SlNo. | Name | Publications |
1. | Vinodh P Vijayan | - Vijayan V P, Gopinathan E “Improving Network Coverage and Llife-Time in a Cooperative Wireless mobile Sensor Network”Fourth International Conference on Advances in computing and communications(ICACC)Aug,2014. Published in IEEE Computer Society Proceedings.Print ISBN:978-1-4799-4364-7,INSPEC Accession Number:14630874,DOI:10.1109/ICACC.2014.16 PP 42-45.
-
Lakshmi R Nair, Vinodh P Vijayan, “Detection and Prevention of flooding attack using a hybrid approach”, International Journal Of Computer Applications(IJCA),ISSN 2250-1797,Issue 4,Volume 4, AUGUST 2014
-
Juby Joseph, Vinodh P Vijayan” Misdirection Attack in WSN Due to Selfish Nodes; Detection and Suppression using Longer Path Protocol” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 7, July 2014, pp. 825-829, ISSN: 2277 128X
-
Vinodh P Vijayan,Vikas K soman “Multi Objective Multi Agent Based AccessPoint Selection Mechanism using Fuzzy Logic”. International Journals of Multidisciplinary Research Academy (IJMRA) Volume 2, Issue 6 (June 2012)
-
K Prasadh, Vinodh P Vijayan, Biju Paul “ A Hybrid Intelligent Path Planning Approach to Cooperative Robots” International Conference, AIM 2011, Nagpur, Maharashtra, India, April 21-22, 2011. Information Technology and Mobile Communication Proceedings(Springer) Communications in Computer and Information Science, 2011, Volume 147, Part 2, 332-335, DOI: 10.1007/978-3-642-20573-6_57
-
V P Vijayan, Biju Paul “Multi Objective Traffic Prediction Using Type-2 Fuzzy Logic and Ambient Intelligence” International Conference on Advances in Computer Engineering 2010 , Published in IEEE Computer Society Proceedings, ISBN: 978-0-7695-4058-0, Print ISBN: 978-1-4244-7154-6
-
Vinodh P Vijayan, Deepti John, Merina Thomas, Neetha V Maliackal, Sara Sangeetha Vargheese “Multi Agent Path Planning Approach to Dynamic Free Flight Environment” International Journal of Recent Trends in Engineering (IJRTE), ISSN 1797-9617 Volume 1, Number 1, May 2009, Page(s): 41-46
-
Poornaselvan, K.J. Kumar, T.G.; Vijayan, V.P. “ Agent Based Ground Flight control Using Type-2 Fuzzy Logic And Hybrid Ant Colony Optimization To A Dynamic Environment “ Proceedings of International Conference on Emerging Trends in Engineering and Technology (ICETET), published by IEEE Computer Society, USA. INSPEC Accession Number: 10141185, IEE INSPEC, EI(Compendex), Thomson ISI .
-
Gireesh, K.T. , Vijayan V P “A Multi-agent Optimal Path Planning Approach to Robotics Environment”. Published in IEEE Computer Society Proceedings. Of International Conference on Computational Intelligence and Multimedia Applications (ICCIMA’07) ,IEEE Computer Society (CSDL) digital libraries, IEE INSPEC , ISBN: 0-7695-3050-8
|
2. |
Neethu Maria John
| -
Jisha Mariyam John,Neethu Mariya John,"Segmentation of Skin Lesions from Digital Images using Texture Distinctiveness with Neural Network",International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Aug-14
-
Neethu Maria John,”Implementation of Apriori Algorithm for finding frequent itemsets “, National Conference proceeding KCET, Virudhunagar, Volume 2, January 2007.
|
3. |
Merlin Mary James
| -
Merin C. Moncey, Merlin Mary James,"An Expandable and Secure Key Predistribution Scheme for Wireless Sensor Networks", International Scientific Journal on Science Engineering and Technology ,ISJSET Volume 17, issue 7, August 2014.
-
Merlin Mary James, “An efficient method for medical image diagnosis using Association rule mining and Neural networks”, International conference proceeding, Maria college of Engineering, Volume 1,January 2012
|
4. |
Vineetha V Nair
| -
Anu Mohan, Vineetha V Nair "An Optimal Caching Mechanism to Re-duce Content Provisioning Cost in Social Wireless Networks", (IIJC) IFRSA's International Journal of Compuing, 651-654, Vol. 4 (3) , 2014
-
Vineetha V Nair, “Source and Sink Location Privacy in Wireless Sensor Networks against a Global Network Monitoring Adversary” International conference proceeding ICGITS, SaintGits College of Engineering , March 2013
|
5. |
Tinu Thomas
| -
Anit V Mathew, Tinu Thomas,"Classification of Mutated Cancer Genome Using Machine Learning Approaches",International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE),Vol. 3, Issue 8, August 2014.
|
6. |
Mitha Rachel Jose
| -
Anisha Sarah Mathew ,MithaRachel “Enhancing Security of Traffic Redundancy and Elimnation Approach in Cloud Data Storage using 3DES(IJCSIT) International Journal of Computer Science and Information Technologies,1415-1419,vol 6(2),March-April 2015
-
Asha J Gomez, Mitha Rachel Jose "Self Adaptive Harmony Search Algorithm For Optimizing ECG Signal", (IJCSIT) International Journal of Computer Science and Information Technologies, 5781-5784, Vol. 5 (4) , 2014.
-
Anu Susan Chandy, Mitha Rachel Jose "A Trust based Report Payment Scheme for Multihop Wireless Networks", (IJARCSSE) International Journal of Advanced Research in Computer Science and Software Engineering, 2277-128X, Vol. 4 (7) , 2014
-
Mitha Rachel,I Berin Jeba Jingle”Automatic Detection of clustered microcalcification in Breast Cancer using mammograms and Cad system International Conference on Advanced Computing and Communication(ICACC)119-124 ,2010 may
|
7. |
Renjana Ramachandran
| -
Gayathri Mohan, Renjana Ramachandran "An Improved Approach for MANET Security using Cluster Based Certificate Revocation",(IJCSIT) International Journal of Computer Science and Information Technologies, 5781-5784, Vol. 5 (4) , 2014
|
8. |
Anna Prathiba Shobak
| -
Gayathri Pradeep, Anna Prathiba Shobak "Improving QoS in Spontaneous Ad hoc Networks", (IJCSIT) International Journal of Computer Science and Information Technologies, 5705-5707, Vol. 5 (4) ,2014
|
9. |
Sreenimol K R
| -
JensyMariyam Kurian, Sreenimol K R "SecuredMobility Controlled Java-Centric Architecture for Industrial Systems" IFRSA's International journal of Computing, IFRSA 2014
-
Nimmy.S, Sreenimol K.R "Proof-Based Intrusion Detection System in MANETS",(IJCSIT) International Journal of Computer Science and Information Technologies, 5724-5725, Vol. 5 (4) , 2014.
|
10. |
Seena George
| -
Manju Joseph, Seena George "Discovering and Profiling Overlapping Communities in Location Based Social Networksusing Feature Description", (IJARCSSE) International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4(7), July 2014.
|
11. |
Syamamol T
| -
Nirmal Zachariah, Syamamol T, "Client-Server Assignment for Better Traffic Route in Internet Distributed Systems", International Journal of Engineering Research and Technology (ISSN: 2278 - 0181), Volume. 3, Issue. 07, July 2014.
-
Nirmal Zachariah, Syamamol T, "Client-Server Assignment for Better Traffic Route in Internet Distributed Systems", International conference on Recent Trends in Engineering, Technology and management (ICRTETm - 2014) (ISBN: 978-81-908980-8-9) Issue. 05, July 2014
|
12. |
Subha Sreekumar
| -
Simi Susan Samuel, Subha Sreekumar, ”Comparative Study Between Sparse Representation Classification and Classical Classifiers on Cervical Cancer Cell Images”,International Journal of Advanced Research in Computer and Communication Engineering(IJARCCE), August 2014.
|
13. |
Sujitha.M
| -
Noble George, Sujitha M, “Flow Based Solutions for DoS and DDoS Attack Detection” , International Journal of Advanced Research in Computer Engineering & Technology Volume..4..Issue…3...,..March-2015..,pp..0661..-..0664..
|
14. |
Neena Joseph
| -
Vishnu S Sekhar,Neena Joseph,"Optimizing the Virtual Machine MigratiCloud Computing Systems by using Future Prediction Algorithm" In IJERT, Volume. 3, Issue.08, August 2014
-
Vishnu S Sekhar,Neena Joseph,"Stealthy P2P Botnet Detection Based On Automated Threshold Computing Using Genetic Algorithm" In IJCSIT,Volume. 5,2014,6910-6813
-
Vishnu S Sekhar,Neena Joseph,"Stealthy P2P Botnet Detection Based On Automated Threshold Computing Using Genetic Algorithm" In National Conference On Advanced Computer Technolgy-NACAT-2K14
|
15. |
Gayathri R Krishna
| -
Saniya Elza Dominic, Gayathr R Krishna, “CHOKE: A Stateless queue for Securing Flows” 2015
|
16. |
Neema George
| -
LeyaZacharias,NeemaGeorge”Enhanced security in personalized websearch”, International Journal of Advanced Research in Computer Science and Technology(IJARCET)4(3),March 2015
|