Faculty Publication

Year Name of Faculty Title of the Paper-Conference/Journal Details
2024-2025 Dr. Preetha K. G. Enhancing Traffic Control Strategies through Dynamic Simulation and Reinforcement Learning
Applied Artificial Intelligence and Computing (ICAAIC)
2024-2025 Dr. Preetha K. G. Dynamic Landslide Prediction, Monitoring, and Early Warning with Explainable AI: A Comprehensive Approach
Applied Artificial Intelligence and Computing (ICAAIC
2024-2025 Ms. Sangeetha Jamal QGen: Automated Question Paper Generator
2024 5th International Conference on Innovative Trends in Information Technology (ICITIIT), IEEE Xplore conference proceedings
2024-2025 Dr. Preetha K. G. Interactive Chatbot with AI Support for Universities: Enhancing Student Engagement and Administrative Efficiency
Intelligent Systems Design and Applications
2024-2025 Ms. Jomina John Trust value evaluation of cloud service providers using fuzzy inference based analytical process
Scientific Reports( Q1 journal)
2024-2025 Dr. Preetha K. G. An Energy Efficiency Optimization for Uplink Communication in IEEE 802.11ah Under Restricted Access Window
Wireless Personal Communications
2024-2025 Ms. Jomina John Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculation
Journal of cloud computing
2024-2025 Dr. Preetha K. G. An interactive visualization tool for the exploration and analysis of multivariate ocean data
Indonesian Journal of Electrical Engineering and Computer Science
2023-2024 Dr. Anita John Hash Function Design Based on Hybrid Five Neighbourhood Cellular Automata and Sponge Functions
Complex Systems
2023-2024 Dr. Sminu Izudheen IoT Based Smart Parking System
International Conference on Control Communication & Computing India (ICCC)
2023-2024 Dr. Preetha K. G. An Intelligent Pattern Matching approach with Deep Hypersphere Model for Secure Big Data Storage in Cloud Environment
International Journal of Computer Information Systems and Industrial Management Applications.
2023-2024 Dr. Preetha K. G. A Python Framework for Interactive 3D Visualization of Ocean Data
International Conference on Soft Computing and Signal Processing
2023-2024 Dr. Saritha S An Intelligent Pattern Matching approach with Deep Hypersphere Model for Secure Big Data Storage in Cloud Environment
International Journal of Computer Information Systems and Industrial Management Applications.
2023-2024 Ms. Sangeetha Jamal A Novel Framework for Real-Time Fire Detection in CCTV Videos Using a Hybrid Approach of Motion-Flicker Detection, Colour Detection and YOLOv7
2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) 19-21 July 2023
2023-2024 Dr. Preetha K. G. A Python-based Tool for the Generation of T-S Plot to Determine Water Masses in the World Ocean
2023 Global Conference on Information Technologies and Communications (GCITC) has been posted to the IEEE Xplore digital library effective 2024-04-18.
2023-2024 Ms. Jomina John Vulnerability scanning and analysis tool
International conference on smart computing and communications
2023-2024 Ms. Sangeetha Jamal QGEN: Automated Question Paper Generator
to be published
2023-2024 Ms. Anu Maria Joykutty Applications of Clustering in Cognitive Radio Networks
International Conference on Recent Trends in Communication Engineering and Network Technologies (CENT 2023)
2023-2024 Ms. Mehbooba P Shareef FESSARec: Explaining Course Recommendations using Fuzzy Expert System and Self-Attention
International Journal of Data Analysis Techniques and Strategies
2023-2024 Dr. Saritha S A Python-based Tool for the Generation of T-S Plot to Determine Water Masses in the World Ocean
2023 Global Conference on Information Technologies and Communications
2023-2024 Dr. Jincy J. Fernandez Protection of online images against theft using robust multimodal biometric watermarking and T-Norms
Multimedia Tools and Applications
2023-2024 Ms. Jomina John A comprehensive survey of malware detection approaches in cloud computing environments
International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)
2023-2024 Dr. Saritha S Q&AI: An AI Powered Mock Interview Bot for Enhancing the Performance of Aspiring Professionals
Recent Advances in Electrical, Electronics, Ubiquitous Communication, and Computational Intelligence
2023-2024 Dr. Sminu Izudheen Fractal dimension of protein–protein interactions: a tool for cancer protein identification
Current Science
2022-2023 Dr. Anita John A Cellular Automata Based Fault Resistant MICKEY-Like Stream Cipher
15th International Conference on Cellular Automata for Research and Industry, ACRI 2022, Geneva, Switzerland
2022-2023 Dr. Anita John Fault Resistant Trivium-like Stream Cipher Using Higher Radii Cellular Automata.
Journal of Cellular Automata
2022-2023 Ms. Sangeetha Jamal Concatenated Xception-ResNet50 - A novel hybrid approach for accurate skin cancer prediction
Computers in Biology and Medicine
2022-2023 Dr. Jincy J. Fernandez Augmenting the detection of online image theft using diagonal transformation and iris biometric watermarking
Int. J. Information and Computer Security,
2022-2023 Dr. Preetha K. G. DeepPRS: A Deep Learning Integrated Pattern Recognition Methodology for Secure Data in Cloud Environment
Innovations in Bio-Inspired Computing and Applications: Proceedings of the 13th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2022)
2022-2023 Dr. Preetha K. G. Price Forecasting on a Large Scale Data Set using Time Series and Neural Network Models
KSII Transactions on Internet and Information Systems
2022-2023 Ms. Jisha Mary Jose A Survey on Consensus Algorithms in Blockchain Based on Post Quantum Cryptosystems
5th International Conference on Computational Intelligence and Networks (CINE), 2022
2022-2023 Dr. Jincy J. Fernandez Real-time sign language recognition and speech conversion using VGG16
International Journal of Computational Vision and Robotics
2022-2023 Dr. Saritha S DeepPRS: A Deep Learning Integrated Pattern Recognition Methodology for Secure Data in Cloud Environment
Innovations in Bio-Inspired Computing and Applications: Proceedings of the 13th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2022)
2022-2023 Dr. Preetha K. G. SPOTLIGHT: A Mobile Application for Artist Management
Mathematical Statistician and Engineering Applications
2022-2023 Mr. Paul Augustine VIRTUAL CLOTH TRY-ON SYSTEM
Proceedings of ARSSS International Conference
2022-2023 Ms. Meenu Mathew Weighted Pooling RoBERTa for Effective Text Emotion Detection
2023 IEEE 8th International Conference for Convergence in Technology (I2CT)
2022-2023 Ms. Sangeetha Jamal Hybrid Model to Detect Pneumothorax Using Double U-Net with Segmental Approach
Intelligent Systems Design and Applications- 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022 - Volume 3
2022-2023 Dr. Saritha S Design and implementation of an augmented reality mobile application for navigating ATM counters (AR-ATM)
Industrial Robot: the international journal of robotics research and application
2022-2023 Dr. Saritha S An Intelligent Pattern Matching approach with Deep Hypersphere Model for Secure Big Data Storage in Cloud Environment
International Journal of Computer Information Systems and Industrial Management Applications.
2022-2023 Dr. Jincy J. Fernandez Biometric watermarking: an application-based review
International Journal of Information Privacy, Security and Integrity
2022-2023 Ms. Seema Safar A Comparative Analysis of Image Captioning Techniques
2023 4th International Conference for Emerging Technology (INCET)
2022-2023 Dr. Renu Mary Daniel Astrengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption
Information and Computation, Elsevier
2022-2023 Ms. Seema Safar Enriching Transformer using Fourier Transform for Image Captioning
2023 3rd International Conference on Intelligent Technologies (CONIT)
2021-2022 Ms. Sangeetha Jamal Survey and Analysis on AI Based Phishing Detection Techniques
2021 International Conference on Communication, Control and Information Sciences (ICCISc)
2021-2022 Ms. Anu Maria Joykutty Data Visualization and Predictive Analysis for Smart Healthcare: Tool for a Hospital
2021 IEEE Region 10 Symposium (TENSYMP)
2021-2022 Dr. Preetha K. G. An Energy Efficient Intelligent Method for Sensor Node Selection to Improve the Data Reliability in Internet of Things Networks
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
2021-2022 Dr. Saritha S An Energy Efficient Intelligent Method for Sensor Node Selection to Improve the Data Reliability in Internet of Things Networks
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
2021-2022 Dr. Sminu Izudheen Introducing HPC and Related Technologies Education in a Higher Education Institute in India
Review of International Geographical Education
2021-2022 Dr. Tripti C An Enhancement for IEEE 802.11p to Provision Quality of Service with Context Aware Channel Access for the Forward Collision Avoidance Application in Vehicular Ad Hoc Network
Sensors
2021-2022 Mr. Paul Augustine A Comparison on Instance Segmentation Models
IEEE Xplore
2021-2022 Dr. Varghese Paul Strengthening Security of Images Using Dynamic S-Boxes for Cryptographic applications
Fourth International Conference onMicroelectronics, Signals & Systems
2021-2022 Dr. Varghese Paul Real Time Proximity Sensin Module for Social Distancing and Disease Spread Tracking
Smart Computing Techniques and Applications
2021-2022 Dr. Varghese Paul Context Based Searching in Cloud Data for Improved Precision of Search Results
2021-2022 Dr. Varghese Paul Impact of Optimized Value for Relative
2021-2022 Dr. Varghese Paul Enhancing Security in Digital Data using various Function of S-Box in Data Encryption Standard Method
2021-2022 Dr. Varghese Paul Towards Detecting Flooding DDOS Attacks Over Software Defined Networks Using Machine Learning Techniques
2021-2022 Dr. Renu Mary Daniel Comorbidity Based Risk Prediction System for ARDS in COVID-19 Patients
International Conference on Advanced Computer Control, ICACC
2021-2022 Ms. Sangeetha Jamal Performance study of various Text Classification Algorithms and its Applications: An Analysis
Intelligent Computing in Information Technology for Engineering System
2021-2022 Ms. Sangeetha Jamal Virtual Fitting Room using Augmented Reality Techniques
Intelligent Computing in Information Technology for Engineering System
2021-2022 Dr. Renu Mary Daniel A Provably Secure Identity Based Authenticated Key Agreement Protocol with Multiple PKG Compatibility for Inter-Vehicular Ad hoc Networks
Journal of Integrated Design and Process Science
2021-2022 Dr. Anita John A Novel Hash Function Based on Hybrid Cellular Automata and Sponge Functions
First Asian Symposium on Cellular Automata Technology
2021-2022 Dr. Varghese Paul Challenges, Security Mechanisms and Research Areas in IOT and IioT
2021-2022 Dr. Varghese Paul Decentralized Blockchain based Authentication for Secure Data Sharing in Cloud-IoT
2021-2022 Dr. Preetha K. G. 'Design and Implementation of an Augmented Reality Mobile Application for navigating ATM counters (AR-ATM)'
Industrial Robot: the international journal of robotics research and application
2021-2022 Dr. Varghese Paul An Effective Mechanism for the Secure Transmission of Medical Images using Compression and Public Key Encryption Mechanism
2020-2021 Ms. Sangeetha Jamal Practical Analysis of Representative Models in Classifier: A Review
AIDE-2019 International Conference On Artificial Intelligence and Data Engineering May 23-24, 2019
2020-2021 Ms. Anjusree V.K. Face Depth Estimation and 3D Reconstruction
Advanced Computing and Communication Technologies for High Performance Applications (ACCTHPA)
2020-2021 Ms. Anjusree V.K. Eye Movement Classification Using CNN
Advanced Computing and Communication Technologies for High Performance Applications (ACCTHPA)
2020-2021 Ms. Sreedevi T R Digital Twin in Smart Farming: A Categorical Literature Review And Exploring Possibilities in Hydroponics
IEEE International Conference on "Advanced Computing and Communication Technologies for High Perfomance Applications
2020-2021 Dr. Preetha K. G. Efficient Abandoned Luggage Detection in Complex Surveillance Videos
ICIDCA-2019
2020-2021 Dr. Preetha K. G. ANALYSE, REFINE, DEVELOP AND EVALUATE THE EFFICIENCY OF ROUTING ALGORITHMS IN MOBILE AD-HOC NETWORKS
Journal of Critical Reviews (Scopus)
2020-2021 Dr. Preetha K. G. An Effcient, Automatic Abandoned Luggage Detection using DenseNet for Intelligent Video Surveillance Systems
International Journal of Future Generation Communication and Networking (ESCI)
2020-2021 Dr. Tripti C An enhanced synchronized multi-channel MAC scheme to improve throughput in VANET
International Journal of Communication Networks and Information Security
2020-2021 Dr. Saritha S Video Enhancement and Low Resolution Facial Image Reconstruction for Crime Investigation
3rd International Conference on Intelligent Data Communication and IoT
2020-2021 Ms. Anu Maria Joykutty Cognitive Radio Networks: Recent Advances in Spectrum Sensing Techniques and Security
International conference on Smart Electronics and Communication 2020: (ICOSEC 2020)
2020-2021 Dr. Renu Mary Daniel An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries
Information and Computation, Elsevier
2020-2021 Dr. Jincy J. Fernandez Iris Recognition using Integer Wavelet Transform and Log Energy Entropy
COCONET-2020
2020-2021 Mr. Paul Augustine Journal named “Automatic Detection of Helmet and Non- Helmet Motorcycle” International Journal of Innovations in Engineering and Technology (IJIET)
INTERNATIONAL JOURNAL FOR INNOVATIONS IN ENGINEERING AND TECHNOLOGY.
2020-2021 Ms. Mehbooba P Shareef Audio Watermarking Schemes: A Comparative Analysis Audio watermarking schemes : A comparative analysis
International Journal of Engineering and Management SciencesWebsite: ijetms.in Issue:4, Volume No.4, July-2020 DOI: 10.46647/ijetms.2020.v04i04.009July 2020 DOI: 10.46647/ijetms.2020.v04i04.009
2020-2021 Dr. Anita John PENTAVIUM: Potent Trivium-Like Stream Cipher Using Higher Radii Cellular Automata.
The 14th International Conference and School Cellular Automata for Research and Industry. Univerity of Lodz, Poland
2020-2021 Ms. Anu Maria Joykutty Reinforcement Learning based Clustering Algorithm for Cognitive Wireless Sensor Networks
International Conference on Communication and Intelligent Systems - ICCIS 2020
2020-2021 Ms. Seema Safar Emotion Recognition-Based Mental Healthcare Chat-bots: A Survey
Elseveir: SSRN
2020-2021 Dr. Sminu Izudheen Intelligent Exploration of Negative Interaction from Protein-Protein Interaction Network and its Application in Healthcare
Psychology and Education Journal
2020-2021 Dr. Sminu Izudheen Short-Term Passenger Count Prediction for Metro Stations using LSTM Network
Turkish Journal of Computer and Mathematics Education
2020-2021 Dr. Saritha S A Fuzzy rule- based Abandoned Object Detection using Image Fusion for Intelligent Video Surveillance Systems
Turkish Journal of Computer and Mathematics Education
2020-2021 Dr. Preetha K. G. A Fuzzy rule- based Abandoned Object Detection using Image Fusion for Intelligent Video Surveillance Systems
Turkish Journal of Computer and Mathematics Education
2020-2021 Dr. Sminu Izudheen Graph centrality of BRCA1 in Protein-Protein Interaction network: An Overview
Turkish Journal of Computer and Mathematics Education
2020-2021 Ms. Anjusree V.K. Automatic Image Tagging In Autonomous Vehicles
International Journal of Research and Analytical Reviews
2020-2021 Ms. Anjusree V.K. A Review of IFM Free and IFM based methods for underwater Imaging
International Journal of Emerging Technologies in Engineering Research
2020-2021 Dr. Jincy J. Fernandez Fingerprint core point detection using Connected Component approach and Orientation map Edge Tracing approach
International Journal of Biometrics
2020-2021 Ms. Mehbooba P Shareef Recommendation Systems : A comparative analysis of Deep learning and classical approaches
8th International Conference on Smart computing and Communications
2020-2021 Dr. Anita John A Novel Hash Function Based on Hybrid Cellular Automata and Sponge Functions.
First Asian Symposium on Cellular Automata Technology. ASCAT 2022
2020-2021 Dr. Varghese Paul An Effective Mechanism for the Secure Transmission of Medical Images Using Compression and Public Key Encryption Mechanism
"Book:Smart Computing Techniques and Applications Pages:317-325 Publisher: Springer, Singapore"
2020-2021 Dr. Varghese Paul Real-Time Proximity Sensing Module for Social Distancing and Disease Spread Tracking
"Book:Smart Computing Techniques and Applications Pages:415-424 Publisher:Springer, Singapore"
2020-2021 Dr. Varghese Paul Towards Detecting Flooding DDOS Attacks Over Software Defined Networks Using Machine Learning Techniques
"Revista Geintec-Gestao Inovacao E Tecnologias Volume:11 Issue:4 Pages:3837-3865 "
2020-2021 Dr. Varghese Paul Decentralized blockchain based authentication for secure data sharing in Cloud-IoT
"Journal of Ambient Intelligence and Humanized Computing "
2020-2021 Dr. Varghese Paul A Highly Non-Linear And Robust Dynamic S-Box Forcryptographic Applications
"Journal:Palarch's Journal Of Archaeology Of Egypt/Egyptology Volume:17 Issue:7 Pages:5361-5373"
2020-2021 Dr. Varghese Paul Impact of Optimized Value for Relative Humidity at Cathode in PEMFC for Improved Stack Performance
"Book:Advances in Communication and Computational Technology Pages:1145-1151 Publisher:Springer, Singapore"
2020-2021 Dr. Varghese Paul Context Based Searching in Cloud Data for Improved Precision of Search Results
"Book:Proceedings of Research and Applications in Artificial Intelligence Pages:277-285 Publisher:Springer, Singapore"
2020-2021 Dr. Varghese Paul Strengthening Security of Images Using Dynamic S-Boxes for Cryptographic Applications
"Published in: 2021 Fourth International Conference on Microelectronics, Signals & Systems (ICMSS) Date of Conference: 18-19 Nov. 2021 INSPEC Accession Number: 21573218 "
2019-2020 Ms. Sangeetha Jamal Fuzzy Mapping Model For Classification In Supervised Learning
TENCON 2019,17-20 October, 2019
2019-2020 Ms. Mehbooba P Shareef Audio watermarking Schemes : A comparative Analysis
International Journal of Engineering Technology and Management Science
2019-2020 Mr. Harikrishnan M Survey on Different Music Recommendation Techniques
3rd International Conference on Advanced Scientific Innovation in Science, Engineering and Technology (ICASISET 2020)
2019-2020 Ms. Sangeetha Jamal Message Moderation Chatbot
3rd International Conference on Advanced Scientific innovation in Science Engineering and Technology-2020
2019-2020 Mr. Sandy Joseph Review on Securing Medical Big Data in Healthcare Cloud
2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)
2019-2020 Ms. Sangeetha Jamal Fuzzy Mapping Model For Classification In Supervised Learning,Angela Mathew and Sangeetha Jamal, Presented in TENCON 2019,17-20 October, 2019 ,Hotel Grand Hyatt, Kochi, Kerala
2019-2020 Ms. Meharban MS A computer vision based approach to detect fake images
International Journal of Imaging and Robotics
2019-2020 Dr. Preetha K. G. . Reduction of Overhead in Routing Protocols for MANET, Using Fuzzy Set Based Decision Making
International Journal of Virtual and Network Organizations, Inderscience - Scopus Indexed. 2019;21(1).
2019-2020 Dr. Preetha K. G. Efficient Abandoned Luggage Detection in Complex Surveillance Videos
Lecture Notes on Data Engineering and Communications Technologies- Springer
2019-2020 Ms. Sangeetha Jamal Practical Analysis of Representative Models in Classifier: A Review,Angela Mathew and Sangeetha Jamal,AIDE-2019 International Conference On Artificial Intelligence and Data Engineering May 23-24, 2019 N.M.A.M Institute Of Technology, Nitte, Karnataka, INDIA.
2019-2020 Dr. Sminu Izudheen An approach to optimize the link Predicted in Protein Networks using Minimum Strong Edge-Edge Domination Set
International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS’20)
2019-2020 Ms. Meharban MS IMAGE COLORIZATION USING DEEP LEARNING
JOURNAL/INTERNATIONAL JOURNAL OF IMAGING AND ROBOTICS
2019-2020 Ms. Meharban MS A review on image synthesis
conference
2019-2020 Ms. Meharban MS Automated Surveillance on Roads for Helmet Detection and Number plate Detection
Conference(Accepted)
2019-2020 Ms. Meharban MS A review on image captioning and speech synthesis
conference/IEEE
2019-2020 Ms. Meharban MS A review on text to face image synthesis
Conference
2019-2020 Ms. Meharban MS Image to text and Text to speech synthesis
Journal
2019-2020 Dr. Saritha S Change Detection in Urban Landscapes : A Tensor Factorization Approach.
Journal of Spatial Information Research
2019-2020 Dr. Sminu Izudheen Effect of community structures in protein–protein interaction network in cancer protein identification
Current Science, Published by Indian Academy of Sciences, SCI Indexed
2019-2020 Dr. Saritha S Change Analysis of Indian Metropolitan Cities through a Spatiotemporal Ontology.
International Conference on Data Science and Engineering
2019-2020 Ms. Meharban MS Generative Adversarial networks:Areview
Conference
2019-2020 Dr. Saritha S Mining spatial colocations from imageobjects: A tensor factorization approach,
Journal of Intelligent and Fuzzy Systems
2019-2020 Dr. Renu Mary Daniel An Efficient eCK Secure Certificateless Authenticated Key Agreement Scheme with Security Against Public Key Replacement Attacks
Journal of information security and applications
2019-2020 Ms. Anu Maria Joykutty A methodology for Short-term Electric Power Load Forecasting
International Conference on Advances in Computing and Communications 2019 (ICACC-2019)
2019-2020 Mr. Uday Babu P Cloud based Petrol Pump Blacklisting using IoT
International Journal of Advanced Trends in Computer Science and Engineering ( IJATCSE ), Volume 9, No. 1.3 (2020), SI (Special Issue), Scopus Indexed Journal, ISSN 2278 - 3091
2019-2020 Dr. Varghese Paul PVW: An Efficient Dynamic Symmetric Cipher to Enable End-to-End Secure Communication
In book: Artificial Intelligence and Evolutionary Computations in Engineering Systems (pp.329-338)
2019-2020 Dr. Varghese Paul A light weight encryption over big data in information stockpiling on cloud
"Indonesian Journal of Electrical Engineering and Computer Science 17(1):389 "
2019-2020 Dr. Varghese Paul A novel approach to big data analysis using deep belief network for the detection of android malware
"Indonesian Journal of Electrical Engineering and Computer Science 16(3):1447 "
2019-2020 Dr. Varghese Paul A Novel System Architecture for Secure Authentication and Data Sharing in Cloud Enabled Big Data Environment
"Journal of King Saud University - Computer and Information Sciences "
2019-2020 Dr. Varghese Paul Soft Set Theory-A Novel Soft Computing Tool for Data Mining
"International Journal of Applied Engineering Research Volume:15 Issue:11 Pages:1052-1058"
2019-2020 Dr. Varghese Paul Soft Set Based Approach For Mining Frequent Itemsets
"International Organization On'technical And Physical Problems Of Engineering' Volume:12 Issue:4 Pages:50-56 Scopus"
2019-2020 Dr. Varghese Paul Multi-Soft Set Based Approach for Rule based Classification Using Sequential Covering Algorithm
"2020 Advanced Computing and Communication Technologies for High Performance Applications (ACCTHPA) Pages 34-42 Publisher IEEE "
2018-2019 Dr. Preetha K. G. Fuzzy Decision-Based Reliable Link Prediction Routing in MANET Using Belief Propagation.
Second International Conference on Computational Intelligence and Informatics- Springer Publication- Scopus. 2018.
2018-2019 Ms. Jomina John Major Vulnerabilities and their prevention methods in cloud computing
Advances in Intelligent systems and computing
2018-2019 Dr. Jincy J. Fernandez Reversible Image Watermarking: A review
International Journal of Scientific research in Science, Engineering and Technology
2018-2019 Dr. Tripti C Data Anonymization for Privacy Preservation in Big Data
International Journal on Recent and Innovation Trends in Computing and Communication
2018-2019 Dr. Jincy J. Fernandez Breast cancer detection in mammogram using fuzzy c-means and random forest classifier
International Journal of Scientific research in Science, Engineering and Technology
2018-2019 Dr. Renu Mary Daniel A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography
Journal of King Saud University-Computer and Information Sciences
2018-2019 Dr. Renu Mary Daniel An Efficient Forward Secure Authenticated Encryption Scheme with Ciphertext Authentication Based on Two Hard Problems
Advances in Big Data and Cloud Computing
2018-2019 Dr. Anita John CARPenter:A Cellular Automata Based Resilient Pentavalent Stream Cipher.
Cellular Automata-13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy
2018-2019 Dr. Varghese Paul An Efficient Algorithm for Polyalphabetic Substitution using Random Tables
International Journal of Advanced Technology and Engineering Exploration 5.43 (2018): pp 124-133
2018-2019 Dr. Varghese Paul Intelligent Agents in Securing Internet
Journal of Internet Technology 19.3 (2018): pp 753-763.
2018-2019 Dr. Varghese Paul Automatic Segmentation and Classification in Cervical Cancer Images: Evaluation and Challenges
International Journal of Pure and Applied Mathematics, Scopus Indexed Vol. 119, No. 12,pp. 12549-12560.
2018-2019 Dr. Varghese Paul An Efficient Algorithm for Polyalphabetic Substitution using Infinite Number of Alphabetical Tables
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 4 (2018).
2018-2019 Dr. Varghese Paul Designing an intelligent controller for improving PEM fuel cell efficiency
"Asian Conference on Intelligent Information and Database Systems ACIIDS 2019: Intelligent Information and Database Systems: Recent Developments pp 387?395 "
2018-2019 Dr. Varghese Paul Content based image retrieval using deep learning process
"Journal:Cluster Computing Volume:22 Issue:2 Pages:4187-4200 Publisher:Springer US Impact Factor: 1.809 " "Journal:Cluster Computing Volume:22 Issue:2 Pages:4187-4200 Publisher:Springer US Impact Factor: 1.809 " "Journal:Cluster Computing Volume:22 Issue:2 Pages:4187-4200 Publisher:Springer US Impact Factor: 1.809 " "Journal:Cluster Computing Volume:22 Issue:2 Pages:4187-4200 Publisher:Springer US Impact Factor: 1.809 " "Journal:Cluster Computing Volume:22 Issue:2 Pages:4187-4200 Publisher:Springer US Impact Factor: 1.809 " "Journal:Cluster Computing Volume:22 Issue:2 Pages:4187-4200 Publisher:Springer US Impact Factor: 1.809 ""Journal:Cluster Computing Volume:22 Issue:2 Pages:4187-4200 Publisher:Springer US Impact Factor: 1.809 "
2018-2019 Dr. Varghese Paul Handsoff Delay Optimisation using Hybrid Prediction Model
International Journal of Networked and Distributed Computing,Vol 6, No.2, 2018.
2018-2019 Dr. Varghese Paul Reducing the Frequent Switch Over between the Base Stations through Continuous Analysis of Signal Strength
Asian Journal of Computer Science and Technology, ISSN:2249-0701 Vol.7 No.1, 2018, pp. 99-103
2018-2019 Dr. Varghese Paul Polyalphabetic Substitution Cipher Using Multiple Random Table
International Journal of Computer Sciences and Engineering, 6 (5), 2018.
2018-2019 Dr. Varghese Paul Abnormality Recognition and Feature Extraction in Female Pelvic Ultrasound Imaging
Informatics in Medicine Unlocked. Elsevier, Scopus Indexed, Vol. 13, pp. 133?138.
2018-2019 Dr. Varghese Paul Performance analysis of artificial intelligent controllers in PEM fuel cell voltage tracking
"Journal:Cluster Computing Volume:22 Issue:2 Pages:4443-4455 Publisher:Springer US"
2018-2019 Dr. Varghese Paul A novel optimized classifier for the loan repayment capability prediction system
"Conference 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC) Publisher:IEEE "
2018-2019 Dr. Varghese Paul Analysis of Novel Recommendation Engine Based on Simulated Annealing Based Clustering
"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC) 27-29 March 2019 2019 ISBN Information: "
2018-2019 Dr. Varghese Paul Mathematical modelling of polymer electrolyte membrane fuel cell and fuzzy-based intelligent controllers for performance enhancement
"Journal:Computers & Electrical Engineering Volume:77; Pages:354-365; Publisher:Pergamon "
2018-2019 Dr. Varghese Paul Secure brain-to-brain communication with edge computing for assisting post-stroke paralyzed patients
"Journal:IEEE Internet of Things Journal Volume:7 Issue:4; Pages:2531-2538"
2018-2019 Dr. Varghese Paul A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry 1?21
Symmetry 2019, 11(2), 293;
2018-2019 Dr. Varghese Paul An imperceptible spatial domain color image watermarking scheme
"Information Sciences Volume 31, Issue 1, January 2019, Pages 125-133 Impact Factor=6.795"
2018-2019 Dr. Varghese Paul Secure thought transfer and processing using novel-T algorithm
"BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY Volume:123 Pages:6-7 Publisher: WILEY"
2018-2019 Dr. Varghese Paul An efficient algorithm for polyalphabetic substitution using infinite number of alphabetical tables
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 4 (2018) Spl. ? Research India Publications. http://www.ripublication.com
2017-2018 Ms. Anu Maria Joykutty Automated Surveillance System for Infection Control
International Journal of Pure and Applied Mathematics
2017-2018 Ms. Sangeetha Jamal Named Entity Recognition in Sanskrit: A Survey, Joseph Mickole James and Sangeetha Jamal, Published in International journal of pure and applied mathematics June,2018(SCOPUS indexed)
2017-2018 Ms. Meharban MS Application of Content Based Image Retrieval
2017-2018 Mr. Harikrishnan M A Survey on Spoofing Detection Techniques using Biometrics
2017-2018 Dr. Jincy J. Fernandez A review on pre-processing with segmentation of medical images using image processing, National Conference on Advanced Computing and Communication
2017-2018 Ms. Asha Raj Techniques used in automatic emotion recognition from eeg signals: a review
2017-2018 Dr. Preetha K. G. Preetha, K. G., and A. Unnikrishnan. "Enhanced domination set based routing in mobile ad hoc networks with reliable nodes." Computers & Electrical Engineering 64 (2017): 595-604. SCIE
2017-2018 Dr. Preetha K. G. 4) Preetha K G, A Unnikrishnan, “Fuzzy Decision Based Reliable Link Prediction Routing in MANET Using Belief Propagation”, Accepted in ICCII 2017, Springer, Scopus.
2017-2018 Dr. Preetha K. G. 2) Preetha K G, A Unnikrishnan, “Reduction of Overhead in Routing Protocols for MANET, Using Fuzzy Set Based Decision Making”, Accepted in International Journal of Virtual and Network Organizations, Inderscience, Scopus
2017-2018 Dr. Preetha K. G. Preetha, K.G. and Unnikrishnan, A., 2017, July. Enhancing the performance of routing protocol in MANET by predicting the link availability through belief propagation. In IEEE Region 10 Symposium (TENSYMP), 2017 (pp. 1-4). IEEE.
2017-2018 Mr. Harikrishnan M Cheque Image Security Enhancement in Online Banking
2017-2018 Dr. Tripti C Tripti, C and Manoj, R (2017) "An asynchronous multi-channel MAC for improving channel utilization in VANET." In: International Conference on Advances in Computing & Communications, Kakkanad, Kochi, INDIA.
2017-2018 Mr. Harikrishnan M Biometric Authentication and Template Protection using Visual Cryptography and Watermarking
2017-2018 Dr. Jincy J. Fernandez A novel image theft identification using biometric feature, Asian Journal of Pharmaceutical and Clinical Research (Scopus indexed), April 2017
2017-2018 Ms. Meenu Mathew A review on identification of protein complexes in PPI
International Journal of Creative Research Thoughts,Vol 6,pg 909-913,April 2018.
2017-2018 Dr. Sivaram M “ Integer wavelet transform based approach for high robustness of audio signal transmission
2017-2018 Ms. Jomina John Major vulnerabilities and their prevention meth-ods in cloud computing
2017-2018 Dr. Jincy J. Fernandez Breast cncer detection in mammogram using fuzzy c-means and random forest classifier, International Journal of Scientific research in science, engineering and technology, Vol. 4. No. 8, pp. 312-321, May-June 2018
2017-2018 Dr. Jincy J. Fernandez Reversible Image Watermarking: A Review, International Journal of Scientific research in science, engineering and technology, Vol. 4. No. 4, pp. 738-746, March 2018
2017-2018 Dr. Saritha S An Incremental Boolean Tensor Factorization approach to model Change Patterns of Objects in Images
2017-2018 Ms. Meenu Mathew Distributed Document Clustering :A Review
51st International Conference on Latest Researches in Engineering, Science and Management,IOSRD
2017-2018 Dr. Saritha S Spatiotemporal Ontology for understanding semantics in Change Patterns of Remote Sensing Images
2017-2018 Dr. Saritha S Identifying the risk factors for Diabetic Retinopathy using Decision trees
2017-2018 Ms. Sangeetha Jamal Flowchart Plagiarism Detection System: An Image Processing Approach ,Jithin S Kuruvila, Midhun Lal V L, Rejin Roy, Tomin Baby, Sangeetha Jamal, Sherly K K,Published in ScienceDirect,Procedia Computer Science 115 (2017) 533–540
2017-2018 Dr. Sminu Izudheen Electricity Load Prediction Using Artificial Neural Network By Back Propagation
2017-2018 Dr. Saritha S Inter-Spectral and Intra-Spectral Features for Effective Classification of Remotely Sensed Images
2017-2018 Dr. Renu Mary Daniel Analysis of hierarchical identity based encryption schemes and its applicability to computing environments
Journal of information security and applications
2016-2017 Ms. Mehbooba P Shareef Tracking location of medicinal plants in dense forest using image processing : A comparative analysis. Journal of Emerging Technologies and innovative research. 2016.
2016-2017 Dr. Preetha K. G. Preetha KG, Anjana K P,Cooperative Judgement Based Intrusion detection system for Wireless Ad hoc Networks,National Symposium on Emerging Trends in Coputing and Informatics
2016-2017 Dr. Preetha K. G. Preetha KG, Jeeva Susan Jacob,A Network Selction scheme for 4G communication Systems Using Muti level Optimization Techniques, National Symposium on Emerging Trends in Coputing and Informatics
2016-2017 Ms. Diya Thomas Multi level Privacy Preserving in Medical Data Publishing,Seventh International Conference on Advances in Computing, Control, and Telecommunication Technologies - ACT 2016
2016-2017 Ms. Diya Thomas MEDICAL IMAGE PROTECTION IN CLOUD SYSTEM,INTERNATIONAL JOURNAL OF CURRENT ENGINEERING AND SCIENTIFIC RESEARCH (IJCESR),VOLUME-3, ISSUE-7, 2016
2016-2017 Dr. Jincy J. Fernandez A novel image theft identification using biometric feature
Special Issue: Advances in smart computing and bioinformatics, Asian Journal of Pharmaceutical and Clinical research
2016-2017 Ms. Sangeetha Jamal QUESTION ANSWERING SYSTEM WITH REPEATED QUESTION IDENTIFICATION. Maria Vijoy and Sangeetha Jamal. Published in International Journal of Advanced Research (2016), Volume 4, Issue 7,DOI:10.21474/IJAR01
2016-2017 Dr. Sminu Izudheen Identifying Negative Interactions in Protein-Protein Interaction Network Using Weak Edge-edge Domination Set
2016-2017 Dr. Preetha K. G. 3) Preetha K G, A Unnikrishnan, “Reduction of Overhead in Routing Protocols for MANET, Using Fuzzy Set Based Decision Making”, Accepted in International Journal of Virtual and Network Organizations, Inderscience, Scopus.
2016-2017 Dr. Preetha K. G. 6) Preetha K G, A Unnikrishnan, “Fuzzy Decision Based Reliable Link Prediction Routing in MANET Using Belief Propagation”, Accepted in ICCII 2017, Springer, Scopus
2016-2017 Dr. Saritha S Analysis of the Smart Growth of Kochi City through Landscape Metrics (Paper Accepted)
2016-2017 Dr. Preetha K. G. Preetha K G, A Unnikrishnan, “Enhanced Domination Set Based Routing in Mobile Ad hoc Networks with Reliable Nodes”, Journal of Computers and Electrical Engineering, Elsevier, SCIE
2016-2017 Dr. Preetha K. G. 5) Preetha K G, A Unnikrishnan, “Enhancing the Performance of Routing Protocol in MANET by Predicting the Link Availability Through Belief Propagation”, Accepted in IEEE TENSYMP 2017
2016-2017 Ms. Sangeetha Jamal Measuring Credibility of Online Information,Naziya C Najeeb and Sangeetha Jamal, Published in IJAR
2016-2017 Dr. Renu Mary Daniel Deriving Practical Applicability of Hierarchical Identity Based Encryption in Massively Multiplayer Online Role Playing Games
International Conference on Advances in Computing and Communications
2015-2016 Ms. Mehbooba P Shareef Encryption-Enhanced Reversible Watermarking for Medical Images via Prediction and RC4 Encryption. In: IEEE; 2015.
2015-2016 Ms. Mehbooba P Shareef Identity of user thrashing and privacy protection of fingerprints. In: ; 2015
2015-2016 Ms. Mehbooba P Shareef Shareef MMP, TV MD. Secure audio watermarking system using Empirical Mode Decomposition and Tinkerbell Chaotic Map. In: IEEE International Conference in Power, Instrumentation,Control and Computing - PICC 2015. Thrissur: IEEE; 2015.
2015-2016 Dr. Preetha K. G. Request Reply Detection Mechanism for Malicious MANETs, Published by Springer
2015-2016 Dr. Preetha K. G. A Novel Approach for Malicious Node Detection in MANET-Published by Springer
2015-2016 Dr. Tripti C A Novel Approach for Enhancing the Security of User Authentication in VANET Using Biometrics
2015-2016 Ms. Dincy Paul GMM clustering based segmentation and optic nervehead geometry detection from OCT nervehead images
2015 Global Conference on Communication Technologies (GCCT), Thuckalay
2015-2016 Ms. Anjusree V.K. Interactive Email System Based on Blink Detection
International Conference on Advances in Computing and Communications
2015-2016 Ms. Diya Thomas A Weighted Cluster Based Routing Protocol for MANET ,International Journal of Advanced Research in Computer Science & Software Engineering , Volume 5 Issue 11,2016
2015-2016 Dr. Sminu Izudheen Link Prediction in Protein Networks using Minimum Strong Edge-Edge Domination Set
2015-2016 Dr. Tripti C Authentication techniques in VANETs-A Survey
2015-2016 Ms. Jomina John ANALYSIS OF WORM ATTACKS DETECTION METHODS IN CLOUD COMPUTING
2015-2016 Ms. Archana Devi R Implementing Message Integrity in Mobile Phones (Android platform) Using Identity Based Encryption
2015-2016 Ms. Archana Devi R Ensuring Image Integrity in Android
2015-2016 Ms. Archana Devi R Visual Cryptographic Schemes for Secure Image Sharing
2015-2016 Ms. Diya Thomas 1. Aswathy P Sreevatsan , Diya Thomas,” An Optimal Weighted Cluster Based Routing Protocol For Manet”, International Conference on Data Mining and Advanced Computing ,IEEE,March,2016
2015-2016 Ms. Archana Devi R A Comparative Study on Sentiment Analysis for Jallikattu Protest
2015-2016 Ms. Sangeetha Jamal A Survey on Mining User Opinion from Texts and Emoticons,Authored by Nasiya Najeeb , Sangeetha Jamal ,International Journal of Scientific & Engineering Research, Volume 6, Issue 10, October-2015
2015-2016 Dr. Saritha S Data Mining - What, Why and Where?
CSI Communications,
2014-2015 Ms. Mehbooba P Shareef Efficient registration via fingerprints combination.2014 International Conference on Communication and Signal Processing 2014.
2014-2015 Ms. Gopika S. Published a paper " Combining chain code, Invariant Moments and Density for offline Signature Verificcation " in International Conference on Parallel Distributed and Grid Computing (PDGC-2014) held at Jaypee University of Information technology, Delhi in \
2014-2015 Ms. Jomina John SECURE DATA DISSEMINATION PROTOCOL IN WIRELESS SENSOR NETWORKS USING XOR NETWORK CODING
2014-2015 Dr. Tripti C SURVEY ON SECURITY CHALLENGES IN WARNING MESSAGE DISSEMINATION AND POSSIBLE SOLUTIONS
2014-2015 Ms. Anjusree V.K. Particle Based Automated Iris Tracking and Blink Detection Engineering(IJARSE)
International Journal of Advance Research in Science and
2014-2015 Dr. Tripti C Distributed Priority based channel access using road structure for VANET (DPBCA)
2014-2015 Dr. Tripti C A Novel Approach for Enhancing the Security of User Authentication in VANET Using Biometrics
2014-2015 Dr. Saritha S Classification based land use/land cover Change Detection through Landsat Images (Proceedings in IEEEXplore)
2014-2015 Ms. Diya Thomas A Survey on Weighted Clustering Techniques in MANETS, ICETEM2014
2014-2015 Ms. Gopika S. International Conference on Information and Communication Technologies (ICICT 2014) - "Online and Offline Signature Verification: A Combined Approach".
2014-2015 Dr. Saritha S A Hierarchical framework for the Classification of Multispectral Imagery (Proceedings in Elsevier)
2014-2015 Ms. Gopika S. "Gradient and Projection Based Feature for Offline Signature Verification" published in The International Conference on Information Science 2014 (ICIS'14) is organized by the Department of Computer Science & Engineering, College of Engineering Cherthala
2014-2015 Ms. Sangeetha Jamal OPEN DOMAIN QUESTION ANSWERING SYSTEM USING SEMANTIC ROLE LABELING, Sreelekhshmi V, Sangeetha Jamal. In: International Conference on Information and Communication Technologies. Vol. 03. 15th ed. IJRET: International Journal of Research in Engineering and Technology ; 2014. p. 104-107.
2014-2015 Ms. Sangeetha Jamal An Improved SRL based Plagiarism Detection Technique using Sentence Ranking, Merin Paul, Sangeetha Jamal. In: International Conference on Information and Communication Technologies, 2014. Published in Elsevier Procedia Computer Science Published by Science Direct, 2015
2014-2015 Ms. Jomina John Confidential Se-Drip:A Secure Data Discovery and Dissemination Protocol for Wireless Sensor Networks
2014-2015 Dr. Tripti C Enhancing the key pre-distribution on wireless sensor networks by reducing storage overhead
2014-2015 Ms. Diya Thomas Enhanced Method for Noise Identification in Datasets, ICACC 2014
2014-2015 Ms. Elizabeth Isaac A novel source routing technique for mesh NoCs
2014-2015 Ms. Diya Thomas A SURVEY ON WEIGHTED CLUSTERING TECHNIQUES IN MANETS,IJCET
2014-2015 Dr. Preetha K. G. Improving the Routing Performance of Mobile Ad hoc Networks Using Domination Set, Published in ICICT, CUSAT, Paper published by Elsiever
2014-2015 Dr. Preetha K. G. A Novel Algorithm for Traffic Reduction in Wireless Sensor Network , Published in First International Conference on Computational Systems and Communications (ICCSC), 2014-Paper Published in IEEE explorer
2014-2015 Ms. Diya Thomas A Survey On Different Noise Identification Techniques In Datasets, NCRTKM-2014
2014-2015 Dr. Anita John Merin Silvi, Anita John: A Short Survey On Image Steganography Techniques in Spatial Domain, Proceedings of the National Conference on Information Security and Network Engineering-(NCISN)
2014-2015 Ms. Elizabeth Isaac Distance Routing on Mesh Network on Chip
2014-2015 Mr. Santhosh K. M. Probability theory based approach for detecting DDoS Attack (Paper accepted in IJCSIT)
2014-2015 Ms. Jomina John Data Dissemination Protocols in Wireless Sensor Networks - a Survey
2014-2015 Ms. Jomina John A Review on Secure Data Dissemination Protocols in Wireless Sensor Networks
2014-2015 Ms. Jomina John Techniques to achieve Data Security During Communication in Networked Critical Infrastructures – A Survey
2014-2015 Dr. Preetha K. G. protocol based classification in hybrid network intrusion detection systems, Published in National Conference on Technological Advancements in Engineering
2014-2015 Ms. Diya Thomas Secure Anonymous Energy Efficient Optimal Routing Protocol for MANET
2014-2015 Dr. Saritha S Junction Based on-Demand Routing Protocol for VANETS (IJERT)
2013-2014 Ms. Mehbooba P Shareef A data concealing method characterised by DNA coding. International Journal of Engineering Research & Technology . 2013.
2013-2014 Dr. John Jose Implementation and Analysis of History Based Output Channel Selection Strategies for Adaptive Routers in Mesh NoCs, accepted for publication in ACM Transactions on Design Automation of Electronic Systems (ACM-TODAES)
2013-2014 Ms. Mintu Philip Comparative Analysis of Similarity Measures in Document Clustering, IEEE
2013-2014 Dr. Jincy J. Fernandez SURVEY ON VARIOUS TECHNIQUES IN REGION BASED FOREGROUND DETECTION
2013-2014 Mr. Paul Augustine An Exploratory Survey on Various Face Recognition Methods Using Component Analysis
2013-2014 Dr. Renu Mary Daniel Launch Time Application Security: The Trusted Approach
International Journal of Science and Research
2013-2014 Dr. Renu Mary Daniel Towards a Trust Envisioned Cyber Security
International Journal of Innovation and Applied Studies
2013-2014 Ms. Jomina John Confidential Se-Drip:A Secure Data Discovery and Dissemination Protocol for Wireless Sensor Networks
2013-2014 Dr. Renu Mary Daniel A Trusted Integrity Verification Architecture for Commodity Computers
International Journal of Computer Applications Technology and Research
2013-2014 Ms. Elizabeth Isaac A Novel Energy Efficient Source Routing for Mesh NoCs
2013-2014 Ms. Diya Thomas A Survey On Different Noise Identification Techniques In Datasets ,NCRTKM-2014
2013-2014 Ms. Diya Thomas Enhanced Method for Noise Identification in Datasets,ICACC2014.
2013-2014 Ms. Mintu Philip A Pragmatic Approach to Develop Computational Thinking Skills in Novices in Computing Education, IEEE
2013-2014 Dr. Tripti C Eliza MG, Tripti C. A Comparison between Contrast Limited Adaptive Histogram Equalization and Gabor Filter Sclera Blood Vessel Enhancement Techniques. International Journal of Soft Computing and Engineering (IJSCE). 2013;ISSN: 2231-2307, Volume-3(Issue-4, September 2013):22-25.
2013-2014 Mr. Paul Augustine Face Recognition : A Comparative Study of Principal Component Analysis and Difference Component Analysis
2013-2014 Dr. John Jose Minimally Bufferred Single-Cycle Deflection Router for Mesh NoCs. In proceedings of IEEE/ACM International Conference on Design, Automation & Test in Europe (DATE-14). Dresden, Germany, March 2014.
2013-2014 Ms. Jomina John A review on secure data dissemination protocols in wireless sensor networks
2013-2014 Ms. Sangeetha Jamal Survey Paper- Question Answering Systems
2013-2014 Ms. Sangeetha Jamal A survey on Plagiarism Detection In Text Documents
2013-2014 Dr. Tripti C Lidiya Ross George M, Tripti. C, "A Survey On Flooding Attack Prevention Methods In MANET-",National Conference on Information Security and Network Engineering (NCISN) 2014, 26-27 March, 2014.
2013-2014 Dr. John Jose WeDBless : Weighted Deflection Bufferless Router for Mesh NoCs. In proceedings of 24th IEEE International Great Lakes Symposium on Very Large Sclae Integration (GLSVLSI-2014). Houston, Texas, USA, May 2014.
2013-2014 Dr. Tripti C Remya Krishnan P,Tripti C, "Authentication techniques in VANETs-A Survey", International Journal of Advanced Research in Computer Science, 28-29 March 2014
2013-2014 Dr. Tripti C Manoj R, Tripti C, Y.Md.Riyazuddin, G.Victor Daniel, "Enhancing the Key Pre-distribution on Wireless Sensor Networks by Reducing Storage Overhead",International Journal of Advanced Research in Computer Science, 28-29 March 2014.
2013-2014 Ms. Mintu Philip Feature Based Image Manipulation, IEEE
2013-2014 Dr. Tripti C Shamna P, Tripti C, Paul A. FACE RECOGNITION : A COMPARATIVE STUDY OF PRINCIPAL COMPONENT ANALYSIS AND DIFFERENCE COMPONENT ANALYSIS. International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) . 2013;(August-31, 2013):275-282.
2013-2014 Dr. John Jose Congestion Management in adaptive NoC routers using cost-effective selection strategies. In proceedings of Student Research Symposium at IEEE International Conference on High Performance Computing (HiPC-SRS), Bangalore, Dec-2013.
2013-2014 Dr. John Jose Minimally buffered deflection NoC router with dual point injection. In proceedings of Student Research Symposium at IEEE International Conference on High Performance Computing (HiPC-SRS), Bangalore, Dec-2013. (Best Paper award)
2013-2014 Ms. Jomina John Data Dissemination Protocols in Wireless Sensor Networks - a Survey
2013-2014 Dr. John Jose SLIDER: Smart Late Injection DEflection Router for Mesh NoCs. In: Proceedings of 31st IEEE International Conference on Computer Design (ICCD 2013). Asheville, North Carolina, USA., Oct 2013. p. 377-383.
2013-2014 Ms. Sangeetha Jamal Fuzzy Rule Based Data Forwarding for Energy Efficient Wireless Sensor Networks in Industrial Control System.
2013-2014 Mr. Santhosh K. M. Defending DDoS Attack using Stochastic Model based Puzzle Controller
2013-2014 Ms. Jisha Mary Jose Confidential Se-Drip:A Secure Data Discovery and Dissemination protocol for Wireless Sensor Networks
National Conference on New Trends in Electronics, Computing and Communication (NTECC-2014)
2013-2014 Mr. Paul Augustine A novel Algorithm for Image Compression and Pattern Matching
ICACC/ICECCS workshops
2013-2014 Mr. Paul Augustine DCA: An Approach for Face Recognition through Component Analysis
ICACC/ICECCS workshops
2013-2014 Dr. Tripti C Shamna P, Tripti C, Paul A. A novel Algorithm for Image Compression and Pattern Matching. International Conference on Advances in Computing and Communications (ICACC) 2013.
2013-2014 Ms. Gopika S. Feature based Image Manipulation
2013-2014 Dr. Preetha K. G. Demand based data replication in MANET, Proceedings of the third international conference on Advances in Computing & Communications 2013, August. Published by IEEE
2013-2014 Dr. Preetha K. G. “ Enhancedbeaconless routing mechanism in VANET, ICACCI, Mysore, August 2013, Publisher is IEEE
2013-2014 Dr. Preetha K. G. A Cluster Based Leader Election Algorithm for MANETs, Presented in ICCC 2013, TVM, 13 to 15 December 2013, Publisher is IEEE
2013-2014 Ms. Jisha Mary Jose Secure data dissemination protocol in wireless sensor networks using XOR Network Coding
International Journal of Research in Engineering & Technology
2013-2014 Mr. Jayarajan J. N. ISSN: 2278 – 1323 : Survey on Playlist Generation Techniques
2013-2014 Dr. Preetha K. G. Enhanced Data Replication based on Demand to Improve Data Availability in MANETs”, published in International Journal of Recent Development in Engineering and Technology Website: www.ijrdet.com (ISSN 2347 - 6435 (Online) Volume 2, Issue 2, February 2014)
2013-2014 Dr. Preetha K. G. “Social-aware Context Based Approach for Forwarding Data in Wireless Network Comprising of Selfish Individuals” Published in IJCSET Journal, Volume 4, Issue 7, July 2013
2013-2014 Dr. Preetha K. G. A novel Approach to find the alternate path for route maintenance in AODV ” Published in IJCSET Journal, Volume 4, Issue 7, July 2013
2013-2014 Ms. Deepa John Rules Extraction in XML using Correlation
2013-2014 Dr. Preetha K. G. “An Effective Path Protection Method to Attain the Route Stability in MANET”, published in the International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 6, June 2013
2013-2014 Dr. Tripti C Balakrishnan, Salini; Tripti, C.; Cyriac, Robin, "SURVEY ON SECURITY CHALLENGES IN WARNING MESSAGE DISSEMINATION AND POSSIBLE SOLUTIONS", Asian Journal of Computer Science & Information Technology;Mar2014, Vol. 4 Issue 3, Pp28.
2013-2014 Ms. Jisha Mary Jose Data Dissemination Protocols in Wireless Sensor Networks-a Survey
International Journal of Advanced Research in Computer and Communication Engineering
2013-2014 Ms. Jisha Mary Jose A Review on secure data dissemination protocols in wireless sensor networks
International Journal of Computer Technology and Applications
2013-2014 Ms. Jisha Mary Jose Techniques to achieve data security during communication in networked critical infrastructures- A Survey
National Conference on Computing and Communication(NCCC-2014)
2013-2014 Ms. Gopika S. Static and Dynamic Hand Geature Recognition
2013-2014 Ms. Jisha Mary Jose Security issues during data dissemination in wireless sensor networks
International Journal of Advanced Research Trends in Engineering & Technology (IJARTET-2015)
2013-2014 Dr. Tripti C Shamna P, Tripti C, Paul A. DCA: An Approach for Face Recognition through Component Analysis. International Conference on Advances in Computing and Communications (ICACC) 2013.
2013-2014 Dr. Tripti C Shamna P, Paul A, Tripti C. An Exploratory Survey on Various Face Recognition Methods Using Component Analysis. International Journal of Advanced Research in Computer and Communication Engineering. 2013;2(5).
2013-2014 Ms. Archana Devi R Traffic Prediction through Live GPS Data
International Journal of Software and Web Sciences (IJSWS) (controlled by International Association of Scientific Innovation and Research (IASIR))
2013-2014 Dr. Saritha S CRM- Cluster Based Replica Allocation over MANET
2013-2014 Dr. Saritha S Survey on various IP Spoofing Detection Techniques
2013-2014 Dr. Saritha S A survey on evaluation schemes for routing behaviours in MANET
2013-2014 Dr. Anita John Expository Study on Sybil attack counter measures in VANET”
2012-2013 Ms. Diya Thomas Location Dependent Query Processing in Mobile Environment. In: International Conference on Advances in Computing and Communication. Vol. 1. RSET; 2012
2012-2013 Ms. Diya Thomas A Categorized Survey on Buffer Overflow Countermeasures . International Journal of Advanced Research in Computer and Communication Engineering. 2013
2012-2013 Ms. Diya Thomas An Enhanced method for privacy preservation in data publishing . In: International Conference on Computing, Communication and Networking Technologies. Vivekanadha College of Engineering for Women: IEEE; 2013.
2012-2013 Ms. Diya Thomas A Survey on Privacy Preservation in Data Publishing. International Journal of Computer Science & Engineering Technology. 2013;4(5)
2012-2013 Mr. Paul Augustine A Survey on Various PCA Techniques for Face Recognition
ICACC/ICECCS workshops
2012-2013 Mr. Paul Augustine An Exploratory Survey on Various Face Recognition Methods Using Component Analysis
Journal
2012-2013 Dr. Anita John Survey on data mining techniques to enhance intrusion detection
2012 International Conference on Computer Communication and Informatics
2012-2013 Dr. Anita John Improving Lifetime of Structured Deployed Wireless Sensor Network Using Sleepy Algorithm
International Conference on Eco-friendly Computing and Communication Systems
2012-2013 Dr. Anita John Host based attack detection using system calls
Second International Conference on Computational Science, Engineering and Information Technology (CCSEIT '12).
2011-2012 Dr. Anita John A host based kernel level rootkit detection mechanism using clustering technique.
International Conference on Computational Science, Engineering and Information Technology
2011-2012 Dr. Anita John Rootkit detection mechanism: A survey
International Conference on Parallel Distributed Computing Technologies and Applications, pp. 366-374. Springer, Berlin, Heidelberg, 2011.