on Detection of Wormhole Attack International Journal of Engineering Science and Computing, VOL 6, ISSUE 6, pp 6545-6549,June 2016, DOI:10.4010/2016.1572, ISSN 2321 3361
5. Mr.T.Vignesh Analysis of Thresholding Versus Image Fusion Techniques to Change Detection using Remote Sensing Images International Journal of Advanced Research in Computer Science and Management Studies, Vol. 4, Issue 4, August 2016, ISSN: 2321-7782,Impact Factor : 6.047

2015-2016

S.No. Name of the Faculty Title of the Paper Paper Details
1. Dr. G. Umarani Srikanth E-Learning and its Impact on Indian Education National Seminar on Educational Technologies and E-Learning Technologies for Indian Class Rooms in the New Millennium, PRIST University, pp 10-14, June 2015
2. Navigation Support for the Visually Impaired using Digitalized Pole National Conference on Recent Trends in Information Technology and Communication, March 2016
3. Improving Network Life Time in Presence of Critical Node in the Path National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
4. Eliminating and Avoiding Critical Node in the Wireless Sensor Networks International Journal of Engineering Science and Computing, Vol 6, Issue 5, pp 5022-5025
5. A survey on the Utilization of ANT Colony Optimization Algorithm in WSN International Conference on Information Communication and Embedded System 2016(ICICES2016)
6. Dr.E.A.Mary Anita Detection of Sybil Attack in Wireless Sensor Network Middle-East Journal of Scientific Research 23 (Sensing, Signal Processing and Security), pp.202-206, July 2015, ISSN 1990-9233, DOI:0.5829/Idosi.Mejsr.2015.23.Ssps.55
7. A Signature based Secure Authentication Framework for Vehicular Adhoc Networks International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:10, No:2, 2016, pp. 369-374.
8. Interactive Big Data Management in Healthcare Using Spark ISBCC’16, Volume 49 of the series Smart Innovation, Systems and Technologies, Springer International Publishing,  pp 265-272. DOI: 10.1007/978-3-319-30348-2_21. ISBN 978-3-319-30347-5
9. Secure and Efficient Distance Effect Routing Algorithm for Mobility (SE_DREAM) in MANETs ISBCC ‘16, Volume 49 of the series Smart Innovation, Systems and Technologies, Springer International Publishing, pp 65-80. DOI: 10.1007/978-3-319-30348-2_6. ISBN 978-3-319-30347-5
10. A Survey on Authentication Schemes of VANETs International Conference on Information Communication and Embedded System (ICICES 2016). DOI: 10.1109/ICICES.2016.7518946. ISBN: 978-1-5090-2552-7
11. Tongue Image Analysis for Diabetic Diagnosis Detection Using Image segmentation Asian Journal of Information Technology, Volume 15, Issue 3, pp. 424-436. DOI : 10.3923/Ajit.2016.424.436
12. Challenges and Security Issues in Vehicular Adhoc Networks 3rd National Conference on Innovative Computing Techniques (NCICT’16), pp. 90-93.  ISBN 978-1-941505-46-5
13. A Novel Robust Routing protocol RAEED to Avoid DOS Attacks in WSN International Conference on Information Communication and Embedded System 2016 (ICICES2016) DOI: 10.1109/ICICES.2016.7518946.  ISBN: 978-1-5090-2552-7
14.      Dr.V.Manjula Selfish Misbehaviour Detection and Prevention of Congestion Attacks With False Data Injection International Journal of Engineering Science and Computing, May 2016 DOI 10.4010/2016.1204, 6, Issue No.5, pp. 4848 -4851
15.      Resilient Enroute Filtering Scheme for False Data Injection Attack in Cyber Physical Networked System(CPNS) National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
16.      Resilient Systems on Secure Sharing of Information Against False Data Injection International Conference on Information Communication and Embedded System 2016 (ICICES2016) ISBN: 978-1-5090-2552-7
17.      Mrs.R.Geetha Effective Transmission of Aggregated Data for Wireless Sensor Networks International Journal of Advanced Research Trends in Engineering and Technology, Volume 3 Special Edition, 19th April 2016 pp549-554
18.      E-Learning and its Impact on Indian Education National Seminar on Educational Technologies and E-Learning Technologies for Indian Class Rooms in the New Millennium, PRIST University, pp 10-14,June 2015
19.      A Hybrid Key Management Approach for Secure Communication in Wireless Sensor Networks Indian Journal of Science and Technology, Vol 8(15),57603, pp 1-8, ISSN(Print): 0974-6846, ISSN : 0974-5645, July 2015
20.      Secure and Efficient Transmission of Aggregated Data (SETA) for Mobile Wireless Sensor Networks International Journal of Computer Electrical Automation Control and Information Engineering Vol:10, No:3, 2016, pp. 570-574. Waset.Org/Publication/10004879
21.      Automatic Stress Detector and Compressor in Working Environment using Pressure Sensor National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
22.      Securing Data in Cloud Environment by Implementing Self Destructive Scheme. National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology, April 2016
23.      Mrs.S.Veena A survey on Privacy Preserving K-NN Classification over Encrypted Data International Journal of Engineering Science And Computing, Vol 6,Issue No.5, May 2016
24.      Query Processing using Privacy Preserving K-NN Classification over Encrypted Data International Conference on Information Communication and Embedded System 2016 (ICICES2016) ISBN: 978-1-5090-2552-7
25.      Semantically Secure Encryption with K-NN Classification in Relational Data National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
26.      Group User Revocation for Shared Dynamic Cloud Data in Cloud Storage National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology, April 2016
27.      Reputation based Task Scheduling for Database Systems by Electing Servers National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology, April 2016
28.            Mr.C.Bala Krishnan             Secure Data Aggregation in WSN: Filtering out Collusion Attacker’s Impact National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
29.      Vehicle Communication based Driver Assistance and Immediate Payment for Tollgate International Conference on Innovations and Challenges in Engineering and Technology, Kings Engineering College
30.      Prevention of Eves Dropping in Network Security using Quantum Key Generation Algorithm International  Conference on Science and Innovative Engineering , Jawahar Engineering College
31.      An Enhanced Iterative Filtering Technique for Data Aggregation in WSN International Conference on Information Communication and Embedded System 2016 (ICICES2016) ISBN: 978-1-5090-2552-7
32.      A survey on Data Aggregation Scheme in WSN International Journal of Engineering Science and Computing, DOI 10.4010/2016.1503
33.      Mr.R.Prasanna Kumar Data Security in Cloud Environment using Multiple KMSP National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
34.      Mrs.N.S.Usha A Novel Robust Routing Protocol RAEED to Avoid DOS Attacks in WSN International Conference on Information Communication and Embedded System 2016 (ICICES2016) ISBN: 978-1-5090-2552-7
35.      Public Auditing for Regenerating Code using Proxy in Cloud Storage National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology, April 2016
36.      Avoidance of DOS Attack in WSN using RAEED Protocol National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
37.      Secure Droid Restrict User Access Control based on GEO Location S/M for Mobile Devices National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology, April 2016
38.      A survey on Hello Flood Attack International Journal of Engineering Science and Computing, DOI 10.4010/2016.1099
39.      Mr.A.Mani Crime Reporter COP’s Android APP National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology, April 2016
40.      IOT Based Parking System using Cloud and Sensors. National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology, April 2016
41.      Mrs.D.Vinodha Energy Efficient Intrusion Detection System International Journal for Scientific Research & Development IJSRD, April 2016
42.      Cost-Effective Authentic and Anonymous Data Sharing with Forward Security International Conference on Advances in Engineering, Science & Technology @ Chennai.
43.      Data Security EOR Complex Data: Privacy and Data Mining National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
44.      Mr.S.Prabhu Enhancing Security using ECDH in VANET National Conference on Recent Trends in Information Technology and Communication 2016, March 2016
45.      A Secured Architecture for Light Weight Integrity in Named Data Networking National Conference on Recent Trends in Information Technology and Communication
46.                          Mr.S.Muthu Kumarasamy                             Stratified Report Assisted Reputation Administration (SRA) System for MANETS International Conference on Information Communication and Embedded System 2016 (ICICES2016) ISBN: 978-1-5090-2552-7
47.      Balanced Clustering in Mobile Adhoc Networks using Route Cluster International Conference on Information Communication and Embedded System 2016 (ICICES2016) ISBN: 978-1-5090-2552-7
48.      A Survey on Reputation System and Price System based Cooperation Inducement Scheme in Mobile Ad-hoc Networks International Journal of Engineering Trends And Technology, Seventh Sense Research Group, Vol. 5,No. 1, Jan 2016, DOI : 10.14445/22315381/IJETT-V35P205
49.      A Controlled Overhead and Throughput using Hybrid Wireless Networks Distributive Approach International Journal of  Innovative Research in Computer and Communication Engineering
50.      Cooperative Communication in MANETS using Extended and Weakly Connected Dominating Set International Journal of  Emerging Technology in Computer Science and Electronics  ISSN No. 0076-1353, Vol 19, Issue 2, Jan 2016
51.      Efficient Channel Management non Uniform Load Distribution in Cluster based MANETS National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
52.      Certificateless Effective Group Key Management in Dynamic Wireless Sensor Network ICTACT-NCACT-16 @ DMI College Of Engineering, March 2016.
53.      A Hierarchical ARM System for MANET’s National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
54. Mrs.M.Renuka Devi Cloud Based Internal Discussion and Decision Portal National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology, April 2016
55. Ms.J.Sangeetha Phony Video Exposure National Conference on Computing Communication and Information Technology (N3CIT16) April 16
56. Reranking Model for Web Image Search Using Attributes National Conference on Recent Trends in Information Technology and Communication 2016, March 2016
57. Mr.Anwar Basha H Collaborative Attacks  in MANETs and a Corrective SAIT Detection Approach National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology, April 2016
58. Ms.S.Sajini Automatic Sentiment Analysis of User Reviews National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
59. Mrs.M.Preetha An Energy Efficient Routing Protocol for Correlated Data using CL-LEACH in WSN The Journal of Mobile Communication, Computation and Information, ISSN: 1022-0038 (Print) 1572-8196 (Online),May 2016, Volume 22, Issue 4,pp 1415–1423, DOI : 10.1007/s11276-015-1063-4
60. Intrusion Detection System in Standalone and Cooperative Network National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
61. Identifying Data Integrity and Routing Path in Wireless Sensor Network National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology, 02.04.2016
62. Identifying Selfish Nodes Using Mutual Neighbor Based Watchdog Mechanism for DTN International Conference on Information Communication and Embedded System 2016 (ICICES 16) ISBN: 978-1-5090-2552-7
63. A survey on Misbehaviour Report Authentication Scheme of Selfish Node Detection using Collaborative Approach in MANET IJESC, Vol 6 Issue No.5 May 2016
64. Aggregation Technique in the Presence of Collusion Attack for Secure Data using Interactive Filtering Algorithm in Wireless Sensor Networks National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology, April 2016
65. Mrs.V.Sureka A Mobile Augmented  Reality Framework in Marketing Purposes National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology, April 2016
66. Specification based Intrusion Detection and Prevention using Advanced Metering  Infrastructure National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
67. Mrs.K.B.Aruna Query Specific Fusion for Image Retrieval System using Ontology International Journal of Computer and Organization Trends, Volume 30 Number 2 – March 2016 Issue. Impact Factor:1.190
68. Recommendation System based on Clustering and Collaborative Filtering International Conference on Emerging and Recent Technology 2016, April 2016
69. Geographical Influence and Points of Interest Based Service Recommendation National Conference on Recent Trends in Information Technology and Communication, March 2016
70. Mr.M.P.Karthikeyan Sensory Data Transmission Using Wireless Sensor Network on the IOT Environment in Health Care National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
71. Secure User Identity Verification using Context Aware Security Hierarchical by Multilevel Architecture(CASHMA) National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology, April 2016
72. Ms.K.Jayanthi A Tracking System using Location Prediction and Dynamic Threshold for Minimising SMS Delivery International Journal of Advanced Research Trends in Engineering and Technology (IJARTET), Vol. 3, Special Issue 19, April 2016 ICICET2016 @ Kings Engineering College
73. Network Immunisation and Virus Propagation in E-mail Maleware National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
74. Ms.K.Ramya Devi Cloud Intelligence in an Inter Cloud National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
75. A Novel Robust Routing Protocol RAEED to Avoid DOS Attack in WSN   International Conference on Information Communication and Embedded System 2016 (ICICES2016) ISBN: 978-1-5090-2552-7
76. PIN Entry Method -Resilient to Shoulder Surfing and Recording Attack National Conference on Computing Communication & Information Technology, TJS College, April 2016
77.   Mrs.L.Sudha Query Specific Fusion for Image Retrieval System using Ontology International Journal of Computer and Organization Trends, Volume 30 Number 2 – March 2016 Issue.Impact Factor:1.190
78. Monitoring Greenhouse using IOT   National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology, 02.04.2016
79. Profit Driven Hybrid Cloud Management for Multimedia Cloud Computing International Journal of Advanced Research Trends in Engineering and Technology(IJARET), Vol 3, Special Issue 19, April 2016.
80. Mr.T.Vignesh A Secure ERASURE Code-based Cloud Storage System using Proxy ReEncryption National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology, April 2016
81. Efficient Classification Methodology for Change Detection using Satellite Imagery Australian Journal of Basic and Applied Sciences, 9(20) June 2015, Pages: 580-590, ISSN:1991-8178, June-2015
82. Mrs.NRG.Sreevani Remote Data Acquisition for Combat Vehicle International Journal for Research in Applied Science and Engineering Technology, Vol 4, Issue V, May 2016, ISSN : 2321-9653, IC value : 13.98
83. Ms.P.Rubasudha Query Specific Fusion for Image Retrieval System using Ontology International Journal of Computer and Organization Trends, Volume 30 Number 2 – March 2016 Issue.Impact Factor:1.190
84. Mrs.K.Elavarasi Android based Secure Account Login and Capture the Hacker National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
85. A Smart Phone Application for False Detection and Sensing Accidents National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology
86. Mrs.V.Saraswathi Balancing Workload of a Cloud and Dynamic Request Redirection for Cloud based Video Services using CDN and Data Cube National Conference on Cutting Edge Technologies in Computing and Bioinformatics (NCCETICB’16) @ Sri Ram Engineering College
87. Privacy Location Provenance for Mobile Devices Using a Witness and an Auditor National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology
88. Ms.C.Saranya Secure Transmission of Data using Random Linear Network Coding National Conference on Computing, Communication & Information Technology (NCIT ), April 2016
89. Remote Data Acquisition for Combat Vehicle International Journal for Research in Applied Science and Engineering Technology, Vol 4, Issue V, May 2016, ISSN : 2321-9653, IC Value : 13.98
90. Ms.S.Sushmitha Map Based Multicopy Dynamic Data Possession in Cloud Computing International Conference on Breakthrough in Engineering Science & Technology-2016, March 2016 @ Salem, India.
91. Placement Cell Automation System National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology
92. Ms.P.Dharani Extended (K,L,n)-Threshold Secret Sharing Scheme in Secure Deduplication. International Journal of Advances in Engineering Science and Technology (IJAEST), Volume 4, Number 3. Nov 2016.
93. Mr.M.Bala Subramanian Provably Secure Timed-Release Public Key Encryption National Conference on Computing, Communication and Information Technology, 07-04-2016
94. Studies on Open Source Real Time Operating Systems for Vehicle Suspension Control National Conference on Innovative Trends in Engineering & Technology (NCITET 2K16) @ Arignar Anna Institute of Science & Technology

2014-2015

S.No Name of the Faculty Title of the Paper Paper Details
1. Dr.G.Umarani Srikanth     Moving ATM Applications to Smart Phones with Secured PIN-Entry Methods IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN:2278 0661, p-ISSN:  2278-8727 ,Volume 17, Issue 1, Ver.II, PP: 58-65 DOI: 10.9790/0661-17125865, Jan-Feb 2015
2. Task Scheduling Model Indian Journal of Science and Technology Volume 8(S7), 33-42, ISSN (Print): 0974-6846, ISSN(Online): 0974-5645, April 2015
3. Effective Cancer Detection Using Soft Computing Technique IOSR Journal of Computer Engineering(IOSR-JCE) e-ISSN 2278-0661, p-ISSN 2278-8727,Volume 17, Issue 1, Ver.IV, PP: 01-05DOI: 10.9790/0661-17140105, Jan-Feb 2015
4. Secure SMS Communication using Cipher-SMS Protocol in Android Mobile Phone National Conference on Emerging Trends in Computing(ETIC 2015),6th Mar-2015
5. A Trinity Construction For Web Extraction Using Efficient Algorithm IOSR Journal of Computer Engineering(IOSR-JCE) e-ISSN:2278-0661,p-ISSN:2278-8727 ,Volume 17, Issue 1, Ver.II, pp: 46-52,DOI: 10.9790/0661-17124652,Jan-Feb 2015
6. An Efficient Data Security System for Group Data Sharing in Cloud System Environment International Conference on Information Communication and Embedded Systems, ICICES 2014
7.           Dr.E.A.Mary Anita                                           Dr. E.A.Mary Anita     A secure Authentication Framework for Mobile Adhoc Networks Asian Journal of Information Technology, 13(2): 58-67 ISSN: 1682-3915, JULY 2014
8. Heuristic Approach of Supervised Learning for Intrusion Detection Indian Journal of Science and Technology, Vol 7(S6), 11–14, ISSN (Print) : 0974-6846 ISSN(Online):0974-5645, Oct-2014
9. Performance Analysis of Black Hole Attacks in Geographical Routing MANET International Journal of Engineering and Technology (IJET),ISSN : 0975-4024, Vol 6,No.5, Oct-Nov-2014
10. A Survey of Big Data Analytics in Healthcare and Government 2ndInternational Symposium on Big Data and Cloud Computing(ISBCC’15) Procedia Computer science 50(2015) 408-413. DOI:10.1016/j.procs2015.04.021,April 2015
11. Securing Multi Cloud using Secret Sharing Algorithm 2ndInternational Symposium on Big Data and Cloud Computing(ISBCC’15) Procedia Computer science 50(2015) 421-426. DOI:10.1016/j.procs2015.04.011,April – 2015
12. Smart Bus- An intelligent Footboard Accident Prevention System National Conference on Innovative Intelligence in Computer Technology(NCIICT), 26,27March- 2015
13. Do Do Algorithm- Evaluation of  Do Do with AES International Conference on Recent Advances and Innovation in Engineering and Technology, 20th&21stMarch- 2015
14. A Novel Secure Framework for IP Multimedia Subsystem, Open Journal of Information Security and Applications, Volume 1, Number 2, ISSN(Print): 2374-6262 ISSN: 2374-6289 DOI: 10.15764/Isa.2014.02004, Sep-2014
15. An Efficient Location Based Anonymous Secure Routing for Mobile Ad hoc Network Open Journal of Information Security and Applications Volume 1, Number 2,Issn(Print): 2374-6262 ISSN(Online): 2374-6289, DOI: 10.15764/Isa.2014.02005, Sep-2014
16. A Novel Hybrid Key Management Scheme for Establishing Secure Communication in Wireless Sensor Networks Wireless Personal Communication, DOI : 10.1007/s11277-015-2290-9, Jan- 2015
17. Dr.P.Bala Subramanian FPGA-Based Synthesis of High-Speed Hybrid Carry Select Adders Hindawi Publishing Corporation Advances in Electronics,Volume 2015,Article ID 713843,13 Pages,http://dx.doi.org/10.1155/2015/713843
18. Mathematical Analysis of Logical Masking Capability of Logic Gates Recent Advances in Electrical Engineering and Electronic Devices,ISBN:978-1-61804-266-8
19. A Standard cell Based Voter for use in  TMR Implementation Recent Advances in Electrical Engineering and Electronic Devices,ISBN:978-1-61804-266-8
20. Dr.V.Manjula Effective Data Retrieval in Disruption Tolerant Networks Using Cipher Text  Policy-Attribute Based Encryption Indian Journal of Applied Research, Volume:5 Issue 6 June 2015,ISSN-2249-555x,DOI:10.15373/2249555x,June 2015
21.                           Mrs.R.Geetha                           A Novel Secure Framework for IP Multimedia Subsystem, Open Journal of Information Security and Applications, Volume 1, Number 2, ISSN(Print): 2374-6262,ISSN: 2374-6289 DOI: 10.15764/Isa.2014.02004, Sep-2014
22. An Efficient Location Based Anonymous Secure Routing for Mobile Ad hoc Network Open Journal of Information Security and Applications Volume 1, Number 2,ISSN(Print): 2374-6262 ISSN: 2374-6289, DOI: 10.15764/Isa.2014.02005, Sep-2014
23. A Novel Hybrid Key Management Scheme for Establishing Secure Communication in Wireless Sensor Networks Wireless Personal Communication, DOI : 10.1007/s11277-015-2290-9, Jan- 2015
24. Secure Communication Against Framing Attack in Wireless Sensor Network International Review on Computers and Software(I.RE.CO.S)  Vol:10,No4 ISSN 1828-6003,DOI- 10.15866, April-2015
25. Guaranteed  Security in Wireless Network using Improved Key Management Scheme International Journal of Science and Innovative Engineering & Technology, ISBN:978-81-904760-6-5,ISSUE Vol 1, May -2015
26. Fuzzy Logic based Technique using Trust Authentication for a Secure Data Exchange in Wireless Sensor Network International Journal of P2P Network Trends and technology(IJPTT) volume 18,Number 1,ISSN:2249-2615, DOI-10.14445, May-2015
27. Implementation of Relay based Key Generation for Data Security in Wireless Environment National Conference on Novel Computing  NCNC’15,13th March- 2015
28. Resource Conscious Secure Routing (RCS) Protocol for Wireless Sensor Networks National Conference on Emerging Trends in Computing(ETIC 2015),6th Mar-2015
29. Effectiveness of Key Management Schemes in Wireless Sensor Networks National Conference on Emerging Trends in Computing(ETIC 2015),6th Mar-2015
30.     33 Secure Routing Protocol based on Dynamic Trust Management for Wireless Sensor Networks National Conference on Emerging Trends in Computing(ETIC 2015),6th Mar-2015
31.                   Mrs.S.Veena                           Optimization of Active Apriori Algorithm using an Effective Genetic Algorithm for Identification of Top-l Elements in a Peer to Peer Network Asian Journal Applied Sciences,ISSN:2321-0893 Vol 02, Issue 05, Oct-2014
32. Optimal Knowledge Based Top L Element Identification using Adaptive Genetic Algorithm  in Peer to Peer Network International Review on Computers and Software(IRECOS),ISSN 1828-6003, Volume 9, No. 6,Page no. 1125 – 1133, June 2014
33. An Efficient Association Rule Mining and Novel Genetic Algorithm for Identification of Top – l Elements CiiT International Journal, Vol No.6,No.4, June -2014
34. An Efficient Method to Identify the Most Frequent Item Sets using Database Count Algorithm and Effective ACO Algorithm in a Peer to Peer Network International Journal of Computer Trends and Technology (IJCTT), Volume 17 Number 6 PP:300 – 303, DOI : 10.14445/22312803/IJCTT, Nov 2014
35. Effective Data Retrieval in Disruption Tolerant Networks using Cipher Text  policy-Attribute Based Encryption Indian Journal of Applied Research, Volume:5 Issue 6 June 2015,ISSN-2249-555x, DOI:10.15373/2249555x,June 2015
36. Sharing Encrypted Data in Cloud Using Key Aggregate Crypto System National Conference on Novel Computing  NCNC’15,13th March- 2015
37.     Mr.C.Bala Krishnan     Peer to Peer Data Dissemination over Disconnected MANET based on Gossip International Journal of Engineering Trends and Technology (IJETT), Volume 20 Number 2, 95-100  ISSN:2231-5381, DOI: 10.14445/22315381/IJETT-V20P217, Feb 2015
38. XSD Technique for Web Application to Overcome Denial of Service Attack Indian Journal of Applied Research Volume 5,Issue:4,ISSN -2249-555X, April – 2015
39. Cipher Text Policy-Attribute Based Encryption for Data Retrieval in Disruption Tolerant Networks National Conference on Emerging Trends in Computing(ETIC 2015)
40. “ On – Time” Proximity Estimation Using Smartphones National Conference on Emerging Trends in Computing(ETIC 2015),6th Mar-2015
41. Web Application Tracer Against Unsolicited Request using XSD Technique National Conference on Emerging Trends in Computing(ETIC 2015),6th Mar-2015
42. Tracing Unsolicited Request in Web Application using CPR Approach International Journal of Applied Engineering Research, ISSN 0973-4562 Vol.10 No.2(2015) pp.1298-1302, March- 2015
43. Emerging Role of Distance Bounding Protocol with RFID Technology in Aerospace System IJSR- International Journal of Scientific Research, Volume:4 Issue:4,  ISSN No:2277-8179, April 2015
44. Authentication Logic Through Turn Around Time in WSN International Journal of Applied Engineering Research, ISSN : 0973-4562, Vol 10,No.2, pp.1303-1307, April 2015
45. Mrs.N.S.Usha     Implementation of Speedy Emergency Alert using Tweet Analysis National Conference on Novel Computing  NCNC’15,13th March- 2015
46. Mrs.D.Vinodha     A Smart ATM for Smartphones with Secure Pin Entry Methods International Journal of Computer and Organization Trends (IJCOT) v20(1):10-14, ISSN:2249-2593, May -2015
47.       Mrs.M.Preetha         The Grouping of Files in Allocation of Job using Server Scheduling in Load Balancing IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN:2278-8727,volume17,Issue 5,ver VI, pp 70-75,DOI: 10.9790/0661-17367075, June 2015
48. Fortify data Regaining in Decentralized Military Networks National Conference on “Leveraging Best Practices in Management”,19th March- 2015
49. Mrs.Joice Jessie Text Detection and localization in Images. National Conference on “Leveraging Best Practices in Management “,19th March- 2015
50.               Mr.S.Muthu Kumarasamy                               Visual Authentication Using QR code to Prevent Keylogging International Journal of Engineering Trends and Technology (IJETT), Volume 20 Number 3, 149-154. ISSN:2231-5381 DOI: 10.14445/22315381/IJETT-V20P227, Feb -2015
51. Secured Authentication for Aadhaar Card Through Sensory Information Using Mobile Phone International Journal of Scientific Research. (IJSR),Volume :4; Issue :4 March 2015; ISSN No 2277 – 8179 DOI: 10.15373/22778179, April- 2015
52. Corporate Policy Governance in Secure MD5 Data Changes and Multihand Administration IOSR Journal of Computer Engineering(IOSR-JCE) e-ISSN:2278-0661,p-ISSN 2278-8727 , Volume 17, Issue 1, Ver IV,PP 18-23 DOI: 10.9790/0661-17141823 ANED-DDL 11.0661/iosr-jce-D017141823, Jan-Feb 2015
53. QR-Based TOTP Authentication in E-Banking National Conference on Emerging Trends in Computing(ETIC 2015),6th Mar-2015
54. Dual Authenticated Smart Card   National Conference on Emerging Trends in Computing(ETIC 2015),6th Mar-2015
55. A Self Robust SAR Scheduling for Evaluating an Approach for File Sharing in Load Balancing National Conference on Emerging Trends in Computing(ETIC 2015),6th Mar-2015
56. Probabilistic Mischief Detection Scheme in Delay Tolerant Networks National Conference on Emerging Trends in Computing(ETIC 2015),6th Mar-2015
57.   Ms.J.Sangeetha     A Web Extraction Using Soft Algorithm for Trinity Structure IOSR Journal of Computer Engineering (IOSR-JCE)e-ISSN: 2278-0661, p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. III, PP 42-48, May-Jun 2015
58. Shared Authority Based Privacy-Pre-Serving Authentication Protocol in Cloud Computing National Conference on “Leveraging Best Practices in Management”,19thMarch- 2015
59. Mrs.Renuka Devi     Captcha as Graphical Passwords using Multiple Images National Conference on Emerging Trends in Computing(ETIC 2015),6th Mar-2015
60. A Web Extraction Using Soft Algorithm for Trinity Structure IOSR Journal of Computer Engineering (IOSR-JCE)e-ISSN: 2278-0661, p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. III, PP 42-48, May-Jun 2015
61.       Mr.H.Anwar Basha                 An Efficient Traffic Delivery in Adhoc Network – A Survey International Conference on Innovative Engineering Technologies (ICIET’ 2014), Dec 28-29, 2014 (Thailand), Dec-2014
62. An Efficient Traffic Delivery in Adhoc Network – A Survey International Journal of Computing & Instrumentation Engineering(IJCCIE) Vol 1,Issue 1 ISSN:2349-1469, e-ISSN:2349-1477 http://dx.doi.org/10.15242/IJCCIE.E1214005, Dec- 2014
63. A New Approach towards Biometric Authentication System using Face Vein National Conference on Computing Technologies Todays and  Beyond (NCCTTB’15),ISBN 978-93-84743-54-3 2015 Bonfring,4thMarch- 2015
64. Privacy Preserving Back Propagation Neural Network Learning using Cloud Computing International Journal of Technical Search and Application, e-ISSN:2320-8163,Volume 3. Issue 2,  PP-58-61, Mar-April 2015
65. Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN:2278-0661, p-ISSN:2278-8727, Volume 17 , Issue 2, Ver.1, PP-75-79, MAR-APR 2015
66. Back Propagation Neural Network Learning Using Cloud Computing National Conference on Emerging Trends in Computing(ETIC 2015),6th Mar-2015
67.         Mrs.S.Sajini               A Web Extraction Using Soft Algorithm for Trinity Structure IOSR Journal of Computer Engineering (IOSR-JCE)e-ISSN: 2278-0661, p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. III, PP 42-48, May-Jun 2015
68. Bus Arrival Time Predication based on Cell Tower Sequence Information Shared by Participatory Users National Conference on “Security Issues and Challenges in SMART Computing (SICSC 2015)”,20th May 2015
69. Bus Arrival Time Predication based on Cell Tower Sequence Information Shared by Participatory Users International Journal of Applied Engineering research,ISSN:0973-4562Vol 10 No56(2015), May 2015
70. Mrs.V.Sureka     A Smart ATM for Smartphones with Secure Pin Entry Methods International Journal of Computer and Organization Trends (IJCOT) v20(1):10-14 ISSN:2249-2593, May -2015
71.   Mrs.S.Jonisha     A Smart ATM for Smartphones with Secure Pin Entry Methods International Journal of Computer and Organization Trends (IJCOT) v20(1):10-14 ISSN:2249-2593, May -2015
72. Ms.K.Jayanthi     A Smart ATM for Smartphones with Secure Pin Entry Methods International Journal of Computer and Organization Trends (IJCOT) v20(1):10-14 ISSN:2249-2593, May -2015
73.     Mrs.K.Elavarasi       The Grouping of Files in Allocation of Job using Server Scheduling in Load Balancing IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN:2278-8727,volume17,Issue 5,ver VI, pp 70-75,DOI: 10.9790/0661-17367075, June 2015
74. Online Signature Verification for User Identification National Conference on “Leveraging Best Practices in Management”,19th March- 2015
75.   Ms.NRG  Sreevani A Web Extraction Using Soft Algorithm for Trinity Structure IOSR Journal of Computer Engineering (IOSR-JCE)e-ISSN: 2278-0661, p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. III, PP 42-48, May-Jun 2015
76. Mr.T.Vignesh Local Binary Pattern Texture Feature for Satellite Imagery Classification International Conference on Science, Engineering and Management Research, (ICSEMER 2014) Nov 27-29, 2014, Nov-2014
77.     66 Personalized Search and Recommendation for Movies in Relational Database National Conference on Novel Computing  NCNC’15,13th March- 2015
78. Mr.M.Balasubramanian   Personalized Q&A System Based on Social Networks. National Conference on Emerging Trends in Computing(ETIC 2015),6th March- 2015
79. Ms.Ramyadevi The Grouping of Files in Allocation of Job using Server Scheduling in Load Balancing IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN:2278-8727,volume17,Issue 5,ver VI, pp 70-75, DOI: 10.9790/0661-17367075, June 2015
80. Cash Payment Voucher National Conference on Novel Computing  NCNC’15,13th March- 2015

2013-2014

Sl. No Name of the Faculty Title of the Paper Paper Details
1. Dr.G.Umarani Srikanth     Load Balancing and Coordination of Web Services in Cloud International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014), Vol 2, Issue Special Jan-March 2014
2. Enhancing Data Privacy and Efficiency for Secure Cloud Storage Model International Journal of Advanced Research in Compute Engineering & Technology (IJARCET)
3. A Partial Inference Control Based Data Disclosure International Conference on Information Communication and Embedded Systems(ICICES 2014), Feb 2014
4. Dr.E.A.Mary Anita       Confronts and Applications in Marine Sensor Networks International Journal of Computer Science and Mobile Computing,, May 2014, Vol.3 Issue.5, 251-256, May 2014
5. A New Compact Micro strip Integrated E-Array Patch Antenna with High Gain and High Aperture Efficiency International Journal of Wireless Personal Communication-Springer Science, April 2014, DOI 10.1007/s11277-014-1798-8
6. Performance Analysis of Routing Protocols for Wireless Sensor Networks for Disaster Management, International Journal of Computer Science and Engineering Communications, Vol 2, Issue.106-112, Feb 2014
7. A Wireless Sensor Network Architecture for Forest Fire Detection International Journal of Computer Applications in Engineering Sciences, Vol.III, Issue.III, 105-107, Sep 2013,
8. Dr.P.Bala Subramanian           FPGA based Synthesis of Hybrid Carry Select Adders International Conference on Advances in Computer Science and Information Technology (ACSIT2K14), 28-29thMarch 2014
9. FPGA  Implementation of Synchronous Section-Carry based Look Ahead Adders International Conference on Devices, Circuits and Systems(ICDCS,14), 6-8thMarch 2014,260-263
10. Computation of Error Resiliency of Muller C-element International Conference on Computational Science and Computational Intelligence (CSCI 2014), March  2014
11. Mrs.R.Geetha Fuzzy Logic Based Compromised Node Detection and Revocation in Clustered Wireless Sensor Networks 4th IEEE International  Conference on Information Communication and Embedded Systems(ICICES 2014), 27-28th Feb 2014
12. SEBAR: Secure Energy Based Ant Routing Algorithm for Wireless Sensor Networks 16th International Conference on Computing, Networking and Communications(ICCNC 2014), 21-22ndFeb 2014
13. Mrs.S.Veena   A Technique with Differentiated Sampling in Anomaly Detection System for Outlier Identification International Journal of Research in Commerce, IT& Management ,  Nov 2013
14.         Mr.C.Bala Krishnan                                   SDRP and SSO Mechanism for Impersonation Attack in Wireless Sensor Networks International Journal of Advanced Research in Computer Science & Technology (IJARSCT 2014), 2347-9817, Volume 2, Issue Special 1 Jan- March 2014
15.       SDRP and SSO Mechanism for Impersonation Attack in Wireless Sensor Networks AICTE Sponsored International Conference  Hi-Tech Trends In Emerging Computational Technologies,20,21-Feb 2014
16.       Smart Tracking of Human Location  and Events based on WPS using Android Technology International Journal of Computer Science and Engineering (IJCSE) 2347-2693, Volume 2, Issue 1 31/01/2014, E-ISSN: 2347-2693,Jan 2014
17.       An Efficient Tracking of Human Mobility  and Events based on WPS using Android Technology International Conference on Advanced Computer Science & Information Technology(ICACSIT) held at Chennai on 20th Oct 2013 (ICACSIT -2013)
18.       Efficient in Revoking Certificates of Malicious Nodes in MANET International Conference on Advanced Computer Science & Information Technology(ICACSIT) held at Chennai on 20th Oct 2013 (ICACSIT -2013)
19.       Efficient in Revoking Certificates of Malicious nodes in MANET International Journal of Advanced Computational Engineering and Networking, 2320-2106, Volume1,Issue 9,  Nov -2013
20.       Improving Node Cooperation for Packet Delivery in Multi Hop Wireless Network International Journal of Scientific in Computer Science Application and Management Studies (IJSRSAMS), 2319-1953,Volume 3, Issue 2, March 2014
21.       Cluster Based Certificate Revocation of Attacker’s Nodes in MANET International Journal of Computer Science and Engineering Volume 2,Issue 1 E-ISSN: 2347-2693
22.       Power Draining Prevention in Ad-Hoc Sensor networks using Sensor Network Encryption Protocol ICICES.2014.7033971 Print ISBN:978-1-4799-3835-3 INSPEC Accession Number:14915905 DOI:10.1109/Publisher : IEEE
23.       Mr.S.Prabhu Enhanced Techniques to strengthening DTN against Flood Attacks International Conference on Information Communication and Embedded Systems(ICICES 2014)
24.       Mr.S.Muthu Kumarasamy     Efficient Video Transmission for Wireless Communication Networks using ZIGBEE Protocol International Conference on Advances in Computer Science and Information Technology(ACSIT’14),28,29-Mar 2014
25.       Efficient Video Transmission for Wireless Communication Networks using ZIGBEE Protocol International Journal of Research in Computer  Application and Management  (IJRCAM), ISSN 2231-1009, Volume No , (2013), Issue No. 11, November 2013
26.       Ms.J.Sangeetha E-Voting System using Android Application International Journal of Research in Engineering & Advanced Technology, Vol2 I 2, 2014, April-May 2014
27.       Mrs.K.Kowsalya Devi Green Computing: Eco-Friendly Computing Resources International Journal of Advanced Research in Computer Science,  Aug 2013
28.       Secure Retrieval over Encrypted Cloud Data National Conference on Challenges and Issues in Computing and Technology, 2013
29.       Mrs.M.Preetha COA-LEACH-An Efficient Energy Postulate Based on Energy Cost Modeling in Wireless Sensor Networks JOKULL Aug 2013
30.       C-MAC: An Efficient Energy Postulate Based on Energy Cost Modeling in Wireless Sensor Network Asian Journal of Information Technology 12(6):176-183,2013 ISSN:1682-3915, Dec 2013
31.       Mr.H.Anwar Basha Load Rebalancing in Cloud for Distributed File Transfer National Conference on Advanced Computing Technology, 2014
32.       Mrs.S.Sajini A Priority and Fair Connection based Opt Packet Scheduling in IEEE 802.11 based Mesh Topology International Journal of Research in Engineering and Advanced Technology (IJREAT), Dec 2013
33.       Mrs.V.Sureka QKD Technology for High Performance Computing and Wireless Network International Journal of Research and Advanced Technology, Vol 1 Issue 6, Jan 2014
34.       Non Path based Mutual Anonymity Protocol for Decentralized  P2P Systems International Journal of Research in Engineering and Advanced  Technology,  Vol 1,Issue 6, JAN 2014
35.       Ms.S.Jonisha QKD Technology for High Performance Computing and Wireless Network International Journal of Research and Advanced Technology, Vol 1 Issue 6, Jan 2014
36.       Non Path based Mutual Anonymity Protocol for Decentralized  P2P Systems International Journal of Research in Engineering and Advanced  Technology,  Vol 1,Issue 6, Jan 2014
37.       Ms.K.Jayanthi Data Consistency for Co-Operative Caching in Mobile Networks National Conference on VLSI, Image Processing and Networking, April 2014

2012-2013

S.No. Name of the Faculty Title of the Paper Paper Details
1. Mrs.Jebarani Sargunar An Efficient Processing of Regular Register Prone to Continuous Change IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 13 ISSN: 2320 – 8791
2. Dr.E.A.Mary Anita A Wireless Sensor Network Architecture for Forest Fire Detection International Journal of Computer Applications in Engineering Sciences, Volume III, Issue III, Sep 2013, ISSN:2231-4946.
3. Mrs.G.Umarani Srikanth       Scheduling of Real Time Task using Ant Colony Optimization International Journal of Soft Computing, Vol.8, Issue No.1, pp.50-55, 2013.
4. Beehive Backbone Construction with Clone Attacks In Wireless Sensor Network International Journal of Societal Applications of Computer Science, , Vol. 2, Issue No.2, 2013, Feb 2013
5. Ant Colony optimization in Diverse engineering application: An Overview International Journal of Computer Application, July 2012
6. Mrs.R.Geetha     Ant colony optimization in diverse engineering application: An overview International Journal of Computer Application, July 2012
7. TARF-Prevention from Adversaries of Multi-hop Routing in WSN CiiT International Journal of Wireless Communication,  2012
8. Mrs.E.Sujatha Detection of Visual Impairments using Back Propagation Neural Network International Journal of Computer Science and Engineering, , Vol. 4, No.3, Mar 2013
9.         Mr.C.Bala Krishnan             Resisting Password based Systems from Online Guessing Attacks International Journal of Emerging Technology and Advanced Engineering ,  Volume 3 Special Issue1, Jan 2013
10. Embedding of Executable File in Encrypted Image using LSB Mechanism International Journal of Emerging Technology and Advanced Engineering, Volume 3 Special Issue1, Jan 2013
11. CAPTCHA: A Defensive Mechanism against Attacks International Journal of Engineering Associates(IJEA) ,Vol. 1, Issue4, ISSN 2320-0804
12. Misbehaving Node Detection and Renovation Scheme in Disruption Tolerant Network International Journal of Engineering Associates(IJEA) , Vol. 1 Issue 4, February 2013, ISSN: 2320-0804
13. Detecting Selfish Routing and Misbehavior of Malicious Node in Disruption Tolerant Networks International Journal of Emerging Technology and Advanced Engineering, Volume 3,Special Issue 1, January 2013
14. Mrs.N.S.Usha   An Effective Geo cache collection in mobile networks using boomerang protocol International Journal of emerging technology and advanced engineering, 2012
15. Mr.A.Mani Proactive Moderation System for Auction Fraud Detection using Linear Coding Function and Selective Labeling IT Research International Conference on Advanced Computer Science And Information Technology, ICACSIT, 10th March 2013
16. Mr.S.Muthu Kumarasamy     Stop Password Hacking Attacks by using Opass Prototype International Journal of Computer Science and Management Research in vol II, Issue II ISSN 2278-733x
17. Identity Theft Detection & Prevention via Data Mining and Threshold Transaction International Conference on ICCSCM/ICIIE/ICMMME-2013,, Feb 2013
18. Increasing the Throughput of Wi-Fi using Sleep well 2nd International Conference on innovative Research in Engineering and Technology 2013 ICRET 2013
19. Detection of Misbehaving Packet Droppers and Modifies in Wireless networks Using an Adaptive Protocol in IJARCCE International Journal of Advanced Research in Computer and Communication Engineering, Vol2, Issue 2, Feb 2013
20. To Alleviate Distributed DoS Attacks in Allied Applications with Clock Drifts using DPH International Journal of Engineering Association, Vol 1, Issue 3, Jan 2013
21. Traffic Avoidance: A Wi-Fi Management using Beacons International Journal of Societal Applications of Computer Science, Vol II, Issue III , March 2013
22. To Create a User Secure Environment by using Android Mobiles International Journal of Computational Linguistics and NLP, IJCLNLP March 2013, in Vol II and Issue III
23. Mr.M.Radha Image Authentication Mechanism National Conference on Advanced Computing Technologies and Applications, 2012
24. Mr.H.Anwar Basha   Detection of Visual Impairments using Back Propagation Neural Network International Journal of Computer Science and Engineering, , Vol. 4, No.3, Mar 2013
25. Mrs.K.Kowsalya Devi     A Survey on Security and Privacy in Cloud Computing International Journal of Engineering Research and Technology, 2012
26. Two Step Share Synthesized Image Stamper Algorithm for Secure Visual Sharing National Conference on Advances in Computing and Technology, 2012
27. Mr.S.Udhaya Kumar Detection of Visual Impairments using Back Propagation Neural Network International Journal of Computer Science and Engineering, , Vol. 4, No.3, Mar 2013