International conferences

  1. J, Dinesh Peter. J, Immanuel Alex Pandian. S, A dual stage adaptive thresholding (DuSAT) for automatic mass detection in mammograms, Computer Methods and Programs in Biomedicine (Elsevier Publisher), Vol. 138, pp. 93–104, January 2017. SJR-0.639, SNIP-1.492, IF: 2.503
  2. Immanuel Joy, J. Dinesh Peter, Visual Tracking with Conditionally Adaptive Multiple Template Update scheme for intricate videos, Multimedia Systems, (Springer Publisher), pp. 1-20, 2017, SJR-0.445, SNIP-1.095, IF-2.207
  3. Jebaveerasingh, J. Dinesh Peter, SK-SVR: Sigmoid kernel support vector regression based in-scale single image super-resolution, Pattern Recognition Letters, Elsevier Publisher, 94, pp. 114-153, 2017, SJR-0.820, SNIP-1.669, IF-1.995
  4. Raveena Judie Dolly. D, Josemin Bala. G, Dinesh Peter. J, Performance enhanced spatial video compression using global affine frame reconstruction, Journal of Computational Science (Elsevier Publisher), Vol. 18, pp. 1-11, January 2017, SJR-0.481, SNIP-1.372, IF: 1.748
  5. Carolin Jeeva. S, Elijah Blessing, Phishing URL detection-based feature selection to classifiers, International Journal of Electronic Security and Digital Forensics, Volume 9, Issue 2, pp. 116-131, 2017, SJR-0.186, SNIP-0.502.
  6. Jenice Aroma, Kumudha Raimond, An Empirical Study on the influence of Image filters in Effective Closed Contour Extraction of Lakes in Satellite images, Indian Journal of Science and Technology, Vol. 10, Issue 5, pp.1-8, February, 2017.
  7. Iwin Thanakumar Joseph, Aman Kumar, Putta Praneeth, Sebastian Morris, Personal health care and monitoring system using secure cloud storage, International Journal of Computer Science Information and Engineering Technologies, Issue. 7, Vol. 1, Series. 2, pp. 1-6, Jan. 2017.
  8. Sharmily, I. Deva Priya, Improvement Of QoS- Oriented Mac Protocol For An Unstable Wireless Sensor Networks, SSRG International Journal of Computer Science and Engineering - (2’ICEIS-2017) – Special Issue, pp. 38-41, April 2017
  9. J, G. Jaspher Willsie Kathrine, An Intrusion Detection System using Correlation, Prioritization and Clustering Techniques to Mitigate False Alerts, International Conference on Big data and Cloud Computing, Karunya University, 01-04-2017
  10. Immanuel John Raja, Getzi Jeba Paulraj, Elijah Blessing Rajsingh, A Novel Node collusion technique to detect and isolate sinkhole node from mobile adhoc cloud, International Conference on Big data and Cloud Computing, Karunya University, 01-04-2017
  11. Durga, S. Mohan, J. Dinesh Peter, A Two stage queue model for Context Aware Task Scheduling in mobile multimedia cloud environments, International Conference on Big data and Cloud Computing, Karunya University, 01-04-2017
  12. P.F, Kumudha Raimond, A random Fourier features based streaming algorithm for anomaly detection in large datasets, International Conference on Big data and Cloud Computing, Karunya University, 01-04-2017
  13. Albin Shaji, Belfin. R.V, Grace Mary Kanaga, An Innovated SIRS Model for Information Spreading, International Conference on Big data and Cloud Computing, Karunya University, 01-04-2017
  14. Renu Mary Daniel, Elijah Blessing Rajsingh, Salaja Silas, An efficient forward secure authenticated encryption scheme with ciphertext authentication based on two hard problems, International Conference on Big data and Cloud Computing, Karunya University, 01-04-2017
  1. Getzi Jeba Leelipushpam, Sharmila John Francis, Immanuel John Raja, A Novel Combined Forecasting Technique for Efficient Virtual Machine Migration in Cloud Environment, Communications in Computer and Information Science (Digital Connectivity–Social Impact), CSI 2016, CCIS 679, pp. 181-190, 2016 (Springer Verlag Publisher) SJR-0.162, SNIP-0.317
  2. Jemima Jebaseeli, D. Sujitha Juliet, AnandDevadurai, Segmentation of Retinal Blood Vessels Using Pulse Coupled Neural Network to Delineate Diabetic Retinopathy, Communications in Computer and Information Science (Digital Connectivity–Social Impact) CSI 2016, CCIS 679, pp. 268-285, 2016 (Springer Verlag Publisher) SJR-0.162, SNIP-0.317
  3. Edwin Prem Kumar, K. Baskaran, R. Elijah Blessing, M. Lydia, Securing the Smart Grid Network: A Review, IEEE International Conference on Computational Intelligence and Computing Research, Agni College of Technology, Chennai, 15-12-2016 to 17-12-2016.
  4. S, Elijah Blessing. R, Titus. I, WASF-Weighted average based subjective feedback system for E-healthcare services, 2nd International Conference on Next Generation Computing Technologies, NGCT 2016, pp. 35-39.
  5. Daniel, R.M., Rajsingh, E.B., Silas, S.,"Deriving Practical Applicability of Hierarchical Identity Based Encryption in Massively Multiplayer Online Role Playing Games" in Procedia Computer Science, 2016, 93, pp. 839-846. 6th International Conference on Advances in Computing and Communications, ICACC 2016; Rajagiri School of Engineering and Technology, Kochi. 06-09-2016 to 08-09-2016. DOI: 10.1016/j.procs.2016.07.250
  6. Vincent, S., Francis, S.A.J., Kumar, O.P., Rajsingh, E.B., " A comparative study of horn antennas suitable for the transmitting antenna array module of MELISSA architecture", in 2016 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2016 - Proceedings, art. no. 7806226, pp. 28-34. DOI: 10.1109/DISCOVER.2016.7806226. National Institute of Technology Karnataka (NITK) Surathkal, Mangalore. 13-08-2016 to 14-08-2016
  7. Lydia, S. Suresh Kumar, A. Immanuel Selvakumar, G. Edwin Prem Kumar, ‘Linear and non-linear autoregressive models for short-term wind speed forecasting’ in Energy Conversion and Management, Volume 112, pp. 115-124, March 2016, SJR- 2.287, SNIP-2.065, CI-18, IF–5.589
  8. Caroline Viola Stella Mary, Elijah Blessing. R, Ganesh R. Nair, Retinal Fundus Image Analysis for Diagnosis of Glaucoma: A Comprehensive Survey, IEEE Access (IEEE Publisher), Vol. 4, pp. 4327-4354, August 2016. SJR-0.801, SNIP-1.927, IF-3.244
  9. Hepzibah Christinal, Daniel Díaz-Pernil, Mathu. T, A uniform family of tissue P systems with protein on cells solving 3-coloring in linear time, Natural Computing (Springer Publisher), pp. 1-9, Nov. 2016. SJR-0.318, SNIP-0.757, IF-0.778
  10. Jenice Aroma, Kumudha Raimond, An Overview of Technological Revolution in Satellite Image Analysis, Journal Of Engineering Science And Technology Review (ISSN:1791-2377) (Kavala Institute of Technology Publisher), Vol.9, Issue. 4, pp. 1 - 5, 2016, SJR-0.317, SNIP-0.466
  11. Immanuel Alex Pandian, G. Josemin Bala, Maya K. Kuriakose, Anitha. J, “A hierarchical algorithm with fast convergence spiral search pattern for block matching in motion estimation”, Int. J. Computational Vision and Robotics(Inderscience publisher), Vol. 6, No. 4, pp. 435-449, 2016. SJR-0.143, SNIP-0.511
  12. Titus, Salaja S, R. Elijah Blessing, Investigations on task and role assignment protocols in wireless sensor network, Journal of Theoretical and Applied Information Technology (Asian Research Publishing Network Publisher), Volume 89, Issue 1, pp. 191-201, July 2016. SJR-0.167, SNIP-0.387
  13. Jeyakrishnan, P. Sengottuvelan, Efficient on Demand Dynamic Availability-Distribution-Span Scheduling and Load Balancing Scheme for Cloud Computing, Journal of Computational and Theoretical Nanoscience(American Scientific Publishers), Vol. 13, No. 10, pp. 1-6, 2016 SJR-0.230, SNIP-0.433
  14. Karthikeyan, M. Chandrasekaran, Dynamic Programming Inspired Virtual Machine Instances Allocation in Cloud Computing, Journal of Computational and Theoretical Nanoscience(American Scientific Publishers), Vol. 13, No.12, pp. 1-10, 2016. SJR-0.230, SNIP-0.433
  15. Immanuel John Raja, Elijah Blessing Rajsingh, GetziJebaLeelipushpam, Salaja Silas, EDIS: an effective method for detection and isolation of sinkhole attacks in mobile ad hoc networks, Int. J. Wireless and Mobile Computing(Inderscience Enterprises Ltd Publisher), Vol. 11, No. 3, pp. 171-181, 2016 SJR-0.250, SNIP-0.561
  16. CarolinJeeva, Elijah Blessing Rajsingh, Intelligent phishing url detection using association rule mining, Human Centric Computing and Information Sciences(Springer Science + Business Media Publisher), 6:10, pp. 1-19, July 2016. SJR-0.615, SNIP-2.825, CI-3
  17. Edwin Prem Kumar, K. Baskaran, Elijah Blessing Rajsingh, M. Lydia, A Comprehensive Review on the Impact of Compressed Sensing in Wireless Sensor Networks, International Journal on Smart Sensing and Intelligent Systems(Massey University Publisher), Vol. 9, No. 2, pp. 818-844, June 2016. SJR-0.285, SNIP-0.682, CI-2
  18. Edwin Prem Kumar, K. Baskaran, Elijah Blessing Rajsingh, M. Lydia, Evaluation of Hybrid trust Models Using Ant Colony Optimization in Wireless Sensor Networks, International Journal on Smart Sensing and Intelligent Systems(Massey University Publisher), Vol. 9, No. 3, pp. 1243-1260, Sep. 2016. SJR=0.285, SNIP-0.682
  19. Blessed Prince, Agnes Ruphavathani, Jeno Lovesum, A Security Aware Resource Allocation Model for Cloud Based Healthcare Workflows, Indian Journal of Science and Technology (Indian Society for Education and Environment Publisher), Vol. 9, Issue 45, 2016
  20. Immanuel John Raja, Elijah Blessing Rajsingh, Getzi Jeba Leelipushpam, “Enhanced dynamic source routing protocol for detection and prevention of sinkhole attack in mobile ad hoc networks”, Int. J. Network Science(Inderscience Publisher), 1(1), pp.63–79, 2016.
  21. Salaja, Elijah Blessing, Performance Analysis on Algorithms for Selection of Desired Healthcare Services, Perspectives in Science (Elsevier Publisher) April 2016.
  1. Naveen Sundar, D. Narmadha, “Utilization of Data Mining Technique for Hassle Free Categorization of Customer Issues in Banking”, in the book titled Enabling Technologies for Health and Human Betterment, Chapter 5, pp. 28-33, ISBN: 9789380485751, Sams Publisher, Chennai, 2015.
  2. T, Christinal. H.A, Díaz-Pernil. D, “A uniform family of tissue p systems with protein on cells solving 3-coloring in linear time”, 14th International Conference on Unconventional Computation and Natural Computation, UCNC 2015; Auckland; New Zealand; 30th August 2015 to 3rd September 2015;Volume 9252, Pages 239-249. SJR=0.315, SNIP=0.552
  3. P.F, Raimond. K, “Comparison of machine learning techniques for the identification of the stages of Parkinson’s disease”, International Conference on Computational Intelligence, Cyber Security and Computational Models, ICC3 2015; Coimbatore; India; 17th December 2015 to 19th December 2015;Volume 412, Pages 247-259. SNIP=0.312, CI-1
  4. Jenice Aroma. R, Kumudha Raimond, “A Review on Availability of Remote Sensing Data”, International Conference on IEEE Technological Innovations in ICT for Agriculture and Rural Development, Easwari Engg. College, Chennai, 10th July 2015 to 12thJuly 2015.CI-1
  5. Durga, S. Mohan, J. Dinesh, A. Aneena, Cuckoo Based Resource Allocation for mobile Cloud Environments, International Conference on Computational Intelligence, Cyber Security and Computational Models, ICC3 2015; Coimbatore; India; 17th December 2015 to 19th December 2015;Volume 412, Pages 247-259. SNIP=0.312, CI-1
  6. Esther Daniel, N. A Vasanthi, An efficient continuous auditing methodology for outsourced data storage in cloud computing, International Conference on Computational Intelligence, Cyber Security and Computational Models, ICC3 2015; Coimbatore; India; 17th December 2015 to 19th December 2015;Volume 412, Pages 247-259. SNIP=0.312
  7. Iyer, G.N., Silas, S., Iyer, G., "An optimized cloud based big data processing mechanism using Self-Organizing Map in Hadoop environments" in Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015, art. no. 7380466, pp. 244-246. 8-10-2015 through 10-10-2015
  8. Lydia, S. Suresh Kumar, A. Immanuel Selvakumar, G. Edwin Prem Kumar, ‘Wind Resource Estimation using wind speed and power models’ in Renewable Energy, Volume 83, pp. 425-434, November 2015. SJR- 1.697, SNIP-2.044, CI-4, IF-4.357
  9. Caroline Viola Stella Mary, Elijah Blessing Vinoth, J. Kishore Kumar Jacob, D. Anandhi, Umberto Amato, S. Easter Selvan, “An empirical study on optic disc segmentation using an active contour model”, in the Journal of Biomedical Signal Processing and Control, Elsevier Publisher, 18, pp. 19-29, April 2015. SJR-0.659, SNIP-1.574, CI-10, IF-2.214
  10. Anitha, J. Dinesh Peter, “Mammogram Segmentation using Maximal Cell Strength Updation in Cellular Automata”, Medical & Biological Engineering & Computing, Springer Publisher, 53(8), pp 737-749, August 2015. SJR-0.699, SNIP-1.238, CI-10, IF-1.916
  11. Sujitha Juliet, Elijah Blessing Rajsingh, Kirubakaran Ezra, “Projection-Based Medical Image Compression for Telemedicine Applications” in the Journal of Digital Imaging, Springer Verlag Publisher, 28(2), pp. 146-159, Apr. 2015. SJR-0.624, SNIP-1.199, CI-2, IF-1.407
  12. Henock Mulugeta Melaku, Kumudha Raimond, Dereje Hailemariam Woldegebreal, “TCP-PLDR: A Novel Packet Loss Detection and Response Mechanism for TCP in Mobile Ad Hoc Networks”, Ad Hoc & Sensor Wireless Networks, Old City Publisher, 28(3-4), pp. 183-202, 2015.SJR-0.291, SNIP-0.685, IF-1.034
  13. S, Francis. S.A.J, Rajsingh. E.B, “An Alternate Antenna Array Geometry for a GB-SAR System Used in Landslide Monitoring”, Journal of the Indian Society of Remote Sensing, Springer India Publisher, 43(4), pp. 761-768, 2015.SJR-0.327, SNIP-0.661, CI-1, IF-0.725
  14. Shibin David, Mande Rebecca, "Multi Objective Virtual Force Particle Swarm Optimization In Wireless Sensor Networks", International Journal of Applied Engineering Research, Research India Publications, 10(12), pp. 31755-31762, July 2015. SJR–0.149, SNIP-0.181
  15. Henock Mulugeta, Dereje Hailemariam, Kumudha Raimond, ‘Investigating the Effects of Security Attacks on the Performance of TCP Variants and Routing Protocols in MANET’ in the International Journal of Computer Applications in Technology, 51(3), 2015.SJR-0.258, SNIP-0.773, CI-1
  16. Anitha and J. Dinesh Peter, “A Multiresolution Ripplet Transform for Breast Cancer Diagnosis in Digital Mammograms”, Recent Patents on Computer Science, Bentham Science Publishers, 8, pp. 1-8, 2015. SJR-0.128, SNIP-0.171
  17. Anitha and J. Dinesh Peter, “Mass Segmentation in Mammograms using a Kernel based Fuzzy Level (KFLS) Method”, International Journal of Biomedical Engineering and Technology, Inderscience Publisher, 19(2), pp. 133-153, 2015. SJR-0.288, SNIP-0.425, CI-1
  18. Ramalakshmi, K. Thanushkodi, “Priority Based Prediction of Node Failure and Optimal Relay Node Placement in Wireless Sensor Network”, Australian Journal of Basic and Applied Sciences, INSInet Publications, 9(23), pp. 402-407, July 2015.SJR-0.145, SNIP-0.472
  19. K.N, Srinivasan. R, Rajsingh. E.B, “Adapting map-reduce programming model with container based virtualization for self-organizing networks”, International Journal of Applied Engineering Research, Research India Publications, 10(11), pp. 29539-29554, 2015. SJR–0.149, SNIP-0.181
  20. Arul Xavier V.M, S. Annadurai, “HFKCS: Hybrid Fuzzy K-Means++ with Clonal Selection Algorithm for Task Scheduling and Load Balancing in Cloud Computing”, International Journal of Applied Engineering Research, Research India Publications, 10(20), 20140-20156, 2015. SJR–0.130, SNIP-0.166
  21. Blessed Prince. P, Krishnamoorthy. K, Anandaraj. R, Jeno Lovesum.P, “A novel approach for secure data gathering in body area network using PRESENT algorithm”, International Journal of Applied Engineering Research, 10(12), pp. 30555-30564, 2015.SJR-0.149, SNIP-0.181
  22. Blessed Prince. P, Krishnamoorthy. K, Ananda Raj. R, Jeno Lovesum.P, “A novel framework for securing health data in pervasive environment using hybrid cryptography”, International Journal of Applied Engineering Research, 10(12), pp. 32557-32575, 2015. SJR-0.149, SNIP-0.181
  23. Blessed Prince. P, Krishnamoorthy. K, Anandaraj. R, JenoLovesum. S.P, “RSA-DABE: A novel approach for secure health data sharing in ubiquitous computing environment”, Indian Journal of Science and Technology, 8(17), pp. 1-9, 2015. SJR-0.251, SNIP-2.108, CI-4
  24. Dinkisa Aga Bulti, Kumudha Raimond, “Optimizing Caching in a Patch Streaming Multimedia-on-Demand System”, Journal of Computing Science and Engineering, Vol. 9, No. 3, pp. 134-141, September 2015. SJR-0.110, SNIP- 145, CI-1
  25. Raveena Judie Dolly, G. Josemin Bala, J.Dinesh Peter, “Adaptation of Frames For GOP Using NSEW Affine Translation For Effective Privacy Protection Mechanism”, International Journal of Electronic Security and Digital Forensics, vol.7, no. 3, pp. 223 - 233, 2015. SJR-0.186, SNIP-0.502
  26. Taye Tolu Mekonnen, Kumudha Raimond, “Drought Pattern Investigation Through Processing Normalized Vegetation Index-Based Satellite Images”, i-manager’s Journal on Pattern Recognition, Vol. 2. No. 3, pp 1-7, September - November 2015, ISSN Print: 2349-7912, ISSN Online: 2350-112X, i-manager publisher, (Ulrich's Periodicals Directory indexed).
  1. Kumudha Raimond, “Drought Prediction: Intelligent System-Based Automatic Prediction of Drought using Satellite Images”, Lambert Academic Publishing, 2014, ISBN-13: 978-3659276095.
  2. Naveen Sundar. G, Narmadha. D, Haran. A.P, “Performance growth for text (template extraction)”, International Conference on Electronics and Communication Systems, ICECS 2014; Coimbatore; India; 13th February 2014 to 14th February 2014, Article number 6892798.
  3. Kumudha Raimond, ‘Review: MR Brain Image Segmentation using Unsupervised Segmentation Techniques’ in the Indian Journal of Advances in Computer Sciences and Technology, 2014, 2(1), pp. 1-10.
  4. Angel C Bency, Deepa Kanmani. S, ‘A Survey on Skyline Processing in Various Environment’ in the Indian Journal of Computer Science and Engineering, Feb-Mar. 2014; 5(1), pp. 5-8.
  5. Ashwathy M. G, Arul Xavier V. M, ‘A Review: Comparison of Cooperative Scheduling Mechanisms in P2P Computing System’, in the Indian Journal of Computer Science and Engineering, Feb-Mar. 2014; 5(1), pp. 1-4.
  6. Deepa Maria Thomas, John Livingston. S, ‘A Novel Hybrid Image Quality Assessment Algorithm’, in the Indian Journal of Applied Sciences, Apr. 2014; 4(4), pp. 107-108.
  7. Elwyn Betzar, Arul Xavier. V. M., ‘Survey on Heuristics based Resource Scheduling in Grid Computing’, in the Indian Journal of Computer Science and Engineering, Feb-Mar. 2014; 5(1), pp. 9-14.
  8. Lydia, S. Suresh Kumar, A. Immanuel Selvakumar, G. Edwin Prem Kumar, ‘A Comprehensive Review on Wind Turbine Power Curve Modeling Techniques’ in Renewable and Sustainable Energy Reviews, Volume 30, pp. 452-460, February 2014. SJR-3.051, SNIP-3.454, CI-56, IF-8.050
  9. Sujitha Juliet, Elijah Blessing Rajsingh, Kirubakaran Ezra, ‘A novel image compression method for medical images using geometrical regularity of image structure’, in the Journal of Signal, Image and Video Processing, 9(7), pp 1691-1703, 2014. SJR-0.391, SNIP-1.067, CI-1, IF-1.102
  10. Naveen Sundar. G, Narmadha. D, Haran. A. P, ‘Simplified Scheme for Performance Augmentation of Web Data Extraction’, in the Journal of Theoretical and Applied Information Technology, 60(3), pp. 629-636, Feb. 2014.SJR-0.167, SNIP-0.387
  11. G. Jaspher Willsie Kathrine, E. Kirubakaran, Elijah Blessing Rajsingh, “Enhancing Security of Electronic health Records through Grid Based User authentication scheme”, International Journal of Information and Communication Technology, Inderscience publishers, 6(2), pp. 109-121, 2014. SJR-0.147, SNIP-0.370
  12. G. Jaspher Willsie Kathrine, E. Kirubakaran, Elijah Blessing Rajsingh, “Efficient biometric template based authentication for grid environment”, International Journal of Tomography and Simulation, 26(2) pp. 26-37, 2014. SJR-0.225, SNIP-0.437, CI-1
  13. Diana JebaGingle. I, Elijah Blessing Rajsingh, "ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks", in the Journal of Human-centric Computing and Information Sciences, Springer publishers, 4(8), pp. 1-19, Sep. 2014. SJR-0.615, SNIP-2.825, CI-11
  14. S.P, Krishnamoorthy. K, Blessed Prince. P, “QOS based Cost Efficient Resource Allocation in Cloud” in the Journal of Theoretical and Applied Information Technology, 64(2), pp. 1-6, June 2014. SJR-0.167, SNIP-0.337
  15. S.P, Krishnamoorthy. K, Blessed Prince. P, “An Optimized QOS based Cost Effective Resource Scheduling in Cloud” in the Journal of Theoretical and Applied Information Technology, 66(1), pp. 395- 400, August 2014. SJR-0.167, SNIP-0.337, CI-1
  16. S.P, Krishnamoorthy. K, Blessed Prince. P, “A Scheduling Technique for QoS Sensitive Jobs in Cloud” in International Journal of Engineering and Technology, Engg Journals Publisher, 6(3), pp. 1380-1385, Jun-Jul 2014. SJR-0.179, SNIP-0.489
  17. S.P, Krishnamoorthy. K, Blessed Prince. P, “A QOS Based Optimal and Cost Effective Load Balancing Strategy in Storage Cloud” in the Research Journal of Applied Sciences, Engineering and Technology, Maxwell Scientific Publisher, 7(22), pp. 4702-4705, June 2014. SJR-0.144, SNIP-0.404
  18. K,Thanushkodi. K, ‘Traffic based random deployment of relay nodes in wireless sensor networks’ in the Journal of Theoretical and Applied Information Technology, 63(2), pp. 408-419, May 2014.SJR-0.167, SNIP-0.387, CI-2
  19. Shamila Ebenezer. A, K. Baskaran, ‘Stability Assessment Metamorphic Approach (SAMA) for Effective Scheduling based on Fault Tolerance in Computational Grid’ in the International Journal of Engineering, TRANSACTIONS B: Applications, 27(5), pp. 699-708, May 2014.SJR-0.283, SNIP-0.526
  20. Naveen Sundar, G, Narmadha, D,Haran, A.P, “Performance intensification for automatic template using world wide web”, Research Journal of Applied Sciences, 9 (5), pp. 288-294, 2014. SJR-264, SNIP- 0.548
  21. Allen Joseph, G. Jaspher W. Kathrine, Rohit Vijayan, “Cloud Security Mechanisms for Data Protection: A Survey”, International Journal of Multimedia and Ubiquitous Engineering, SERC publication Vol.9, No.9, pp.81-90, 2014. SJR-0.164, SNIP-0.439, CI-3
  22. Regis W. Anne, Elijah Blessing Rajsingh, “An autonomous moving heuristic for mobile sink based on feasible sojourn regions to maximize network lifetime in wireless sensor networks”, in International Journal of Information Technology, Communications and Convergence, Vol. 3, No. 1, 2014, pp. 65-86. (Inderscience Publication)
  23. Cidharth.S, Grace Mary Kanaga. E, ‘Brain Computer Interface : The Present and Future Technology’ in the International Journal of Engineering Research & Technology, Jan. 2014; 3(1), pp.1179 – 1182.
  24. Anju Ann Abraham Deepa Kanmani. S, ‘A Survey on Various Methods used for Detecting Duplicates in XML Data’ in the International Journal of Engineering Research and Technology’, Jan. 2014; 3(1), pp. 354-357.
  25. Gopal. K, Ramalakshmi. K, Priyadharsini. C, ‘A Survey on Energy Efficient Fault Detection and Routing Scheme for Wireless Sensor Networks’ in the International Journal Of Research In Computer Applications And Robotics, Jan. 2014; 2(1), pp. 1-6.
  26. A. Samson Arun Raj, Ramalakshmi. K, Priyadharsini. C, ‘A Survey on Classification of Fault Tolerance Technique Available in Wireless Sensor Network’ in the International Journal of Engineering Research & Technology, Jan. 2014; 3(1), pp. 688-691.
  27. Charney Jeevanandam, Ramalakshmi. K, Deva Priya. I, ‘A Survey on Energy Efficient Fault Tolerance Mechanisms in Wireless Sensor Networks’ in the International Journal of Emerging Technology and Advanced Engineering, Jan. 2014; 4(1), pp. 330-334.
  28. Jenifer Nirubah. T, Rose Rani John, ‘A Survey of the Impact of Task Scheduling Algorithms on Energy-Efficiency in Cloud Computing’ in the International Journal of Engineering Research & Technology, Jan. 2014; 3(1), pp. 1287-1291.
  29. Pravin Sam. J, Priyadharsini. C, ‘Adaptive Error Control of Fuzzy Modeling in LIEU of Iterative Localization for Wireless Sensor Networks’ in the International Journal of Research in Computer Applications and Robotics, March 2014; 2(3), pp. 42-48.
  30. Anju Ann Abraham, Deepa Kanmani. S, ‘A Novel Approach for the Effective Detection of Duplicates in XML Data’, in the International Journal of Computational Engineering Research, March 2014; 4(3), pp. 82-87.
  31. Monika Xess, Akila Agnes. S, ‘Analysis of Image Segmentation Methods Based on Performance Evaluation Parameters’, in the International Journal of Computational Engineering Research, March 2014; 4(3), pp. 68-74.
  32. Sherlin Mary Koshy, Belfin. R. V., ‘Customized Query Interface Integration using Attribute Constraint Matrices’, in the International Journal of Computational Engineering Research, March 2014; 4(3), pp. 64-67.
  33. Syamily. K.R, Belfin. R. V., ‘Maintain Top-K results using Similarity Clustering in Relational Databases’, in the International Journal of Research in Computer Applications and Robotics, March 2014; 2(3), pp. 124-129.
  34. Christy Maria Joy, Leela. S, ‘Optimal Sentence Clustering Using an Innovative Hierarchical Fuzzy Clustering Algorithm’ in the International Journal for Research in Applied Science and Engineering Technology, March 2014; 2(III), pp. 214-218.
  35. Anjana Sreedhar, Rexie. J. A. M, ‘A Novel Approach for the Development of Metadata Editors in Web-based Applications’ in the International Journal for Research in Applied Science and Engineering Technology, March 2014; 2(III), pp. 219-222.
  36. Jeena Baby, Karunakaran. V, ‘Bi-Level Weighted Histogram Equalization with Adaptive Gamma Correction’ in the International Journal of Computational Engineering Research, March 2014; 4(3), pp. 25-30.
  37. Parvathy. R, John Livingston. S, ‘Analysis of Two Image Segmentation Schemes Based on its Error Rate’ in the International Journal for Research in Applied Science and Engineering Technology, April 2014; 2(IV), pp. 47-52.
  38. Preema Theresa Varghese, Diana. A, ‘Minimizing Traffic Congestion Cost in Inter-Domain Traffic Engineering’ in the International Journal for Research in Applied Science and Engineering Technology, April 2014; 2(IV), pp. 7-12.
  39. Annu Kurien, Diana. A, ‘Link Lifetime Prediction in Position-Based VANET Routing Protocol’ in the International Journal for Research in Applied Science and Engineering Technology, April 2014; 2(IV), pp. 36-41.
  40. Rajesh George Rajan, Jeyakrishnan. V, ’PSO based Approach in a Hybrid Gaming Environment for Effective Load Distribution in Cloud Computing’ in the International Journal of Advanced Research in Computer and Communication Engineering, March 2014; 3(3), pp. 5909-5912.
  41. Rajesh George Rajan, Jeyakrishnan. V, ’Efficient Utilization of Nodes in a Gaming Environment by Greedy Strategies in Cloud Computing’ in the International Journal for Research in Applied Science and Engineering Technology, March 2014; 2(III), pp.111-114.
  42. Archana.T.A, Jeyakrishnan. V, ‘Survey on Cloud Computing Security Techniques’ in the International Journal of Research in Engineering and Technology, Jan. 2014; 3(1), pp.240-242.
  43. Shiny Jenita, Rexie. J. A. M, ‘Prediction of Concealed Information from Social Networks’ in the International Journal for Research in Applied Science and Engineering Technology, March 2014; 2(III), pp.157-160.
  44. M, Bright Gee Varghese, ‘An Interactive Approach for Software System Re-modularization based on Chronicle Data’, International Journal of Research in Computer Applications and Robotics, March 2014; 2(3), pp. 65-69.
  45. Liji Jacob, Jeyakrishnan. V, ‘Resource Scheduling in Cloud using Bacterial Foraging Optimization Algorithm’ in the International Journal of Computer Application, April 2014; 92(1), pp.14 -20.
  46. Hannah Nithya. S, Rose Rani John, ‘A VM Scheduling Algorithm for Reducing Power Consumption of a Virtual Machine in Cloud Environments’ in the International Journal of Research in Engineering and Technology, March 2014; 3(3), pp. 387-391.
  47. Jenifer Nirubah. T, Rose Rani John, ‘Energy-Efficient Task Scheduling Algorithms for Cloud Data Centers’, in the International Journal of Research in Engineering and Technology, March 2014; 3(3), pp. 322-326.
  48. R, Mathew Kurian, ‘Efficient Mining of Web Log for improving the website using Density Based Spatial Clustering Application with Noise (IDBSCAN)’, in the International Journal of Advanced Research in Computer Engineering & Technology, March 2014; 3(3), pp. 740-743.
  49. Alphy George, S. John Livingston, ‘Image Performance Tuning using Contrast Enhancement Method with Quality Evaluation’, in the International Journal of Computational Engineering Research, March 2014; 4(3), pp. 58-63.
  50. Angel C Bency, Deepa Kanmani, ‘Efficient Evaluation of Skyline Results in Mobile Environment’, in the International Journal of Research in Computer Applications and Robotics, March 2014; 2(3), pp. 141-146.
  51. Angel Preethima, Margret Johnson, ‘Hybrid ACO-IWD Optimization Algorithm for Minimizing Weighted Flowtime in Cloud-based Parameter Sweep Experiments’, in the International Journal of Research in Engineering and Technology, Mar. 2014; 3(3), pp. 317-321.
  52. A, Felix Arokya Jose, ‘Optimal Sensor State Planning for CMIMO in Multi-Hop Wireless Sensor Networks’, in the International Journal for Research in Applied Science and Engineering Technology, April 2014; 2(IV), pp. 195-202.
  53. Benita Jacinth Suseela. B, Jeyakrishnan. V, ‘A Multi-objective Hybrid ACO-PSO Optimization Algorithm for Virtual Machine Placement in Cloud Computing’, in the International Journal of Research in Engineering and Technology, April 2014; 3(4), pp. 1-3.
  54. Christabel Williams, Bright Gee Varghese. R, ‘Clustering Based on Software Evolution using Genetic Algorithm’, in the International Journal of Research in Computer Applications and Robotics, March 2014; 2(3), pp. 136-140.
  55. Hareesh Pallathoor Balakrishnan, Jeban Chandir Moses, ‘A Survey on Defence Mechanism against DDOS Attacks’, in the International Journal of Advanced Research in Computer Science and Software Engineering, March 2014; 4(3), pp. 604-606.
  56. Irene Maria, Mathew Kurian, ‘Pattern Similarity based Clustering of Gene Expression Patterns’, in the International Journal of Research in Computer Applications and Robotics, March 2014; 2(3), pp. 147-152.
  57. Jesna. M, Kumudha Raimond, ‘MR Brain Image Segmentation based on Principle Component Analysis and Self-Organizing Map’, in the International Journal for Research in Applied Science and Engineering Technology, March 2014; 2(II), pp. 161-167.
  58. Merlin Shirly, Margret Johnson, ‘Improved Security Measures for Data in Key Exchanges in Cloud Environment’, in the International Journal of Research in Computer Applications and Robotics, March 2014; 2(3), pp. 153-158.
  59. Sarath Babu, John Livingston, ‘An Efficient Objects Discrimination and Noise Reduction on Hyperspectral Images’, in the International Journal for Research in Applied Science and Engineering Technology, March 2014; 2(III), pp. 133-137.
  60. Suchithra Chandran, Bright Gee Varghese, ‘Identification of Code Clones for Application of Extract Class Refactoring in Object-Oriented Systems’, in the International Journal of Research in Computer Applications and Robotics, March 2014; 2(3), pp. 70-74.
  61. Venshila Santha Kumar, Jeno Lovesum, ‘A Cost Efficient Security Mechanism using Blow Fish Algorithm’, in the International Journal of Research in Computer Applications and Robotics, April 2014; 2(4), pp. 63-69.
  62. Diya Davis, Bright Gee Varghese ‘Cooperative Clustering using Optimized Similarity Measures’, in the International Journal of Research in Computer Applications and Robotics, March 2014; 2(3), pp. 130-135.
  63. Angelin Jenisha, Rebecca Sandra, ‘Semantic Content Extraction based on Homomorphic Methodology’ in the International Journal of Engineering Sciences & Research Technology, April 2014; 3(4), pp. 1859-1860.
  64. Jensiya Asirvatham, Akila Agnes, ‘Survey on Restoration of Degraded Document using Different Thresholding Techniques’, in the International Journal of Engineering Sciences & Research Technology, April 2014; 3(4), pp. 1868-1871
  65. Neethu Innocent, Mathew Kurian, ‘Cancer Prediction based on Gene Expression Data Through Association Rule based Classification and Fuzzy Rough Set Attribute Reduction on Information Gain Ratio’, in the International Journal for Research in Applied Science and Engineering Technology, April 2014; 2(IV), pp. 42-46.
  66. Rubini, Leela. S, ‘Intrinsic Plagiarism Detection for Text based Features Pattern’ in the International Journal Of Engineering Sciences & Research Technology, April 2014; 3(4), pp. 1872-1874.
  67. S, Anitha Christy Angelin, ‘Reducing Energy Consumption and Processing Time in Mobile Sensor/Robot Networks’ in the International Journal for Research in Applied Science and Engineering Technology, April 2014; 2(IV), pp. 14-16.
  68. Sincy John, Kumudha Raimond, ‘Palmprint Identification based on Adaptive Neuro Fuzzy Inference System’ in the International Journal for Research in Applied Science and Engineering Technology, April 2014; 2(III), pp. 138-142.
  69. Nikhil Dharman M.K., Jeban Chandir Moses, ‘Survey on Different Bone Age Estimation Methods’, in the International Journal of Advanced Research in Computer Science and Software Engineering, Jan. 2014; 4(1), pp. 1128-1131.
  70. Jenitta Magdalene, Rebecca Sandra, ‘Improved Item based Collaborative Filtering for Personalised Recommendation’, in the International Journal for Research in Applied Science and Engineering Technology, April 2014; 2(IV), pp. 21-25.
  71. Jenitta Magdalene, Rebecca Sandra, ‘Solving the Accuracy Metrics and Diversity Measures for Personalised Recommendation’, in the International Journal of Engineering Research and Applications, Jan. 2014; 4(1), pp. 1-5.
  72. M. Nair, Sebastian Terence, ‘CORREP: An Efficient Correlation and Replication based Distributed Data Storage Protocol with Mobile Sink’, in the International Journal of Research in Computer Applications and Robotics, March 2014; 2(3), pp. 110-118.
  1. Dr. Kumudha Raimond, ‘Sensor Bus Architecture for Real-Time Wireless Sensor Networks’ in the book titled Wireless Sensor Networks: From Theory to Applications, CRC Press, Taylor and Francis Group Part II: Chapter 6, pp.157-190, August 2013.
  2. C, Anand Deva Durai. C, “Novel hybrid PSO algorithms with search optimization strategies for a University Course Timetabling Problem”, 5th International Conference on Advanced Computing, ICoAC 2013; Chennai; India; 18th December 2013 to 20th December 2013, Article number 6921931, Pages 77-85.
  3. A.B, Manimurugan. S, Anitha. J, “A modified anti-forensic technique for removing detectable traces from digital images”, 3rd International Conference on Computer Communication and Informatics, ICCCI 2013; Coimbatore; India; 4th January 2013 to 6th January 2013, Article number 6466109.
  4. A.B, Manimurugan. S, Rajivkumar, Anitha. J, “A new technique for removing forensically detectable traces from digital images”, 7th International Conference on Intelligent Systems and Control, ISCO 2013, Coimbatore, 2013, Article number 6481171, Pages 321-324.
  5. J, Peter. J.D, “A region growing based mammogram segmentation using multi resolution analysis”, 8th International Conference on Mass Data Analysis of Signals and Images with Applications in Medicine, r/g/b Biotechnology, Food Industries and Dietetics, Biometry and Security, and Agriculture, MDA 2013; New York, NY; United States; 13th July 2013 to 16th July 2013, Pages 117-126.
  6. A.R, Mythily. M, “A qualitative analysis on the specification mining techniques”, IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology, ICE-CCN 2013; Tirunelveli; India; 25th March 2013 to 26th March 2013, Article number 6528492, Pages 199-202.
  7. Jenice Aroma. R, Kurian. M, “A Semantic web: Intelligence in information retrieval”, IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology, ICE-CCN 2013; Tirunelveli; India; 25th March 2013 to 26th March 2013, Article number 6528493, Pages 203-206.
  8. K.C.K, Terence, S, “RETP: Reliable event transmission protocol in a wireless sensor network”, IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology, ICE-CCN 2013; Tirunelveli; India; 25th March 2013 to 26th March 2013, Article number 6528489, Pages 181-188. CI-3
  9. J, Durai. C.A.D, “A survey on texture classification techniques”, International Conference on Information Communication and Embedded Systems, ICICES 2013; Chennai, Tamilnadu; India; 21st February 2013 to 22nd February 2013, Article number 6508183, Pages 180-184.CI-4
  10. George, A.M., Durai, C.A.D, “A survey on prominent iris recognition systems”, Article number 6508207, Pages 191-195, 2013 International Conference on Information Communication and Embedded Systems, ICICES 2013; Chennai, Tamilnadu; India; 21 February 2013 through 22 February 2013. CI-2
  11. Raj, J.S., Mary Thomas, R, “Genetic based scheduling in grid systems: A survey”, Article number 6466140, 2013 3rd International Conference on Computer Communication and Informatics, ICCCI 2013; Coimbatore; India; 4 January 2013 through 6 January 2013. CI-2
  12. Joshua Samuel Raj, Fiona. R, “Load balancing techniques in grid environment: A survey”, 3rd International Conference on Computer Communication and Informatics, ICCCI 2013; Coimbatore; India; 4th January 2013 to 6th January 2013, Article number 6466142. CI-2
  13. Joshua Samuel Raj, Rachel. I.S, “A survey on reliability scheduling on grid computing”, 7th International Conference on Intelligent Systems and Control, ISCO 2013; Coimbatore, Tamilnadu; India; 4th January 2013 to 5th January 2013, Article number 6481173, Pages 331-334. CI-1
  14. Jeba Leelipushpam, P.G, Sharmila, J. “Live VM migration techniques in cloud environment - A survey”, IEEE Conference on Information and Communication Technologies, ICT 2013; Thuckalay, Tamil Nadu; India; 11th April 2013 to 12th April 2013, pp. 408-413. CI-5
  15. Meena S, Esther Daniel, N. A Vasanthi, “Survey on various data integrity attacks in cloud environment and the solutions”, IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2013, Nagercoil; India; 21st March 2013 to 22nd March 2013, pp. 1076-1081. CI-6
  16. Adonu Celestine J. Dinesh Peter, “Modified Graph-Cut Algorithm with Adaptive Shape Prior”, International Conference on Advanced Computing, Networking, and Informatics, Raipur, 12-06-2013 to 14-06-2013, SNIP- 312
  17. Mohandas, G., Silas, S., Sam, S.,"Survey on routing protocols on mobile adhoc networks", in Proceedings - 2013 IEEE International Multi Conference on Automation, Computing, Control, Communication and Compressed Sensing, iMac4s 2013, art. no. 6526467, pp. 514-517. Kerala; 22-02-2013 to 23-02-2013; CI-9
  18. Lakshmi. C. S, Arul Xavier. V. M, ‘Analysis On Performance With Combination Of Scheduling And Replication In Data Grids’ in the Indian Journal of Computer Science and Engineering, Dec 2013-Jan 2014; 4(6), pp. 510-515.
  19. Neenu. M. Nair, Sebastian Terence. J, ‘Survey on Distributed Data Storage Schemes in Wireless Sensor Networks’ in the Indian Journal of Computer Science and Engineering, Dec 2013-Jan 2014; 4(6), pp. 466-473.
  20. Lydia, Immanuel Selvakumar, Suresh Kumar, Edwin Prem Kumar, “Advanced algorithms for wind turbine power curve modeling”, IEEE Transactions on Sustainable Energy, 4(3), pp. 827-835, July 2013. SJR-2.636, SNIP-2.883, CI-42, IF-4.909
  21. Sujitha Juliet, Elijah Blessing Rajsingh, Kirubakaran Ezra, ‘A novel medical image compression using Ripplet transform’ in the Special Issue on Journal of Real-Time Image Processing, pp. 1-12, July 2013. SJR-0.313, SNIP-1.257, CI-4, IF-2.010
  22. Immanuel Alex Pandian, JoseminBala, Anitha. J, ‘A pattern based PSO approach for block matching in motion estimation’ in the Journal of Engineering Applications of Artificial Intelligence, 26(8), pp. 1811-1817, Sep. 2013. SJR-1.047, SNIP-1.940, CI-10, IF-2.894
  23. Salaja Silas, Kirubakaran Ezra, Elijah Blessing Rajsingh, “An Efficient Service Selection Framework for Pervasive Environments”, International Journal of Wireless and Mobile Computing, Inderscience Publishers, 6(1), pp.80 – 90, 2013. SJR-0.250, SNIP-0.561, CI-5
  24. G. Jaspher Willsie Kathrine, E. Kirubakaran, Elijah Blessing Rajsingh, “Smart Card based time efficient authentication scheme for global grid computing”, in Journal of Human-Centric Computing and Information Sciences, Springer publications. Vol.3, no.16, September 2013.SJR-0.615, SNIP-2.825, CI-24
  25. Christhu Raj, M.R., Edwin Prem Kumar, G., Kusampudi, K. “Drill System based Hierarchical Trust Calculation to detect Selfish nodes in Wireless Sensor Network”, International Journal of Engineering and Technology; 5(1), pp. 366-375, Feb-Mar 2013. SJR-0.179, SNIP-0.489.
  26. Manoj Kumar S., N, Rajkumar, W. Catherine Christinal Mary, “Dropping False Packet to Increase the Network Lifetime of Wireless Sensor Network using EFDD Protocol”, Wireless Personal Communications, June 2013, Vol.70, Issue 4, pp.1697-1709. IF-0.979, SJR-0.313, SNIP-0.726, CI-2
  27. Manoj Kumar, Rajkumar, “SCT based adaptive data aggregation for wireless sensor networks”, Wireless Personal Communications, June 2013, Vol.70, Issue 4, pp.1697-1709. IF-0.979, SJR-0.313, SNIP-0.726
  28. Venkatesan, Thanuskodi, “Resource management in computational grid with economic based allocation model using particle swarm optimization (PSO)”,
    Journal of Theoretical and Applied Information Technology
    , 54(3), pp. 388-400, 2013, SJR-0.167, SNIP-0.387.
  29. Regis W. Anne, Elijah Blessing Rajsingh, ‘Mobile Entities in Wireless Sensor Networks: Theory and Performance Analysis’, in the ICTACT Journal on Communication Technology, March 2013, 4(1), pp. 662-668.
  30. Jesna. M, Kumudha Raimond, ‘A Survey on MR Brain Image Segmentation using SOM Based Strategies’ in the International Journal of Computational Engineering Research, Dec. 2013; 3(12), pp. 1-6.
  31. Sincy John, Kumudha Raimond, ‘A Survey on Feature Extraction Techniques for Palmprint Identification’ in the International Journal of Computational Engineering Research, Dec. 2013; 3(12), pp. 14-18.
  32. Lisha Sara Varughese, Anitha. J, ‘A Study Of Region Based Segmentation Methods For Mammograms’ in the International Journal of Research in Engineering and Technology, Dec. 2013; 2(12), pp. 421-425.
  33. Balasuresh. A, Felix Arokya Jose. A, ‘Centralized and Distributed Energy Efficient Routing Techniques in Wireless Sensor Networks: A Survey’ in the International Journal of Emerging Technology and Advanced Engineering, Dec. 2013; 2(12), pp. 419-422.
  34. Pravin Sam. J, Priyadharsin. C, ‘A Survey on Error Control of Localization Methods Available in Wireless Sensor Networks’ in the International Journal of Research in Computer Applications and Robotics, Dec. 2013; 1(9), pp. 170-175.
  35. Parvathy Raghunandanan, John Livingston. S, ‘A Review on various Graph Cut Based Image Segmentation Scheme’ in the International Journal of Advances in Engineering Science and Technology, Dec. 2013; 2(3), pp. 379-382.
  36. Alphy George, John Livingston. S, ‘A Survey on Full Reference Image Quality Assessment Algorithms’ in the International Journal of Research in Engineering and Technology, Dec. 2013; 2(12), pp. 303-307.
  37. Deepa Maria Thomas, John Livingston. S, ‘A Survey on Efficient No-Reference Blur Estimation Methods’ in the International Journal of Research in Engineering and Technology, Dec. 2013; 2(12), pp. 201-205.
  38. Maria Rajan, Deva Priya. I, ‘A Survey on Secure Multi-Hop Code Dissemination Protocols in Wireless Sensor Networks’ in the International Journal of Research in Engineering and Technology, Dec. 2013; 2(12), pp. 30a56-3058.
  39. Neha.K.Y, Deva Priya. I, ‘A Survey on Channel Coordination for Multi-Channel Wireless Networks’ in the International Journal of Research in Engineering and Technology, Dec. 2013; 2(12), pp. 2043-2047.
  40. Dhanya Rajan, Deva Priya. I, ‘An Effective Survey on Cluster Based Routing Protocols’ in the International Journal of Engineering Research & Technology, Dec. 2013; 2(12), pp. 2559-2561.
  41. Monika Xess, Akila Agnes. S, ‘Survey On Clustering Based Color Image Segmentation And Novel Approaches To FCM Algorithm’ in the International Journal of Research in Engineering & Technology, Dec. 2013; 2(12), pp. 346-349.
  42. Kalpana Sonika, Akila Agnes. S, ‘A Scrutiny on Digital Watermarking Techniques’ in the International Journal of Advanced Research in Computer Science and Software Engineering, Dec. 2013; 3(12), pp. 175-179.
  43. Ancy Emmanuel, Priyadharsini. C, ‘A Survey on Coverage and Connectivity Algorithms for Deploying Wireless Sensor Network’ in the International Journal of Engineering Research & Technology, Dec. 2013; 2(12), pp. 2149-2152.
  44. Angelin Jenisha, Rebecca Hudson. P, ‘Survey on Rule-based Model for Semantic Content Extraction’ in the International Journal of Research in Computer Applications and Robotics, Dec. 2013; 1(9), pp. 123-126.
  45. Arjun. P. K, Mythily. M, M. L. Valmathi, ‘Development of a Secure XML Data Warehouse: A Practical Approach’ in the International Journal of Emerging Technology and Advanced Engineering, Dec. 2013; 3(12), pp. 409-413.
  46. George T. Vadakkumcheril, Mythily. M, M. L. Valmathi, ‘A Simple Implementation of UML Sequence Diagram to Java Code Generation through XML Representation’ in the International Journal of Emerging Technology and Advanced Engineering, Dec. 2013; 3(12), pp. 404-408.
  47. Annu Kurien, Diana. A, ‘Survey on Various Position Based Routing Protocols in Vehicular Ad-Hoc Network’ in the International Journal of Engineering Research & Technology, Dec. 2013; 2(12), pp. 3119-3123.
  48. Preema Theresa Varghese, Diana. A, ‘Survey on Various Inter-Domain Traffic Engineering Technologies’ in the International Journal of Engineering Research & Technology, Dec. 2013; 2(12), pp. 2917-2920.
  49. Anjana Thomas, Anitha Christy Angelin. P, ‘Techniques to improve Energy Efficiency in Wireless Sensor Networks: A Survey’ in the International Journal of Advanced Research in Computer Science and Software Engineering, Dec. 2013; 3(12), pp. 741-744.
  50. Anumol, Anitha Christy Angelin. P, ‘Survey on Data Delivery Schemes in Intermittently Connected Mobile Sensor Networks’ in the International Journal of Advanced Research in Computer Science and Software Engineering, Dec. 2013; 3(12), pp. 707-710.
  51. Maria Mathew, Anitha Christy Angelin. P, ‘A Study on Mitigating and Controlling Congestion using various protocols in Wireless Sensor Network’ in the International Journal of Advanced Research in Computer Science and Software Engineering, Dec. 2013; 3(12), pp. 672-674.
  52. Vimal Vinod, Leela. S, ‘A Survey on Periodicity Detection Techniques in Time Series Databases’ in the International Journal of Engineering Research & Technology, Dec. 2013; 2(12), pp. 2954-2957.
  53. S.Priyanka, Leela. S, ‘Retrieval Of Sequence pattern From Sequential Database using Multiple Minimum Supports’ in the International Journal Of Research In Computer Applications And Robotics, Dec. 2013; 1(9), pp. 120-122.
  54. Christy Maria Joy, Leela. S, ‘Review on Sentence Level Clustering with Various Fuzzy Clustering Techniques’ in the International Journal of Engineering Research & Technology, Dec. 2013; 2(12), pp. 3510-3513.
  55. P.Rubini, Leela. S, ‘A Survey On Plagiarism Detection In Text Mining’ in the International Journal Of Research In Computer Applications And Robotics, Dec. 2013; 1(9), pp. 117-119.
  56. Merlin Shirly, Margret Johnson, ‘Survey on secure protocols for key exchanges in data intensive applications over cloud computing’ in the International Journal of Research in Computer Applications and Robotics, Dec. 2013; 1(9), pp. 158-162.
  57. Angel Preethima, Margret Johnson, ‘Survey on Optimization Techniques for Task Scheduling in Cloud Environment’ in the International Journal of Advanced Research in Computer Science and Software Engineering, Dec. 2013; 3(12), pp. 413-415.
  58. Neethu M. Nair, Felix Arokya Jose. A, ‘Survey on Data Collection Methods in Wireless Sensor Networks’ in the International Journal of Engineering Research and Technology, Dec. 2013; 2(12), pp. 2220-2225.
  59. Nancy Priyadharshini, Karthikeyan. P, ‘A survey on Job Rescheduling and Meta scheduling Approaches in Grid environment’ in the International Journal of Research in Computer Application and Robotics, Dec. 2013; 1(9), pp. 103-108.
  60. Shirley Sequeira, Karthikeyan. P, ‘A survey on Auction Based Resource allocation in Cloud environment’ in the International Journal of Research in Computer Application and Robotics, Dec. 2013; 1(9), pp. 96-102.
  61. P.Priscilla, Karthikeyan. P, ‘A Survey on Meta Scheduler in Grid Environment’ in the International Journal of Research in Computer Application and Robotics, Dec. 2013; 1(9), pp. 74-78.
  62. M.Anitha Mary, Jeno Lovesum S. P, ‘Survey on resource management techniques in cloud computing’ in the International Journal of Engineering Research & Technology, Dec. 2013; 2(12), pp. 1723-1731.
  63. Anju Baby, Jeno Lovesum S. P, ‘A survey on honey bee inspired load balancing of tasks in cloud computing’ in the International Journal of Engineering Research & Technology, Dec. 2013; 2(12), pp. 1442-1445.
  64. Akiladevi R, Naveen Sundar. G, ‘A Survey On Web Log Mining Using DBSCAN’ in the International Journal Of Research In Computer Applications And Robotics, Dec. 2013; 1(9), pp. 144-149.
  65. Claudia Reynolds, Naveen Sundar. G, ‘A Survey on Discovery of Part-Whole Relations with Knowledge-Base’ in the International Journal of Advanced Research in Computer Science and Software Engineering, Dec. 2013; 3(12), 447-450.
  66. Syamily K R, Naveen Sundar. G, ‘Survey On Scalable Continual Top-K Keyword Search In Relational Databases’ in the International Journal of Research in Engineering and Technology, Dec. 2013; 2(12), pp. 312-315.
  67. Sherlin Mary Kosh, Naveen Sundar. G, ‘A Study on the Existing Techniques for Query Interface Integration’ in the International Journal of Advanced Research in Computer Science and Software Engineering, Dec. 2013; 3(12), pp. 330-333.
  68. Manuja George, Rexie. J. A. M., ‘Information Extraction Techniques in Different Application Domains’ in the International Journal of Engineering Research and Technology, Dec. 2013; 2(12), pp. 1581-1585.
  69. Anjana Sreedhar, Rexie. J. A. M., ‘Efficient Approach for the Development of Metadata Editors by Metamodeling Strategy : A Survey’ in the International Journal of Engineering Research and Technology, Dec. 2013; 2(12), pp. 3545-3548.
  70. R. Shiny Jenita, Rexie. J. A. M., ‘Security in Prediction of Private Information on Social Network’ in the International Journal of Engineering Research and Technology, Dec. 2013; 2(12), pp. 1753-1758.
  71. Aneesha K. Jose, Roshni Thanka. M, ‘A Survey on Security and Privacy Ensuring Techniques for Storage and Computation in Cloud Computing’ in the International Journal of Engineering Research & Technology, Dec. 2013; 2(12), pp. 1424-1429.
  72. Suganya. S, Roshni Thanka. M, ‘A Survey on Enabling External Auditing for Storage Security in Cloud Computing’ in the International Journal Of Research In Computer Applications And Robotics, Dec. 2013; 1(9), pp. 138-143.
  73. Dathi Soniya. M, Roshni Thanka. M, ‘A Survey on Secure Overlay Techniques for Cloud Storage’ in the International Journal of Advanced Research in Computer Science and Software Engineering, Dec. 2013; 3(12), pp. 345-347.
  74. Prisilla Preethi, Roshni Thanka. M, ‘Survey on Efficient Task Scheduling in a Cost Efficient Manner’ in the International Journal of Engineering Research & Technology, Dec. 2013; 2(12), pp. 1749-1752.
  75. Greehmamol Varghese, Kumudha Raimond, ‘A Survey on the Methods used in Document Digitization and its Applications’ in the International Journal of Advanced Research in Computer Science and Software Engineering, Dec. 2013; 3(12), pp. 715-718.
  76. Seena Elizabeth Philip , Kumudha Raimond, ‘Survey on Semantic Based Image Retrieval Using Image Annotation’ in the International Journal of Advanced Research in Computer Science and Software Engineering, Dec. 2013; 3(12), pp. 711-714.
  77. Sreepathi V. B, Iwin Thanakumar Joseph. S, ‘A Novel Technique in Cryptography for Data Hiding in Digital Images’ in the International Journal of Computer Trends and Technology, Dec. 2013; 6(4), pp. 199-203.
  78. Sujith. T, Iwin Thanakumar Joseph. S, ‘Data Concealing in Encrypted Images using Reversible Data Hiding Techniques’ in the International Journal of Computer Trends and Technology, Dec. 2013; 6(4), pp. 192-198.
  79. Shalini. S, Ramalakshmi. K, Anitha Christy Angelin, ‘A Survey on Partition and Recovery Methods of Node Failure in Wireless Sensor Networks’ in the International Journal of Advanced Research in Computer Science and Software Engineering, Dec. 2013; 3(12), pp. 932-936.
  80. Hannah Nithya. S, Rose Rani John, ‘A Survey on Various Power Measuring Techniques for a Virtual Machine’ in the International Journal of Advanced Research in Computer Science and Software Engineering, Dec. 2013; 3(12), pp. 374-377.
  81. Venshila Santha Kumar, Jeno Lovesum, ‘Survey on Data Security in Cloud Computing Using Combined Approach’ in the International Journal of Advanced Research in Computer Science and Software Engineering, Dec. 2013; 3(12), pp. 516-518.
  82. Jeena Baby, Karunakaran. V, ‘Survey on Various Image Contrast Enhancement Techniques’ in the International Journal for Research in Applied Science and Engineering Technology, Dec. 2013; 1(V), pp. 65-69.
  83. Rajesh George Rajan, Jeyakrishnan. V, ‘A Survey on Load Balancing in Cloud Computing Environments’ in the International Journal of Advanced Research in Computer and Communication Engineering, Dec. 2013; 2(12), pp. 4726-4728. (10)
  84. Liji Jacob, Jeyakrishnan. V, ’Survey on Scheduling Techniques in Cloud Computing’ in the International Journal of Engineering Research & Technology, Dec.2013; 2(12), pp.2979-2982.
  85. Diya Davis, Bright Gee Varghese, ‘Survey on Cooperative Clustering Models’ in the International Journal of Engineering Research & Technology, Dec. 2013; 2(12), pp. 1810-1815.
  86. Suchithra Chandran, Bright Gee Varghese, ‘A Survey on Clustering Techniques for Identification of Extract Class Opportunities’, International Journal of Research in Engineering and Technology, Dec. 2013; 2(12), pp. 426-429.
  87. Christabel Williams, Bright Gee Varghese, ‘Survey on Traditional and Evolutionary Clustering Approaches’, International Journal of Research in Engineering and Technology, Dec. 2013; 2(12), pp. 442-446.
  88. Rajalakshmi. M, Bright Gee Varghese, ‘Survey on Software Remodularization Techniques’, International Journal of Research in Engineering and Technology, Dec. 2013; 2(12), pp. 361-365.
  89. Gopika. N. A, Deepa Kanmani. S, ‘A Survey on Optimal Route Queries for Road Networks’, in the International Journal of Research in Engineering and Technology, Dec. 2013; 2(12), pp. 447-450.
  90. Irene Maria, Mathew Kurian, ‘A Survey on Clustering Approaches for Gene Expression Patterns’, in the International Journal of Computer Trends and Technology, Dec. 2013; 6(4), pp. 214-218.
  91. Namitha Ann Regi, Rebecca Sandra. P, ‘Improved A Survey on Recommendation Techniques in E-Commerce’, in the International Journal of Engineering Research & Technology, Dec. 2013; 2(12), pp. 1586-1590.
  92. Pauline Jeba. Y, Rebecca Sandra. P, ‘A Survey on Annotating Search Results from Web Databases’, in the International Journal of Research in Computer Applications and Robotics, Dec. 2013; 1(9), pp. 69-73.
  93. Neethu Innocent, Mathew Kurian, ‘Survey on Semi Supervised Classification Methods and Feature Selection’, in the International Journal of Research in Engineering and Technology, Dec. 2013; 2(12), pp. 574-577.
  94. Saranya. K, Kethsy Prabavathy. A, ‘Survey on New Approach for Video Cut Detection using Fuzzy Logic Control’ in the International Journal Of Engineering Research & Technology, Dec. 2013; 2(12), pp. 1805-1809.
  95. Athira. V, Jeban Chandir Moses. A, ‘Survey on Multicast Routing Protocols for Ad Hoc Networks’ in the International Journal Of Engineering Research & Technology, Dec. 2013; 2(12), pp. 2428-2432.
  96. Hima Suresh, Kumudha Raimond, “Analysis of Time Series Rule Extraction Techniques”, IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 8, Issue 5, pp. 22-27, Jan-Feb 2013.
  97. Sharmili. C, Rexie.J.A.M, “Efficient Keyword Search Methods in Relational Databases”, International Journal of Engineering Research and Applications (IJERA), Vol.3, Issue 1, pp. 1-5, Jan-Feb 2013.
  98. S. Arokia Jerome George, S. John Livingston, “Survey on Region Growing Segmentation and Classification for Hyperspectral Images”, International Journal of Computer Applications (IJCA), Vol. 62, Issue No. 13, pp. 51-56, Jan 2013.
  99. Santhiya H, Karthikeyan. P, “Survey on Auction Based Scheduling in Grid and Cloud Environment”, International Journal of Computer Applications (IJCA), Vol. 62, Issue No.8, pp. 6-9, Jan 2013.
  100. Jenice Aroma R, Mathew Kurian, “A Survey on Tools Essential for Semantic Web Research”, International Journal of Computer Applications (IJCA), Vol. 62, Issue No.9, pp. 26-29, Jan 2013.
  101. Nightingale.D, Akila Agnes, “A Survey on Bayesian Visual Reranking”, International Journal of Science and Research (IJSR), Vol. 2, Issue 1, pp. 442-446, Jan 2013.
  102. Rasmi. K, Vivek. V, “Survey: Resource Management Strategies in Cloud Environment”, International Journal of Computer Science and management Research (IJCSMR), Vol. 2, Issue 1, pp. 1222-1227, Jan 2013.
  103. Apeksha Yashpal Khobragade, Jeya Krishnan, “A Novel Approach for Energy Aware Resource Allocation Using Hybrid Heuristics in Cloud Computing”, International Journal of Computer Science and Management Research (IJCSMR), Vol. 2, Issue 1, pp. 1385-1391, Jan.2013.
  104. Kulangara Silpa Prabhu, Felix Arokya Jose, “Clad: Accurate Capture of Transmission In Multi-Hop Wireless Networks”, International Journal of Engineering Research & Technology (IJERT), Vol. 2, Issue 1, pp. 1-5, Jan 2013.
  105. V M Noufidali, Jobin S Thomas, Felix Arokya Jose, “E-Auction Frauds-A Survey”, International Journal of Computer Applications (IJCA), Vol. 61, Issue 14, pp. 41-44, Jan 2013.
  106. A.Diana, “A Study on Biometric Recognition in Embedding Web Browsers In 3G Mobile Phone Applications”, International Journal of Emerging Technology and Advanced Engineering (IJETAE), Vol. 3, Issue 1, pp. 711-715, Jan 2013.
  107. Antony Taurshia. A, S. Deepa Kanmani, “Recommender System and Ranking Techniques: A Survey”, International Journal of Engineering Research and Applications (IJERA), Vol. 3, Issue 1, pp. 1-3, Jan-Feb 2013.
  108. Christylda Angelin Hannah. J, Natheldha Mary Navina. S, “A Survey on Image Denoising“, International Journal of Engineering Research and Applications (IJERA), Vol. 3, Issue 1, pp. 153-156, Jan-Feb 2013.
  109. Divya Gilly, Dr. Kumudha Raimond, “A Survey on License Plate Recognition Systems”, International Journal of Computer Applications (IJCA), Vol. 61, Issue 6, pp. 34-40, Jan 2013.
  110. Ginnu George, Dr. Kumudha Raimond, “A Survey on Optimization Algorithms for Optimizing the Numerical Functions”, International Journal of Computer Applications (IJCA), Vol. 61, Issue 6, pp. 41-46, Jan 2013.
  111. Tulips Angel Thankachan, Dr.Kumudha Raimond, “A Survey on Classification and Rule Extraction Techniques for Data Mining“, IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 8, Issue 5, pp. 75-78, Jan-Feb 2013.
  112. Karthika Gopal, Ramalakshmi Krishnamoorthy, “Analysis of Cluster based Target Tracking in Wireless Sensor Networks”, International Journal of Computer Applications (IJCA), Vol. 62, Issue 7, pp. 10-13, Jan 2013.
  113. Arul Xavier V. M, Angelin Jeyaseeli. D, “Delay-Efficient Approaches for Sleep Scheduling in Wireless Sensor Networks”, International Journal of Scientific and Technology Research, Vol. 2, Issue 1, pp. 45-48, Jan. 2013.
  114. Greeshma Gopal, Dr. E. Grace Mary Kanaga, “A Study on Enhancement Techniques for Mammogram Images”, International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE), Vol. 2, Issue 1, pp. 36-39, Jan 2013.
  115. Vineetha Sara Abraham, S. Deepa Kanmani, “A Survey on Continuous Monitoring of Preference Queries using Sliding Window”, International Journal of Scientific and Research Publications (IJSRP), Vol. 3, Issue 2, pp. 1-4, Feb 2013.
  116. Swapna Lia Anil, Roshni Thanka, “A Survey on Security of Data Outsourcing in Cloud”, International Journal of Scientific and Research Publications (IJSRP), Vol. 3, Issue 2, pp. 1-3, Feb 2013. (5)
  117. Mary Sumi Kurian, S.P. Jeno Lovesum, “Cloud Based Scaling of Grid Resources through Grid Middleware”, International Journal of Computer Applications (IJCA), Vol. 64, No. 15, pp. 7-11, Feb 2013.
  118. Helen Sara George, S.P. Jeno Lovesum, “A Survey on Different Encryption Schemes and Security Challenges in Cloud Storage System”, International Journal of Engineering Research and Technology (IJERT), Vol. 2, Issue 1, pp. 1-4, Jan 2013.
  119. Simsy Xavier, S.P. Jeno Lovesum, “A Survey of Various workflow Scheduling Algorithms in Cloud Environment”, International Journal of Scientific and Research Publications (IJSRP), Vol. 3, Issue 2, pp. 1-3, Feb 2013.
  120. J. Rex Fiona, Roshni Thanka, “Parallel Genetic Load Balancing with Competency Rank in Computational Grid Environment”, International Journal of Engineering Research and Applications (IJERA), Vol. 3, Issue 1, pp. 1814-1817, Jan-Feb 2013.
  121. Immanuel Gem, Arul Xavier, “A Scrutiny on Congestion Control Algorithms”, International Journal of Scientific and Technology Research,Vol. 2, Issue 2, pp. 190-193, Feb 2013.
  122. Krishna Priya.K.C., Sebastian Terene, “EECP: Energy Efficient and Congestion-aware Protocol in a Wireless Sensor Network”, International Journal of Computer Science and Management Research, Vol. 2, Issue 2, pp. 1607-1612, Feb 2013.
  123. Chinchu Elza Andrews, Iwin Thanakumar Joseph, “An Analysis of Various Steganographic Algorithms”, International Journal of Advanced Research in Electronics and Communication Engineering, Vol. 2, Issue 2, pp. 116-123, Feb 2013.
  124. J Sweetlin Subha, Jeban Chandir Moses, “A Survey of Various Risk Mitigating Techniques in MANET Environment”, International Journal of Scientific and Research Publications (IJSRP), Vol. 3, Issue 2, pp. 1-3, Feb 2013.
  125. Sreela Chandran, S. Nathelda Mary Navina, “Cellular Automata based Denoising and Fuzzy Logic Based Edge Detection”, International Journal of Advanced Research in Electronics and Communication Engineering,Vol. 2, Issue 2, pp. 187-193, Feb 2013.
  126. Angelin Jeyaseeli. D, V. M. Arul Xavier, “Optimizing Delay for Critical Event Monitoring in Wireless Sensor Networks”, International Journal of Engineering Research and Technology, Vol. 2, Issue 2, pp. 1-4, Feb 2013.
  127. Adlin Sharo T, Dr. Kumudha Raimond, “A Survey on Color Image Enhancement Techniques”, IOSR Journal of Engineering, Vol. 3, Issue 2, pp. 20-24, Feb. 2013.
  128. Ginnu George, Dr. Kumudha Raimond, “Solving Travelling Salesman Problem using Variants of ABC Algorithm”, The International Journal of Computer Science & Applications, Vol. 2, No. 01, pp. 97-109, March 2013.
  129. Divya Gilly, Dr. Kumudha Raimond, “License Plate Recognition – A Template Matching Method”, International Journal of Engineering Research and Applications, Vol. 3, Issue 2, pp. 1240-1245, March-April 2013.
  130. Hima Suresh, Dr. Kumudha Raimond, “Mining Association Rules from Time Series Data using Hybrid Approaches”, International Journal of Computational Engineering Research, Vol. 3, Issue 3, pp. 81-89, March 2013.
  131. Tulips Angel Thankachan, Dr. Kumudha Raimond, “A Hybrid Classifier based Rule Extraction System”, International Journal of Engineering Research and Development, Vol. 6, Issue No.4, pp. 114-121, March 2013.
  132. Nini Elsa Shaji, Shamila Ebenezer, “Information Aggregation Techniques in Different Networks”, International Journal of Computer Applications, Vol. 62, No. 8, pp. 37-41, Jan. 2013.
  133. Nini Elsa Shaji, Shamila Ebenezer, “An Effectual Failure Factor Augmented Aggregation Techniques for Computational Grid”, International Journal of Computer Trends and Technology, Vol. 4, Issue 4, pp. 269-274, 2013.
  134. Martin Victor K, K. Ramalakshmi, “Multiple Event-Driven Node Localization in Wireless Sensor Networks”, International Journal of Advanced Research in Computer Engineering & Technology, Vol. 2, Issue 3, pp. 1073-1077, March 2013.
  135. Helen Sara George, S.P. Jeno Lovesum, “A Secured Cloud Storage System”, International Journal of Computer Science and Management Research, Vol. 2, Issue 4, pp. 2014-2016, April 2013.
  136. Annie Ratna Priya, M. Mythily, “An Efficient Methodology for Improving Code Quality using Object Oriented Approach”, International Journal of Engineering Research and Applications, Vol. 3, Issue 2, pp. 608-610, March-April 2013.
  137. John Moses, P. Anitha Christy Angelin, “Enhancing the Privacy Through Pseudonymous Authentication and Conditional Communication in Vanets”, International Journal of Engineering and Science, Vol. 2, Issue 7, pp. 45-49, March 2013.
  138. C, P. Anitha Christy Angelin, “Efficient Localized Deployment Algorithm with Balanced Energy Consumption in Wireless Sensor Networks”, International Journal of Advanced Research in Computer Engineering & Technology, Vol. 2, Issue 2, pp. 698-702, Feb. 2013.
  139. Jeba Princess Jafrin, P. Anitha Christy Angelin, “The Enhanced Design for Data Gathering in WSAN based on Clustering and Optimal Path Selection (COPS) Method”, International Journal of Computer Technology and Applications, Vol. 4 (2), pp. 291-294, March-April 2013.
  140. H, P. Karthikeyan. “QOS Policy Based Scheduling for Resource Allocation in Grid Computing Environment”, International Journal of Computer Science and Management Research, Vol. 2, Issue 3, pp. 1742-1745, March 2013.
  141. Gogila G. Nair, P. Karthikeyan, “A Hierarchical Chemical Reaction Optimization for Varying Length Task Scheduling in Grid Computing”, International Journal of Engineering Research and Applications, Vol. 3, Issue 2, pp. 717-720, March-April 2013.
  142. H, P. Karthikeyan, “A Survey on Optimization Based Job Scheduling in Grid Computing”, International Journal of Management, IT and Engineering, Vol. 3, Issue 4, pp. 268-277, April 2013.
  143. H, P. Karthikeyan , “Price Adjustment for Double Auction Based Scheduling in Grid Environment”, International Journal of Advanced Research in Computer Engineering & Technology, Vol. 2, Issue 3, pp. 1166-1169, March 2013.
  144. Riya Mary Thomas, Joshua Samuel Raj, “Enhancing Genetic Based Scheduling in Computational Grid with Bacterial Foraging Optimization Technique”, International Journal of Computer Science & Technology, Vol. 4, Issue 1, pp. 337-341, Jan-March 2013.
  145. Jenice Aroma. R, Mathew Kurian, “An Efficient Semantic Web Through Semantic Mapping”, International Journal of Computational Engineering Research, Vol. 3, Issue 3, pp, 257-261, March 2013.
  146. Anisha Radha Krishnan, Mathew Kurian, “Effective Pattern Matching Approach for Knowledge Discovery Application”, International Journal of Advanced Research in Electronics & Communication Engineering,Vol. 2, Issue 2, pp. 224-227, Feb. 2013.
  147. Neenu Raju, Mr. Karunakaran, “A Survey on Filtering Methods”, International Journal of Advanced Research in Electronics and Communication Engineering, Vol. 2, Issue 1, pp. 98-100, Jan. 2013.
  148. Christylda Angelin Hannah. J, Natheldha Mary Navina, “A New Algorithm for the Detection and Removal of Impulse Noise using Cellular Automata”, International Journal of Advanced Research in Computer Engineering & Technology, Vol. 2, Issue 2, pp. 407-410, Feb. 2013.
  149. Immanuel Gem. A. J, Arul Xavier. V. M, “A Priority based Delay Sensitive TADR Idea on Congestion Control”, International Journal of Computer Science and Management Research, Vol. 2, Issue 4, pp. 2071-2074, April 2013.
  150. Antony Taurshia. A, Deepa Kanmani, “Diversity Improvement in Recommender System”, International Journal of Advanced Research in Computer Engineering and Technology, Vol. 2, Issue 2, pp. 726-728, Feb. 2013.
  151. Jobin S Thomas, Felix Arokya Jose, Noufidali V M, “Efficient Path Selection Metric for Hop-by-Hop Routing in Wireless Mesh Network”, International Research Journal of Computer Science Engineering and Applications, Vol. 2, Issue 3, pp. 330-334, March 2013.
  152. Mariat Thomas, G. Naveen Sundar, “Adaptive Sharing Method for Multiple Continuous Query”, International Journal of Advanced Research in Computer Engineering and Technology, Vol. 2, Issue 3, pp. 1187-1191, Feb. 2013.
  153. Revathi, Mythily, “A Review on Concurrency Fault Detection Techniques”, International Journal of Advanced Research in Computer Engineering and Technology, Vol. 2, Issue 2, pp. 337-341, Feb. 2013.
  154. Revathi, Mythily, “A UML/MARTE Detection of Starvation and Deadlocks at the Design Level in Concurrent System”, International Journal of Computer Technology & Applications, Vol. 4(2), pp.279-285, Mar-Apr. 2013.
  155. Jincy Annie. V. V, J. A. M. Rexie, “Evaluating Aggregation Function with Partial Aggregations”, International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE), Vol. 2, Issue 2, pp. 112-115, February 2013.
  156. C, J. A. M. Rexie, “Top K Answers for Keyword Queries using Indexes”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol. 2, Issue 2, pp. 614-617, February 2013.
  157. Josepin Dayana, J. A. M. Rexie, “Distance Based Range Queries”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol. 2, Issue 2, pp. 703-706, February 2013.
  158. Joson George, V. Jeyakrishnan, “Resource Failure management for Tenant-Based Resource Allocation Model”, International Journal of Computer Science and Management Research, Vol. 2, Issue 3, pp. 1948-1952, March 2013.
  159. Sijo Thomas, Deva Priya, “Guest Client Management in Uncoordinated WLANs”, International Journal of Computer Science and Management Research, Vol. 2, Issue 3, pp. 1971-1975, March 2013.
  160. S, Ramalakshmi, “Clustering Approach for Maximizing the Lifetime of Wireless Sensor Networks”, International Journal of Engineering Research and Applications, Vol. 3, Issue 2, pp. 1-7, March-April 2013.
  161. Sheba Gaikwad, Naveen Sundar, “Optimized Content Extraction from Web Pages Using Composite Approaches”, International Journal of Computer Trends and Technology, Vol. 4, Issue 3, pp. 450-453, 2013.
  162. Teena A. Sunny, Naveen Sundar, “An Efficient Information Extraction Model for Personal Named Entity”, International Journal of Computer Trends and Technology, Vol. 4, Issue 3, pp. 446-449, 2013.
  163. S. Gayathri, Leela, “Ranking Adaptation SVM for Target Domain Search”, International Journal of Advanced Research in Computer Engineering and Technology, Vol. 2, Issue 2, pp. 744-749, Feb. 2013.
  164. Pearline Divya, Leela, “The Content Summarization System”, International Journal of Advanced Research in Computer Engineering and Technology, Vol. 2, Issue 2, pp. 628-635, Feb. 2013.
  165. Jisy Raju. C, Anand Deva Durai, “Texture Classification in Iris Using Dominant Neighborhood Structure”, International Journal of Advanced Research in Electronics and Communication Engineering, Vol. 2, Issue 3, pp. 298-301, March 2013.
  166. Ashna Mary George, Anand Deva Durai, “Iris Recognition System for Scale and Rotation Invariance with SVM Classifier”, International Journal of Advanced Research in Electronics and Communication Engineering, Vol. 2, Issue 3, pp. 302-306, March 2013.
  167. Asha Susan Prakesh, Anand Deva Durai, S. Manimurugan, “Introducing QAM for Removing Reflection and Distortion from Un-natural”, International Journal of Computer Science and Management Research, Vol. 2, Issue 4, pp. 2017-2021, April 2013.
  168. Asir Daniel Raj. A, Mythily, “Ideas on Semantic Model Checking”, Journal of Computer Science and Management Research, Vol. 2, Issue 3, pp. 1815-1818, March 2013.
  169. Asir Daniel Raj. A, Mythily, “Representing Web Services”, Journal of Computer Science and Management Research, Vol. 2, Issue 3, pp. 1819-1823, March 2013.
  170. Jose Francis, Immanuel John Raja, “Energy Efficient Routing in MANETs – A Pandect”, Journal of Computer Science and Management Research, Vol. 2, Issue 3, pp. 1963-1967, March 2013.
  171. Sneha George, I. Deva Priya, “Efficient Privacy-Preserving On-Demand Unobservable Routing Protocol against DoS Attacks for MANETS”, International Journal of Computer Science and Management Research, Vol. 2 Issue 4, pp. 2032-2035, April 2013.
  172. Adlin Sharo T., Dr. Kumudha Raimond, “Enhancing Degraded Color Images using Fuzzy Logic and Artificial Bee Colony”, International Journal of Computational Engineering Research, Vol.3, Issue 3, pp. 356-360, March 2013.
  173. Lomin Joy V., C. Priyadharsini, “Multipath Routing using Multiple Sink Monitoring Mechanism in WSN”, International Journal of Computer Science and Management Research, Vol. 2, Issue 4, pp. 2027-2031, April 2013.
  174. Naveen Sundar, D. Narmadha, “A Proficient Method for Temporal Removal”, International Journal of Computer Science and Technology, Vol. 4, Issue 1, pp. 598-601, Jan-March 2013.
  175. Nisha Wilvicta, Dr. Grace Mary Kanaga, “Agent Based Decision Support System for Identifying the Spread of Nosocomial Infections in a Rural Hospital”, International Journal of Engineering Research and Applications, Vol. 3, Issue 2, pp. 1628-1633, March-April 2013.
  176. Anna Geomi. George, Kethsy Prabavathy, “A Survey on Different Approaches used in Image Quality Assessment”, International Journal of Emerging Technology and Advanced Engineering, Vol. 3, Issue 2, pp. 197-203, Feb. 2013.
  177. Anna Geomi. George, Kethsy Prabavathy, “Blind Image Quality Assessment for Highly Distorted Images using Ciqe Algorithm”, International Journal of Engineering Research and Technology, Vol. 2, Issue 3, pp. 1-5, March 2013.
  178. Regnard Viven C, A. Shamila Ebenezer, “Distributed Metadata Filter Array Based Resource Discovery in Distributed Computational Grids”, International Journal of Computer Science and Management Research, Vol. 2, Issue 4, pp. 2149-2152, April 2013.
  179. Tesmy George, C. Priyadharshini, “Hybrid Movement Control Algorithm for Restoring Connectivity in WSAN”, International Journal of Advanced Research in Computer Engineering and Technology, Vol. 2, Issue 4, pp. 1094-1098, March 2013.
  1. Dr. E.Grace Mary Kanaga, M.L. Valarmathi, Preethi S.H. Darius, “A Novel 3D Approach for Patient Scheduling Using Multi-agent Coordination”, Cross-Disciplinary Applications of Artificial Intelligence and Pattern Recognition: Advancing Technologies, Chapter -27, pp. 544 – 563, IGI Global publishers, 2012
  2. Salaja Silas, Kirubakaran Ezra, Elijah Blessing Rajsingh, “An Effective User Driven Framework for Selection of Social Network Services”, Computational Social Networks: Security and Privacy, Series in Computer Communications and Networks, 2, pp. 229-246, Springer Verlag, London, 2012.
  3. Dr. Kumudha Raimond, “Video Processing for Ethiopian Sign Language Translation”, Lambert Academic Publishing, 2012, ISBN-13: 978-3848483334
  4. Joycy, J.S., Prabavathy, K, Survey on automatic segmentation of relevant textures in agricultural images, Article number 6215568, Pages 26-32, 1st International Conference on Advances in Engineering, Science and Management, ICAESM-2012; Nagapattinam, Tamil Nadu; India; 30 March 2012 through 31 March 2012 (CI=5)
  5. Grace Mary Kanaga. E, Valarmathi. M.L, “Multi-agent based patient scheduling using particle swarm optimization”, International Conference on Communication Technology and System Design 2011, ICCTSD 2011; Coimbatore; India; 7th December 2011 to 9th December 2011, Volume 30, 2012, Pages 386-393. SJR-0.282, SNIP-0.697(CI=5)
  6. J, Dinesh Peter. J, ‘A wavelet based morphological mass detection and classification in mammograms”, International Conference on Machine Vision and Image Processing, MVIP 2012; Coimbatore, Tamil Nadu; India; 14th December 2012 to 15th December 2012, Article number 6428752, Pages 25-28. (CI=5)
  7. A.A, Durai. C.A.D, “Genetic algorithm with search bank strategies for university course timetabling problem”, International Conference on Modelling Optimization and Computing; TamilNadu; India; 10th April 2012 to 11th April 2012, Volume 38, Pages 253-263. (CI=7)
  8. Japhynth Jacob, R. Elijah Blessing, Isaac Balasingh Jesudasan, “Ontology Based Resource Allocation (OBRA) for adaptive intelligent grid environment”, 6th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2012; Vitoria-Gasteiz; Spain; 3rd December 2012 to 5th December 2012, Volume 7656 LNCS, Pages 330-333. SJR-0.315, SNIP-0.552
  9. Diana Jeba Jingle. I, Rajsingh. E.B, “DDDOST: Distributed detection of DOS attack using timers in wireless broadband networks”, 4th International Conference on Advanced Computing, ICoAC 2012; Chennai; India; 13th December 2012 to 15th December 2012, Article number 6416795.
  10. H, Raimond. K, “Performance of TCP variants over proactive and reactive routing protocols in MANET”, International Conference on Management of Emergent Digital EcoSystems, MEDES 2012; Addis Ababa; Ethiopia; 28th October 2012 to 31st October 2012, Pages 123-130. (CI=3)
  11. Joshua Samuel Raj, Devi Priya. S, “Contribution of BFO in grid scheduling”, 3rd IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2012; Coimbatore, Tamilnadu; India; 18th December 2012 to 20th December 2012, Article number 6510214. (CI=1)
  12. Durga S., “Mobile Cloud Media Computing Applications -A Survey;” Springer Lecture Notes in Electrical Engineering, 4th International Conference on Signal and Image Processing 2012, ICSIP 2012; Coimbatore, (222), pp 619-628, December 2012. SJR-0.127, SNIP-0.118, (CI=5)
  13. Sujitha, Kirubakaran, Kenanya Kumar, “Survey on image compression techniques: Using CVIP tools”, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Volume 86, 2012, Pages 300-309. SJR-0.149, SNIP-0.215
  14. Salaja Silas, Kirubakaran Ezra, Dr. R. Elijah Blessing, “An Analysis on the Effect of Mobility and Load on Fault Tolerant Service Selection Framework for Pervasive Environments”, European Journal of Scientific Research, 67(2), pp. 301-308, Jan. 2012. SJR-0.125
  15. Salaja Silas, Kirubakaran Ezra, Elijah Blessing Rajsingh, “Efficient service selection middleware using ELECTRE methodology for cloud environments”, Information Technology Journal, 11(7), pp. 868-875, 2012. SJR-0.102, SNIP-0.367 (CI-16)
  16. Immanuel Alex Pandian. I, JoseminBala. G, Anitha. J, “An efficient diamond based X-pattern motion estimation for video coding”, International Journal of Imaging and Robotics, 9(1), pp. 117-128, 2012. SJR-0.313, SNIP-0.839
  17. Salaja Silas, Kirubakaran Ezra, Elijah Blessing Rajsingh, “A Novel Fault Tolerant Service Selection Framework for Pervasive Computing”, Journal of Human-Centric Computing and Information Sciences, Springer publications, Vol. 2, No. 5, pp. 1-14, March 2012. SJR-0.615, SNIP-2.825 (CI-55)
  18. Salaja Silas, Kirubakaran Ezra, Elijah Blessing Rajsingh, “An Effective User Driven Framework for Selection of Social Network Services”, Computational Social Networks: Security and Privacy, Series in Computer Communications and Networks, Vol. 2, pp. 229-246, Springer Verlag, London, 2012.
  19. G. Mageshwari, Dr. E. Grace Mary Kanaga, “A Distributed Optimized Patient Scheduling using Partial Information”, International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 3, No. 3, pp. 83-94, May 2012.
  20. I.Diana Jeba Jingle, Dr. Elijah Blessing Rajsingh, P. Mano Paul, “Distributed Detection of DoS Using Clock Values in Wireless Broadband Networks”, International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 – 8958, Volume-1, Issue-5, pp. 409-413, June 2012.
  21. A.Shamila Ebenezer, K. Baskaran, “Fault Tolerant most Fitting Resource Scheduling Algorithm (FMFRS) for Computational Grid”, European Journal of Scientific Research, Vol. 86, Issue 4, pp. 468-473, September 2012.
  22. Sijo Thomas, DevaPriya. I, “Survey on-Traffic Aware Distributed channel Assignment in WLANs”, International Journal of Computer Science and Management Research, Vol. 1, Issue 3, pp. 522-526, October 2012.
  23. Elizabeth Sama Sam, A. Kethsy Prabhavathy, J. Devi Shree, “A Survey on Outdoor Scene Image Segmentation”, International Journal of Computer Applications, Vol. 55, No. 9, pp. 5-9, October 2012.
  24. Anu Rachel Abraham, A. Kethsy Prabhavathy, J. Devi Shree, “A Survey on Video Inpainting”, International Journal of Computer Applications, Vol. 55, No. 9, pp. 43-47, October 2012.
  25. Veena Ramakrishnan, A. Kethsy Prabhavathy, J. Devi Shree, “A Survey on Vehicle Detection Techniques in Aerial Surveillance”, International Journal of Computer Applications, Vol. 55, No.18, pp. 43-47, October 2012.
  26. Hydin John, J. Anitha, “A Study of Image Segmentation Approaches”, International Journal of Advanced Research in Electronics and Communication Engineering, Vol. 1, Issue 4, pp. 62-68, October 2012.
  27. Merin Antony. A, J. Anitha, “A Survey on Moving Object Segmentation Methods”, International Journal of Advanced Research in Electronics and Communication Engineering, Vol. 1, Issue 4, pp. 73-80, October 2012.
  28. Anju. B, S. Manimurugan, “A Survey on Medical Image Compression”, International Research Journal of Computer Science Engineering and Applications, Vol. 1, Issue 1, pp. 62-65, October 2012.
  29. S. Manimurugan, Anju. B, “An Approach to Medical Image Compression Using Filters Based on Lifting Schemes”, IOSR Journal of VLSI and Signal Processing, Vol. 1, Issue 2, pp. 09-16, Sep-Oct 2012.
  30. S. Manimurugan, Ramajayam.N, “Visual Cryptography Encryption for Image – Survey”, International Journal of Computational Linguistics and Natural language Processing, Vol. 1, Issue 3, pp. 65-74, October 2012.
  31. S. Manimurugan, Ramajayam.N, “Visual Cryptography Based on Modified RLE Compression”, International Journal of Computer Science and Management Research, Vol. 1, Issue 3, pp. 390-394, October 2012.
  32. S Manimurugan and Athira B Kaimal, “A Tailored Anti-Forensic Technique for Digital Image Applications”, International Journal of Computer Applications, Vol. 53, No.9, pp. 14-20, September 2012.
  33. S Manimurugan and Athira B Kaimal, “A Tailored Anti-Forensic Approach for Bitmap Compression in Medical Images”, IOSR Journal of VLSI and Signal Processing, Vol. 5, Issue 1, pp. 01-05, Sep-Oct 2012.
  34. Jipsa Kurian, V. Karunakaran, “A Survey on Image Classification Methods”, International Journal of Advanced Research in Electronics and Communication Engineering, Vol. 1, Issue 4, pp. 69-72, October 2012.
  35. John Sathya. M, Shweta Vincent, “Survey on Network Anomaly Detection”, International Journal of Computer Science and Management Research, Vol. 1, Issue 3, pp. 600-603, October 2012.
  36. Tritty Mamachan, M. Roshni Thanka, “Survey on Keyword Searching in Cloud Storages”, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 11, pp. 271-275, November 2012.
  37. Vijini Mary Kurian, M. Roshni Thanka, “Survey on Securing Data in Cloud”, International Journal of Computer Applications, Volume 57, No. 15, November 2012, pp. 21-24.
  38. E.Bijolin Edwin, Dr.P.Uma Maheswari, M.Roshni Thanka, “A Survey on Security Assurance Architecture in Virtualization Implementation on Cloud”, International Journal of Science, Engineering and Technology Research, Volume 1, Issue 5, pp. 154-159, Nov. 2012.
  39. Krishna Priya. K. C, Sebastian Terence, “A Survey on Event Detection and Transmission Protocols in an Event Driven Wireless Sensor Network” International Journal of Computer Applications, Vol. 58, No. 4, pp. 12-18, November 2012.
  40. Jincy Annie V. V, J. A. M. Rexie, “Efficient Tabular Dataset Preparations by the Aggregations in SQL: A Survey” International Journal of Computer Applications, Volume 58, No.15, November 2012, pp. 17-20.
  41. Litty K Mathews, S. Deepa Kanmani, “A Survey on Temporal Information Retrieval Systems”, International Journal of Computer Applications, Volume 58, No.15, pp. 24-28, November 2012.
  42. Jenice Aroma R, Mathew Kurian, “A Survey on Need for Semantic Web”, International Journal of Scientific and Research Publications, Vol. 2, Issue 11, pp. 1-4, Nov. 2012.
  43. Regnard Viven. C, Shamila Ebenezer, “A Survey on Resources Discovery Approaches in Distributed Computational Grids” International Journal of Computer Science and Management Research, Vol. 1, Issue 4, pp. 707-711, Nov. 2012.
  44. Joel Anandraj. E, Margret Johnson, “Survey on Scheduling in Cloud Computing System” International Journal of Computer Science and Management Research, Vol. 1, Issue 4, pp. 712-715, Nov. 2012.
  45. Priyadharsini. C, Ann Saviour, “Survey on Auto-Calibration of Beacon Nodes in Indoor Location Computing”, International Journal of Emerging Technology and Advanced Engineering, Vol. 2, Issue 11, pp. 170-175. Nov. 2012.
  46. Naveen Sundar, Sheba Gaikwad, “Efficient Content Extraction Using Hybrid Technique”, International Journal of Computer Science and Technology, Vol. 3, Issue 4, pp. 372-375, Oct-Dec 2012.
  47. Naveen Sundar, Teena A. Sunny, “Optimized Clustering for Personal Name Information Extraction”, International Journal of Computer Science and Technology, Vol. 3, Issue 4, pp. 361-363, Oct-Dec 2012.
  48. Jobin S Thomas, Noufidali V M, Felix Arokya Jose, “A Survey on Bandwidth Guaranteed Routing Techniques in Wireless Mesh Networks”, International Journal of Computer Applications, Vol. 60, N0. 5, pp. 11-15, Dec. 2012.
  49. Sumana T., Natheldha Mary Navina, “A Survey on Non Local Means Algorithms”, International Journal of Engineering Research and Technology, Vol. 1, Issue 10, pp. 1-5, Dec 2012.
  50. Ann Maria Jacob, J. Anitha, “Inspection of Various Object Tracking Techniques”, International Journal of Engineering and Innovative Technology, Vol. 2, Issue 6, pp. 118-124, Dec. 2012.
  51. Denny P George, Sebastian Terrence, “Anypath Routing in Wireless Networks - A Review”, International Journal of Computer Science and Management Research, Vol. 1, Issue 5, pp. 1103-1107, Dec. 2012.
  52. Shamily. C, P. Anitha Christy Angelin, “Comparative Study on Efficient Localized Deployment Algorithm for Wireless Sensor Networks”, International Journal of Computer Applications, Vol. 59, N0. 17, pp.29-33, Dec. 2012.
  53. Sreela Chandran, Natheldha Mary Navina, “Survey on Various Image Denoising Techniques Using Cellular Automata”, International Journal of Advanced Research in Electronics and Communication Engineering, Vol. 1, Issue 6, pp. 11-14, Dec 2012.
  54. Jeba Princess Jafrin, P. Anitha Christy Angelin, “A Comparative study of Data Gathering Algorithms for a Mobile Sink in Wireless Sensor Network“, International Journal of Advanced Research in Computer Engineering and Technology, Vol. 1, Issue 9, pp.1-6, Nov. 2012.
  55. P. Anitha Christy Angelin, John Moses, “A Survey on Conditional Privacy in Vehicular Adhoc Networks Network”, International Journal of Scientific and Engineering Research, Vol. 3, Issue 12, pp.1-4, Dec. 2012.
  56. Sangeetha. S, Ramalakshmi, “A Survey on Coverage Problems in Wireless Sensor Networks”, International Journal of Advanced Research in Computer Engineering and Technology, Vol. 1, Issue10, pp.1-6, Dec. 2012.
  57. Jim Solomon Raja, Immanuel John Raja, “A Survey on Selfishness Handling In Mobile Ad Hoc Network”, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 11, pp. 688-692, November 2012.
  58. Anisha Radhakrishnan, Mathew Kurian, “Efficient Updating of Discovered Patterns for Text Mining: A Survey”, International Journal of Computer Applications (IJCA), Vol. 58, Issue No.1, pp. 29-33, Nov 2012.
  59. Lakshmi.S.Dutt, Mathew Kurian, “Handling of Uncertainty - A Survey”, International Journal of Scientific and Research Publications, Vol. 3, Issue 1, pp. 1-4, Jan 2012.
  60. Tesmy George, Priyadharshini. C, “Inter-actor Connectivity Restoration Algorithm for Wireless Sensor and Actor Networks: A Survey”, International Journal of Computer Science and Management Research (IJCSMR), Vol. 1, Issue 5, pp. 1160-1164, Dec 2012.
  61. Mariat Thomas, G.Naveen Sundar, “A Survey on Adaptive Query Optimization Over Data Stream”, International Journal of Computer Science and Management Research (IJCSMR), Vol. 1, Issue 5, pp. 1151-1154, Dec 2012.
  62. Neena Antony, A. Alfred Raja Melvin, “A Survey on Encryption Schemes In the Clouds for Access Control”, International Journal of Computer Science and Management Research (IJCSMR), Vol.1, Issue 5, pp. 1135-1139, Dec 2012.
  63. Harish. M, Shwetha Vincent, “A Survey on Routing Protocols in MANETS“, International Journal of Computer Science and Management Research (IJCSMR), Vol. 1, Issue 5, pp. 1140-1144, Dec 2012.
  64. Rasha T.K, Shwetha Vincent, “A Survey on Intrusion Response Mechanism for MANET Routing Attacks”, International Journal of Emerging Technology and Advanced Engineering (IJETAE), Vol. 2, Issue 10, pp. 479-485, Oct 2012.
  65. Rosebell John, V.Karunakaran, “A Survey on Denoising Methods”, IOSR Journal of Engineering (IOSR-JEN), Vol. 2, Issue 10, pp. 85-89, Oct 2012.
  66. Joson George, Jenny Frank Rosaline, Jeya Krishnan , “Survey on Cloud Computing Resource Allocation Models & Methods”, International Journal of Computer Science and Management Research (IJCSMR), Vol. 1, Issue 5, pp. 1155-159, Dec 2012.
  67. Sheela Rani Arasu, Immanuel John Raja, “Analysis of Different Routing Techniques for Opportunistic Data Transfer”, International Journal of Computer Applications (IJCA), Vol. 62, No. 5, pp. 1-4, Jan 2012.
  68. Kulangara Silpa Prabhu, Felix Arokya Jose, Jeya Krishnan, “IntErgy: Minimization of Interference and Energy Optimization in Multi-hop Wireless Networks”, International Journal of Advanced Computer Theory and Engineering, Vol. 1, Issue 2, pp. 23-27, 2012.
  69. Lomin Joy V., C. Priyadharsini, “A Survey on Sink Based Multipath Routing Protocols in WSN”, International Journal of Computer Science and Management Research, Vol. 1, Issue 5, pp. 1108-1111, Dec. 2012.
  70. Joshua Samuel Raj, Hridya K. and V. Vasudevan “Augmenting Hierarchical Load Balancing with Intelligence in Grid Environment”, International Journal of Grid and Distributed Computing, Vol.5, No.2, pp. 9-18, June 2012.
  71. Mageshwari, Dr. E. Grace Mary Kanaga, “A Distributed Optimized Patient Scheduling using Partial Information” International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 3, No. 3, pp. 83-94, May 2012.
  72. S, Joshua Samuel Raj, “Expeditious Scheduling for Precedence Constraint Tasks in Grid”, International Journal of Scientific and Engineering Research, Vol.3, Issue 5, May 2012.
  73. Hridya K. S, Joshua Samuel Raj, “Enhanced Hierarchical Load Balancing Algorithm in Grid Environment”, International Journal of Scientific and Engineering Research, Vol.3, Issue 5, May 2012.
  74. Mageshwari, Dr. E. Grace Mary Kanaga, “Literature Review on Patient Scheduling Techniques”, International Journal on Computer Science and Engineering (IJCSE), Vol. 4, No. 3, pp. 397-401, March 2012.
  75. B, S.Manimurugan, “A Survey on Various Medical Image Compression Techniques”, International Journal of soft Computing and Engineering(IJSCE), Vol. 2, Issue 1, pp.425-428, March 2012.
  76. John Justin. M, S.Manimurugan, “A Survey on Various Encryption Techniques”, International Journal of soft Computing and Engineering (IJSCE), Vol. 2, Issue 1, pp.429-432, Mar. 2012.
  77. Pradeep P. Mathew, S.Manimurugan, “An Evaluation on Irreversible compression of Encrypted Image”, International Journal of Computer Applications,Vol. 42, No. 2, pp. 17-20, March 2012.
  78. Boby Jose, S.Manimurugan, “A Novel Method for Detecting Triple JPEG Compression with the Same Quantization Matrix”, International Journal of Engineering Trends and Technology, Vol. 3, pp. 94-97, Mar. 2012.
  79. John Justin. M, Alagendran. B, S.Manimurugan, “A Survey on Various Visual Secret Sharing Schemes with an Application”, International Journal of Computer Applications, Vol. 41, No.18, pp 6-10, March 2012.
  80. Pradeep P. Mathew, S.Manimurugan, “An assessment on Irrevocable compression of Encrypted Grayscale Image”, International Journal of Engineering Trends and Technology, Vol. 2, Issue. 2, pp. 26-29, May 2012.
  81. John Justin. M, Alagendran. B, S.Manimurugan, “Secure Color Visual Secret Sharing Scheme using Shifting Coefficients with no Pixel Expansion”, International Journal of Computer Science and Information Technologies, Vol. 3, No. 2, pp. 3793-3800, April 2012.
  82. John Justin. M, Alagendran. B, S. Manimurugan, “Compression of 3D Medical Image by Edge Preservation Technique”, International Journal of Electronics and Computer Science Engineering, Vol. 1, No. 2, pp. 802-809, April 2012.
  83. Bincy, Aparna Raj, T.Mathu, “Survey on Common Data Mining Classification Techniques”, International Journal of Wisdom Based Computing, Vol. 2(1), pp. 12-15, April 2012.
  84. E.Grace Mary Kanaga, Dr. M.L. Valarmathi, “Multi-agent Based Patient Scheduling Using Particle Swarm Optimization”, ScieneDirect, Procedia Engineering, Vol. 30, pp. 386–393, March 2012.
  85. Kethsy Prabavathy, J. Sophia Joycy, “Survey on Automatic Segmentation of Relevant Textures in Agricultural Images”, CiiT International Journal of Digital Image Processing, Vol. 4, No. 3, pp. 123-129, Feb. 2012.
  86. Naveen Sundar, Narmadha, “An Efficient Approach for Mining Association Rules in Large Databases”, International Journal of Artificial Intelligence and Knowledge Discovery, Vol. 2, Issue 1, Jan. 2012.
  1. Salaja Silas, Kirubakaran Ezra, R. Elijah Blessing, “Scalable and reliable methodology for service selection in pervasive computing” 3rd International Conference on Electronics Computer Technology, ICECT 2011; Kanyakumari, 8th April 2011 to 10th April 2011, Volume 1, Article number 5941587, Pages 188-191. (CI=3)
  2. D, Jeno Lovesum. S.P, “A novel approach for scheduling service request in cloud with trust monitor”, International Conference on Signal Processing, Communication, Computing and Networking Technologies, ICSCCN-2011; Thuckalay; India; 21st July 2011 to 22nd July 2011, Article number 6024605, Pages 509-513. (CI=8)
  3. S, Porkumaran. K, “A new fast and efficient visual cryptography scheme for medical images with forgery detection”, International Conference on Emerging Trends in Electrical and Computer Technology, ICETECT 2011; Chunkankadai; India; 23rd March 2011 to 24th March 2011, Article number 5760187, Pages 594-599. (CI=5)
  4. Benitha Christinal. J, Vivek. V, “A user-level tool for monitoring router network characteristics using packet probing”, International Conference on Computer, Communication and Electrical Technology, ICCCET 2011; Maruthakulam; India; 18th March 2011 to 19th March 2011, Article number 5762469, Pages 18-23.
  5. Kethsy Prabhavathy. A, Joseph. N, Lydia Liz Lukose, “Query by image content using biased discriminant euclidean algorithm and clustering techniques”, International Conference on Emerging Trends in Electrical and Computer Technology, ICETECT 2011; Chunkankadai; India; 23rd March 2011 to 24th March 2011, Article number 5760184, Pages 577-580.
  6. T, Narmadha. D, Geetha. S, “Mining and post-mining of time stamped association rules”, 3rd International Conference on Electronics Computer Technology, ICECT 2011; Kanyakumari; India; 8th April 2011 to 10th April 2011, Article number 5941876, Pages 149-153.
  7. D, Naveensundar. G, Geetha. S, “A novel approach to prune mined association rules in large databases”, 3rd International Conference on Electronics Computer Technology, ICECT 2011; Kanyakumari; India; 8th April 2011 to 10th April 2011, Volume 5, Article number 5942031, Pages 409-413. (CI=4)
  8. Immanuel Alex Pandian. S, Josemin Bala. G, Anitha. J, “Enhanced modified orthogonal search for motion estimation”, IEEE Recent Advances in Intelligent Computational Systems, RAICS 2011; Trivandrum, Kerala; India; 22nd September 2011 to 24th September 2011, Article number 6069440, Pages 907-910. (CI=10)
  9. J, Mathew. A.M, “Video quality enhancement using IRM”, International Conference on Recent Trends in Information Technology, ICRTIT 2011; Chennai; India; 3rd June 2011 to 5th June 2011, Article number 5972316, Pages 1250-1254.
  10. P, Anitha. J, “Accessing relevant images: Fuzzy K-Means”, 3rd International Conference on Electronics Computer Technology, ICECT 2011; Kanyakumari; India; 8th April 2011 to 10th April 2011, Volume 6, Article number 5942105, Pages 312-315.
  11. R, Ramalakshmi. K, Patro. A, Thanushkodi. K, “Scheduling framework with resource level load balance using agents in grid computing environments”, IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011; Xi'an; China; 27th May 2011 to 29th May 2011, Article number 6014981, Pages 672-675.
  12. R, Ramalakshmi. K, Bhasme. J.I.V, Thanushkodi. K, “Scheduling framework for queuing and advanced reservation using TBRA in grid computing environments: Trust based resource agent”, IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011; Xi'an; China; 27th May 2011 to 29th May 2011, Article number 6014980, Pages 667-671.
  13. A, Ramalakshmi. K, “Maintaining the secrecy in visual cryptography schemes”, 3rd International Conference on Electronics Computer Technology, ICECT 2011; Kanyakumari; India; 8th April 2011 to 10th April 2011, Volume 4, Article number 5941910, Pages 311-314. (CI=1)
  14. P.L.H, Venkatesan. R, Ramalakshmi. K, “Perspective study on resource level load balancing in grid computing environments”, 3rd International Conference on Electronics Computer Technology, ICECT 2011; Kanyakumari; India; 8th April 2011 to 10th April 2011, Volume 6, Article number 5942107, Pages 321-325. (CI=4)
  15. Benson Edwin Raj. S, Varghese. G, “Analysis of intrusion-tolerant architectures for Web Servers”, 2011 International Conference on Emerging Trends in Electrical and Computer Technology, ICETECT 2011; Chunkankadai; India; 23rd March 2011 to 24th March 2011, Article number 5760265, Pages 998-1003. (CI=5)
  16. Benson Edwin Raj. S, Annie Portia. A, “Analysis on credit card fraud detection methods”, International Conference on Computer, Communication and Electrical Technology, ICCCET 2011; Maruthakulam; India; 18th March 2011 to 19th March 2011, Article number 5762457, Pages 152-156. (CI=27)
  17. Japhynth Jacob, R. Elijah Blessing, Isaac Balasingh Jesudasan, “Dynamic multi dimensional matchmaking model for resource allocation in grid environment”, 1st International Conference on Computer Science, Engineering and Information Technology, CCSEIT 2011; Tirunelveli, Tamil Nadu; India; 23rd September 2011 to 25th September 2011, Volume 204 CCIS, Pages 179-185. SJR= 0.162, SNIP=0.317
  18. G, Thanushkodi. K, “A new trace backing algorithm for maximizing streaming data join”, 1st International Conference on Computer Science, Engineering and Information Technology, CCSEIT 2011; Tirunelveli, Tamil Nadu; India; 23rd September 2011 to 25th September 2011, Volume 204 CCIS, Pages 516-522. SJR= 0.162, SNIP=0.317
  19. Grace Mary Kanaga, Valarmathi. M.L, “Synergy of multi-agent coordination technique and optimization techniques for patient scheduling”, International Conference on Information Technology and Mobile Communication, AIM 2011; Nagpur, Maharashtra; India; 21st April 2011 through 22nd April 2011, Volume 147 CCIS, Pages 317-322. SJR= 0.162, SNIP=0.317
  20. Jaspher Katherine, Benson Edwin, Kirubakaran, “A novel security framework for computational grid” 3rd International Conference on Electronics Computer Technology, ICECT 2011; Kanyakumari, pp. 103-107.
  21. Japhynth Jacob, Dr. R. Elijah Blessing, Isaac Balasingh Jesudasan, “Three Dimensional Matchmaking Model for Optimal Allocation of Resources in Grid”, European Journal of Scientific Research, 67(1), pp. 128-136, Dec. 2011.(CI-1) SJR-0.125
  22. Manimurugan. S, Porkumaran, “Secure medical image compression using Block Pixel Sort Algorithm”, European Journal of Scientific Research, 56(2), pp. 129-138, 2011. (CI-2) SJR-0.125
  23. S, Porkumaran. K, “Fast and efficient secure medical image compression schemes”, European Journal of Scientific Research, 56(2), pp. 139-150, 2011. (CI-2) SJR-0.125
  24. Anup Mathew Abraham, Shweta Vincent, “Defending DoS attacks using a Puzzle based approach and Tracing back to the Attacker”, CiiT International Journal of Data Mining and Knowledge Engineering, Volume 3, No. 14, Pg- 862, October 2011.
  25. Joshua Samuel Raj, V. Vasudevan, “Grid Computing with Smart Genetic Algorithm”, Int. Journal of Grid Computing and Multi Agent Systems, Vol. 2, No.1, pp. 1-10, Jan-June 2011.
  26. Ashly Thomas, N. Dhinakaran, Anitha Christy P Angelin, “A-SMOCK: Authenticated SMOCK for Wireless Sensor Networks”, International Journal of Computer Applications, Vol 19(6), pp 1-5, April 2011.
  27. R.Britto Pradeep, Dhinakaran, Anitha Christy P Angelin, “Comparison of Drop Rates in Different TCP Variants against Various Routing Protocols”, International Journal of Computer Applications, Vol 20(6), pp 1-7, April 2011.
  28. Jeba Veera Singh, A. Alfred Raja Melvin, J. Immanuel John Raja, “A Robust Intrusion Detection in Mobile Ad-hoc Networks with Reactive Routing Protocols”, CiiT International Journal of Wireless Communication, Vol. 3, No. 4, pp. 250-253, March 2011, ISSN 0974 – 9756.
  29. Sowmya, J. Immanuel John Raja, J.M.Lifna Prema, “An Approach for Internet Connectivity for MANET”, CiiT International Journal of Wireless Communication, Vol. 3, No. 4, pp. 246-249, March 2011, ISSN 0974 – 9756.
  30. Daniel, Mrs. Jeno, “Adaptive job scheduling with load balancing for workflow application in grid platform”, International journal of computer engineering and technology, March 2011, Vol. 2, No. 1, pp.09-21.
  31. Anju Vincent, Mr. Roshni Thanka, Ansu Liz Thomas, ‘Steganography on JPEG Image for Minimum Energy’, in the CiiT International Journal of Image Processing, March 2011, Vol 3, No 3, pp. 173-177.
  32. Priya Premkumar, Mrs. J. Anitha, “A Better Approach to Attain Appropriate Images From a Collection of Images Using Fuzzy-C-Means”, in the CiiT International Journal of Digital Image Processing, March 2011, Vol. 3, No. 4, pp. 231-236.
  33. T. Mathu, S.Geetha, “ A Novel Approach to Mine Temporal Association Rules”, CiiT International Journal of Data Mining and Knowledge Engineering, Vol. 3, No. 4, pp. 242-245, March 2011.
  34. Neethu Tom, J. Anitha, “Multiple Object Detection and Tracking with Scene Context”, CiiT International Journal of Digital Image Processing, Vol. 3, No. 4, pp. 259-262, March 2011.
  35. Ann Mary Mathew, J. Anitha, “Attaining a Super Quality Video from Multiple Compressed Copies Using IVEM”, CiiT International Journal of Digital Image Processing, Vol. 3, No. 4, pp. 226-230, March 2011.
  36. Mr. Jeban Chandir Moses, “Performance analysis of various ad-hoc routing protocols in multicast environment”, in the International Journal of Computer Science and Technology (IJCST), March 2011, Vol. 2, Issue 1, pp.184-187.
  37. Anju Rachel Oommen, Mrs. Nathelda Mary Navina, “Image Segmentation Using Grabcut Based on Anisotropic Diffusion”, in the International Journal on Computer Science and Engineering, Mar 2011, Vol. 3, No. 3, pp. 1307-1311.
  38. K. Ebin Kanaga Jozer, Mr. V. M. Arul Xavier, “Renovation of Node Connectivity in Wireless Sensor Networks”, in the CiiT International Journal of Wireless Communication, Feb 2011, Vol.3, No.2, pp.149-153.
  39. J. M. Lifna Prema, Mr. J. Immanuel John Raja, S. Sowmya, “Wormhole Detection Methods – A Survey”, in the CiiT International Journal of Wireless Communication, Feb 2011, Vol.3, No.2, pp.145-148.
  40. Mrs. J. Emi Retna, Merlin Soosaiya, Summy Joseph, “A Comparitive Study and Reusability Metrics Calculation with Reliability Estimation Approach of a Source Code Navigation Tool”, in the CiiT International Journal of Software Engineering and Technology, Feb 2011, Vol.3, No.2, pp.67-71.
  41. Deepa John, Mr. G. Naveen Sundar, “A Survey on Data Extraction from Web Pages”, in the CiiT International Journal of Data Mining and Knowledge Engineering, Feb 2011, Vol. 3, No. 3, pp. 180-183.
  42. Mrs. A.Shamila Ebenezer, “A novel trust based Job replication for a global scale grid environment “, in the CiiT –Networking andcommunication Engineering, Feb 2011, Vol. 3, No 2, pp. 128-131.
  43. Mrs. A.Shamila Ebenezer, “Fault tolerant scheduling techniques for Computational Grid “, in the CiiT –Networking andcommunication Engineering, Feb 2011, Vol. 3, No 2, pp. 128-131.
  44. Mrs. J.Emi Retna, Sumy Joseph, Merlin Soosaiya, “An Architecture Based Approach For Reliability Estimation Of A Source Code Navigation Tool” in the International Journal of Computer Applications (IJCA) Special Issue on Computational Science - New Dimensions & Perspectives, Feb 2011, No. 3, pp. 129–132, Published by Foundation of Computer Science. (ISBN: 978-93-80746-42-3)
  45. Ms. Sumitha C.H, Krupa Ophelia Geddam, “Implementation of Recursively Enumerable Languages in Universal Turing Machine”, in the International Journal of Computer Theory and Engineering, Feb 2011, Vol. 3, No. 1, pp. 1793-8201.
  46. Mr. Naveen Sundar, Cyju Varghese, “An Analysis of Various Record Matching Approaches and Similarity Computations”, in the Ciit International Journal of Data Mining and Knowledge Engineering, Jan 2011, Vol. 3, No. 2, pp. 99-103.
  47. D. Narmadha, Mr. Naveen Sundar, Mrs. Geetha, “An Efficient Approach to Prune Mined Association Rules in Large Databases”, in the International Journal of Computer Science Issues, Jan 2011, Vol 8, Issue 1, pp. 409-415.
  48. P. Priya, K. Vani, Mr. V. Vivek, Ms. Beaulah, “A Reliable Communication With Dynamic Routing Topology interference”, in the Ciit International Journal of Networking and Communication Engineering, Jan 2011, Vol 3, No. 1, pp. 15-19 (ISSN: 0974-9713)
  49. Mr. V. Vivek, J.Benitha Christinal, “Packet Forwarding Priority, Network Tomography, Congestion Control Based on Packet Probing in Network”, in the International Journal on Computer Science & Engg. (IJCSE), Jan 2011, Vol. 3, No.1 , pp. 401-409 (ISSN: 0975-3397)
  50. Mrs. S. Deepa Kanmani, Mr. K. Veningston, T.M. Nitha, “Construction of customized query forms for efficient retrieval from database” in the Ciit International Journal of Data Mining Knowledge Engineering, Jan 2011, Print: ISSN 0974-9683, Online: ISSN 0974-9578, Vol 3, No. 1, pp. 13-17.
  51. Mrs. S. Deepa Kanmani, Mr. K. Veningston, Sreeja S. Pillai, “To identify dynamic behaviour of frequent patterns by exploiting timestamps” in the Ciit International Journal of Data Mining Knowledge Engineering, Jan 2011, Print: ISSN 0974-9683, Online: ISSN 0974-9578, Vol 3, No. 1, pp. 8-12.
  52. T. Neethu Mohan, Mrs. S. Deepa Kanmani, Mrs. G. Hemalatha, “Survey on Identifying the attributes that improves the object visibility” in the Ciit International Journal of Data Mining Knowledge Engineering, Jan 2011, Print: ISSN 0974-9683, Online: ISSN 0974-9578, Vol 3, No. 2, pp. 71-75.