RESEARCH PUBLICATIONS

JOURNALS (2017-2014)

SI. No Publication author &Title Journal Volume No-Issue No ISSN No
2017
1 S.Sharon Priya ,W.Aisha Banu,
Fuzzy Resource Pre-processing and Compress and Join Gang Polling Evaluation
International journal of intelligent Engineering & Systems 10 – 3 2185-3118
2 Azka, S. Revathi, Angelina Geetha
A Survey of Applications and Security Issues in Software Defined Networking
International Journal of Computer Network and Information Security 10 – 3 2074-9104
3 Ramanathan L., Angelina Geetha, Khalid M., Swarnalatha P.
Student Performance Prediction Model Based on Lion-Wolf Neural Network
International Journal of Intelligent Engineering and Systems 10 – 1 2185-3118
4 SV.Shri Bharathi, Angelina Geetha
Sentiment Analysis for Effective Stock Market Prediction
International Journal of Intelligent Engineering and Systems 10 – 3 2185-3118
5 Arun Raj.L, Dhananjay Kumar and A.Srinivasan
Adaptive video streaming over HTTP through 4G wireless networks based on Buffer Analysis
Journal on Image and Video Processing 41 1687-5281
6 Subhashini & Revathi Hand gesture Recognition using Binary Language for Audio Based Communication International Journal of Current Engineering And Scientific Research (IJCESR) 4 – 6 2394-0697
7 Azka and S.Revathi
Protocols for Secure Internet of Things
International Journal Education and Management Engineering 2 2305-8463
8 Nadana Ravishankar, Shriram Raghunathan
Corpus Based Sentiment Classification Of Tamil Movie Tweets Using Syntactic Patterns
IIOAB Journal 8 – 2 0976-3104
9 TN Ravishankar, R Shriram
A review of algorithms applied for linguistic sentiment analysis-A study with reference to Tamil Tweets by public in Twitter
International Journal of Computer Science and Information Security 14 – 9 1947-5500
10 E.Syed Mohamed,S.Rajasekaran
An Alternative Analytical Model for Propagation of Tsunami Waves
International Journal of Pure and Applied Mathematics 113 – 6 0972-9828
11 E.Syed Mohamed,S.Rajasekaran
Complex Solutions for Tsunami-Ascending Into a River as a Bore
International Journal of Pure and Applied Mathematics 114 – 6 0972-9828
12 Bagirathi.S, Dr. Sharmila Sankar, Dr. Sandhya
Hybrid Zigbee Rfid for Detection of Active Tags and Energy Minimization
Journal of Theoretical and Applied Information Technology 75 – 3 1992-8645
13 C.Hema, Dr. Sharmila Sankar, Dr. Sandhya
Performance comparison of Dragonfly and Firefly algorithm in the RFID network to improve the data transmission
Journal of Theoretical and Applied Information Technology 95 – 59 1992-8645
14 S.P.Valli , Dr.Sharmila Sankar,Dr.K.M.Mehata
A Heuristic Method For Improving Tcpperformance By A Greedy Routing Algorithm
Journal of Theoretical and Applied Information Technology 95 – 19 1992-8645
15 X Arputha Rathina
Face Emotion Recognition using combined SIFT, LBP and Local Phase Quantization Features
IJETSR 4 – 8 2394-3386
16 SairaBanu, R.Shriram ,Radhika
Effective Packet Loss Concealment Algorithm For VIOP
Journal Of Advanced Research In Dynamical And Control Systems 17 1943-023X
17 Ruby Annette. J, Dr. Aisha Banu
Cold Start Problem In Recommending Cloud Services:A Survey
Journal of Advanced Research in Dynamical and Control Systems 9 – 19 1943-023X
18 Ruby Annette. J, Dr. Aisha Banu
Towards An Ontology For Cloud Renderfarm Services
Journal of Advanced Research in Dynamical and Control Systems 9 – 16 1943-023X
19 Ruby Annette. J, Dr. Aisha Banu. W, Subash Chandran
A Cloud Broker Framework for Cloud Renderfarm Services Selection” Advanced Engineering Research and Applications
Advanced Engineering Research and Applications 10 – 20 2454-2377
20 Nadana Ravishankar, Shriram Raghunathan
Grammar Rule based Sentiment categorization model for Tamil Tweets
Springer – Advances in Intelligent Systems and Computing To appear 1867-5662
21 Nadana Ravishankar, Shriram Raghunathan
Grammar Rule based Sentiment categorization model for classification of Tamil Tweets
International Journal of Intelligent Systems Technologies and Applications – Inderscience To appear 1740-8873
2016
22 Velayudhan Kumar M.R, Raghunathan Shriram,
Heterogeneity and thermal aware adaptive heuristics for energy efficient consolidation of virtual machines in infrastructure clouds
Journal of Computer and System Sciences 82-2 0022-0000
23 Raj V.K.M, Shriram R,
Power management in virtualized datacenter – A survey
Journal of Network and Computer Applications 69 1084-8045
24 Velayudhan Kumar, Mohan Raj, Raghunathan, Shriram,
Power management using dynamic power state transitions and dynamic voltage frequency scaling controls in virtualized server clusters
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES 24-4 1300-0632
25 Arun Raj L, Kumarand D, Srinivasan A,
Adaptive video streaming over wireless internet with improved QoE in client server architecture
Asian Journal of Information Technology 15-8 1682-3915
26 Sabiyath Fatima N, Muthupriya V,
An effective (FD-E-TOHIP) fault detection enabled E-TOHIP for mobile Ad-Hoc networks
Indian Journal of Science and Technology 9-40 0974-6846
27 Arputha Rathina X, Mehata K.M, Ponnavaikko,
An automatic emotion detection system from face image of a video using Bacterial Foraging Optimization
International Journal of Applied Engineering Research 11-6 0973-4562
28 L Ramanathan, A Geetha, M Khalid, P Swarnalatha,
A Novel Genetic Nand Paft Model For Enhancing The Student Grade Performance System In Higher Educational Institutions
Institute of Integrative Omics and Applied Biotechnology 7-5 0976-3104
29 U Sandhya, S Revathi,
Text Mining using Side Information from Twitter Tweets
International Journal of Science, Engineering and Technology Research 5-4 2278-7798
30 C. Firdozali, T. Nagamalar,
Energy Aware Mobile Sink Based RPL Routing Protocol for Wireless Sensor Networks
International Journal of Latest Technology in Engineering, Management and Applied Science 5-4 2278-2540
31 Boominathan.S, Aranganathan .S,
A Verifiable Mechanism for Attribute based encryption in cloud computing
International Journal of Engineering Research in Computer Science and Engineering 3-3 2394-2320
32 Arun Raj.L, K. Balaprasath,
Predictive Analytics on Student Academics
International Journal of Computer Trends and Technology 34-2 2231-2803
33 Suganthi,J. Brindha Merin,
Using of Jaccard Index for Catchwords Similarity Values
International Journal of Science and Innovative Engineering and Technology 1-1 2319-5967
34 Sabiyath Fatima N., Jahira Begam S., Muneera N.S.,
Reverse auction to trade unused cloud computing resources
Indian Journal of Science and Technology 9-30 0974-6846
35 LA Raj, D Kumar,
Ultrasound Video Streaming using HEVC-XLD in WiMAX Networks
Asian Journal of Research in Social Sciences and Humanities 6-8
36 VS Dayanandan, A Geetha,
Success Models Using Knowledge Seekers’ and Experts’ Responses for Knowledge and E-Learning Portals
Revolutionizing Education through web-based instruction
2015
37 Fouzul Hidhaya S., Geetha A., Kumar B.N., Sravanth L.V., Habeeb A.,Supplementary event-listener injection attack in smart phones KSII Transactions on Internet and Information Systems 9-10 1976-7277
38 SP Valli, KM Mehata,
A Cross-Layer Approach for TCP Packet Loss Differentiation in Adhoc Networks
Middle – East Journal of Scientific Research 23-9 1990-9233
39 Dhananjay Kumar , Arun Raj.L,
Adaptive Video Streaming Over HTTP through 3G/4G Wireless
ITU Kaleidoscope 2015 – Trust in the Information Society, Spain.
40 R Narayani, WA Banu,
Framework for Provenance based Virtual Machine Placement in Cloud
International Journal of Education and Management Engineering 5-1 2305-3623
41 T Sathya, A Radhika,
Dynamic Learning Strategies For Data Mining
International Journal on Applications in Information and Communication Engineering 1-3 2394-6237
42 R.Shriram, T.Nadana Ravishankar,
Mining Web Log Files Using Self-Organizing Map and K-Means Clustering Methods
International Journal of Applied Engineering Research 10-17 0973-4562
43 Subramanian D.V., Geetha A., Shankar P,
An effective assessment of knowledge sharing and E-learning portals
International Journal of Web-Based Learning and Teaching Technologies 10-2 1548-1093
44 Muthupriya, V., Mehata, K.M.,
Performance analysis of AOMDV under the impact of rushing attack
International Journal of Applied Engineering Research 10-11 0973-4562
45 Arunraj L., Vasanth S., Ramanathan M.,
Evaluating vulnerability tool to analyze the web security mechanism
International Journal of Applied Engineering Research 10-10 0973-4562
46 Balasundaram Ananthakrishnan S.P. Valli,
Packet Loss Classification and Cross-Layer Congestion Control in Wireless Networks
International Journal of Applied Engineering Research 10-9 0973-4562
47 Prakash R.A., Mehata K.M., Chellappan C,
A robust biometric authentication and PIN distribution technique for secure mobile commerce applications
Research Journal of Applied Sciences, Engineering and Technology 9-6 2040-7459
48 K Niha, WA Banu, R Anette,
A Cloud Service Providers Ranking System Using Ontology
International Journal of Scientific and Engineering Research 6-4 2229-5518
49 B Ananthakrishnan,
An Efficient Approach for Load Balancing in Cloud Environment
International Journal of Scientific and Engineering Research 6-4 2229-5518
50 M Thoufeeq, S Sankar, M Sandhya,
Secure Authorized Deduplication Process in Hybrid Cloud
International Journal of Advance Research in Computer Science and Management Studies 3-3 2321-7782
51 R Annette, A Banu,
A Service Broker Model for Cloud based Render Farm Selection
International Journal of Computer Applications 96-24 0975-8887
52 Teras.M, Raghunathan.S,
Big Data Visualisation in Immersive Virtual Reality Environments: Embodied Phenomenological Perspectives to interaction
ICTACT Journal on Soft Computing 5-4
53 AF Ramzi, NS Fatima,
Collision Optimized Broadcast Scheduling in Wireless Sensor Network
International Journal of Computer Applications 119-5 0975-8887
54 Kumar.M.R.V, Raghunathan.S,
Heterogeneity and thermal aware adaptive heuristics for energy efficient consolidation of virtual machines in infrastructure clouds
Journal of Computer and System Sciences
55 JN Wani, AS Ahmed,
FSSE Tracker
International Journal of Advance Research in Computer Science and Management Studies 3-3 2321-7782
56 Tn Ravishankar, D Mavaluru,
Grammar Rule Based Information Retrieval Model For Big Data
ICTACT Journal on Soft Computing 5-4 2229-6956
57 R. Krishnan, J. Thirumalai, V. Mahalingam, A. John Peter,
Room temperature synthesis of NaGd(MoO4)2:Pr3+ nanophosphor with blue excitation for WLED applications
AIP Advances
58 F Mushtaq, S Aranganathan,
Secure Access Control Requirement Analysis in Cloud Computing
International Journal of Advance Research in Computer Science and Management Studies 3-3 2321-7782
59 A Wahid, WA Banu,
Managing PRI Devices and Call Rates for Information Security Department
International Journal of Scientific and Engineering Research 6-4 2229-5518
60 M Khatoon, WA Banu,
A Survey on Community Detection Methods in Social Networks
International Journal of Education and Management Engineering
61 Saria Banu,
Qos Analysis of VOIP traffic over WiMAX
International Journal of Advance Engineering and Research Development 2-5
62 T.N.Ravi, Sharmila Sankar,
Measuring the Security Compliance using Cloud Control matrix
Middle – East Journal of Scientific Research 23-8
63 Regin Bose, K., Sankaranarayanan, V.,
Effective handing over of mobile nodes for optimal utilization of channel capacity
International Journal of Engineering and Technology 7-4 2319-8613
64 Ramanathan L., Geetha A., Khalid M.,
Mining students’ record to predict their performance in undergraduate degree
International Journal of Applied Engineering Research 10-1 0973-4562
65 Neeraja E., Sabiyath Fatima N.,
Security enhancement in MANET using a new enhanced topology hiding multipath routing protocol (E-TOHIP)
International Journal of Applied Engineering Research 10-20 0973-4562
66 A Radhika,
Effective Summary For Massive Data Set
ICTACT Journal on Soft Computing 5-4 2229-6956
67 S Revathi, TR Rangaswamy,
Secure Route Discovery using Opinion Based Method in MANET
International Journal of Computer Networks and Wireless Communications 5-1 2250-3501
68 B MANIKANDAN,
An Effective Reliable Broadcast Code Dissemination In Wireless Sensor Networks
International Journal of Emerging Technology in Computer Science & Electronics 13-4 0976-1353
69 S Vasanth, L Arun Raj,
A Survey on Near Field Communication Attacks
International Journal of Advanced Engineering Research and Science 2-1 2349-6495
70 T Naqishbandi, S Qazi,
Big Data, CEP and IOT: Redefining Holistic Healthcare Information Systems and Analytics
International Journal of Engineering Research & Technology 4-1 2278-0181
71 OB Hassan, AS Ahmad,
Optimum Load Balancing of Cloudlets Using Honey Bee Behavior Load Balancing Algorithm
International Journal of Advance Research in Computer Science and Management Studies 3-3 2321-7782
2014
72 Sandhya M., Rangaswamy T.R.,
Zero knowledge and hash-based secure access control scheme for mobile RFID systems
Arabian Journal for Science and Engineering 39-3 1319-8205
73 Arun Prakash R., Mehata K.M., Chellappan C.,
A novel hybrid authentication method based on orientation maps and server aided signature form commerce secured transactions
Journal of Theoretical and Applied Information Technology 64-1 1992-8645
74 Regin Bose K., Sankaranarayanan V.,
GPS based location prediction and authentication during inter-MSC handover
Applied Mechanics and Materials 602-605 1660-9336
75 Revathi S., Rangaswamy T.R.,
Efficient flooding and local route repair using stable connected dominating set for mobile ad hoc networks
Asian Journal of Scientific Research 7-1 1992-1454
76 Raghul Vignesh Kumar, Imthyaz Sheriff C,
Topical Categorization of Credible Micro blog Content
International Journal for Scientific Research & Development 2-6
77 Venkatesh, K.M.Mehata,
A Fault Tolerant System Based On Genetic Algorithm for Target Tracking in Wireless Sensor Networks
International Journal of Computer Applications Technology and Research 3-7 2319–8656
78 Tawseef Ahmad Naqishbandi, Imthyaz Sheriff C
A Resilient Strategy Against Energy Attacks In Ad-Hoc WSN And Future IOT
International Journal of Advanced Research in Computer Science and Software Engineering 4-2
79 Ruby Annette, Aisha Banu. W,
Article: A Service Broker Model For Cloud Based Render Farm Selection
International Journal of Computer Applications 96-24 0975 – 8887
80 Syed Mohamed , Dr.S.Raja Sekaran,
A Study Of Tsunami Model For Propagation Of Oceanic Waves
Journal Of Theoretical And Applied Information Technology 59-3
81 R.Shriram and V.K.Mohan Raj,
Energy efficient and interference aware provisioning in virtualized server cluster environment
Journal of Computer Science 10-1 1549-3636
82 Selvendran, Sharmila Sankar, Sandhya . M,
High Performance Multicast Routing Protocol in Mobile Adhoc Network.
International Journal of Computer Applications 103-7 0975-8887
83 P.Usha, R.Shriram, S.Sathishkumar,
Multiple Sensitive Attributes Based Privacy Preserving Data Mining Using K-Anonymity
International Journal of Scientific and Engineering Research 5-4 2229-5518
84 Rathika A.,Guru Prasad L. ,Ganapathi Raman R,
Physicochemical Properties Of Organic Non-Linear Optical (Nlo) Dl-Alanine Maleate (Dlam) Single Crystals
Materials Research Innovations 18-3
85 Shriram Raghunathan,
Power Management Using Dynamic Power State Transitions And Dynamic Voltage Frequency Scaling Controls In Virtualized Server Clusters
NOT SPECIFIED 3-4
86 B.Govindarajalu. ,K.M.Mehata,
A case for hybrid instruction encoding for reducing code size in embedded system-on-chips based on RISC processor core
Journal of Computer Science 10-3
87 L.ArunRaj, Srinivasan, Dhivahar , Sweta,
A Survey on Telemedicine Approach Using Cross Layer Design in Video Streaming
International Journal of Scientific Engineering and Technology 3-7
88 L.Arun Raj , Thangapandian,
Motion Based Summarization and Grouping of Events for Video Surveillance System
International Journal of Engineering Research 3-4
89 Sheriff C.I., Geetha A,
A survey of research dimensions in complex event processing
International Journal of Applied Engineering Research 9-20 0973-4562
90 Fouzul Hidhaya S., Ibrahim M., Geetha A,
Pro-active detection of malicious attacks on smart phones using permission enforcer algorithm
International Journal of Applied Engineering Research 9-23 0973-4562

CONFERENCES (2017-2015)

SI. No Publication Author & Title Conference
2017
1 L.Arun raj, Dhananjay Kumar
Machine learning approach for quality adaptation of streaming video through 4G wireless network over HTTP
International Conference on ITU Kaleidoscope
2 Muthupriya
Mobile Ad-Hoc Networks
IEEE International conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)
3 T.R. Akila Devi, R. Akila, Angelina Geetha
Framework for Embedded Intelligence – Integrating IOT, WOT and W2T
IEEE sponsored Second International Conference on Computing and Communications Technologies
4 D. Veni, Angelina Geetha
Chronic Kidney Disease (CKD) Prediction using Shuffled Frog Leap Algorithm and Metabolic Profiling
8th International Conference on Computer Science and Information Technology
5 Shri Bharathi, Angelina Geetha
Sentiment Analysis for Online Stock Market News using RSS Feeds
International Conference on Computer Science and Information Technology
6 Madhina Banu.D, Sumathi.R
Static Analysis for the Removal of Web Application Vulnerabilities
International Journal Of Science And Innovative Engineering & Technology
7 T.R.Akila Devi,R.Akila,Angelina Geetha,
Embedded Intelligence- A Study on Current Scenarios and Research Challenges
ICCCT
2016
8 Niha K , W.Aisha Banu,
Brain Signal Processing: Technologies, Analysis and Application
IEEE International Conference on Computational lntelligence and Computing Research
9 Imthyaz Sheriff C.,Angelina Geetha ,Tawseef Naqishbandi,
An Integrated Analytics Platform using Bid Data, Complex Event Processing and the Internet of Things
International Conference on Electrical, Electronics and Computer Engineering
10 C.Hema, Sharmila Sankar, M.Sandhya,
Energy efficient cluster based protocol to extend the RFID network lifetime using dragonfly algorithm
International Conference on Communications and Signal Processing
11 S.Bagirathi, Sharmila Sankar, M.Sandhya,
Tag Detection in RFID System based on RSSI Technique for LF and HF Passive Tags
International Conference on Communications and Signal Processing
12 S.Jahira Begam , N.Sabiyath Fatima,
Reverse Auction to Trade Unused Cloud Computing Resources
International Conference on Innovations in information
Embedded and Communication Systems
13 N.S.Muneera, N.Sabiyath Fatima,
A Security Enabled Authentication Processing Time Reduction In Distributed Cloud Computing
International Conference on Innovative and Emerging Trends in
Engineering and Technology
14 Navya Nelapati, R.Shriram,
Automated Answer Evaluation Of Short Answers Using Moodle Platform
International Conference on Innovative and Emerging Trends in Engineering and Technology
15 A. Premchand, Sandhya M, S. Sankar,
Roadmap for simplification of enterprise architecture at financial institutions
International Conference on Computation of Power, Energy Information and Communication (ICCPEIC)
2015
16 Nagamalar, T., Rangaswamy, T.R.,
Energy efficient cluster based approach for data collection in wireless sensor networks with multiple mobile sink
International Conference on Industrial Instrumentation and Control, ICIC 2015
17 Aishwarya K., Sankar S.,
Traffic analysis using Hadoop Cloud
International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)
18 Sharmila Sankar, Sandhya, Anush Premchand,
Simplification of Information Technology services cut financial Institution- A Framework
ICCCT -Sixth International of Computer and Communication Technology
19 TN Ravishankar, R Shriram,
Mining Web Log Files Using Self-Organizing Map and K-Means Clustering Methods
International Conference on Applied Research in Engineering and Management
20 Mehjabin Khatoon, Aisha Banu, Ayesha Zohra, Chintamani,
Sentiment Analysis in Tweets
Computer Society of India 2015 Convention, India.
21 Gayathri J,
A Fuzzy Logic Based trust model in cloud computing
International Conference on Advance Information Computation
22 Sharon Priya,
A scheduling Strategy to federate parallel workload using backfilling
International Conference on Evolving Trends in Engineering and Technology
23 Sharon Priya,
Comparative Study of Ant colony optimization and Gang Scheduling
International Conference on Innovation in Communications and Computer Engineering
24 X Arputha Rathina,
Drowsiness Detection system for safety Driving
International Conference on Advanced Computing and Mathematical Engineering
25 Raja Sheik,
Enhancing Implicit Relations in Wikipedia mining using object relationship technique
International Conference on Innovation in Communications and Computer Engineering
26 Halima Yasmin, S.P.Valli,
Forecasting ideal TCP round trip time in MANET
International Conference on Computing, Communication and Advanced Networks
27 Geethanjali, Sandhya, Sharmila Sankar,
Implementation of K-Means Clustering using Big Data Methodology for categorizing retail dataset
International Conference on Science Technology Engineering and Management
28 MuthuPriya V,
LARP protocol for secure location service based on Direct Anonymous Attestation (DAA) scheme in MANET
International Conference on Advanced Computing and Mathematical Engineering
29 R.Shriram,
Outlier Detection in Data Streams
International Conference on Electrical, Electronics and Computer Engineering
30 Balasundaram Anantha krishnan, Valli S P,
Packet loss classification and Cross-Layer congestion control in Wireless Networks
International Conference on Engineering Technology and Science
31 Sharon Priya,
Performance analysis of Gang Scheduling in cloud
International Conference on Advanced Computing and Mathematical Engineering
32 Mohammed Idhris,Sandhya , Sharmila Sankar,
Prevention of Wormhole Attack in MANET using secure key sharing and routing algorithm
International Conference on Science Technology Engineering and Management
33 R.Shriram,
Sketching Approach and Massive Dataset
International Conference on Electrical, Electronics and Computer Engineering
34 MuthuPriya V,
TPSS: Two Phase Security System to avoid path reduction in AOMDV
International Conference on Power Electronics Instrumentation and Communication Engineering

Consultancy

Period Project Areas of Consultancy Services Agency / Nature of Funding
2010-11 M/S Infosys Campus Connect Training Program M/s Infosys
2008-11 Consultancy on Optical Character Recognition Developing character recognition software Learn Fun System
2007-08 Consultancy on Optical Character Recognition Developing character recognition software Learn Fun System
2007-08 Business Intelligence Training Training in SQL/BI tools Prediktiva Technologies
2007-08 M/s Infosys Training of Campus Connect Initiative M/s Infosys
2006-07 IBM The Great Mind Challenge TGMC Workshop IBM The Great Mind Challenge
2005-06 M/s Infosys Campus Connect Training Program M/s Infosys

Institute – Industry Interaction

S.No Year Name of the Company Purpose
1 2010 IEEE – CS Registered Education Provider – Purna Career Solution Pvt.Ltd., Chennai Under this agreement the department is identified as academic partner with Novell to conduct specialized courses on Open Source Technologies. Novell India Pvt. Ltd. Will be setting up Novell centre for excellence in the department with Software support from Novell.
2 2010 TCS The department of CSE has been identified by TCS to conduct INITIAL LEARNING PROGRAMME (ILP) programme for training the new recruits
3 2010 TCS Provide Faculty Orientation Programme to our staff members
4 2007 Infosys M/s. Campus Connect
5 2007 Prediktiva Technologies Private Limited Provide BI tools to faculty and students
6 2007 Infosys M/s. Enhance quality of Education
7 2005 Wipro Technologies, India. Conducting classes for Wipro Recruits
8 2003 IBM, India. To establish high quality people repository in Software Technology
9 2002 CISCO To train our students to take CCNA prometric online examination and our university is one of the authorized CISCO local academy
10 2002 CISCO Under this agreement the department is identified as academic partner with Novell to conduct specialized courses on Open Source Technologies. Novell India Pvt. Ltd. Will be setting up Novell centre for excellence in the department with Software support from Novell.

Research Activities

The Department has strong emphasis on R&D activities. Research in the department encompasses a variety of areas ranging from advancing the fundamentals of computing to recent innovations. Research is conducted within groups of faculties and their research scholars with common interests. Department also organizing workshops, seminars and guest lectures by eminent persons from leading institutions and institutions regularly. These activities are usually supported by technically and financially by different companies or organizations. Our faculty members have good amount of research publications and presentation in various National / International Journals with high impact factor and citation and Conferences. Our Research Scholars are share their experience and ideas with other faculty members during the regular faculty meet conducted by our department. It is highly motivate the other faculty members to select their research areas and refine their existing research activities.

Thust Areas of Research

  • Mobile Adhoc Networks
  • Grid Computing
  • Data Mining and Information Processing
  • Wireless Sensor Networks
  • Network Security
  • Image Processing
  • Mobile Ubiquitous Computing

Ph.D Approved Research Supervisors

Name of the Supervisor Area of Specialization
Dr. K. M. Mehata Software Engineering, Computer Networks, Neural networks, Image processing, Software Metrics.
Dr. Angelina Geetha Web Mining and Information Retrieval
Dr. R. Shriram Pervasive Computing,Mobile Computing,Language Computing, Grid Computing, Text Mining.
Dr. Sharmila Sankar Big Data, Wireless Networks
Dr. Sandya RFID, Wireless Sensor Networks, Big Data
Dr. W. Aisha Banu Knowledge Engineering & Information Retrieval,Data Mining.
Dr. Aranganathan Grid & Cloud Computing
Dr. Revathi Wireless Networks, Mobile Ad hoc Network, Security in Network, Genetic Algorithm

Collaborative Research done by the Faculty

  • Dr.R.Shriram is working with Dr.Vijayan Sugumaran of Sogang University, South Korea in the World Class University Project since August 2010. They have a prior research collaboration and have published 2 conferences and 2 journal papers together. They are working on Middleware design for mobile computing.
  • Mrs.Arputha Rathna was invited as a Visiting Professor by Hiroshima University, Japan. The areas of research are related to Image processing and Emotion recognition.