Changes

no edit summary
Line 54: Line 54:     
==Publications==
 
==Publications==
1. “Rules Based Routing for Preset Controls with MAC in Wireless Multihop Networks" published in International Journal of Applied Engineering Research ISSN 0973-4562 http://www.ripublication.com/ijaer.htm.Vol. 10 No.5 (2015) pp. 4001-4009, Anna University Annexure II Journal
+
# “Rules Based Routing for Preset Controls with MAC in Wireless Multihop Networks" published in International Journal of Applied Engineering Research ISSN 0973-4562 http://www.ripublication.com/ijaer.htm.Vol. 10 No.5 (2015) pp. 4001-4009, Anna University Annexure II Journal
   −
2. “Modeling and Analysis for Proactive Spectrum Handoff in Cognitive Radio Adhoc Networks with Improved Throughput and Security”, Published on International Journal of Wired and Wireless Communications Vol.2, Issue 2, April, 2014, pp 5-9, Print-ISSN: 2319-9512 e-ISSN: 2319-9520
+
# “Modeling and Analysis for Proactive Spectrum Handoff in Cognitive Radio Adhoc Networks with Improved Throughput and Security”, Published on International Journal of Wired and Wireless Communications Vol.2, Issue 2, April, 2014, pp 5-9, Print-ISSN: 2319-9512 e-ISSN: 2319-9520
   −
3. “An Efficient Mining Approach for Tracking Moving Objects”, published on Information Science and Technology ISSN: 0976-917X & ISSN: 0976-9188, Volume 3, Issue 1, 2014, pp.-051-053.
+
# “An Efficient Mining Approach for Tracking Moving Objects”, published on Information Science and Technology ISSN: 0976-917X & ISSN: 0976-9188, Volume 3, Issue 1, 2014, pp.-051-053.
   −
4. “Secure Mobile Health Monitoring Using Cloud Storage” published on Noto-are 19205225: Computer engineering & Computer hardware. 2014-07-20.ISSN 1941-2681 http://www.notoare.com/19205225, pp -1-4
+
# “Secure Mobile Health Monitoring Using Cloud Storage” published on Noto-are 19205225: Computer engineering & Computer hardware. 2014-07-20.ISSN 1941-2681 http://www.notoare.com/19205225, pp -1-4
   −
5. “Theft Identification during Data Transfer in it Sector” Published on International Journal of Computer Science and Information Engineering Published By: Serials Publications ISSN: 0976-626X. (Vol.4 No.1 2013) Pages: 7-11.
+
# “Theft Identification during Data Transfer in it Sector” Published on International Journal of Computer Science and Information Engineering Published By: Serials Publications ISSN: 0976-626X. (Vol.4 No.1 2013) Pages: 7-11.
   −
6. “An Efficient Mining Approach for Tracking Moving Objects” Published on World Research Journal of Computation Theory – Bio info journals ISSN: 2229-712X10.9735, Volume-2, Issue-5, Pages: 16-19 Aug 2013.
+
# “An Efficient Mining Approach for Tracking Moving Objects” Published on World Research Journal of Computation Theory – Bio info journals ISSN: 2229-712X10.9735, Volume-2, Issue-5, Pages: 16-19 Aug 2013.
   −
7. “In Wireless Sensor Network Vis Global Snook Armor Demeanor Privacy” Published on Elixir Comp. Sci. &Engg. 63 (Oct2013) pp 18258-18260. Elixir International Journal ISSN: 2229-712X.
+
# “In Wireless Sensor Network Vis Global Snook Armor Demeanor Privacy” Published on Elixir Comp. Sci. &Engg. 63 (Oct2013) pp 18258-18260. Elixir International Journal ISSN: 2229-712X.
   −
8. "Page Ranking For Ontology Based Search Engine", Uot: 025.4.03 Journal Of Qafqaz University- Mathematics And Computer Science2013.  ISSN:1302-6763Volume 1, Number 2  Pages 99-103
+
# "Page Ranking For Ontology Based Search Engine", Uot: 025.4.03 Journal Of Qafqaz University- Mathematics And Computer Science2013.  ISSN:1302-6763Volume 1, Number 2  Pages 99-103
   −
9. “Security and Analysis for Batch Transparency and Dynamic Storage in Cloud Computing” Published on CiiT International Journal of Networking and Communication Engineering Print: ISSN 0974 – 9713 & Online: ISSN 0974 – 9616, vol 4, issue 14,pp 894-898
+
# “Security and Analysis for Batch Transparency and Dynamic Storage in Cloud Computing” Published on CiiT International Journal of Networking and Communication Engineering Print: ISSN 0974 – 9713 & Online: ISSN 0974 – 9616, vol 4, issue 14,pp 894-898
   −
10. “Diagonalization Matrix Method of solving the first basic problem of Hidden Markov Model in speech Recognition system” Published on Anale. SeriaInformaticăVolumul 8, Fascicula 1, ISSN: 1583-7165 &ISSN: 2065-7471. Pp: 17-26.
+
# “Diagonalization Matrix Method of solving the first basic problem of Hidden Markov Model in speech Recognition system” Published on Anale. SeriaInformaticăVolumul 8, Fascicula 1, ISSN: 1583-7165 &ISSN: 2065-7471. Pp: 17-26.
   −
11. “Analysis of Chaotic-Chebyshev Polynomials using on Public Key Cryptosystems”, Published on GESJ-Computer Sciences and Telecommunications, Reviewed Electronic Scientific Journal (GESJ CST), ID1589, Aug 2009.ISSN 1512-1232.
+
# “Analysis of Chaotic-Chebyshev Polynomials using on Public Key Cryptosystems”, Published on GESJ-Computer Sciences and Telecommunications, Reviewed Electronic Scientific Journal (GESJ CST), ID1589, Aug 2009.ISSN 1512-1232.
   −
12.   “Public Key Cryptosystems Based On Chaotic- Chebyshev Polynomials”, Published on JETR- Journal of Engineering and Technology Research Vol.1 (7), pp. 122-128, October, 2009, ISSN 2006-9790.  
+
# “Public Key Cryptosystems Based On Chaotic- Chebyshev Polynomials”, Published on JETR- Journal of Engineering and Technology Research Vol.1 (7), pp. 122-128, October, 2009, ISSN 2006-9790.  
   −
13. "Ear as a Raised area for Hottest Biometric Solution Using Universality, Distinctiveness, Permanence and Measurability Properties -- PURS Using UDPM", World Congress on Computing and Communication Technologies (WCCCT) 2014, pp. 39-43, doi:10.1109/WCCCT.2014.57
+
# "Ear as a Raised area for Hottest Biometric Solution Using Universality, Distinctiveness, Permanence and Measurability Properties -- PURS Using UDPM", World Congress on Computing and Communication Technologies (WCCCT) 2014, pp. 39-43, doi:10.1109/WCCCT.2014.57
   −
14. "Public Key Cryptosystems Using Chebyshev Polynomials Based on Edge Information", World Congress on Computing and Communication Technologies (WCCCT) 2014, pp. 243-245, doi:10.1109/WCCCT.2014.21  
+
# "Public Key Cryptosystems Using Chebyshev Polynomials Based on Edge Information", World Congress on Computing and Communication Technologies (WCCCT) 2014, pp. 243-245, doi:10.1109/WCCCT.2014.21  
   −
1. “Performance and Analysis of Prioritization Security for Input-Queued Packet Switches”, Published on IEEE Explorer & IEEE Proceedings of the International Conference on Communication and Computational Intelligence (INCOCCI 2010), 27-29 Dec 2010. 978-81-8371-369-6/10 © 2010 IEEE.
+
# “Performance and Analysis of Prioritization Security for Input-Queued Packet Switches”, Published on IEEE Explorer & IEEE Proceedings of the International Conference on Communication and Computational Intelligence (INCOCCI 2010), 27-29 Dec 2010. 978-81-8371-369-6/10 © 2010 IEEE.
   −
2. “Public Key Cryptosystems Based on Chaotic- Chebyshev Polynomials”, Published on IEEE Computer Society Trivandrum Section IEEE Explorer & Proceedings of the International conference on Advances in Recent Technologies in Communication and Computing (ARTCOM2009)–Aug 2009.978-0-7695-3845-7/09 © 2009 IEEEDOI 10..6421109/64.
+
# “Public Key Cryptosystems Based on Chaotic- Chebyshev Polynomials”, Published on IEEE Computer Society Trivandrum Section IEEE Explorer & Proceedings of the International conference on Advances in Recent Technologies in Communication and Computing (ARTCOM2009)–Aug 2009.978-0-7695-3845-7/09 © 2009 IEEEDOI 10..6421109/64.
   −
3. “Public Key Cryptosystems Based On Chaotic- Chebyshev Polynomials Using Arnold Cat Algorithm”, Published on IEEE Chennai Section IEEE Explorer & Proceedings of the International conference on Intelligence Agent and Multi Agent System the International conference on 978-1-4244-4711-4/09 ©2009 IEEE/ IAMA.2009.
+
# “Public Key Cryptosystems Based On Chaotic- Chebyshev Polynomials Using Arnold Cat Algorithm”, Published on IEEE Chennai Section IEEE Explorer & Proceedings of the International conference on Intelligence Agent and Multi Agent System the International conference on 978-1-4244-4711-4/09 ©2009 IEEE/ IAMA.2009.
    
4. “An Efficient Mining Approach for Tracking Moving Objects” Published on National Conference on Advancements in the Era of Multi Disciplinary Systems (AEMDS-2013) Elsevier Publications 2013, pp 166-171, ISBN : 9789351070573
 
4. “An Efficient Mining Approach for Tracking Moving Objects” Published on National Conference on Advancements in the Era of Multi Disciplinary Systems (AEMDS-2013) Elsevier Publications 2013, pp 166-171, ISBN : 9789351070573
Bureaucrats, Check users, lookupuser, Administrators, translator
3,197

edits