DEPARTMENT OFFERED COURSES
@B-TECH
@M-TECH
S.NO | Name of the Faculty | Journal Name | Year & Month of Publication | Vol.No.,Issue No & Pg.No's | Title | Name of Authors(as Published) |
---|---|---|---|---|---|---|
1 | Dr.Jayadev Gyani | Int.J.Business Intelligence and Data Mining, Vol 8 No.3 2013. | 2013 | Vol 8 No.3 | Fuzzy generalized Classifier for Distributed Knowledge Discover | Dr.Jayadev Gyani |
2 | Dr.Jayadev Gyani | International Conference on Cloud Computing | ,Nov 2013 | ISBN-978-81-923777-8-9 | Contrasting the Similarities between Grid Computing and Cloud Computing | Dr.Jayadev Gyani |
3 | Dr.Jayadev Gyani | International Conference on Cloud Computing , | Nov-13 | ISBN-978-81-923777-8-9, | A Novel Approach for Mobile Agent Based Trust Model for Cloud", | Dr.Jayadev Gyani |
4 | Dr.Jayadev Gyani | International Conference on Cloud Computing , | ,Nov 2013 | ISBN-978-81-923777-8-9 | Improving Cloud Storage Data Security in Cloud Computing Systems by Enhancement of RC6 Block Cipher Algorithm | Dr.Jayadev Gyani |
5 | Dr.Jayadev Gyani | International Conference on Cloud Computing , | ,Nov 2013 | ISBN-978-81-923777-8-9 | A Survey on Usage of HTML5 in Mobile Cloud Computing Applications | Dr.Jayadev Gyani |
6 | Dr.Jayadev Gyani | International Conference on Cloud Computing , | ,Nov 2013 | ISBN-978-81-923777-8-9 | Program Development on Smart phones: A New Era of Mobile Cloud Computing | Dr.Jayadev Gyani |
7 | Dr.Jayadev Gyani | International Conference on Cloud Computing , | ,Nov 2013 | ISBN-978-81-923777-8-9 | Secure Data Storage in Cloud Using Message Authentication Code | Dr.Jayadev Gyani |
8 | Dr.Jayadev Gyani | ICACM-2013, | 2013 | ISBN No-97893 51071495 | A Robust Trust Model Based on Grid Certificate and Reputation Using GridSim",ICACM-2013,ISBN No-9789351071495 | Dr.Jayadev Gyani |
9 | Dr.S.Kirubakaran | International Journal of Computer Science and Mobile Computing | Feb-14 | Vol. 3, Issue. 2, February 2014, pg.8 - 14. 2013-14 | A Survey Conducted on E-Agriculture with Indian Farmers" | Sumitha Thankachan, Dr.S.Kirubakaran |
10 | Dr.S.Kirubakaran | International Journal of Computer Science Trends and Technology (IJCST) - | Dec-13 | Volume1 Issue2, Nov- | A Survey on Anonymous Routing Protocols in Mobile Ad hoc Networks | V.Madhumitha, Dr.S.Kirubakaran |
11 | Dr.S.Kirubakaran: | International Journal of Communication and Networking System, | Dec-13 | Vol 2, Issue 2 | Lifetime Improvement of Wireless Sensor Networks by Using Sleep-Wake Scheduling and Any Cast Packet Forwarding Scheme | K.Maheswri, Dr.S.Kirubakaran, Dr.S.Karthik |
12 | Dr.P.Rajkumar | International Journalof Computer Science Trends and Technology (IJCST) | -Feb 2014 | Volume 2 Issue 1, Jan-Feb 2014 | Literature survey on Security Analysis in Multi-hop Wireless Networks | Dr.P.Rajkumar,P.Gana prakesh" |
13 | Dr.P.Rajkumar | Computational Intelligence and information technology | ISBN 81-903041-9-4. | ISBN 81-903041-9-4. | Wavelength Division Multiplexing Optical Networks Planning using Maximum Lightpath attack radious and attack-aware Routing | P.Rajkumar, M.Ananthi |
14 | Dr.P.Rajkumar | International Journal of Computer Science Trends and Technology (IJCST) | Apr 2014. | Volume 2 Issue 2 ,Mar - Apr 2014. | Intrusion Detection System Using EAACK and Digital Signature For Authentication in MANET | P.Rajkumar, Nithya Karthika M |
15 | Mr.P.Srinivas Rao | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9, | Improving Cloud Storage Data Security in Cloud Computing Systems by Enhancement of RC6 Block Cipher Algorithm | Mr.P.Srinivas Rao |
16 | Ms.G.Jose Mary | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | A Survey on Usage of HTML5 in Mobile Cloud Computing Applications | Ms.G.Jose Mary |
17 | Mr.K.Srinivas | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Program Development on Smart phones: A New Era of Mobile Cloud Computing | Mr.K.Srinivas |
18 | Mr.T.Ramakrishna | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | A Study on Mobile Augmentation using Cloud Computing | Mr.T.Ramakrishna |
19 | Ms.S.Gouthami | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | A Survey on Usage of HTML5 in Mobile Cloud Computing Applications | Ms.S.Gouthami |
20 | Mr.B.Naresh | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Evaluation of mobile apps based on Data mining and Cloud Computing platform | Mr.B.Naresh |
21 | Mr. A.RaghuVarman | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Evaluation of mobile apps based on Data mining and Cloud Computing platform | Mr. A.RaghuVarman |
22 | Mr.R.Bharath Kumar | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Secure Data Storage in Cloud Using Message Authentication Code", International Conference on Cloud Computing ,ISBN-978-81-923777-8-9,Nov 2013. | Mr.R.Bharath Kumar |
23 | Mr. M.Narender | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Secure Data Storage in Cloud Using Message Authentication Code | Mr. M.Narender |
24 | Ms.K.AM.Sushma | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | PSEUDONYMIZATION : Privacy Enhancing Technology for designing Cloud Computing Services | Ms. K .AM. Sushma |
25 | Ms. N.Sarika | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Sheltered Cloud Storage- Retreat, Preserve Open Evaluation | Ms. N.Sarika |
26 | Ms.L.Tarasvi | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Sheltered Cloud Storage- Retreat, Preserve Open Evaluation | Ms.L.Tarasvi |
27 | Ms.L.Tarasvi | International Journal of Computer Science and Electronics Engineering, | Jan-13 | ISSN-0975-5664 , | Locally Consistent Concept Factorization for Document Clustering | Ms.L.Tarasvi |
28 | Mr.P.Anand Kumar | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Evaluation of Data Centric Protocols Based On Wireless Sensor Networks Using Cloud Computing | Mr.P.Anand Kumar |
29 | Mr Mohammed Ashraf | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | A Study on Mobile Augmentation using Cloud Computing | Mr Mohammed Ashraf |
30 | Ms. K.Vanisree | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | PSEUDONYMIZATION : Privacy Enhancing Technology for designing Cloud Computing Services | Ms. K.Vanisree |
31 | Ms.K.Sravana Kumari | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Reusable Component Repository in Cloud Computing | Ms.K.SravanaKumari |
32 | Ms.S. Sandhya | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Reusable Component Repository in Cloud Computing | Ms.S. Sandhya |
33 | Mr. V.Krishna | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Remote-Accessing of Big Data across Clusters in Cloud Computing | Mr. V.Krishna |
34 | Mr. V.Sravan Kumar | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Cloud Computing Security Problems and Solutions | Mr. V.Sravan Kumar |
35 | Mr. E.Vinay Kumar | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Cloud Computing Security Problems and Solutions | Mr. E.Vinay Kumar |
36 | Mr. I.Sreenath | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Security Issues of Data Sharing on a Cloud | Mr. I.Sreenath |
37 | Mr. I.Sreenath | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Task Scheduling Using Rough Set Theory in a Hierarchical Cloud Computing Network | Mr. I.Sreenath |
38 | Mrs. M. Shara Lydia | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Task Scheduling Using Rough Set Theory in a Hierarchical Cloud Computing Network | Mrs. M. Shara Lydia |
39 | Mr. N.Devendar | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Remote-Accessing of Big Data across Clusters in Cloud Computing | Mr. N.Devendar |
40 | Mr. D.Upender | International Conference on Cloud Computing | Nov-13 | ISBN-978-81-923777-8-9 | Evaluation of Data Centric Protocols Based On Wireless Sensor Networks Using Cloud Computing | Mr. D.Upender |
S.NO | Name of the Faculty | Journal Name | Year & Month of Publication | Vol.No.,Issue No &Pge.nos | Title | Name of Authors(as Published) |
---|---|---|---|---|---|---|
1 | Dr.S.Kirubakaran | Research Journal of Computer Systems Engineering, | June 2013.2013-14 | Vol 4,pp:485-493 | Optimization Techniques in Heterogeneous Mobile Wireless Network for fast disaster response and recovery", | Dr.S.Kirubakaran |
2 | Dr.S.Kirubakaran | National seminar on Computing Innovations for Social and Ecological Relevance-NSCI- | 2K14. | An Intelligence based Alert System for Farmers" | Dr.S.Kirubakaran | |
3 | Dr.S.Kirubakaran | "National seminar on Computing Innovations for Social and Ecological Relevance-NSCI- | 2K14 | Efficient Anonymous Multicast routing Protocols in MANET" | Dr.S.Kirubakaran |
S. No. | Name Of Faculty | Title | Type | 1. | Dr.Jayadev Gyani | ➽ Fuzzy generalized Classifier for Distributed Knowledge Discover ➽ Contrasting the Similarities between Grid Computing and Cloud Computing ➽ A Novel Approach for Mobile Agent Based Trust Model for Cloud ➽ Improving Cloud Storage Data Security in Cloud Computing Systems by Enhancement of RC6 Block Cipher Algorithm ➽ A Survey on Usage of HTML5 in Mobile Cloud Computing Applications ➽ Program Development on Smart phones: A New Era of Mobile Cloud Computing ➽ Secure Data Storage in Cloud Using Message Authentication Code ➽ A Robust Trust Model Based on Grid Certificate and Reputation Using GridSim |
Conference |
---|---|---|---|
2. | Mr.P.Srinivas Rao | ➽ Improving Cloud Storage Data Security in Cloud Computing Systems by Enhancement of RC6 Block Cipher Algorithm | Conference |
3. | Ms.G.Jose Mary | ➽ A Survey on Usage of HTML5 in Mobile Cloud Computing Applications | Conference |
4. | Mr.K.Srinivas | ➽ Program Development on Smart phones: A New Era of Mobile Cloud Computing | Conference |
5. | Mr.T.Ramakrishna | ➽ A Study on Mobile Augmentation using Cloud Computing | Conference |
6. | Ms.S.Gouthami | ➽ A Survey on Usage of HTML5 in Mobile Cloud Computing Applications | Conference |
7. | Mr.B.Naresh | ➽ Evaluation of mobile apps based on Data mining and Cloud Computing platform | Conference |
8. | Mr. A.RaghuVarman | ➽ Evaluation of mobile apps based on Data mining and Cloud Computing platform | Conference |
9. | Mr.R.Bharath Kumar | ➽ Secure Data Storage in Cloud Using Message Authentication Code | Conference |
10. | Mr. M.Narender | ➽ Secure Data Storage in Cloud Using Message Authentication Code | Conference |
11. | Ms. K .AM. Sushma | ➽ PSEUDONYMIZATION: Privacy Enhancing Technology for designing Cloud Computing Services | Conference |
12. | Ms. N.Sarika | ➽ Sheltered Cloud Storage- Retreat, Preserve Open Evaluation | Conference |
13. | Ms.L.Tarasvi | ➽ Sheltered Cloud Storage- Retreat, Preserve Open Evaluation | Conference |