Introduction

The Department of Computer Science & Engineering aims to impart high quality education to post-graduate and under-graduate students as well as to carry out cutting edge technology in research on various disciplines of Computer Science and Engineering.

We offer Specialized courses

  • B.Tech. -Information Security and Digital Forensics (in Association with COEDF)
  • B.Tech.( CSE) with specialization in Data Science and AI (in Association with IBM)
  • M.Tech in Information Security and Cyber Forensics

All the programmes focus on preparing the students for wide range of IT careers and Research equipping them with unique experience - moulding tomorrow's technocrats with high caliber.

Our Department Provides Skill based training programmes to the students in association with CISCO, REDHAT, IBM, ORACLE and Spoken tutorial IIT Bombay.

Collaborated with many Industry institute for hands on Training and Internship for the students during course period.

Signed MOU’s with foreign universities for Students Exchange Programmes.


Vision

To become a Premier Institution of Excellence in Computer Science and Engineering that would develop self sustaining and globally competent Computer Science and Information Technology Professionals.

 
Mission
  • Enable students and faculty with the best of Technologies and Knowledge emerging in the domain of Computer Science and Engineering.
  • Equip the department laboratories with the power of in-demand Technologies and Software for the On-Demand Industry.
  • Share and Collaborate knowledge across the IT Industries for holistic development of skilled and talented students.
  • Impart the students with Ethical values, Critical thinking and Broad based computational skills, to enable students to become Entrepreneurs.
  • Motivate the students to comprehend problems across Inter Disciplinary Domains and offer innovative solution using ICT.
 
Quality Policy
  • Learn, Teach and Practice validated procedures with Transparency
Program Educational Objectives

The Graduate will be able to

  • Establish a career in Computer Science and Engineering in Industry, Government, Academia and work collaboratively with Peers
  • Successfully pursue Higher Studies in the field of Engineering, Science, Technology and Management and/or take up Research)
  • Promote Design, Research and implementation of Products and Services in the field of Computer Science & Engineering through strong Communication, Leadership and Entrepreneurial Skills
  • Engage himself in a Professional, Ethical and Responsible manner to the Profession, Industry, Nation and the Society
  • Undertake the development of Innovative Systems and Solutions using Hardware and Software integration
  • Contribute to the Nation’s E-Governance and ICT Mission
Program Specific Outcomes

PSO’sdescribe what students are expected to know or be able to do by the time of graduation from the program.

  • Prepare graduates to apply the knowledge and professional skill of theoretical computer science to provide ethical solutions for real world problems.
  • Graduates will have the ability to comprehend highly complex engineering problems with the knowledge of basic science and engineering.
  • Students at the time of graduation will be able to design economic, innovative hardware and software system for various domains.
  • Students will be able to create platforms for secured information sharing and management for engineering or social applications.

Student Outcomes

  • Engage himself in a Professional, Ethical and Responsible manner to the Profession, Industry, Nation and the Society
  • Undertake the development of Innovative Systems and Solutions using Hardware and Software integration
  • Contribute to the Nation’s E-Governance and ICT Mission
  • An ability to apply knowledge of mathematics, science, and engineering.
  • An ability to design and conduct experiments, as well as to analyze and interpret data.
  • An ability to design a system, component, or process to meet desired needs within realistic constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and sustainability.
  • An ability to function on multidisciplinary teams.
  • An ability to identify, formulate, and solve engineering problems.
  • An understanding of professional and ethical responsibility.
  • An ability to communicate effectively.
  • The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context.
  • A recognition of the need for, and an ability to engage in life-long learning.
  • A knowledge of contemporary issues.
  • An ability to use the techniques, skills, and modern engineering tools necessary for engineering practice.


Program Outcomes

  • Engineering Knowledge: Apply the Knowledge of mathematics, science, Bioengineering fundamentals, and a Bio engineering specialization to the solution of complex Biotechnological problems.
  • Problem analysis: Identify, formulate, review research literature, and analyze complex Biotechnological Problems and reaching, substantiated conclusions using first principles of mathematics, natural sciences and engineering sciences.
  • Design/development of solutions: Design solutions for complex Bio engineering problems and design system components or processes that meet the specified needs with appropriate consideration for the public health and safety, and the cultural, societal, and environmental consideration.
  • Conduct investigations of complex problems: Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions
  • Modern tool usage: Create, select and apply appropriate techniques, resources and modern Biotechnological tools including prediction and modeling to complex Biological activities with an understanding of the limitations.
  • The engineer and society: Apply reasoning informed by the contextual knowledge to access societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional engineering practice
  • Environment and sustainability: Understand the impact of the professional engineering solutions in societal and environmental contexts and demonstrate the knowledge of and need for sustainable development.
  • Ethics: Apply Bioethical principles and commit to professional ethics andresponsibilities and norms of the Biotechnological practice
  • Individual and team work: Function effectively as an individual and as member or leader in diverse teams and in multidisciplinary settings
  • Communication:Communicate effectively on complex Biotechnological activities with the engineering community and with society at large such as being able to comprehend and write effective reports and design documentation, make effective presentations and give and receive clear instructions.
  • Project management and finance: Demonstrate knowledge and understanding of the Biotechnological and management principles and apply these to once own work as a member and leader in a team to manage projects and multidisciplinary environments
  • Life –long learning: Recognize the need for and have the preparation and ability to engage in independent and life-long learning in the broadest context of technological change

Courses


Infrastructure

There are about 500 students enrolled in the various programs offered by the Department. It has six laboratories equipped with around 500 computers and other state-of-the-art computing facilities to support teaching and research activities.

Learning Ambience at Dr. M.G.R. University is Noteworthy.

  • Syllabus comparable to international university standards and competent faculty.

  • Transparent evaluation system.

  • Modern laboratory facilities with state-of-the-art hardware and software.

  • More than 500 computers and many software packages.

A separate system maintenance department is being established to manage all hardware, software and network facilities of the department and university.

We have well trained Technical Support Team with wide knowledge on latest Technologies.

LIBRARY

The Department of Computer Science and Engineering has a Library with 1075 Books under 350 Titles. It has AICTE patronized e-journals. Its Digital Library possesses Teaching Aids, e-books, Educational Videos, MIT Open Courseware, Reference Papers from IEEE, Springer, etc.,

LABORATORIES


COMPUTING FACILITIES

Computing facilities in our department is periodically updated. Most of the systems are of latest configurations and purchased from reputed companies like Sun Microsystems, Wipro, Compaq, Dell and HCL. We have around 500 systems connected through network with high end servers. Our department follows the principle of one man one machine.

INTERNET FACILITIES

Internet facilities are provided to the students from morning 7AM to 10PM (round the Clock). We have established a new internet facility of 2 MBPS with 1:1 compression ratio through R F link. These facilities are given to various departments through fiber optic backbone connectivity.


   


   

Research & Development

RESEARCH

Our teaching is underpinned by strong research. Research programs in computer science are carried out in the emerging fields of Information technology and Computer Engineering. 

The Department offers the following research programs both in Part Time and Full Time,

  • Doctoral Degree program (Ph.D)

  • M.S. (Research)

  • M.Phil

 

The research programs focus on the following broad areas:

 

  • IP Networks, Mobile and AdHoc networks

  • Digital Image Processing

  • Image Compression and Segmentation

  • Neuro Fuzzy Systems

  • Pattern Recognition & Matching

  • Grammatical Inference

  • Cryptography and Network Security

  • Intelligent Systems & Human Computer Interaction

  • Data Mining and Knowledge Engineering

  • Distributed - Object Oriented Technologies

  • Distributed Grid Computing

  • Database Management Systems

  • Web Technology, e-Learning

  • Agent Technology

  • Software Quality Assurance and Management

  • Software Testing

  • Grid Computing

  • Reliability Engineering

  • Fault-Tolerant and Real Time Systems

  • Open Source Programming / Aspect Oriented Programming

The department strives to offer a distinctive environment for the pursuit and expansion of knowledge. Apart from research activity the department organizes a series of workshops, seminars, national / international conferences and symposiums every year.

 

PROJECTS

The mission is to assist faculty and staff members in all aspects to obtain externally funded research projects as well as other scholarly activities. The Process of acquiring Funded Projects starts from the identification of a potential sponsor and the preparation of a proposal, through various administrative steps (related to budgets, personnel, space, sub-contracts, reporting and accountability, patents, negotiations with the sponsor etc) during the course of the project, to the submission of the documents required to complete the project.

 

Thrust Areas Of Research

  • Multimedia & Image Processing

  • Cryptography & Security

  • Data Mining

  • Grid Computing

  • Bio-informatics

  • Sensor Networks

  • Wireless & Adhoc Networks


Awards& Achievements

CSE is recognized as the Top Notch department of the University
Certification Details

S.No Year Got Certifications
Oracle CCNA MCSE
01 Final 50 20 17
02 Third 30 11 14
03 Second 22 9 10

 

 

S.No Batch Got Certifications
IBM-Z/OS Juniper IBM-DB2 IBMRAD
01 I 40 145 26 90
02 II - - 100 -
03 III - - 50 -


Some of our Students Projects selected under TGMC Project selection program conducted by IBM.




Faculty Details

S.No

Name

Qualification

Designation

1

Dr.S. P. Rajagopalan

Ph.D.

Professor Emeritus

2

Dr. H.V. Ramakrishnan

Ph.D.

Professor Emeritus

3

Dr. V. Cyrilraj

B.E., M.E., Ph.D.

Professor

4

Dr. Sumathy Eswaran

AMIE., M.Tech., Ph.D.

Professor &Dean

5

Dr. V.N. Rajavarman

M.Sc., M.E., Ph.D.

Professor

6

Dr.T.V.Ananthan

B.E., M.E., Ph.D.

Professor

7

Dr. R.S. Ponmagal

B.E., M.E., Ph.D.

Professor

8

Dr.G. VictoSudha George

B.E., M.Tech., Ph.D.

Professor

9

Dr.S.Geetha

B.E., M.E., Ph.D.

Associate Professor & Head

10

Dr.R.Shoba Rani

MCA., M.Phil., Ph.D.

Associate Professor

11

Dr.N.Kanya

M.Sc., M.Tech., Ph.D.

Associate Professor

12

Dr.P.S. Rajakumar

MCA., M.Tech., Ph.D.

Associate Professor

13

Dr.D.Usha

MCA., M.E., Ph.D.

Associate Professor

14

Mr.P. Dinesh Kumar

B.E., M.Tech.

Assistant Professor & Addl.Head

15

Mr.Saravanan Elumalai

M.Sc., M.Tech.

Assistant Professor

16

Mr.G.Sreeram

B.Tech.,M.Tech.

Assistant Professor

17

Mrs.T.Kiruba Devi

B.Tech.,M.Tech.

Assistant Professor

18

Mrs.S.Amudha

B.E., M.S.

Assistant Professor

19

Mrs.C.Tamilselvi

B.E., M.Tech.

Assistant Professor

20

Mr.D. Syed Ali

B.E., M.E.

Assistant Professor

21

Mrs.I. Golda Selia

MCA.,M.Tech.

Assistant Professor

22

Mr.G.Senthilvelan

M.Sc., M.Tech.

Assistant Professor

23

Mrs.Kavitha. P

B.E., M.Tech.

Assistant Professor

24

Mrs. T. Yuvarani

B.E., M.E.

Assistant Professor

25

Ms.U.Indumathi

B.E., M.Tech.

Assistant Professor

26

Mrs. R. Aiyshwariya Devi

B.Tech., M.E.

Assistant Professor

27

Mrs. S. Shobana

B.Tech., M.E.

Assistant Professor

28

Mr.Arun .M

B.E., M.Tech.

Assistant Professor

29

Mr. S. Mohamed Ibrahim

M.Sc., M.Tech.

Assistant Professor

30

Mr.Thamizhikkavi.P

B.E., M.Tech.

Assistant Professor

31

Mrs.TharaniPavithra

B.Tech., M.E.

Assistant Professor

32

Mrs.M.Revathi

B.E., M.E.

Assistant Professor

33

Mrs.C.Hemalatha

B.Tech., M.E.

Assistant Professor

34

Mrs.A.Maheswari

B.Tech., M.E.

Assistant Professor

35

Mrs.Anu P Varghese

B.Tech.,M.Tech.

Assistant Professor

36

Mr.S.Satheesh

M.Sc., M.Tech.

Assistant Professor

37

Mrs.J.UmaMaheswari

MCA., M.Phil.

Assistant Professor

38

Ms.Chinchu Nair

B.E., M.E.

Assistant Professor










Publications


  • R.Venkatarathinam, Dr.V.Cyril Raj and Dr.G.Victo Sudha George (2018),"A Novel Hybrid Iterative Backward Feature Selection Framework For Intrusion System”, International Journal Of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 5 (2018) pp.2780-2785 Research India Publications. http://www.ripublication.com.
  • Neethu Sathyan M, Dr.Golda Dilip, Dr.Victo Sudha George,(2018),"Review On Condenser Air Leak Test”, International Journal Of Pure And Applied Mathematics Volume 119 No. 16 2018,3197-3205 ISSN:1314-3395(Online version). http://www.acadpubl.eu/hub/.
  • R.Venkatarathinam, Dr.V.Cyril Raj and Dr.G.Victo Sudha George (2018),"EEOFSA:An Embedded Ensemble Optimal Feature Selection Algorithm For Building Efficient Intrusion Detection System”, International Journal Of Pure And Applied Mathematics Volume 119 No. 15 2018,1445-1459 ISSN:1314-3395(Online version). http://www.acadpubl.eu/hub/.
  • Geetha S, Ramamoorthy S, Kanya N and Anandha Mala GS "Extraction Of Sequence Of Actions From Unstructured Requirements Specification Document”, Journal Of Computational and Theoretical Nanoscience. Accepted.
  • G.Sabeena Gnanaselvi, T.V.Ananthan (2018),"An Analysis Of Applications, Challenges and Security Attacks in MANET”, JCSE International Journal Of Computer Sciences And Engineering Vol-6, Issue-5, May 2018 E-ISSN:2347-2693.
  • T.Kamal Raj, Dr.T.V.Ananthan, Dr.Balakrishna (2018) "Enhanced Cost-Aware Secure Routing Protocol Design For Wireless Sensor Network”, Journal Of Advanced Research in Dynamical & Control Systems, Vol-10, 10-Special issue, 2018.
  • Arun Selvan, Dr.T.V.Ananthan, Sriram (2018) "An Perspective Of Probabilistic Misbehaviour Detection Scheme In Vehicular Ad-Hoc Networks”, International Journal Of Engineering and Technology (UAE)-IJET(UAE). Accepted.
  • Manivasagam,M.A, Ananthan,T.V.(2018)"Signal Strength Based Self Reconfiguration to Ensure Reliability in Wireless Sensor Networks", Indonesian Journal of Electrical Engineering and Computer Science Vol. 10, No. 2, May 2018, pp. 725~732 ISSN: 2502-4752, DOI: 10.11591/ijeecs.v10.i2.pp725-732.
  • M.A.Manivasagam, T.V.Ananthan (2018)"An Adaptive Self Reconfiguration Mechanism For Improving Reliability In WSN”, Indian Journal of Public Health & Development, Vol.9, Issue.2. DOI Number: 10.5958/0976-5506.2018.00164.X.
  • P.Dineshkumar, V.N.Rajavarman,R.S.Ponmagal,S.Ramamoorthy,(2018), "Fitness Evaluation System (FES) for ailment estimate by Machine Learning over Big Health Sensor Data, Journal Of Computational and Theoretical Nanoscience.
  • T.Kamalraj, Ananthan,T.V. and Balakrishnan, (2017) "Development of Cluster Routing Protocol for Power Consumption in Wireless Sensor Networks : A Survey”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 6, Issue 1, January 2017. ISSN 2319 – 4847.
  • C.Menaka and R.S.Ponmagal, (2017), suitable protected encryption with access control in support of personal health records in cloud environments, Journal of Advanced Research in Dynamical and Control Systems (ISSN 1943-023X).no.2, special issue, 2017, pp.1170-1180.(SCOPUS – h-index4)
  • K. Sujatha, R.S. Ponmagal, K. Senthil Kumar and K.S. Ramkumar,(2017), "Fuzzy Controller for Automatic Tap Changing in Transformers forPower Quality Enhancement in a Smart Grid Distribution System” , International Journal of Control Theory and Applications , Volume : No.10 (2017) Issue No. :6 (2017), pp.471-482.H index: 9 - Scopus
  • S. Kevin Andrews, Dr. V. N. Rajavarman, (2017), " Designing an IoT Enabled Vehicular Diagnostics System using Automotive Sensors and Actuators Integrated with Onboard Video Camera" International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 19 (2017) pp. 8273-8277
  • S Jayasundar, V N Rajavarman, V Saishanmuga Raja " An Improved Query Ranking and Hardness prediction Algorithm for Query Interfaces on Databases" Indian Journal of Public Health Research & Development. July-September 2017, Vol. 8, No. 3.Scopus.
  • Cristin R., Cyril Raj V. "Consistency features and fuzzy-based segmentation for shadow and reflection detection in digital image forgery”, (2017) Science China Information SciencesVolume 60, Issue 8, 1 August 2017, Article number 082101.Scopus.
  • Kanimozhi A., Cyrilraj V. "A computational model of cognitive tutor using cognitive architecture-ACT-R for implementing an effective E-learning system”, (2017), Journal of Computational and Theoretical Nanoscience Volume 14, Issue 3, March 2017, Pages 1599-1608.Scopus.
  • Gurumayum Ronald Sharma.,GoldaDilip,(2017),”Hybrid Verifiable Delegation Ciphertext-Policy Attribute-Based Encryption Scheme in Cloud Computing”An International Journal Of Advanced Engineering & Computer Technology.
  • T.V Ananthan.,R. Balakrishna.,T Kamal Raj,”(2017),Development Of Cluster Routing Protocol For Power Consumption In Wireless Sensor Networks: A Survey,International Journal of Application or Innovation in Engineering and Management.
  • Jince P Kuruvilla.,Kavitha P.,G.Kalpana,(2017),”Detection Of Compromised Accounts On Social Networks Based On Anomalous User Behaviour”International Journal of Emerging Technology in Computer Science & Electronics.
  • Raghunathan.V.S.Cyrilraj,V. SumathyEswaran, Ambika,A. sangeetha,R.U.(2016) " Optimization of Digitalized Document verification using e-Governance service Delivery Platform(e-SDP), International Journal of Applied Engineering Research, ISSN 0973-4562,Vol 11,N0.4,pp2531-2539.
  • Rajalakshmi,R.Ananthan,T.V.(2016)." Hybrid Routing using Swarm Intelligence in Wireless Sensor Networks", International Journal of Control Theory and Applictions,Vol.9(4),pp125-135
  • Saishanmuga raja, Kanya,N.(2016). "Enhanced lung segmentation Using Artificial Neural network and Genetic Algorithm", STLWAN,Vol160(4),pp153-168.ISI-Indexed
  • Revathi,K. Golda Selia , I. (2016). "An Efficient and Secure Deduplication Management in Private Cloud", International Journal of Computer science and Mobile Computing,ISSN-2320-088x
  • Ujina,T.K. Sai Shanmuga Raja. (2016). " Effective Energy Saving Strategy for Wireless Access Network Using Software Defined Network”, International journal of CiiT.
  • Sangami,C. Ananthan,T.V. Shruthi,S.(2016). " Isolation of Malevolent Nodes using Supportive Trap in Mobile Adhoc Networks”, International journal of CiiT.
  • Karthikeyan,L. Sreeram,G. (2016). " Key Metrics for Safeguarding Confidential Data in Cloud”, International journal of CiiT.
  • Saranya, P. Ponmagal,R.S. (2016). " Secure and Scalable Sensor Data Access Network with Delay Tolerance”, International journal of CiiT.
  • Nalini Poornima, S. Ponmagal,R.S. (2016). "Secure Preserving Public Auditing for Regenerating Code based on Cloud Storage”, International journal of CiiT.
  • Anandhi, Kalpana,G. (2016). "Securing Smart Grid Communication against False Data Injection Attacks”, International journal of CiiT
  • Rupa Debnath, G. Senthil Velan. (2016). " Semi Trusted Third Party Using Dynamic Grid System for Location Based Services”, International journal of CiiT.
  • Kavitha.P, S.Tamilarasi, V.Cyrilraj "Design of Malicious Activity Detection & Prevention System for Enterprise Network" IJCTA 9(6), 2016, pp 2799-2808
  • Geetha.S, Anandha Mala.G.S, Suresh Kumar Sanampudi "Automatic Domain Knowledge Extraction from Requirement Specification Text" Research Journal of Applied Sciences, Engineering and Technology 12(9): pp:926-932, 2016
  • Sujatha K, Senthil kumar K, Godhavari T, Ponmagal R S, Bhavani N P G, (2016), "An Effective Distributed Service Model for Image Based Combustion Quality Monitoring and Estimation in Power Station Boilers" Springer Link
  • Senthikumar R, Ponmagal R S, Sujatha K, (2016), "Efficient Health Care Moinitoring and Emergency Management System using IoT" IJCTA pp-137-145, Vol(9), No(4)
  • Srividhya V, Sujatha K, Ponmagal R S, (2016), "Ethylene Gas Measurement for Ripening of Fruits using Image Processing", Indian Journal of Science and Technology, Vol(9), No(11).
  • Manivasagam, M.A and Ananthan,T.V. (2016) " Reliable and Efficient Self Reconfiguration WSN design (RESR) to Mitigate Link Failures”, International Journal of Control Theory and Applications (IJCTA) ISSN:0974-5572, Vol.9(31), pp.107-118.
  • Kavitha, R., Jeyalakshmi, V. and Deborah, S. (2015) ‘Adaptive Gentle Random Early Detection Congestion Algorithm in Software Defined Network’, International Journal of Applied Engineering Research, Vol. 10, No. 17, H – Index. 3.
  • Rajavarman, V.N., Ananthan, T.V. and Dinesh Kumar, P. (2015) ‘Active Resource Allocation using ARIMA Forecasting Technique for Virtual Machines in Cloud Computing’, Global Journal of Pure and Applied Mathematics.
  • Ponmagal, R.S. and Chitra, M.P. (2015) ‘Caemon: Cloud Access Execution and Monitoring for Big Data Analytics of Sensor System’, ARPN Journal of Engineering and Applied Sciences, India, Vol., No. 10, pp. 563-571.
  • Sai Shanmugaraja, V. (2015) ‘Selecting a Best Architecture of an Artificial Neural Network Using Genetic Algorithm for Lung Segmentation’, Australian Journal of Basic and Applied Sciences, No. 9, pp. 39-46.
  • Cyrilraj, V. (2015) ‘A Novel Idea to Improve Pedestrian Safety in Black Spots using a Hybrid VANET of Vehicular and Body Sensors’, Innovation in Computing Technology.

  • Ismail Kalilulah, S. and Justus Rabi. (2015) ‘Performance Improvement of Faulty Nodes using Efficient Energy Consumption in MANET’, International Journal of Applied Engineering Research, Vol. 10, No. 68, H – Index. 3.

  • Ponmagal, R.S. (2015) ‘Big Data Analytics Architecture for Secured Wireless Body Area Sensor Networks’, IJAER, No. 68, pp. 160-166.

  • Ponmagal, R.S. and Menaka, C. (2015) ‘Big Data Analytics Architecture for Smarter Health Care System’, IJAER, No. 69, pp. 63-68.

  • Ponmagal, R.S. (2015) ‘Design and Development of Secure Cloud Architecture for Sensor Services’, Lecture Notes in Computer Science, Netherlands, pp. 339-344.

  • Ananthan, T.V. and Rajavarman, V.N. (2015) ‘Information Extraction in Unstructured Multilingual Web Documents’, Indian Journal of Science and Technology, India.

  • Victo Sudha George, G. and Cyrilraj, V. (2015) ‘An Accelerated Feature Subset Selection Using Discriminative Function Allied With Large Margin Distribution Based Ranking’, International Journal Of Applied Engineering Research, India, No. 3, pp. 5537-5550.

  • Sai Shanmugaraja, V. (2015) ‘A Comparative Analysis of Data Mining Techniques used in Health Care Systems’, International Journal Applied Engineering Research, India, No. 10.

  • Victo Sudha George, G. and Cyrilraj, V. (2015) ‘Accurate and Stable Feature Selection Powered by Iterative Backward Selection and Cumulative Ranking Score of Features’, Indian Journal of Science and Technology, No. 11.

  • Shoba Rani. and Syed Ali. (2015) ‘Categorization of Video Using Viola Jones and Fisher’s Linear Discriminant Function’, Australian Journal of Basic and Applied Sciences, India, Vol. 9(23), pp. 418-423.

  • Kanya, N. (2015) ‘Named Entity Recognition from Biomedical Abstracts – An Information Extraction Task’, Australian Journal of Basic and Applied Sciences, Israel, Vol. 7, pp. 393-398.

  • Monica Jenefer, B. and Cyrilraj, V. (2015) ‘Multi - Class Abnormal Breast Tissue Segmentation Using Texture Features and Analyzing the Growth Factor Using Power Law’, International Journal of Applied Engineering Research, India, Vol. 1.

  • Almas Begum. and Cyrilraj, V. (2015) ‘Architectural Analysis for Improving Security using LBS with ATAM’, International Journal of Applied Engineering Research, India, Vol. 8.

  • Monica Jenefer, B. and Cyrilraj, V. (2015) ‘Classification Of Breast Tumor Using Fractal Based Fourier Transform Method’, International Journal of Applied Engineering Research, India.

  • Sumathy Eswaran. (2015) ‘Shadow Removal From Remote Sensing Images By Efficient Inpainting Method’, International Journal of Applied Engineering Research, India, Vol.10, pp. 19989-19999.

  • Rajavarman, V.N. and Dinesh Kumar, P. (2015) ‘Active Resource Allocation Using ARIMA Forcasting Technique for Virtual Manchines in Cloud Computing’, Global Journal of Pure and Applied Mathematics, India, Vol. 11, No. 2, pp. 557-568.

  • Ponmagal, R.S. and Dinesh Kumar, P. (2015) ‘Caemon: Cloud Access Execution and Monitoring for Big Data Analytics of Sensor System’, ARPN Journal of Engineering and Applied Sciences, India, Vol. 10, No. 2, pp. 222-230.

  • Rajavarman, V.N., Dinesh Kumar, P. and Ananthan, T.V. (2015) ‘Active Resource Allocation using ARIMA Forecasting Technique for Virtual Machines in Cloud Computing’, Global Journal of Pure and Applied Mathematics (GJPAM), Research India Publications, Vol. 11, No. 2 , pp. 557-568, ISSN. 0973-1768.

  • Ponmagal, R.S., Chitra, M.P., Dineshkumar, P., Rajavarman, V.N. and Dhineshkumar, G. (2015) ‘CAEMON - Cloud Access Execution and MONitoring of Big - Data Analytics for Sensor System’, ARPN Journal of Engineering and Applied Sciences, Vol. 10, No. 2, pp. 563-571, H – Index. 4.

  • Ponmagal, R.S., Dinesh, N. and UmaRajaram. (2015) ‘Design and Development of Secure Cloud Architecture for Sensor Services’, Distributed Computing and Internet Technology Lecture Notes in Computer Science Springer Verlag, Vol. 8956, pp. 339-344, H – Index. 118.

  • Sujatha, K., Kumaresan., Ponmagal, R.S. and Vidhushini. (2015) ‘Vision Based Automation for Flame Image Analysis in Power Station Boilers’, Australian Journal of Basic and Applied Sciences, Vol. 9(2), pp. 40-45, H – Index. 12.

  • Senthil Velan, G. (2015) ‘Chirp Scaling Algorithm for Modern Radar Processing’, International Journal of Science and Application, Vol. 1, Issue. 1, ISSN. 2395 – 0498.

  • Menaka, C. and Ponmagal, R.S. (2014) ‘Secure Cloud Architecture for Hospital Information System’, Elysium Journal of Engineering Research and Management, Vol. 1, No. 1, pp. 124-128, ISSN. 2347- 4734.

  • Kanya, N. and Ravi, T. (2015) ‘Named Entity Recognition from Biomedical Abstracts – An Information Extraction Task’, Australian Journal of Basic and Applied Sciences, Vol. 9(7), pp. 393-398, ISSN. 1991-8178.

  • Pavithra, B. and Kanya, N. (2015) ‘Related Packet Padding For Anonymous Web Browsing In Mobile Devices Against Traffic Analysis Attack’, International Journal of Advanced Research in Computer Science Engineering and Information Technology, Vol. 5, Issue. 1, ISSN. 2321-3337.

  • Victo Sudha George, G. and Cyril Raj, V. (2015) ‘An Accelerated Feature Subset Selection Using Discriminative Function Allied With Large Margin Distribution Based Ranking’, International Journal Of Applied Engineering Research, ISSN. 0973-4562, Vol. 10, No. 3, pp. 5537-5550.

  • Kavitha, R., Jeyalakshmi, V. and Deborah, S. (2015) ‘Adaptive Gentle Random Early Detection congestion algorithm in Software Defined Network’, International Journal of Applied Engineering Research, ISSN. 0973-4562, Vol. 10, No. 17.

  • Praveena, S. and Rajakumar, P.S. (2014) ‘Ambient Audio Based Key Generation Using Asyncronization Method’, International Journal of Research in Computer Applications and Robotics, Vol. 2, Issue. 4.

  • Geetha, S. and Anandha Mala, G.S. (2014) ‘Automatic Relational Schema Extraction from Natural Language Requirements Specification Text’, Middle - East Journal of Scientific Research, Vol. 21(3), pp. 525-532.

  • Ponmagal, R.S. (2014) ‘Architecting Service Based Sensor Networks for the Intelligent Assimilation’, Hindawi Publishing Coorporation Chinese Journal of Engineering, Vol. 2014, Article ID. 701829.

  • Saishanmuga Raja. V. and Rajagopalan. S.P. (2014) ‘A Comparative Analysis of Optimization Techniques for Artificial Neural Network in Bio Medical Applications’, Journal of Computer Science, Scientific Publications, Vol. 10, No. 1, pp. 106-113.

  • Bhavani, M. & Shoba Rani, (2013) Human Identification using Finger and Iris Images, International Journal of Computer Trends and Technology, ISSN:2231 – 2803,Vol.4, Issue 3, pp. 258 - 263, I.F-0.477, H Index:24

  • Shoba Rani (2013) Implementation of Textile Image Segmentation using Rotational Gabor Filter and Echo State Neural Network, International Journal of Scientific and Engineering Research, ISSN: 2229 - 5518, Vol.4, Issue. 5, pp. 457 – 462, I.F.0.4510, H Index:10

  • Sabari Vasan, S. & Golda Selia, I. (2013) Secured Data Storage in Google Cloud, International Journal of Computer Trends and Technology, Vol. 4, Issue 4, ISSN: 2231-2803, I.F.0.43, H Index:24

  • Saishanmuga Raja, V. & Sharmila Priya, (2013) Enabling Multilevel Secured Framework For Remote Attestation, International Journal of Computer Trends and Technology, Vol.4, Issue 3, ISSN : 2231-2803, I.F-0.477, H Index:10

  • Saishanmuga Raja, V. & Rajagopalan, S.P. (2013) Iris Recognition System using Neural Network and Genetic Algorithm, International Journal of Computer Applications, Vol. 67, Issue 2, I.F.0.821, H Index:15

  • Saishanmuga Raja.V, & Rajagopalan, S.P. (2013)A Comparative Analysis of Optimization Techniques for Artificial Neural Network in Bio Medical Applications, Journal of Computer Science, Scientific Publications, I.F.0.325, H Index:12

  • Geetha, S. & Anandha Mala, G.S. (2013) Elicitation of Relation Schema with Primary Key Attribute from Natural Language Text, International Journal of Computer Application, ISSN: 0975 – 8887, Vol.71, Isssue: 18, pp: 21 - 24, I.F-0.821, H Index:15

  • Ramakrishnan M.V. & Sumathy Eswaran, (2013) A Comparative Study of Various Parallel Longest Common Subsequence (LCS) Algorithms, International Journal of Computer Trends and Technology, Vol. 4, Issue: 2, pp.183 – 186, I.F.0.569, H Index:24

  • Kolla Bhanu Prakash, Dorai Ranga Swamy, M.A. & Arun Raja Raman, (2013) Neural Model for Content Extraction in Multilingual Web documents, International Journal of Computer Applications, ISSN: 0975 - 8887,Vol. 65, No: 4. I.F-0.821, H Index:15

  • Clara Shanthi, G. & Saravanan, E. (2013) Background Subtraction Techniques: Systematic Evaluation and Comparative Analysis, International Journal of Modern Engineering Research, Vol.3, Issuse 1, pp. 514-517, SSN 2249-6645

  • Fouziasulthana, K. & Kanya, N. (2013) Content Extraction with text Mining using Natural Language Processing for Anatomy based Topic Summarization, International Journal of Modern Engineering Research, Vol.3, Issue.1, pp.564-567, I.F.1.227, H Index:2

  • Anu, S. & Golda Dilip (2013) Object Tracking for Video Files with Spatiogram, International Journal of Engineering Research & Technology, ISSN: 2278 – 0181, Vol.2, Issue: 3, I.F-1.76. H Index:17

  • Ponmagal, R.S. (2012), An efficient and extensible Service based Sensor Access Architecture, International Journal of Power Control Signal and Computation, ISSN. 0976-268X, Vol.14, No.2, pp.117-128, I.F.1.0., H Index:68

  • Cyrilraj, V. & Kalla Madhu Sudhana, (2012) A Study on Metadata standards for Semantic Annotation of Learning Objects, International Journal of Advanced Computer Science, Vol. 3, No. 5, I.F.1.324, H Index:11

  • Golda Selia, I. & Iswarya, R. (2012) Solution for Accessing a Computer Using VNC in Mobile Cloud Computing, International Journal of Computational Engineering Research, ISSN NO: 2250-3005, NCASG. I.F.2.542, H Index:12

  • Sumathy Eswaran & Rajagopalan, S.P. (2012) Identification of Similar H1N1 cases in other parts of the world using SRLCS model Combined with Fuzzy Membership, International Journal of Advanced Computer Research, Index Copernicus Value (ICV) Current(2010): I.F.1.863, H Index:20

  • Devika, P. & Ponmagal, R.S. (2012) Bruit Bait:Peer To Peer Systems, International Journal of Computational Engineering Research, ISSN: 2250-3005, pp. 36-40, I.F.1.145, H Index:12

  • Golda Selia, & I. Madhumithaa, S.K. (2012) CRM System in Cloud Computing With Different Service Provider,International Journal of Computational Engineering Research, ISSN:2250-3005, NCASG, I.F-1.145, H Index:12

  • Ponmagal, R.S. & Raja, J. (2011) SAMON - C: Sensor Access and Monitoring in Cloud Environment, CiiT International Journal of Networking and Communication Engineering, ISSN: 0974-9713, Vol.3, No.2, pp.136-144, I.F. 0.569,H Index:25

  • Cyril Raj, V. (2010) A Model Linked to E.coli Related to Electrostrictive Energy in Cancer Cell, International Journal Sensors and Transducers, Vol.113, Issue 02, pp. 158-166, I.F. 2.05, H Index:105

  • Ananthan, T.V. & Nakkeeran, R. (2009) Amelioration of BEBA in Distributed MAC Protocol to Reduce the Waiting Time of a Station in Wi-Fi (802.11), International Journal of Computer Applications, ISSN:0973-5704, Vol.04, Number.01, pp.71-76, I.F. 0.323, H Index:08

  • Valarmathie, P. Srinath, M.V. & Dinakaran, K. (2009) An Increased Performance of Clustering High Dimensional Data through Dimensionality Reduction Technique, International Journal of Theoretical & Applied Information Technology, ISSN: 1992-8645, Vol 5, No:6, pp.731- 733, I.F. 1.71, H Index:05

  • Cyril Raj, V. (2008) PH Homeostatis and Cell Signalling Pathway Reflected in Capacitance Relaxation Phenomena, Journal of Medical Engineering & Informatics, Vol.1, No.1, p.85-90, I.F. 0.97. H Index:03

  • S.Porkodi, Sumathy Eswaran, "Security Enhanced Exam Management In M-Learning Environments", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • K.Sowmiya, Dr. G.Victo Sudha George, "Job Scheduling Techniques Of Hadoop Maproduce Framework In Big Data Analytics", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • M.Vignesh, Dr.N.Kanya, "Learning Management System", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • Nitesh Kumar, Aamir Sohail, C.B.Dhinesh, Mini Kumari, Arutselvam, "Event Feedback System For College Events", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • Neha Sneha Thakur, Ramya.N, Arutselvam, "Replica Cat", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • Harini.G, Harshini.M.N, Priyadarshini.S and Dr. Kanya, "Intelligent Hands Free Speech Based Class Notes", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • SubhashKumar, Ronil D Shah, K Ajay Varma and Sidharth Nambi,"RaspherrryPi VPN Gateway", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • Vigneshwari R, Dr. Cyril Raj V and Dr. Kalpana G, "Forensic Examination Through IDPS To Analyze The Criminal Element Without Any Changes In Data", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • G.Sabeena Gnanaselvi, Dr. T.V.Ananthan and Sumathy Eswaran, "A Study Paper On MANETs Challenges and Security Attacks", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • S.Pradeepa, S.Rithika and Mr. Arutselvan, "Catering Service Mobile Application", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • K.Pavithra, S.Priyanka, Shraddha Shree and U.Indumathi, "Product Review Monitoring", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • S. Kevin Andrews, Dr. V.N.Rajavarman, "Designing an IOT Enabled Vehicle Diagnostics System Using Automotive Sensors And Actuators Integrated With Onboard Video Camera", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • Appavu Karunakar, Sumathy Eswaran and L.Ramesh, " A Solution To Enhance Aadhaar Data Security From Hacking Using Block chain Technology", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • L.Sonia, Meenakshi Chandra sekar and Mr.G.Senthilvelan, "Smart Car Parking System For University", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • C.TamilSelvi and Dr.S.Ramamoorthy, "Review Of Bigdata Analytics In E-Commerce With Challenges And Future Research Directions", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • R.Swathikumari and S.Geetha, "Overview On Hadoop Security Tools", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • V.R.Niveditha and Dr. T.V.Ananthan,"Reconsiderations Of Authorisation In Android Applications", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • K. Amandeep Singh, Dr. T.V.Ananthan and R.Rajalakshmi, "Research Challenges On Big lot Data Analytics", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • S.Balakumaran, S.Amaladhas, R.Balaji and , Dr.N.Kanya, "Generating a Encrypted Files Using Tamil Encryption Software", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • T.Kirubadevi and Dr.S.Ramamoorthy, "Using Bluetooth, IEEE802.15.4(Zigbee), Wi-Fi And LTE In Lot - An Overview", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • Sunku Dinesh Kumar, Syed Abbas, Vellala Srinivasa Sharma and T.Yuvarani,"Security Live Streaming", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • Suketh E, Monica R, Harini M and Dr. Shoba Rani, " Block Chain Technology And Bitcoin", National Conference on Innovative Computing Techniques (NCICT 2018),Data-Science, Analytics & Security, at Chennai, ISBN. 978-81-937145-4-6
  • K.Sujatha, R.S.Ponmagal, K.Senthil Kumar, R.Shoba Rani, Golda Dilip (2018),"IOT-Based Multimodal Biometric Identification For Automation Railway Engine Pilot Security System”, International Conference on Smart Computing and Informatics, Center For Electronics Automation And Industrial Research (CEAIR).
  • Deepalakshmi, K.Sujatha, R.S.Ponmagal, T.Kalpalatha Reddy,(2017), "An Assessment Of Potential Windmills Using Image Processing And Artificial Intelligence(AI) Based Wind Speed Estimation”, International Conference On Energy, Communication, Data Analytics and Soft Computing (ICECDS).
  • Dr.K.Sujatha, V.Srividhya, Dr.R.S.Ponmagal and Dr.T.Godhavari "Soft Sensor For Capacitance Tracking In Quality Assurance Of Fruit Ripening Process”, International Conference On Smart Engineering Materials(ICSEM 2016).
  • Dineshkumar P, R.Senthilkumar, K.Sudha, R.S Ponmagal, V.N Rajavarman, (2016), "Big Data Analytics of IoT based Health Care Monitoring System ,IEEE Xplore Digital Library,Scopus
  • Ponmagal,R.S.Sujatha,K.Gothavari,T,(2016), " Automation of Solar system for maximum power point Tracking using Artificial Neural Networks and IoT" IEEE Xplore Digital Library, Scopus
  • Ponmagal,R.S.Sujatha,K.Gothavari,T,(2016), " Automation of Solar system for maximum power point Tracking using IoT" ACM Digital Library, ISBN:978-1-4503-4756-3, Scopus
  • Sujatha K, Ponmagal R S, Srividya V, Gothawari T, (2016) " Feature Extraction for Ethylene Gas Measurement for Ripening Fruits" International Conference on Electrical Elecronics and Optimization Technique (|ICEEOT)
  • Ponmagal R S, Srinivasan N, (2016) " Machine Learing Approach for exploring rock arts througth cloud Inftrastructrue" IEEE Xplore Digital Library Scopus
  • Aaditya Ganapathy, Godwin Manoj, S.Geetha, Dr. Ramesh L,( 2016)," Online Energy Audit & renewable Energy Management System", 2nd International Conference on Computing, Communicatio, Control and Automation (ICCUBEA2016) IEEE Pune Section, Aug 2016 Scopus
  • G.Senthil Velan,(2016) , " A Novel Approach for Data Sharing in Public Cloud Using Dynamic Secure Group Sharing Frame Works",International Conference on Innovative & Emerging trends in Engineering and Technology, Panimalar Institute of Technology, in association with CSI.IETE,IEEE,ISTE,ICTACT and SAEINDIA.
  • Ponmagal,R.S.Sujatha,K.Gothavari,T,(2016), " Cloud Computing for Autonomous Navigation of Unmanned Ground Vehcle,International Conference on Electrical Electronics and Optimization Techniques,ICEEOT-2016
  • Anu.K.C, Ambika.A , Sumathy Eswaran, Raghunathan V.S4 "Challenges and Issues Involved in Promoting E – Governance as Effective Service Delivery" , National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • S. Rekha, S.Golda Dilip "Efficient Networking System Based on Layer Combination Design Structure", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • Saranya.P, Dr.R.S.Ponmagal "Secure and Scalable Sensor Data Access Network with Delay Tolerance", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • Sangami.C, T.V.Ananthan, S.Shruthi "Isolation of Malevolent nodes using Supportive Trap in mobile Adhoc networks", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • Anandhi.A, G.Kalpana "Securing Smart Grid Communication against False Data Injection Attacks", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • ViswaPriya. V Shobarani " Tumor Detection In Brain MRI Using Threshold Based Segmentation With Morphological Operations", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • S.Shruthi T.V.Ananthan, Sumathy Eswaran, S.Swathi, "Harnessing the Power from Home Appliance’s Light Source to Fuel Low Power Devices using Graphenes", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • Saranya.K, P.Kavitha " Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography ", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • Ujina.T.K, Sai Shanmuga Raja "Effective Energy Saving Strategy For Wireless Access Network Using Software Defined Network", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • Vijaya Abirami.P, Shoba Rani, S.Amudha "An Analysis on Finger Print Identification for Gender Classification ", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • Prathusha.P, N.Kanya " Intrusion Detection System For Smartphones", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • G.Tamizhvaanan, Saravanan Elumalai. " Passive DNS for Incident Handling", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • Rupa Debnath, Senthil Velan.G." Semi trusted Third Party Using Dynamic Grid System for Location Based Services ", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • Nalini Poornima.S,R.S.Ponmagal. "Secure Preserving Public Auditing For Regenerating Code Based On Cloud Storage", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • K.V.S.Prathima, Mrs.S.Geetha " Captcha as Graphical Password- AI Problems for Security ", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • R.RajaLakshmi, T.V.Ananthan, R.Shobarani "A Survey on Clustering Based Routing Protocol Schemes in WSN", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • Karthikeyan.L..G.Sreeram. "Key metrics for safeguarding confidential data in cloud", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • Sumathy Easwaran,M.A.J.Bosco,Rajalakshmi"A Study on Traffic Forecast for Metro Railway Expansion in Chennai", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • T. Muralidharan, V. Saishanmuga raja. S.P. Rajagopalan "Comparison of Supervised and Unsupervised Learning Algorithms for Pattern Classification", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • Anu.K.C, Raghunathan V.S, Sumathy Eswaran, V. Cyril Raj,"Enabling Construction by Configuration (CbC) in front end and back end systems – A case study", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • Sumathy Eswaran, M.Bhuvaneswari "A RIoT Architecture for Performance Improvement of Railways in Developing Countries", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • Archana.P, Ilamchezhian.J "A Survey on Encryption algorithm using Data Compression for Unicode Data", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • S.Kevin andrews, V.N.Rajavarman. "Vehicle Information System Using R-PI And Internet of Things", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • N.Yamini Saraswathi, S.DharaniTrusted DataBase With Privacy And Data Confidentiality", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • C.Rohith Bhat .S.Ramamoorthy Analysis of Process Mining with ProM Framework", National Conference on Innovative Computing Techniques (NCICT 2016),Citizen Empowerment, at Chennai, ISBN. 978-1-941505-47-2
  • Rajalakshmi, R. and Ananthan, T.V. (2015) ‘Advanced Nano Sensor Technology in WBANs’, National Conference on Innovative Computing Techniques (NCICT 2015), Sustainable computing and Model, at Chennai, ISBN. 978-1-941505-34-2.
  • Premkumar, B. and Ponmagal, R.S. (2015) ‘Bilinear Aggregate Signature and PDP Encryption in Audit Service for Cloud Storage’, National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable computing and Model, at Chennai, ISBN. 978-1-941505-34-2.
  • Karthicka, P.G. and Dharani, S. (2015) A Local Mining and Global Learning Approach for Bridging the Vocabulary Gap’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.
  • Sruthi, S. and Rajavarman, V.N. (2015) ‘QSS : Question and Answer System Based on Social Networks for Non - Factual Queries’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Dhanasekaran, C. and Ponmagal, R.S. (2015) ‘Risk Conscious Easing of Routing Attacks for Ad-hoc Networks’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Manojkumar, R. and Cyril Raj, V. (2015) ‘Vulnerability Detection Behind Web Applications’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Keerthi, G. and Golda Selia. (2015) ‘Flexible Authentication with User Revocation for DAC in Cloud’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Arun, M. and Sreeram, G. (2015) ‘Diverse Encryption Plans in Conveyed Stockpiling’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Dhineshkumar, G., Ponmagal, R.S. and Dineshkumar, P. (2015) ‘A Keyword Sensitive Service Recommendation on Map Reduce for Hotel Information’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Rajni Marban, M., Prathiba, R. and Sharmila, R. (2015) ‘Automatic Number Plate Recognition System’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Vijayalakshmi, S. and Sumathy Eswaran. (2015) ‘Shadow Removal from Remote Sensing Images by Efficient Inpainting Method’, Presented in the Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Priyalakshmi, S. and Sumathy Eswaran. (2015) ‘Robust & Secured Image Authentication System by Watermarking & Iris Biometric’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Sangeetha, C.K. and Golda Dilip. (2015) ‘Securing Data in Cloud Using Ring Signature’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Sasidaran, S. and Kalpana, G. (2015) ‘Exploiting Linux Service Misconfiguration’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Magitha, C. and Kalpana, G. (2015) ‘VANET using Efficient Privacy and Preserving Authentication’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Vijayalakshmi, S. and Geetha, S. (2015) ‘Secured Personal Health Record in Cloud using Attribute based Encryption’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Gomathi Pradeepa, M. and Geetha, S. (2015) ‘Secure Deduplication with Reliable Convergent Key Management in Hybrid Cloud’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Pavithra, B. and Kanya, N. (2015) ‘Reduce Crime Attacks on Online Transactions Using Biometric Identifier and OTP’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Muralidharan, T. and Rajagopalan, S.P. (2015) ‘Comparative Analysis of Mining Transactional and Time Series Data’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Almas Begum. and Cyrilraj, V. (2015) ‘Architectural Analysis for Improving Security using LBS with ATAM’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Kanya, N., Geetha, S. and Syed Ali, D. (2015) ‘Data Mining Challenges with Big Data’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Antony Xavier Bronson, F. and Rajagopalan, S.P. (2015) ‘Securing IWR in Cloud Using Various Trait Based Encryption Methods’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Shoba Rani. and Syed Ali, D. (2015) ‘Categorization of Video using Viola Jones and Fisher’s Linear Discriminant Function’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Ambika, A., Anu, K.C. and Shoba Rani. (2015) ‘Analysis of Various Segementation Techniques to Diagnose the Possible Liver Disorder’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Thanudas, B., Sreelal, S., Manoj, B.S., Cyril Raj, V. and Sumathy Eswaran. (2015) ‘Agent -Controller Based Security Infrastructure for Enterprise Network’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Dharani. S., (2015) ‘A Local Mining and Global Learning Approach for Bridging the Vocabulary Gap’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Senthil Velan, G. and Somasundaram, K. (2015) ‘Scaling up for High Dimensional Data and High Speed Data Streams’, International Conference on Electrical, Instrumentation and Communication Engineering – Recent Trends and Research Issues, at Coimbatore.

  • Tamilselvi, C. (2015) ‘An Abstract Survey on Software-Defined Networking’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Sahana, M. and Saravanan, E. (2015) ‘Investigation of Offences in Social Network and Its Countermeasures’, Second National Conference on Innovative Computing Techniques (NCICT 2015) Sustainable Computing and Model, at Chennai, ISBN. 978-1-941505-34-2.

  • Ismail Kalilulah, S. (2015) ‘Performance Improvement of Faulty Nodes Using Efficient Energy Consumption in MANET’, National Conference on Mobile Communication (NCMC’15), Chennai.

  • Srinivasan, P.K. (2015) ‘Component Ranking for Fault - Tolerant Cloud Application’, National Conference on Mobile Communication, Chennai.

  • Prabhu, T. (2015) ‘Formalizing Modularization and Data Hiding in Synthetic Biology’, National Conference on Mobile Communication, Chennai.

  • Sujatah, K., Ponmagal, R.S. and Uma Rajaram. (2014) ‘Sensor Cloud for Autonomous Navigation of Unmanned Ground Vehicle’, International Conference on Defence and Security Technology, Kulalampur, Malaysia.

  • Menaka, C., Ponmagal, R.S. and Uma Rajaram. (2014) ‘Secure and Service Based Mobile Monitoring of Industrial Sensors’, International Conference on Green Technology for Environmental Pollution Prevention and Control, NIT, Trichy.

  • Menaka, C. and Ponmagal, R.S. (2014) ‘Secure Cloud Architecture for Hospital Information System’, International Conference on Architecture, Software systems and Green Computing, pp. 219-223, ISBN. 978-93-81208-31-1.

  • KirubaDevi, T. and Ponmagal, R.S. (2014) ‘Service Based Intelligent Integration of Sensor Networks with Internet’, National Conference on Innovative Computing Techniques NCICT, pp. 80-84, ISBN. 978- 81-925141-9-2.

  • Menaka, C. and Ponmagal, R.S. (2014) ‘A Survey on Security Issues in Cloud Services’, National Conference on Innovative Computing Techniques NCICT, pp. 91-95, ISBN. 978- 81-925141-9-2.

  • Arun, M. and Ponmagal, R.S. (2014) ‘The Enhanced USB’, National Conference on Innovative ComputingTechniques NCICT, pp. 404-406, ISBN. 978- 81-925141-9-2 Chennai.

  • Jeyanthi, M. and Ananthan, T.V. (2014) ‘Enhancing Driving Controls with Vehicular Ad Hoc Network’, NCICT, ISBN. 978- 81-925141-9-2.

  • Mohana. and Ananthan, T.V. (2014) ‘Web Services Composition’, NCICT, ISBN. 978- 81-925141-9-2.

  • Dhanasekaran, C., Teja, R. and Ponmagal, R.S. (2014) ‘The Survey on Security Issues in Nxg Addressing’, National Conference on Innovative Computing Techniques NCICT, pp. 649-652, ISBN. 978- 81-925141-9-2.

  • Sujatah, K., Ponmagal, R.S. and Uma Rajaram. (2014) ‘Sensor Cloud for Autonomous Navigation of Unmanned Ground Vehicle’, International Conference on Defence and Security Technology, Kulalampur, Malaysia.

  • Menaka, C., Ponmagal, R.S. and Uma Rajaram. (2014) ‘Secure and Service Based Mobile Monitoring of Industrial Sensors’, International Conference on Green Technology for Environmental Pollution Prevention and Control, NIT, Trichy.

  • Menaka, C. and Ponmagal, R.S. (2014) ‘Secure Cloud Architecture for Hospital Information System’, International Conference on Architecture, Software systems and Green Computing, pp. 219-223, ISBN. 978-93-81208-31-1.

  • KirubaDevi, T. and Ponmagal, R.S. (2014) ‘Service Based Intelligent Integration of Sensor Networks with Internet’, National Conference on Innovative Computing Techniques NCICT, pp. 80-84, ISBN. 978- 81-925141-9-2.

  • Menaka, C. and Ponmagal, R.S. (2014) ‘A Survey on Security Issues in Cloud Services’, National Conference on Innovative Computing Techniques NCICT, pp. 91-95, ISBN. 978- 81-925141-9-2.

  • Arun, M. and Ponmagal, R.S. (2014) ‘The Enhanced USB’, National Conference on Innovative ComputingTechniques NCICT, pp. 404-406, ISBN. 978- 81-925141-9-2.

  • Jeyanthi, M. and Ananthan, T.V. (2014) ‘Enhancing Driving Controls with Vehicular Ad Hoc Network’, NCICT, ISBN. 978- 81-925141-9-2.

  • Mohana. and Ananthan, T.V. (2014) ‘Web Services Composition’, NCICT, ISBN. 978- 81-925141-9-2.

  • Dhanasekaran, C., Teja, R. and Ponmagal, R.S. (2014) ‘The Survey on Security Issues in Nxg Addressing’, National Conference on Innovative Computing Techniques NCICT, pp. 649-652, ISBN. 978- 81-925141-9-2.

  • Vijayashree, Kolla Bhanu Prakash, Ananthan, T.V. (2013) Training the Neural Network Using Levenberg-Marquardts Algorithm to Optimize the Evacuation Time in an Automotive Vacuum Pump, RITS ICAEM-2013, 2nd Internaiontal Conference on Advancements in Engineering Management, pp.981-985, Hydrabad

  • Geetha, S. Anandha Mala, G.S. (2013) Extraction of Key Attributes from Natural language Requirements Specification Text, International Conference on Sustainable Energy and Intelligent System (SEISCON 2013)

  • Vijayashree, Kolla Bhanu Prakash, Ananthan, T.V. and Ganesan, V. (2013) Optimization of evacuation time in an automotive vacuum brake using artificial neural network, International Conference on Design, Analysis, Manufacturing and Simulation (ICDAMS 2013),Chennai

  • Vijashree, Kolla Banu Prakash, Ananthan, T.V. (2013) Training the Neural Network using Levenberg-Marquardts Algorithm to Optimize the Evacuation time in an Automotive Vacuum Pump, RITS ICAEM-2013, International Conference on Advancement in Engineering and Management at Royal Institute of Technology, Hyderabad, Andra Predesh, India. ISBN 978-93-5104-586-1

  • Vijashree, Kolla Banu Prakash, Ananthan, T.V. (2013) Optimization of Evacuation Time in an Automotive Vacuum Brake using Artificial Neural Network, International Conference on Design, Analysis, Manufacturing and Simulation (ICDAMS-2013), Department of Mechanical Engineering, Saveetha School of Engineering, Saveeetha University

  • Saishanmuga Raja, V. Rajagopalan, S.P. (2013) Genetic Optimized Neural Network for Human Iris Recognition System, International Conference on Emerging Trends and Challenges in Science and Technology

  • Muthukrishnan, P. Golda Selia, I. (2013) Detachable And Transformable Data Masking In Encrypted Image, National Conference on Web Technology, NCWT13, ISBN 978-93-81208-16-8

  • Golda Selia, I. Latha Parthiban (2013) Noise Suppression of magnetic Resonance Image using genetic Algorithm, National Conference on Architecture, Software systems and Green Computing

  • Shoba Rani (2013) Implementation of Textile Image Segmentation using Contextual Clustering and Fuzzy Logic, Proceedings of International Conference on Internet Computing and Information Communications, ISSN: 2194-5357, Vol. 216, pp.461-469, Springer Publication

  • Saishanmuga Raja, V. Naveen Kumar, S. (2013) Improving Storage Security in Cloud Computing Using Public Autitability and Data Dynamics, International Conference on Emerging Trends and Challenges in Science and Technology

  • Shobarani, Jafer Ali Ibrahim, (2013) Face Recognition and Facial age estimation using facial local features, International Conference on "Advanced computing Machines and Embedded Technology, ISBN: 978-93-80757-74-2

  • Saishanmuga Raja .V, Rajagopalan, S.P. (2012) Image pattern recognition Using Genetic algorithm and Neural Networks, National conference on Challenges in Business Practices, ISBN:978-93-81430-42-2

  • Saishanmuga Raja,V. (2012) Face Recognition Using Genetic algorithm and Neural Networks, International Conference on Innovative Computing and Information Processing, ISBN: 978-81-8424-758-9

  • Saishanmuga Raja, V. Rajagopalan, S.P. (2012) A Novel Human Iris Recognition System Using Genetic Optimized Neural Network, International Conference on E-Governance and Cloud Computing

  • Rajakumar, R.S. Ravi, S and Suresh, R.M. (2012) Efficient Computation of phonocardio graphic signal analysis in Classified Layer System, International Conference in Computational Intelligence

  • Kolla Bhanu Prakash, Dorai Ranga Swamy, M.A. Arun Raja Raman, (2012) Statistical Interpretation for Mining Hybrid Regional Web Documents, ICIP 2012, CCIS 292, pp. 503–512

  • Geetha, S. Anandha Mala, G.S. (2012) Effectual Extraction of Data Relations from Unstructured Data, Third International Conference on Sustainable Energy and Intelligent System

  • Sumathy Eswaran, Rajagopalan, S.P. (2012) Selection using SRLCS Model for Protein Comparative Modeling, National Conference on Challenges in Business Practices, pp. 89 – 92

  • Sumathy Eswaran and Rajagopalan, S.P. (2012) Selection using SRLCS Model for Protein Comparative Modeling, National Conference on Challenges in Business Practices CIBP-2012, 89 – 92

  • Golda Selia, I. Madhumithaa, S.K. (2012) CRM System in Cloud Computing With Different Service Provider, National Conference on Architecture,Software systems and Green computing, Aarupadai Veedu Institute of Technology Vinayaka Missions University, Chennai

  • Shobarani, R. Purushothaman, S. (2012) Review of Texture types and Texture Analysis Methods, International Conference on E-Governance and Cloud computing services, Chennai. ISBN: 978-81-910827-9-1, pp.557-560

  • Prabhu,T. (2012) Size and Flexibility Matrix for e-Learning System, International Conference in Computing and Control Engineering, Dr.M.G.R. Educational and Research Institute University, Chennai

  • Srinivasan, P.K. (2012) Video Streaming Distribution in vanets, National Conference on grid and cloud computing, PB Engineering College.

  • Srinivasan, P.K. (2012) Time Cost Scheduling algorithm, International conference in computing and control engineering, Dr.M.G.R. Educational and Research institute University, Chennai

  • Kavitha, R. (2012) Software defined radio – the future radio, National Conference on Recent trends in electrical and electronics Engineering, PB College of Engineering.

  • Anusuya, Golda Selia, Latha Parthiban, (2011) Non subsampled contourlet Based Denoising and Fusion of satellite Images, International Conference on Ongoing Research in Management and IT at ASM Campus, Pune

  • Golda Selia, Anusuya, Latha Parthiban, (2011) A gabor Based technique for matching low Resolution Fingerprint Images, International Conference on Ongoing Research in Management and IT at ASM Campus, Pune

  • Aneesh, L. Euprazia and Ponmagal, R.S. (2011), Energy Efficient Quantized- XML for Wireless Sensor Networks, IJCA Proceedings on International Conference on VLSI, Communications and Instrumentation (ICVCI), Foundation of Computer Science, (13) p-31–33

  • Sumathy Eswaran and Rajagopalan, S.P. (2011) A Study of Performance of Longest Common Subsequence Identification with Sequence Identity of Biosequences, Proceedings of the International Conference on Sustainable Energy and Intelligent System , 666-669, ISBN: 978-9-38043-000-3

  • Sumathy Eswaran and Rajagopalan, S.P. (2011) Comparison of SRLCS with Clustal-W for identifying Longest Common Subsequence in Biosequences, proceedings of 2nd National Conference on Researches in Computer Application & Information Technology, pp. 120 -125

  • Dharani, S. (2011) Content Based Image Retrieval, International Conference on Emerging Technology Trends

  • Dharani,S. (2011) Color Histogram Features Based Image Classification in CBIR System, International Conference on Biomedical Inst. Engg & Environmental Management

  • Geetha, S. Anandha Mala, G.S. (2011) A survey on informaton extraction using entity relation
    based methods, Second International Conference on Sustainable Energy and Intelligent System, pp. 882 – 885

  • Tamilarasi, S. (2010) Distributed Cyber Care using SOA, Conference on Computational Systems & Communication Technology

  • Tamilarasi, S. (2010) E – Learning Management System Using SOA, National Conference on Recent trends in Advanced Computing, Bharath University, Chennai

  • Rajakumar, P.S. Ravi, S. Suresh, RM. (2010) Speech Enhancement Models Suited for Speech Recording using Composite Source Model and Wavelet Decomposition Model in Proc IEEE International Conference on Signal and Image Processing, pp.511 – 514

  • Rajesh, V. Gnanasekar, J.M. Ponmagal, R.S. and Anbalagan, P. (2010) Integration of Wireless Sensor Networks with Cloud, International Conference on Recent trends in Information, Telecommunication and Computing, pp. 321-323, Cochin

  • Ponmagal, R.S. (2010) Adaptive FEC based packet loss flexible scheme for voice communication over ad hoc wireless network, National Conference on Computing Techniques and Systems, Muthayammal Engineering College, Rasipuram

  • Anbalagan, P. Malarvizhi, S. Ponmagal, R.S. (2010) Xml based data representation model for the exchange of power system reliability, International conference on Industrial and Information systems, pp. 458

  • Prabhu, T. (2010) Fast accurate computation of large scale traffic matrices form link nodes , National Conference on intelligent information and distributed computing, Dr.M.G.R. Educational and Research institute University , Chennai

  • Ponmagal, R.S. (2009) A Qos based link estimation routing algorithm for wireless sensor Networks, National conference on Microwave and Optical Communication, at A.C. College of Engineering and Technology, Karaikudi

  • Shoba Rani (2009) Review in Textures in Computer Vision, International Conference on Intelligent Science & Technology, Sun College of Engineering Technology

  • Sreeram, G. Ramesh, S. Murali Bhaskaran, V. (2009) Implementation of Quantum Cryptography in 802.11i Networks, International Conference on Recent Trends in Computing and Communications, FACT2009, KCG College of Engineering & Technology,Chennai

  • Sumathy Eswaran (2009) Technology and Unlocking Hidden Values in Logistics, International Conference on Transnational Business Challenges & Strategies, Dr.M.G.R. Educational and Research Institute, Chennai

  • Prabhu, T. (2009) Grid Computing , optimized resource discovery algorithm , National Conference on emerging trends in computing and information Technology, Srinivasa institute of engineering and technology, Chennai

  • Srinivasan, P.K. (2009) Web Based Distributed authoring and Versioning, National Conference: Emerging Trends in Computing and Information Technology, srinivasa institute of engineering and Technology

  • Shobarani, R. Purushothaman, S. (2008) Texture image segmentation using Gabor Filter and Artificial Neural Network, IEEE Conferences on AI Tools in Engineering, at Cummins College of Engineering for Women, Pune

  • Shobarani, R. Purushothaman, S. (2008) Impact of Image Segmentation on transforming the society, International conference on Researching for Transforming the Society, Chennai

  • Ramakrishnan, H.V. (2008) GSM intelligent networks, World Congress on Sciencer, Engineering and Technology 2008 (WCSET 2008), Bangkok,Thailand

  • Ramakrishnan, H.V. (2008) IP Based Network Address Management, International conference on Advanced Computing Technologies, Gokaraju Rangaraju Institute of Engineering &Technology, Bachupally, Kukatpally, Hyderbad – 500072, Andhra Pradesh, India

  • Ramakrishnan, H.V. (2008) GSM intelligent networks, International Conference&Symposium on Storage Technologies NMAM Institute of technology NITTE, UDUPI(D), Karnataka with storage technology leader-EMC

  • Ramakrishnan, H.V. (2008) Web Based integrated Network Management-Case Study, Procedings of the International conference on Advanced Computing and Communication Technologies for High performance Application Vol-1, Centre for high Performance Computing federal Institute of Technology-cochin, Kerala-Sponsered by IEEE

  • Prabhu, T. (2008) Advanced parallel and distributing computing for a grid port using web services, National Conference on recent trends in advanced computing, SKR Engineering College, Chennai

  • Srinivasan, P.K. (2008) Anthropometric data through cluster analysis, National Conference: Recent Trends in Advanced Computing, S.K.R Engineering College

  • Srinivasan, P.K. (2008) A Heuristic approach for multi cast routing with delay and delay variation, National Conference: Emerging Trends in Engineering and Technology, GKM college of Engineering and Technology

  • Kavitha, R. (2008) An Active load balancing system for distributed networks with delays, National Conference on Computing Technologies, Mepco Schlenk Engineering College, Sivakasi

  • Dr. N. Kanya, Dr. S Geetha, Dr. Rajakumar, & Dr. Dahlia Sam, "Essentials of Database Management Systems” 2021, ISBN : 978-93-88568-23-4
  • Ms. S.Amudha , Dr. P.S.Rajakumar & Ms. V.R.Niveditha, "Environmental Science and Engineering”, 2020, ISBN: 978-93-86388-36-0, Jupiter Publications Consortium, Chennai
  • Dr. T.V.Ananthan, Dr. D.Usha , Ms. T.Yuvarani & Ms. V.R.Niveditha, " Cyber Security &Forensics”, 2020, ISBN: 978-81-947070-6-6, Magestic Technology Solutions Pvt.Ltd., Chennai
  • Dr. T.V.Ananathan , Dr. S.Radha Rammohan & Ms. V.R.Niveditha, "Mobile security”,2020, ISBN : 978-93-86388-37-7, Jupiter Publications Consortium, Chennai
  • Dr. S. Geetha, Dr. T.V.Ananathan, Ms. V.R.Niveditha & Mr. AmandeepSingh K, "Rudiments of Internet of Things”,2020, ISBN: 978-81-947070-0-4 ,Magestic Technology Solutions Pvt.Ltd.
  • R.Aiyshwariya Devi , "Etcetera of Research World”, 2017, ISBN : 9788193714539
  • Dr.Sumathy Eswaran, & Dr.R.S.Ponmagal, "Tutorials in Computer Science & Engineering ", 2016, ISBN : 978-93-84654214
  • Dr.Sumathy Eswaran, S.Geetha, Dr.V.N.Rajavarman, & Dr.T.V.Ananthan , "Innovative comprehension on Computer Science Fundamentals”, 2015, ISBN: 9789384654184
  • Prabhu, T, "C Programming Made Easy”, 3rd ed., 2013, Kanthimathi Publications
  • Kanya, N. & Jayanthi, "Software Engineering”, 1st Edition, 2010 Jeppiaar Press, Chennai
  • Ponmagal.R.S., " A Text Bookof Computer Programming”, 2009, Dhanam Publications, Chennai.
  • Sumathy Eswaran & Rajagopalan, S.P. " Computer Architecture and Organization” 2009, . ISBN: 978-81-87156- 54-6, Viswanathan Publisher, Chennai.

Our Presence



Contact Us 

Head of the Department,
Department of Computer Science and Engineering,
Dr.M.G.R. Educational and Research Institute,
Maduravoyal
Chennai - 600095

Ph.No : +91 44 2378 2176 Extn: 218
Fax no : +91 44 2378 2165
Mail id : hod-cse[at]drmgrdu.ac.in