Year | Name of Faculty | Title of the Paper-Conference/Journal Details |
2024-2025 | Dr. Preetha K. G. | Enhancing Traffic Control Strategies through Dynamic Simulation and Reinforcement Learning Applied Artificial Intelligence and Computing (ICAAIC) |
2024-2025 | Dr. Preetha K. G. | Dynamic Landslide Prediction, Monitoring, and Early Warning with Explainable AI: A Comprehensive Approach Applied Artificial Intelligence and Computing (ICAAIC |
2024-2025 | Ms. Sangeetha Jamal | QGen: Automated Question Paper Generator 2024 5th International Conference on Innovative Trends in Information Technology (ICITIIT), IEEE Xplore conference proceedings |
2024-2025 | Dr. Preetha K. G. | Interactive Chatbot with AI Support for Universities: Enhancing Student Engagement and Administrative Efficiency Intelligent Systems Design and Applications |
2024-2025 | Ms. Jomina John | Trust value evaluation of cloud service providers using fuzzy inference based analytical process Scientific Reports( Q1 journal) |
2024-2025 | Dr. Preetha K. G. | An Energy Efficiency Optimization for Uplink Communication in IEEE 802.11ah Under Restricted Access Window Wireless Personal Communications |
2024-2025 | Ms. Jomina John | Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculation Journal of cloud computing |
2024-2025 | Dr. Preetha K. G. | An interactive visualization tool for the exploration and analysis of multivariate ocean data Indonesian Journal of Electrical Engineering and Computer Science |
2024-2025 | Dr. Anita John | Exploring Diverse Configurations of Cellular Automata Based S-Boxes Using Reinforcement Learning International Conference on Cellular Automata for Research and Industry |
2023-2024 | Dr. Anita John | Hash Function Design Based on Hybrid Five Neighbourhood Cellular Automata and Sponge Functions Complex Systems |
2023-2024 | Dr. Sminu Izudheen | IoT Based Smart Parking System International Conference on Control Communication & Computing India (ICCC) |
2023-2024 | Dr. Preetha K. G. | An Intelligent Pattern Matching approach with Deep
Hypersphere Model for Secure Big Data Storage in
Cloud Environment International Journal of Computer Information Systems and Industrial Management Applications. |
2023-2024 | Dr. Preetha K. G. | A Python Framework for Interactive 3D Visualization of Ocean Data International Conference on Soft Computing and Signal Processing |
2023-2024 | Ms. Sangeetha Jamal | A Novel Framework for Real-Time Fire Detection in CCTV Videos Using a Hybrid Approach of Motion-Flicker Detection, Colour Detection and YOLOv7 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) 19-21 July 2023 |
2023-2024 | Dr. Jisha G. | Analysing the geographical impact on short-term solar irradiance forecasting using univariate and multivariate time series models Energy Sources, Part A: Recovery, Utilization, and Environmental Effects |
2023-2024 | Dr. Preetha K. G. | A Python-based Tool for the Generation of T-S Plot to Determine Water Masses in the World Ocean 2023 Global Conference on Information Technologies and Communications (GCITC) has been posted to the IEEE Xplore digital library effective 2024-04-18. |
2023-2024 | Ms. Jomina John | Vulnerability scanning and analysis tool International conference on smart computing and communications |
2023-2024 | Dr. Jisha G. | SExpSMA-based T5: Serial exponential-slime mould algorithm based T5 model for question answer and distractor generation Intelligent Decision Technologies |
2023-2024 | Ms. Sangeetha Jamal | QGEN: Automated Question Paper Generator to be published |
2023-2024 | Ms. Anu Maria Joykutty | Applications of Clustering in Cognitive Radio Networks International Conference on Recent Trends in Communication Engineering and Network Technologies (CENT 2023) |
2023-2024 | Ms. Mehbooba P Shareef | FESSARec: Explaining Course Recommendations using Fuzzy Expert System and Self-Attention International Journal of Data Analysis Techniques and Strategies |
2023-2024 | Dr. Jincy J. Fernandez | Protection of online images against theft using robust multimodal biometric watermarking and T-Norms Multimedia Tools and Applications |
2023-2024 | Ms. Jomina John | A comprehensive survey of malware detection approaches in cloud computing environments International Journal of Engineering Research in Computer Science and Engineering (IJERCSE) |
2023-2024 | Dr. Sminu Izudheen | Fractal dimension of protein–protein interactions: a tool for cancer protein identification Current Science |
2022-2023 | Dr. Anita John | A Cellular Automata Based Fault Resistant MICKEY-Like Stream Cipher 15th International Conference on Cellular Automata for Research and Industry, ACRI 2022, Geneva, Switzerland |
2022-2023 | Dr. Anita John | Fault Resistant Trivium-like Stream Cipher Using Higher Radii Cellular Automata.
Journal of Cellular Automata |
2022-2023 | Ms. Sangeetha Jamal | Concatenated Xception-ResNet50 - A novel hybrid approach for accurate skin cancer prediction Computers in Biology and Medicine |
2022-2023 | Dr. Jincy J. Fernandez | Augmenting the detection of online image theft using
diagonal transformation and iris biometric
watermarking Int. J. Information and Computer Security, |
2022-2023 | Dr. Preetha K. G. | DeepPRS: A Deep Learning Integrated Pattern
Recognition Methodology for Secure Data
in Cloud Environment Innovations in Bio-Inspired Computing and Applications: Proceedings of the 13th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2022) |
2022-2023 | Dr. Preetha K. G. | Price Forecasting on a Large Scale Data
Set using Time Series and Neural Network
Models KSII Transactions on Internet and Information Systems |
2022-2023 | Ms. Jisha Mary Jose | A Survey on Consensus Algorithms in Blockchain Based on Post Quantum Cryptosystems 5th International Conference on Computational Intelligence and Networks (CINE), 2022 |
2022-2023 | Ms. Amitha Mathew | Finger Vein image labelling using hybrid algorithm International Conference on Emerging Trends in Industry 4.0 and Sustainable Concepts |
2022-2023 | Dr. Jincy J. Fernandez | Real-time sign language recognition and speech conversion using VGG16 International Journal of Computational Vision and Robotics |
2022-2023 | Dr. Jisha G. | Solar Irradiance Prediction using Deep Learning-Based Approaches Conference |
2022-2023 | Dr. Mary Priya Sebastian | Malayalam Natural Language Processing: Challenges in Building a Phrase-Based Statistical Machine Translation System ACM Transactions on Asian and Low-Resource Language Information Processing |
2022-2023 | Dr. Preetha K. G. | SPOTLIGHT: A Mobile Application for Artist Management Mathematical Statistician and Engineering Applications |
2022-2023 | Mr. Paul Augustine | VIRTUAL CLOTH TRY-ON SYSTEM Proceedings of ARSSS International Conference |
2022-2023 | Ms. Meenu Mathew | Weighted Pooling RoBERTa for Effective Text Emotion Detection 2023 IEEE 8th International Conference for Convergence in Technology (I2CT) |
2022-2023 | Ms. Sangeetha Jamal | Hybrid Model to Detect Pneumothorax Using Double U-Net with Segmental Approach Intelligent Systems Design and Applications- 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022 - Volume 3 |
2022-2023 | Dr. Uma Narayanan | A Novel and Dynamic S-Box for Improving the Security of Audio and Video for Various Crypto - Applications International Journal of Intelligent Systems and Applications in Engineering |
2022-2023 | Dr. Jincy J. Fernandez | Biometric watermarking: an application-based review International Journal of Information Privacy, Security and Integrity |
2022-2023 | Dr. Jisha G. | Time series prediction of personalized insulin dosage for type 2 diabetics Indonesian Journal of Electrical Engineering and Computer Science |
2022-2023 | Ms. Seema Safar | A Comparative Analysis of Image Captioning Techniques 2023 4th International Conference for Emerging Technology (INCET) |
2022-2023 | Dr. Renu Mary Daniel | Astrengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption Information and Computation, Elsevier |
2022-2023 | Ms. Seema Safar |
Enriching Transformer using Fourier Transform for Image Captioning 2023 3rd International Conference on Intelligent Technologies (CONIT) |
2021-2022 | Ms. Liya Joseph | • Detection of Rooftop Regions in Rural Areas Using Support Vector Machine International Journal of Scientific Research Engineering & Technology |
2021-2022 | Dr. Uma Narayanan | A novel approach to big data analysis using deep belief network for the detection of android malware Indonesian Journal of Electrical Engineering and Computer Science |
2021-2022 | Dr. Uma Narayanan | A Light Weight Encryption Over Big Data In Information Stockpiling On Cloud Indonesian Journal of Electrical Engineering and Computer Science |
2021-2022 | Dr. Uma Narayanan | A Novel System Architecture for Secure Authentication and Data Sharing in Cloud enabled Big Data Environment Journal of King Saud University - Computer and Information Sciences |
2021-2022 | Dr. Uma Narayanan | Decentralized blockchain based authentication for secure data sharing in Cloud-IoT Journal of Ambient Intelligence and Humanized Computing (JAIHC) |
2021-2022 | Ms. Sangeetha Jamal | Survey and Analysis on AI Based Phishing Detection Techniques 2021 International Conference on Communication, Control and Information Sciences (ICCISc) |
2021-2022 | Ms. Anu Maria Joykutty | Data Visualization and Predictive Analysis for Smart Healthcare: Tool for a Hospital 2021 IEEE Region 10 Symposium (TENSYMP) |
2021-2022 | Dr. Preetha K. G. | An Energy Efficient Intelligent Method for Sensor Node Selection to Improve the Data Reliability in Internet of Things Networks KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS |
2021-2022 | Dr. Sminu Izudheen | Introducing HPC and Related Technologies Education in a Higher Education Institute in India Review of International Geographical Education |
2021-2022 | Dr. Tripti C | An Enhancement for IEEE 802.11p to Provision Quality of Service with Context Aware Channel Access for the Forward Collision Avoidance Application in Vehicular Ad Hoc Network Sensors |
2021-2022 | Mr. Paul Augustine | A Comparison on Instance Segmentation Models IEEE Xplore |
2021-2022 | Dr. Varghese Paul | Strengthening Security of Images Using Dynamic S-Boxes for Cryptographic applications Fourth International Conference onMicroelectronics, Signals & Systems |
2021-2022 | Dr. Varghese Paul | Real Time Proximity Sensin Module for Social Distancing and Disease Spread Tracking Smart Computing Techniques and Applications |
2021-2022 | Dr. Varghese Paul | Context Based Searching in Cloud Data for Improved Precision of Search Results |
2021-2022 | Dr. Varghese Paul | Impact of Optimized Value for Relative |
2021-2022 | Dr. Varghese Paul | Enhancing Security in Digital Data using various Function of S-Box in Data Encryption Standard Method |
2021-2022 | Dr. Varghese Paul | Towards Detecting Flooding DDOS Attacks Over Software Defined Networks Using Machine Learning Techniques |
2021-2022 | Dr. Renu Mary Daniel | Comorbidity Based Risk Prediction System for ARDS in COVID-19 Patients International Conference on Advanced Computer Control, ICACC |
2021-2022 | Ms. Amitha Mathew | E-Quarantine: Remote Real Time Monitoring of COVID-19 patients ICACC 2021 |
2021-2022 | Ms. Amitha Mathew | Deep learning network architecture using evolutionary algorithms
International Conference on “Artificial Intelligence – Multidisciplinary Perspectives on Emerging Challenges, Research and Opportunities (ICAI-2022) |
2021-2022 | Ms. Sangeetha Jamal | Performance study of various Text Classification Algorithms and its Applications: An Analysis Intelligent Computing in Information Technology for Engineering System |
2021-2022 | Ms. Sangeetha Jamal | Virtual Fitting Room using Augmented Reality Techniques Intelligent Computing in Information Technology for Engineering System |
2021-2022 | Dr. Renu Mary Daniel | A Provably Secure Identity Based Authenticated Key Agreement Protocol with Multiple PKG Compatibility for Inter-Vehicular Ad hoc Networks Journal of Integrated Design and Process Science |
2021-2022 | Dr. Anita John | A Novel Hash Function Based on Hybrid Cellular Automata and Sponge Functions First Asian Symposium on Cellular Automata Technology |
2021-2022 | Dr. Varghese Paul | Challenges, Security Mechanisms and Research Areas in IOT and IioT |
2021-2022 | Dr. Varghese Paul | Decentralized Blockchain based Authentication for Secure Data Sharing in Cloud-IoT |
2021-2022 | Dr. Preetha K. G. | 'Design and Implementation of an Augmented Reality Mobile Application for navigating ATM counters (AR-ATM)' Industrial Robot: the international journal of robotics research and application |
2021-2022 | Dr. Varghese Paul | An Effective Mechanism for the Secure Transmission of Medical Images using Compression and Public Key Encryption Mechanism |
2020-2021 | Ms. Sangeetha Jamal | Practical Analysis of Representative Models in Classifier: A Review AIDE-2019 International Conference On Artificial Intelligence and Data Engineering May 23-24, 2019 |
2020-2021 | Ms. Anjusree V.K. | Face Depth Estimation and 3D Reconstruction Advanced Computing and Communication Technologies for High Performance Applications (ACCTHPA) |
2020-2021 | Ms. Anjusree V.K. | Eye Movement Classification Using CNN Advanced Computing and Communication Technologies for High Performance Applications (ACCTHPA) |
2020-2021 | Ms. Sreedevi T R | Digital Twin in Smart Farming: A Categorical Literature Review And Exploring Possibilities in Hydroponics IEEE International Conference on "Advanced Computing and Communication Technologies for High Perfomance Applications |
2020-2021 | Dr. Preetha K. G. | Efficient Abandoned Luggage Detection in Complex
Surveillance Videos ICIDCA-2019 |
2020-2021 | Dr. Preetha K. G. | ANALYSE, REFINE, DEVELOP AND EVALUATE THE EFFICIENCY OF ROUTING ALGORITHMS IN MOBILE AD-HOC NETWORKS Journal of Critical Reviews (Scopus) |
2020-2021 | Dr. Preetha K. G. | An Effcient, Automatic Abandoned Luggage Detection using DenseNet for Intelligent Video Surveillance Systems International Journal of Future Generation Communication and Networking (ESCI) |
2020-2021 | Dr. Tripti C | An enhanced synchronized multi-channel MAC scheme to improve throughput in VANET International Journal of Communication Networks and Information Security |
2020-2021 | Ms. Anu Maria Joykutty | Cognitive Radio Networks: Recent Advances in Spectrum Sensing Techniques and Security International conference on Smart Electronics and Communication 2020: (ICOSEC 2020) |
2020-2021 | Dr. Renu Mary Daniel | An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries Information and Computation, Elsevier |
2020-2021 | Dr. Jincy J. Fernandez | Iris Recognition using Integer Wavelet Transform and Log Energy Entropy COCONET-2020 |
2020-2021 | Mr. Paul Augustine | Journal named “Automatic Detection of Helmet and Non-
Helmet Motorcycle” International Journal of Innovations in Engineering and Technology (IJIET)
INTERNATIONAL JOURNAL FOR INNOVATIONS IN ENGINEERING AND TECHNOLOGY. |
2020-2021 | Ms. Mehbooba P Shareef |
Audio Watermarking Schemes: A Comparative Analysis
Audio watermarking schemes : A comparative analysis International Journal of Engineering and Management SciencesWebsite: ijetms.in Issue:4, Volume No.4, July-2020 DOI: 10.46647/ijetms.2020.v04i04.009July 2020 DOI: 10.46647/ijetms.2020.v04i04.009 |
2020-2021 | Dr. Anita John | PENTAVIUM: Potent Trivium-Like Stream Cipher Using Higher Radii Cellular Automata. The 14th International Conference and School Cellular Automata for Research and Industry. Univerity of Lodz, Poland |
2020-2021 | Ms. Anu Maria Joykutty | Reinforcement Learning based Clustering Algorithm
for Cognitive Wireless Sensor Networks International Conference on Communication and Intelligent Systems - ICCIS 2020 |
2020-2021 | Ms. Seema Safar | Emotion Recognition-Based Mental Healthcare Chat-bots: A Survey Elseveir: SSRN |
2020-2021 | Dr. Sminu Izudheen | Intelligent Exploration of Negative Interaction from Protein-Protein Interaction Network and its Application in Healthcare Psychology and Education Journal |
2020-2021 | Dr. Sminu Izudheen | Short-Term Passenger Count Prediction for Metro Stations using LSTM Network Turkish Journal of Computer and Mathematics Education |
2020-2021 | Dr. Preetha K. G. | A Fuzzy rule- based Abandoned Object Detection using Image Fusion for Intelligent
Video Surveillance Systems Turkish Journal of Computer and Mathematics Education |
2020-2021 | Dr. Sminu Izudheen | Graph centrality of BRCA1 in Protein-Protein Interaction network: An Overview Turkish Journal of Computer and Mathematics Education |
2020-2021 | Ms. Anjusree V.K. | Automatic Image Tagging In Autonomous Vehicles International Journal of Research and Analytical Reviews |
2020-2021 | Ms. Anjusree V.K. | A Review of IFM Free and IFM based methods for underwater Imaging International Journal of Emerging Technologies in Engineering Research |
2020-2021 | Dr. Jincy J. Fernandez | Fingerprint core point detection using Connected Component approach and Orientation map Edge Tracing approach International Journal of Biometrics |
2020-2021 | Ms. Mehbooba P Shareef | Recommendation Systems : A comparative analysis of Deep learning and classical approaches 8th International Conference on Smart computing and Communications |
2020-2021 | Dr. Anita John | A Novel Hash Function Based on Hybrid Cellular Automata and Sponge Functions. First Asian Symposium on Cellular Automata Technology. ASCAT 2022 |
2020-2021 | Dr. Varghese Paul | An Effective Mechanism for the Secure Transmission of Medical Images Using Compression and Public Key Encryption Mechanism
"Book:Smart Computing Techniques and Applications Pages:317-325 Publisher: Springer, Singapore" |
2020-2021 | Dr. Varghese Paul | Real-Time Proximity Sensing Module for Social Distancing and Disease Spread Tracking
"Book:Smart Computing Techniques and Applications Pages:415-424 Publisher:Springer, Singapore" |
2020-2021 | Dr. Varghese Paul | Towards Detecting Flooding DDOS Attacks Over Software Defined Networks Using Machine Learning Techniques
"Revista Geintec-Gestao Inovacao E Tecnologias Volume:11 Issue:4 Pages:3837-3865 " |
2020-2021 | Dr. Varghese Paul | Decentralized blockchain based authentication for secure data sharing in Cloud-IoT
"Journal of Ambient Intelligence and Humanized Computing " |
2020-2021 | Dr. Varghese Paul | A Highly Non-Linear And Robust Dynamic S-Box Forcryptographic Applications
"Journal:Palarch's Journal Of Archaeology Of Egypt/Egyptology Volume:17 Issue:7 Pages:5361-5373" |
2020-2021 | Dr. Varghese Paul | Impact of Optimized Value for Relative Humidity at Cathode in PEMFC for Improved Stack Performance
"Book:Advances in Communication and Computational Technology Pages:1145-1151 Publisher:Springer, Singapore" |
2020-2021 | Dr. Varghese Paul | Context Based Searching in Cloud Data for Improved Precision of Search Results
"Book:Proceedings of Research and Applications in Artificial Intelligence Pages:277-285 Publisher:Springer, Singapore" |
2020-2021 | Dr. Varghese Paul | Strengthening Security of Images Using Dynamic S-Boxes for Cryptographic Applications
"Published in: 2021 Fourth International Conference on Microelectronics, Signals & Systems (ICMSS) Date of Conference: 18-19 Nov. 2021 INSPEC Accession Number: 21573218 " |
2019-2020 | Ms. Sangeetha Jamal | Fuzzy Mapping Model For Classification In Supervised Learning TENCON 2019,17-20 October, 2019 |
2019-2020 | Ms. Mehbooba P Shareef | Audio watermarking Schemes : A comparative Analysis International Journal of Engineering Technology and Management Science |
2019-2020 | Mr. Harikrishnan M | Survey on Different Music Recommendation Techniques 3rd International Conference on Advanced Scientific Innovation in Science, Engineering and Technology (ICASISET 2020) |
2019-2020 | Ms. Sangeetha Jamal | Message Moderation Chatbot 3rd International Conference on Advanced Scientific innovation in Science Engineering and Technology-2020 |
2019-2020 | Mr. Sandy Joseph | Review on Securing Medical Big Data in Healthcare Cloud 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS) |
2019-2020 | Ms. Sangeetha Jamal | Fuzzy Mapping Model For Classification In Supervised Learning,Angela Mathew and Sangeetha Jamal, Presented in TENCON 2019,17-20 October, 2019 ,Hotel Grand Hyatt, Kochi, Kerala |
2019-2020 | Ms. Meharban MS | A computer vision based approach to detect fake images International Journal of Imaging and Robotics |
2019-2020 | Dr. Preetha K. G. | . Reduction of Overhead in Routing Protocols for MANET, Using Fuzzy Set Based Decision Making International Journal of Virtual and Network Organizations, Inderscience - Scopus Indexed. 2019;21(1). |
2019-2020 | Dr. Preetha K. G. | Efficient Abandoned Luggage Detection in Complex
Surveillance Videos Lecture Notes on Data Engineering and Communications Technologies- Springer |
2019-2020 | Ms. Amitha Mathew | A review on finger vein recognition using deep learning technique National Conference on Machine Learning and Its Applications |
2019-2020 | Ms. Sangeetha Jamal | Practical Analysis of Representative Models in Classifier: A Review,Angela Mathew and Sangeetha Jamal,AIDE-2019 International Conference On Artificial Intelligence and Data Engineering May 23-24, 2019 N.M.A.M Institute Of Technology, Nitte, Karnataka, INDIA. |
2019-2020 | Dr. Mary Priya Sebastian | Verb Phrases Alignment Technique for English-Malayalam Parallel Corpus in Statistical Machine Translation Special issue on MTIL 2017 Journal of Intelligent Systems, De Gruyter |
2019-2020 | Ms. Amitha Mathew | Deep Learning Techniques: An Overview International Conference on Advanced Machine Learning Technologies and Applications |
2019-2020 | Dr. Sminu Izudheen | An approach to optimize the link Predicted in Protein Networks using Minimum Strong Edge-Edge Domination Set International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS’20) |
2019-2020 | Ms. Meharban MS | IMAGE COLORIZATION USING DEEP LEARNING JOURNAL/INTERNATIONAL JOURNAL OF IMAGING AND ROBOTICS |
2019-2020 | Ms. Meharban MS | A review on image synthesis conference |
2019-2020 | Ms. Meharban MS | Automated Surveillance on Roads for
Helmet Detection and Number plate
Detection
Conference(Accepted) |
2019-2020 | Ms. Meharban MS | A review on image captioning and speech synthesis conference/IEEE |
2019-2020 | Ms. Meharban MS | A review on text to face image synthesis Conference |
2019-2020 | Ms. Meharban MS | Image to text and Text to speech synthesis Journal |
2019-2020 | Dr. Sminu Izudheen | Effect of community structures in protein–protein interaction network in cancer protein identification Current Science, Published by Indian Academy of Sciences, SCI Indexed |
2019-2020 | Dr. Mary Priya Sebastian | Machine learning approach to suffix separation on a sandhi rule annotated malayalam data set South Asia Research, SAGE Publications |
2019-2020 | Ms. Meharban MS | Generative Adversarial networks:Areview Conference |
2019-2020 | Dr. Renu Mary Daniel | An Efficient eCK Secure Certificateless Authenticated Key Agreement Scheme with Security Against Public Key Replacement Attacks Journal of information security and applications |
2019-2020 | Ms. Anu Maria Joykutty | A methodology for Short-term Electric Power Load Forecasting International Conference on Advances in Computing and Communications 2019 (ICACC-2019) |
2019-2020 | Mr. Uday Babu P | Cloud based Petrol Pump Blacklisting using IoT International Journal of Advanced Trends in Computer Science and Engineering ( IJATCSE ), Volume 9, No. 1.3 (2020), SI (Special Issue), Scopus Indexed Journal, ISSN 2278 - 3091 |
2019-2020 | Dr. Varghese Paul | PVW: An Efficient Dynamic Symmetric Cipher to Enable End-to-End Secure Communication
In book: Artificial Intelligence and Evolutionary Computations in Engineering Systems (pp.329-338) |
2019-2020 | Dr. Varghese Paul | A light weight encryption over big data in information stockpiling on cloud
"Indonesian Journal of Electrical Engineering and Computer Science 17(1):389 " |
2019-2020 | Dr. Varghese Paul | A novel approach to big data analysis using deep belief network for the detection of android malware
"Indonesian Journal of Electrical Engineering and Computer Science 16(3):1447 " |
2019-2020 | Dr. Varghese Paul | A Novel System Architecture for Secure Authentication and Data Sharing in Cloud Enabled Big Data Environment
"Journal of King Saud University - Computer and Information Sciences " |
2019-2020 | Dr. Varghese Paul | Soft Set Theory-A Novel Soft Computing Tool for Data Mining
"International Journal of Applied Engineering Research Volume:15 Issue:11 Pages:1052-1058" |
2019-2020 | Dr. Varghese Paul | Soft Set Based Approach For Mining Frequent Itemsets
"International Organization On'technical And Physical Problems Of Engineering' Volume:12 Issue:4 Pages:50-56 Scopus" |
2019-2020 | Dr. Varghese Paul | Multi-Soft Set Based Approach for Rule based Classification Using Sequential Covering Algorithm
"2020 Advanced Computing and Communication Technologies for High Performance Applications (ACCTHPA) Pages 34-42 Publisher IEEE " |
2018-2019 | Shimmi A | Modelling and Verification of the FlexRay Startup Mechanism using UPPAAL Model Checker 8th International Symposium on Embedded Computing and System Design (ISED), 2018 |
2018-2019 | Dr. Preetha K. G. | Fuzzy Decision-Based Reliable Link Prediction Routing in MANET Using Belief Propagation. Second International Conference on Computational Intelligence and Informatics- Springer Publication- Scopus. 2018. |
2018-2019 | Ms. Jomina John | Major Vulnerabilities and their prevention methods in cloud computing Advances in Intelligent systems and computing |
2018-2019 | Dr. Jincy J. Fernandez | Reversible Image Watermarking: A review International Journal of Scientific research in Science, Engineering and Technology |
2018-2019 | Dr. Tripti C | Data Anonymization for Privacy Preservation in Big Data International Journal on Recent and Innovation Trends in Computing and Communication |
2018-2019 | Dr. Jincy J. Fernandez | Breast cancer detection in mammogram using fuzzy c-means and random forest classifier International Journal of Scientific research in Science, Engineering and Technology |
2018-2019 | Dr. Renu Mary Daniel | A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography Journal of King Saud University-Computer and Information Sciences |
2018-2019 | Dr. Renu Mary Daniel | An Efficient Forward Secure Authenticated Encryption Scheme with Ciphertext Authentication Based on Two Hard Problems Advances in Big Data and Cloud Computing |
2018-2019 | Dr. Anita John | CARPenter:A Cellular Automata Based Resilient Pentavalent Stream Cipher. Cellular Automata-13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy |
2018-2019 | Dr. Jisha G. | Dual Sentimental Analysis on Product Review International Journal of Engineering and Science Invention (IJESI). (UGC Approved) |
2018-2019 | Dr. Varghese Paul | An Efficient Algorithm for Polyalphabetic Substitution using Random Tables
International Journal of Advanced Technology and Engineering Exploration 5.43 (2018): pp 124-133 |
2018-2019 | Dr. Varghese Paul | Intelligent Agents in Securing Internet Journal of Internet Technology 19.3 (2018): pp 753-763. |
2018-2019 | Dr. Varghese Paul | Automatic Segmentation and Classification in Cervical Cancer Images: Evaluation and Challenges
International Journal of Pure and Applied Mathematics, Scopus Indexed Vol. 119, No. 12,pp. 12549-12560. |
2018-2019 | Dr. Varghese Paul | An Efficient Algorithm for Polyalphabetic Substitution using Infinite Number of Alphabetical Tables
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 4 (2018). |
2018-2019 | Dr. Varghese Paul | Designing an intelligent controller for improving PEM fuel cell efficiency
"Asian Conference on Intelligent Information and Database Systems ACIIDS 2019: Intelligent Information and Database Systems: Recent Developments pp 387?395 " |
2018-2019 | Dr. Varghese Paul | Content based image retrieval using deep learning process
"Journal:Cluster Computing Volume:22 Issue:2 Pages:4187-4200 Publisher:Springer US Impact Factor: 1.809 " "Journal:Cluster Computing Volume:22 Issue:2 Pages:4187-4200 Publisher:Springer US Impact Factor: 1.809 " "Journal:Cluster Computing Volume:22 Issue:2 Pages:4187-4200 Publisher:Springer US Impact Factor: 1.809 " "Journal:Cluster Computing Volume:22 Issue:2 Pages:4187-4200 Publisher:Springer US Impact Factor: 1.809 " "Journal:Cluster Computing Volume:22 Issue:2 Pages:4187-4200 Publisher:Springer US Impact Factor: 1.809 " "Journal:Cluster Computing Volume:22 Issue:2 Pages:4187-4200 Publisher:Springer US Impact Factor: 1.809 ""Journal:Cluster Computing Volume:22 Issue:2 Pages:4187-4200 Publisher:Springer US Impact Factor: 1.809 " |
2018-2019 | Dr. Varghese Paul | Handsoff Delay Optimisation using Hybrid Prediction Model International Journal of Networked and Distributed Computing,Vol 6, No.2, 2018. |
2018-2019 | Dr. Varghese Paul | Reducing the Frequent Switch Over between the Base Stations through Continuous Analysis of Signal Strength Asian Journal of Computer Science and Technology, ISSN:2249-0701 Vol.7 No.1, 2018, pp. 99-103 |
2018-2019 | Dr. Varghese Paul | Polyalphabetic Substitution Cipher Using Multiple Random Table
International Journal of Computer Sciences and Engineering, 6 (5), 2018. |
2018-2019 | Dr. Varghese Paul | Abnormality Recognition and Feature Extraction in Female Pelvic Ultrasound Imaging
Informatics in Medicine Unlocked. Elsevier, Scopus Indexed, Vol. 13, pp. 133?138. |
2018-2019 | Dr. Varghese Paul | Performance analysis of artificial intelligent controllers in PEM fuel cell voltage tracking
"Journal:Cluster Computing Volume:22 Issue:2 Pages:4443-4455 Publisher:Springer US" |
2018-2019 | Dr. Varghese Paul | A novel optimized classifier for the loan repayment capability prediction system
"Conference 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC) Publisher:IEEE " |
2018-2019 | Dr. Varghese Paul | Analysis of Novel Recommendation Engine Based on Simulated Annealing Based Clustering
"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC) 27-29 March 2019 2019 ISBN Information: " |
2018-2019 | Dr. Varghese Paul | Mathematical modelling of polymer electrolyte membrane fuel cell and fuzzy-based intelligent controllers for performance enhancement
"Journal:Computers & Electrical Engineering Volume:77; Pages:354-365; Publisher:Pergamon " |
2018-2019 | Dr. Varghese Paul | Secure brain-to-brain communication with edge computing for assisting post-stroke paralyzed patients "Journal:IEEE Internet of Things Journal Volume:7 Issue:4; Pages:2531-2538" |
2018-2019 | Dr. Varghese Paul | A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry 1?21
Symmetry 2019, 11(2), 293; |
2018-2019 | Dr. Varghese Paul | An imperceptible spatial domain color image watermarking scheme
"Information Sciences Volume 31, Issue 1, January 2019, Pages 125-133 Impact Factor=6.795" |
2018-2019 | Dr. Varghese Paul | Secure thought transfer and processing using novel-T algorithm
"BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY Volume:123 Pages:6-7 Publisher: WILEY" |
2018-2019 | Dr. Varghese Paul | An efficient algorithm for polyalphabetic substitution using infinite number of alphabetical tables
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 4 (2018) Spl. ? Research India Publications. http://www.ripublication.com |
2017-2018 | Ms. Anu Maria Joykutty | Automated Surveillance System for Infection Control International Journal of Pure and Applied Mathematics |
2017-2018 | Ms. Sangeetha Jamal | Named Entity Recognition in Sanskrit: A Survey, Joseph Mickole James and Sangeetha Jamal, Published in International journal of pure and applied mathematics June,2018(SCOPUS indexed) |
2017-2018 | Dr. Mary Priya Sebastian | CONFERENCE PAPER-IEEE ICICCS 2018.-Deep Learning Techniques in Computational Linguistics |
2017-2018 | Ms. Meharban MS | Application of Content Based Image Retrieval |
2017-2018 | Mr. Harikrishnan M | A Survey on Spoofing Detection Techniques using Biometrics |
2017-2018 | Dr. Mary Priya Sebastian | CONFERENCE PAPER-NCILC2018-Exploring Semantic Similarities of Malayalam Words Using Word Embeddings |
2017-2018 | Dr. Mary Priya Sebastian | CONFERENCE PAPER-NCILC 2018-An Attempt to Develop an Author Identification System for Malayalam Text Documents |
2017-2018 | Dr. Jincy J. Fernandez | A review on pre-processing with segmentation of medical images using image processing, National Conference on Advanced Computing and Communication |
2017-2018 | Ms. Asha Raj | Techniques used in automatic emotion recognition from eeg signals: a review |
2017-2018 | Dr. Preetha K. G. | Preetha, K. G., and A. Unnikrishnan. "Enhanced domination set based routing in mobile ad hoc networks with reliable nodes." Computers & Electrical Engineering 64 (2017): 595-604. SCIE |
2017-2018 | Dr. Preetha K. G. | 4) Preetha K G, A Unnikrishnan, “Fuzzy Decision Based Reliable Link Prediction Routing in MANET Using Belief Propagation”, Accepted in ICCII 2017, Springer, Scopus. |
2017-2018 | Dr. Preetha K. G. | 2) Preetha K G, A Unnikrishnan, “Reduction of Overhead in Routing Protocols for MANET, Using Fuzzy Set Based Decision Making”, Accepted in International Journal of Virtual and Network Organizations, Inderscience, Scopus |
2017-2018 | Dr. Preetha K. G. | Preetha, K.G. and Unnikrishnan, A., 2017, July. Enhancing the performance of routing protocol in MANET by predicting the link availability through belief propagation. In IEEE Region 10 Symposium (TENSYMP), 2017 (pp. 1-4). IEEE. |
2017-2018 | Mr. Harikrishnan M | Cheque Image Security Enhancement in Online Banking |
2017-2018 | Dr. Tripti C | Tripti, C and Manoj, R (2017) "An asynchronous multi-channel MAC for improving channel utilization in VANET." In: International Conference on Advances in Computing & Communications, Kakkanad, Kochi, INDIA. |
2017-2018 | Mr. Harikrishnan M | Biometric Authentication and Template Protection using Visual Cryptography and Watermarking |
2017-2018 | Dr. Jincy J. Fernandez | A novel image theft identification using biometric feature, Asian Journal of Pharmaceutical and Clinical Research (Scopus indexed), April 2017 |
2017-2018 | Ms. Meenu Mathew | A review on identification of protein complexes in PPI International Journal of Creative Research Thoughts,Vol 6,pg 909-913,April 2018. |
2017-2018 | Dr. Sivaram M | “ Integer wavelet transform based approach for high robustness of audio signal transmission |
2017-2018 | Ms. Jomina John | Major vulnerabilities and their prevention meth-ods in cloud computing |
2017-2018 | Dr. Jincy J. Fernandez | Breast cncer detection in mammogram using fuzzy c-means and random forest classifier, International Journal of Scientific research in science, engineering and technology, Vol. 4. No. 8, pp. 312-321, May-June 2018 |
2017-2018 | Dr. Jincy J. Fernandez | Reversible Image Watermarking: A Review, International Journal of Scientific research in science, engineering and technology, Vol. 4. No. 4, pp. 738-746, March 2018 |
2017-2018 | Ms. Meenu Mathew | Distributed Document Clustering :A Review 51st International Conference on Latest Researches in Engineering, Science and Management,IOSRD |
2017-2018 | Dr. Mary Priya Sebastian | Journal of Intelligent Systems-Verb Phrases Alignment Technique for English-Malayalam Parallel Corpus in Statistical Machine Translation Special issue on MTIL 2017 |
2017-2018 | Ms. Amitha Mathew | Video Anomaly Detection in Confined Areas |
2017-2018 | Ms. Sangeetha Jamal | Flowchart Plagiarism Detection System: An Image Processing Approach ,Jithin S Kuruvila, Midhun Lal V L, Rejin Roy, Tomin Baby, Sangeetha Jamal, Sherly K K,Published in ScienceDirect,Procedia Computer Science 115 (2017) 533–540 |
2017-2018 | Dr. Sminu Izudheen | Electricity Load Prediction Using Artificial Neural Network By Back Propagation |
2017-2018 | Dr. Renu Mary Daniel | Analysis of hierarchical identity based encryption schemes and its applicability to computing environments Journal of information security and applications |
2016-2017 | Ms. Mehbooba P Shareef | Tracking location of medicinal plants in dense forest using image processing : A comparative analysis. Journal of Emerging Technologies and innovative research. 2016. |
2016-2017 | Dr. Jisha G. | Maintaining connectivity of mobile nodes using MANET gateway nodes |
2016-2017 | Dr. Preetha K. G. | Preetha KG, Anjana K P,Cooperative Judgement Based Intrusion detection system for Wireless Ad hoc Networks,National Symposium on Emerging Trends in Coputing and Informatics |
2016-2017 | Dr. Preetha K. G. | Preetha KG, Jeeva Susan Jacob,A Network Selction scheme for 4G communication Systems Using Muti level Optimization Techniques, National Symposium on Emerging Trends in Coputing and Informatics |
2016-2017 | Ms. Diya Thomas | Multi level Privacy Preserving in Medical Data Publishing,Seventh International Conference on Advances in Computing, Control, and Telecommunication Technologies - ACT 2016 |
2016-2017 | Ms. Diya Thomas | MEDICAL IMAGE PROTECTION IN CLOUD SYSTEM,INTERNATIONAL JOURNAL OF CURRENT ENGINEERING AND SCIENTIFIC RESEARCH (IJCESR),VOLUME-3, ISSUE-7, 2016 |
2016-2017 | Dr. Jisha G. | Integrated MANET Routing Scheme for Heterogeneous Networks |
2016-2017 | Dr. Jincy J. Fernandez | A novel image theft identification using biometric feature Special Issue: Advances in smart computing and bioinformatics, Asian Journal of Pharmaceutical and Clinical research |
2016-2017 | Ms. Sangeetha Jamal | QUESTION ANSWERING SYSTEM WITH REPEATED QUESTION IDENTIFICATION. Maria Vijoy and Sangeetha Jamal. Published in International Journal of Advanced Research (2016), Volume 4, Issue 7,DOI:10.21474/IJAR01 |
2016-2017 | Dr. Jisha G. | Design and Analysis of Virtualized Wireless Sensor Network in Internet Of Thing (IOT). |
2016-2017 | Dr. Sminu Izudheen | Identifying Negative Interactions in Protein-Protein Interaction Network Using Weak Edge-edge Domination Set |
2016-2017 | Dr. Preetha K. G. | 3) Preetha K G, A Unnikrishnan, “Reduction of Overhead in Routing Protocols for MANET, Using Fuzzy Set Based Decision Making”, Accepted in International Journal of Virtual and Network Organizations, Inderscience, Scopus. |
2016-2017 | Dr. Preetha K. G. | 6) Preetha K G, A Unnikrishnan, “Fuzzy Decision Based Reliable Link Prediction Routing in MANET Using Belief Propagation”, Accepted in ICCII 2017, Springer, Scopus |
2016-2017 | Shimmi A | Sreya Sreedharan, Shimmi Asokan, "A cache replacement policy based on re-reference count", International Conference on Inventive Communication and Computational Technologies (ICICCT),IEEE, March 2017DOI: 10.1109/ICICCT.2017.7975173 |
2016-2017 | Shimmi A | Ritz Sebastian, Shimmi Asokan, "Process compliance checking using model checker", International Conference on Inventive Communication and Computational Technologies (ICICCT),IEEE, March 2017, DOI: 10.1109/ICICCT.2017.7975220 |
2016-2017 | Dr. Preetha K. G. | Preetha K G, A Unnikrishnan, “Enhanced Domination Set Based Routing in Mobile Ad hoc Networks with Reliable Nodes”, Journal of Computers and Electrical Engineering, Elsevier, SCIE |
2016-2017 | Dr. Preetha K. G. | 5) Preetha K G, A Unnikrishnan, “Enhancing the Performance of Routing Protocol in MANET by Predicting the Link Availability Through Belief Propagation”, Accepted in IEEE TENSYMP 2017 |
2016-2017 | Ms. Sangeetha Jamal | Measuring Credibility of Online Information,Naziya C Najeeb and Sangeetha Jamal, Published in IJAR |
2016-2017 | Shimmi A | Ayana S and Shimmi Asokan, “Verification of Congestion Control Protocol in VANETS Using Formal Method”, IJAR, ISSN: 2320-5407, September 2016, DOI: 10.21474/IJAR01/1682 |
2016-2017 | Dr. Renu Mary Daniel | Deriving Practical Applicability of Hierarchical Identity Based Encryption in Massively Multiplayer Online Role Playing Games International Conference on Advances in Computing and Communications |
2015-2016 | Ms. Mehbooba P Shareef | Encryption-Enhanced Reversible Watermarking for Medical Images via Prediction and RC4 Encryption. In: IEEE; 2015. |
2015-2016 | Ms. Mehbooba P Shareef | Identity of user thrashing and privacy protection of fingerprints. In: ; 2015 |
2015-2016 | Ms. Mehbooba P Shareef | Shareef MMP, TV MD. Secure audio watermarking system using Empirical Mode Decomposition and Tinkerbell Chaotic Map. In: IEEE International Conference in Power, Instrumentation,Control and Computing - PICC 2015. Thrissur: IEEE; 2015. |
2015-2016 | Ms. Amitha Mathew | Human Identification and Tracking under Occlusion using HOG and SURF |
2015-2016 | Dr. Preetha K. G. | Request Reply Detection Mechanism for Malicious MANETs, Published by Springer |
2015-2016 | Dr. Preetha K. G. | A Novel Approach for Malicious Node Detection in MANET-Published by Springer |
2015-2016 | Dr. Tripti C | A Novel Approach for Enhancing the Security of User Authentication in VANET Using Biometrics |
2015-2016 | Ms. Dincy Paul | GMM clustering based segmentation and optic nervehead geometry detection from OCT nervehead images 2015 Global Conference on Communication Technologies (GCCT), Thuckalay |
2015-2016 | Ms. Anjusree V.K. | Interactive Email System Based on
Blink Detection International Conference on Advances in Computing and Communications |
2015-2016 | Dr. Jisha G. | Active Cluster Node aggregation Scheme in wireless sensor network using neural networks |
2015-2016 | Dr. Jisha G. | Role of Gateways in MANET Integration Scenarios |
2015-2016 | Ms. Diya Thomas | A Weighted Cluster Based Routing Protocol for MANET ,International Journal of Advanced Research in Computer Science & Software Engineering , Volume 5 Issue 11,2016 |
2015-2016 | Dr. Sminu Izudheen | Link Prediction in Protein Networks using Minimum Strong Edge-Edge Domination Set |
2015-2016 | Dr. Tripti C | Authentication techniques in VANETs-A Survey |
2015-2016 | Shimmi A | Neethu Kurian, Shimmi Asokan, “Summarizing user opinions: A method for labeled-data scarce product domains.”, International Conference on Information and Communication Technologies (ICICT 2014), Elsevier, 2014 |
2015-2016 | Shimmi A | Niloofer Shanavas and Shimmi Asokan, Ontology-Based Document Mining System for IT Support Service, International Conference on Information and Communication Technologies (ICICT 2014), December 2014, Elsevier |
2015-2016 | Ms. Jomina John | ANALYSIS OF WORM ATTACKS DETECTION METHODS IN CLOUD COMPUTING |
2015-2016 | Ms. Archana Devi R | Implementing Message Integrity
in Mobile Phones (Android platform) Using Identity Based Encryption |
2015-2016 | Ms. Archana Devi R | Ensuring Image Integrity in Android |
2015-2016 | Ms. Archana Devi R | Visual Cryptographic
Schemes for Secure Image Sharing |
2015-2016 | Dr. Jisha G. | Integrated MANET Routing Scheme for Heterogeneous Networks |
2015-2016 | Ms. Diya Thomas | 1. Aswathy P Sreevatsan , Diya Thomas,” An Optimal Weighted Cluster Based Routing Protocol For Manet”, International Conference on Data Mining and Advanced Computing ,IEEE,March,2016 |
2015-2016 | Ms. Archana Devi R | A Comparative
Study on Sentiment Analysis for Jallikattu Protest |
2015-2016 | Ms. Sangeetha Jamal | A Survey on Mining User Opinion from Texts and Emoticons,Authored by Nasiya Najeeb , Sangeetha Jamal ,International Journal of Scientific & Engineering Research, Volume 6, Issue 10, October-2015 |
2014-2015 | Ms. Mehbooba P Shareef | Efficient registration via fingerprints combination.2014 International Conference on Communication and Signal Processing 2014. |
2014-2015 | Ms. Gopika S. | Published a paper " Combining chain code, Invariant Moments and Density for offline Signature Verificcation " in International Conference on Parallel Distributed and Grid Computing (PDGC-2014) held at Jaypee University of Information technology, Delhi in \ |
2014-2015 | Ms. Jomina John | SECURE DATA DISSEMINATION PROTOCOL IN WIRELESS SENSOR NETWORKS USING XOR NETWORK CODING |
2014-2015 | Dr. Tripti C | SURVEY ON SECURITY CHALLENGES IN WARNING MESSAGE DISSEMINATION AND POSSIBLE SOLUTIONS |
2014-2015 | Ms. Anjusree V.K. | Particle Based Automated Iris Tracking and Blink
Detection
Engineering(IJARSE) International Journal of Advance Research in Science and |
2014-2015 | Dr. Tripti C | Distributed Priority based channel access using road structure for VANET (DPBCA) |
2014-2015 | Dr. Tripti C | A Novel Approach for Enhancing the Security of User Authentication in VANET Using Biometrics |
2014-2015 | Ms. Diya Thomas | A Survey on Weighted Clustering Techniques in MANETS, ICETEM2014 |
2014-2015 | Ms. Gopika S. | International Conference on Information and Communication Technologies (ICICT 2014) - "Online and Offline Signature Verification: A Combined Approach". |
2014-2015 | Ms. Gopika S. | "Gradient and Projection Based Feature for Offline Signature Verification" published in The International Conference on Information Science 2014 (ICIS'14) is organized by the Department of Computer Science & Engineering, College of Engineering Cherthala |
2014-2015 | Ms. Sangeetha Jamal | OPEN DOMAIN QUESTION ANSWERING SYSTEM USING SEMANTIC ROLE LABELING, Sreelekhshmi V, Sangeetha Jamal. In: International Conference on Information and Communication Technologies. Vol. 03. 15th ed. IJRET: International Journal of Research in Engineering and Technology ; 2014. p. 104-107. |
2014-2015 | Ms. Sangeetha Jamal | An Improved SRL based Plagiarism Detection Technique using Sentence Ranking, Merin Paul, Sangeetha Jamal. In: International Conference on Information and Communication Technologies, 2014. Published in Elsevier Procedia Computer Science Published by Science Direct, 2015 |
2014-2015 | Ms. Jomina John | Confidential Se-Drip:A Secure Data Discovery and Dissemination Protocol for Wireless Sensor Networks |
2014-2015 | Dr. Tripti C | Enhancing the key pre-distribution on wireless sensor networks by reducing storage overhead |
2014-2015 | Ms. Diya Thomas | Enhanced Method for Noise Identification in Datasets, ICACC 2014 |
2014-2015 | Ms. Elizabeth Isaac | A novel source routing technique for mesh NoCs |
2014-2015 | Ms. Diya Thomas | A SURVEY ON WEIGHTED CLUSTERING TECHNIQUES IN MANETS,IJCET |
2014-2015 | Dr. Preetha K. G. | Improving the Routing Performance of Mobile Ad hoc Networks Using Domination Set, Published in ICICT, CUSAT, Paper published by Elsiever |
2014-2015 | Dr. Preetha K. G. | A Novel Algorithm for Traffic Reduction in Wireless Sensor Network , Published in First International Conference on Computational Systems and Communications (ICCSC), 2014-Paper Published in IEEE explorer |
2014-2015 | Shimmi A | Niloofer Shanavas and Shimmi Asokan, Ontology-Based Document Mining System for IT Support Service, International Conference on Information and Communication Technologies (ICICT 2014), December 2014, Elsevier |
2014-2015 | Shimmi A | Neethu Kurian, Shimmi Asokan, “Summarizing user opinions: A method for labeled-data scarce product domains.”, International Conference on Information and Communication Technologies (ICICT 2014), Elsevier, 2014 |
2014-2015 | Ms. Diya Thomas | A Survey On Different Noise Identification Techniques In Datasets, NCRTKM-2014 |
2014-2015 | Dr. Anita John | Merin Silvi, Anita John: A Short Survey On Image Steganography Techniques in Spatial Domain, Proceedings of the National Conference on Information Security and Network Engineering-(NCISN) |
2014-2015 | Ms. Elizabeth Isaac | Distance Routing on Mesh Network on Chip |
2014-2015 | Mr. Santhosh K. M. | Probability theory based approach for detecting DDoS Attack (Paper accepted in IJCSIT) |
2014-2015 | Ms. Jomina John | Data Dissemination Protocols in Wireless Sensor Networks - a Survey |
2014-2015 | Ms. Jomina John | A Review on Secure Data Dissemination Protocols in Wireless Sensor Networks |
2014-2015 | Ms. Jomina John | Techniques to achieve Data Security During Communication in Networked Critical Infrastructures – A Survey |
2014-2015 | Dr. Preetha K. G. | protocol based classification in hybrid network intrusion detection systems, Published in National Conference on Technological Advancements in Engineering |
2014-2015 | Ms. Diya Thomas | Secure Anonymous Energy Efficient Optimal Routing Protocol for MANET |
2013-2014 | Ms. Mehbooba P Shareef | A data concealing method characterised by DNA coding. International Journal of Engineering Research & Technology . 2013. |
2013-2014 | Dr. John Jose | Implementation and Analysis of History Based Output Channel Selection Strategies for Adaptive Routers in Mesh NoCs, accepted for publication in ACM Transactions on Design Automation of Electronic Systems (ACM-TODAES) |
2013-2014 | Ms. Mintu Philip | Comparative Analysis of Similarity Measures in Document Clustering, IEEE |
2013-2014 | Dr. Jincy J. Fernandez | SURVEY ON VARIOUS TECHNIQUES IN REGION BASED FOREGROUND DETECTION |
2013-2014 | Mr. Paul Augustine | An Exploratory Survey on Various Face Recognition Methods Using Component Analysis |
2013-2014 | Shimmi A | Sreya Sreedharan, Shimmi Asokan, A Survey on Cache Performance Improvement Techniques,National conference on Recent Advances in Computer Science & Information Engineering at St. Joseph’s College of Engineering & Technology, Palai |
2013-2014 | Ms. Amitha Mathew | A CRYPTOGRAPHIC APPLICATION LEVEL DDoS MITIGATION USING PORT HOPPING METHOD |
2013-2014 | Dr. Renu Mary Daniel | Launch Time Application Security: The Trusted Approach International Journal of Science and Research |
2013-2014 | Dr. Renu Mary Daniel | Towards a Trust Envisioned Cyber Security International Journal of Innovation and Applied Studies |
2013-2014 | Ms. Amitha Mathew | |
2013-2014 | Ms. Jomina John | Confidential Se-Drip:A Secure Data Discovery and Dissemination Protocol for Wireless Sensor Networks |
2013-2014 | Dr. Renu Mary Daniel | A Trusted Integrity Verification Architecture for Commodity Computers International Journal of Computer Applications Technology and Research |
2013-2014 | Ms. Elizabeth Isaac | A Novel Energy Efficient Source Routing for Mesh NoCs |
2013-2014 | Ms. Diya Thomas | A Survey On Different Noise Identification Techniques In Datasets ,NCRTKM-2014 |
2013-2014 | Ms. Diya Thomas | Enhanced Method for Noise Identification in Datasets,ICACC2014. |
2013-2014 | Ms. Mintu Philip | A Pragmatic Approach to Develop Computational Thinking Skills in Novices in Computing Education, IEEE |
2013-2014 | Dr. Tripti C | Eliza MG, Tripti C. A Comparison between Contrast Limited Adaptive Histogram Equalization and Gabor Filter Sclera Blood Vessel Enhancement Techniques. International Journal of Soft Computing and Engineering (IJSCE). 2013;ISSN: 2231-2307, Volume-3(Issue-4, September 2013):22-25. |
2013-2014 | Mr. Paul Augustine | Face Recognition : A Comparative Study of Principal Component Analysis and Difference Component Analysis |
2013-2014 | Dr. John Jose | Minimally Bufferred Single-Cycle Deflection Router for Mesh NoCs. In proceedings of IEEE/ACM International Conference on Design, Automation & Test in Europe (DATE-14). Dresden, Germany, March 2014. |
2013-2014 | Ms. Jomina John | A review on secure data dissemination protocols in wireless sensor networks |
2013-2014 | Ms. Sangeetha Jamal | Survey Paper- Question Answering Systems |
2013-2014 | Ms. Sangeetha Jamal | A survey on Plagiarism Detection In Text Documents |
2013-2014 | Dr. Tripti C | Lidiya Ross George M, Tripti. C, "A Survey On Flooding Attack Prevention Methods In MANET-",National Conference on Information Security and Network Engineering (NCISN) 2014, 26-27 March, 2014. |
2013-2014 | Dr. John Jose | WeDBless : Weighted Deflection Bufferless Router for Mesh NoCs. In proceedings of 24th IEEE International Great Lakes Symposium on Very Large Sclae Integration (GLSVLSI-2014). Houston, Texas, USA, May 2014. |
2013-2014 | Dr. Tripti C | Remya Krishnan P,Tripti C, "Authentication techniques in VANETs-A Survey", International Journal of Advanced Research in Computer Science, 28-29 March 2014 |
2013-2014 | Dr. Tripti C | Manoj R, Tripti C, Y.Md.Riyazuddin, G.Victor Daniel, "Enhancing the Key Pre-distribution on Wireless Sensor Networks by Reducing Storage Overhead",International Journal of Advanced Research in Computer Science, 28-29 March 2014. |
2013-2014 | Ms. Mintu Philip | Feature Based Image Manipulation, IEEE |
2013-2014 | Dr. Tripti C | Shamna P, Tripti C, Paul A. FACE RECOGNITION : A COMPARATIVE STUDY OF PRINCIPAL COMPONENT ANALYSIS AND DIFFERENCE COMPONENT ANALYSIS. International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) . 2013;(August-31, 2013):275-282. |
2013-2014 | Dr. John Jose | Congestion Management in adaptive NoC routers using cost-effective selection strategies. In proceedings of Student Research Symposium at IEEE International Conference on High Performance Computing (HiPC-SRS), Bangalore, Dec-2013. |
2013-2014 | Dr. John Jose | Minimally buffered deflection NoC router with dual point injection. In proceedings of Student Research Symposium at IEEE International Conference on High Performance Computing (HiPC-SRS), Bangalore, Dec-2013. (Best Paper award) |
2013-2014 | Ms. Jomina John | Data Dissemination Protocols in Wireless Sensor Networks - a Survey |
2013-2014 | Dr. John Jose | SLIDER: Smart Late Injection DEflection Router for Mesh NoCs. In: Proceedings of 31st IEEE International Conference on Computer Design (ICCD 2013). Asheville, North Carolina, USA., Oct 2013. p. 377-383. |
2013-2014 | Ms. Sangeetha Jamal | Fuzzy Rule Based Data Forwarding for Energy Efficient Wireless Sensor Networks in Industrial Control System. |
2013-2014 | Mr. Santhosh K. M. | Defending DDoS Attack using Stochastic Model based Puzzle Controller |
2013-2014 | Dr. Mary Priya Sebastian | Reshma Prasad, Mary Priya Sebastian, “A Survey on Phrase Structure Learning Methods for Text Classification”, In: International Journal on Natural Language Computing,Volume 3 ,Number 2, April 2014 |
2013-2014 | Ms. Jisha Mary Jose | Confidential Se-Drip:A Secure Data Discovery and Dissemination protocol for Wireless Sensor Networks National Conference on New Trends in Electronics, Computing and Communication (NTECC-2014) |
2013-2014 | Mr. Paul Augustine | A novel Algorithm for Image Compression and Pattern Matching ICACC/ICECCS workshops |
2013-2014 | Mr. Paul Augustine | DCA: An Approach for Face Recognition through Component Analysis ICACC/ICECCS workshops |
2013-2014 | Dr. Tripti C | Shamna P, Tripti C, Paul A. A novel Algorithm for Image Compression and Pattern Matching. International Conference on Advances in Computing and Communications (ICACC) 2013. |
2013-2014 | Ms. Gopika S. | Feature based Image Manipulation |
2013-2014 | Dr. Preetha K. G. | Demand based data replication in MANET, Proceedings of the third international conference on Advances in Computing & Communications 2013, August. Published by IEEE |
2013-2014 | Dr. Preetha K. G. | “ Enhancedbeaconless routing mechanism in VANET, ICACCI, Mysore, August 2013, Publisher is IEEE |
2013-2014 | Dr. Preetha K. G. | A Cluster Based Leader Election Algorithm for MANETs, Presented in ICCC 2013, TVM, 13 to 15 December 2013, Publisher is IEEE |
2013-2014 | Ms. Jisha Mary Jose | Secure data dissemination protocol in wireless sensor networks using XOR Network Coding International Journal of Research in Engineering & Technology |
2013-2014 | Mr. Jayarajan J. N. | ISSN: 2278 – 1323 : Survey on Playlist Generation Techniques |
2013-2014 | Dr. Mary Priya Sebastian | Reshma Prasad, Mary Priya Sebastian, Dr. G. Santhosh Kumar, “A Technique to Extract Transliterating Phrases in Statistical Machine Translation from English to Malayalam”, In: Proceedings of National Conference On Indian Language Computing, February 2014 |
2013-2014 | Dr. Preetha K. G. | Enhanced Data Replication based on Demand to Improve Data Availability in MANETs”, published in International Journal of Recent Development in Engineering and Technology Website: www.ijrdet.com (ISSN 2347 - 6435 (Online) Volume 2, Issue 2, February 2014) |
2013-2014 | Shimmi A | Asha M. J., Shimmi Asokan, BIFEMIT- A Novel Algorithm for Biometric Identification, International Journal of Computer Science Engineering and Technology, ISSN:2231-0711, Vol 3, Issue 7 |
2013-2014 | Dr. Preetha K. G. | “Social-aware Context Based Approach for Forwarding Data in Wireless Network Comprising of Selfish Individuals” Published in IJCSET Journal, Volume 4, Issue 7, July 2013 |
2013-2014 | Dr. Preetha K. G. | A novel Approach to find the alternate path for route maintenance in AODV ” Published in IJCSET Journal, Volume 4, Issue 7, July 2013 |
2013-2014 | Ms. Deepa John | Rules Extraction in XML using Correlation |
2013-2014 | Dr. Preetha K. G. | “An Effective Path Protection Method to Attain the Route Stability in MANET”, published in the International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 6, June 2013 |
2013-2014 | Shimmi A | Niloofer Shanavas, Shimmi Asokan, “Semantic Approach Utilizing Data Mining and Case -Based Reasoning for IT Support Service”, IJRET, Volume 3, Issue 3 |
2013-2014 | Dr. Tripti C | Balakrishnan, Salini; Tripti, C.; Cyriac, Robin, "SURVEY ON SECURITY CHALLENGES IN WARNING MESSAGE DISSEMINATION AND POSSIBLE SOLUTIONS", Asian Journal of Computer Science & Information Technology;Mar2014, Vol. 4 Issue 3, Pp28. |
2013-2014 | Ms. Jisha Mary Jose | Data Dissemination Protocols in Wireless Sensor Networks-a Survey International Journal of Advanced Research in Computer and Communication Engineering |
2013-2014 | Ms. Jisha Mary Jose | A Review on secure data dissemination protocols in wireless sensor networks International Journal of Computer Technology and Applications |
2013-2014 | Ms. Jisha Mary Jose | Techniques to achieve data security during communication in networked critical infrastructures- A Survey National Conference on Computing and Communication(NCCC-2014) |
2013-2014 | Ms. Gopika S. | Static and Dynamic Hand Geature Recognition |
2013-2014 | Ms. Jisha Mary Jose | Security issues during data dissemination in wireless sensor networks International Journal of Advanced Research Trends in Engineering & Technology (IJARTET-2015) |
2013-2014 | Dr. Tripti C | Shamna P, Tripti C, Paul A. DCA: An Approach for Face Recognition through Component Analysis. International Conference on Advances in Computing and Communications (ICACC) 2013. |
2013-2014 | Dr. Tripti C | Shamna P, Paul A, Tripti C. An Exploratory Survey on Various Face Recognition Methods Using Component Analysis. International Journal of Advanced Research in Computer and Communication Engineering. 2013;2(5). |
2013-2014 | Dr. Jisha G. | Network Layer Attacks and Protection in MANET, A Survey |
2013-2014 | Ms. Archana Devi R | Traffic Prediction through Live GPS
Data International Journal of Software and Web Sciences (IJSWS) (controlled by International Association of Scientific Innovation and Research (IASIR)) |
2013-2014 | Dr. Jisha G. | Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly Updating Service Availability on Peers in P2P Network |
2013-2014 | Dr. Jisha G. | A Comparison between Flooding and Bloom Filter Based Multikeyword Search in Peer To Peer Network |
2013-2014 | Dr. Anita John | Expository Study on Sybil attack counter measures in VANET” |
2012-2013 | Ms. Diya Thomas | Location Dependent Query Processing in Mobile Environment. In: International Conference on Advances in Computing and Communication. Vol. 1. RSET; 2012 |
2012-2013 | Ms. Diya Thomas | A Categorized Survey on Buffer Overflow Countermeasures . International Journal of Advanced Research in Computer and Communication Engineering. 2013 |
2012-2013 | Ms. Diya Thomas | An Enhanced method for privacy preservation in data publishing . In: International Conference on Computing, Communication and Networking Technologies. Vivekanadha College of Engineering for Women: IEEE; 2013. |
2012-2013 | Ms. Diya Thomas | A Survey on Privacy Preservation in Data Publishing. International Journal of Computer Science & Engineering Technology. 2013;4(5) |
2012-2013 | Mr. Paul Augustine | A Survey on Various PCA Techniques for Face Recognition ICACC/ICECCS workshops |
2012-2013 | Mr. Paul Augustine | An Exploratory Survey on Various Face Recognition Methods Using Component Analysis Journal |
2012-2013 | Dr. Anita John | Survey on data mining techniques to enhance intrusion detection 2012 International Conference on Computer Communication and Informatics |
2012-2013 | Dr. Anita John | Improving Lifetime of Structured Deployed Wireless Sensor Network Using Sleepy Algorithm International Conference on Eco-friendly Computing and Communication Systems |
2012-2013 | Dr. Anita John | Host based attack detection using system calls Second International Conference on Computational Science, Engineering and Information Technology (CCSEIT '12). |
2011-2012 | Dr. Anita John | A host based kernel level rootkit detection mechanism using clustering technique. International Conference on Computational Science, Engineering and Information Technology |
2011-2012 | Dr. Anita John | Rootkit detection mechanism: A survey International Conference on Parallel Distributed Computing Technologies and Applications, pp. 366-374. Springer, Berlin, Heidelberg, 2011. |