Bibliographic Database

Found 85 results
Filters: Keyword is Department of Information Science and Engineering  [Clear All Filters]
2018
Deepti, C.., "An Insight into Identity based Authentication Techniques for the Internet of Things Environment", International Conference on Electrical, Electronics, Computers,Communication, Mechanical and Computing, 2018.
2017
Selvarani, R.., and R.. Bharathi, "Analysis of Error Propagation in Safety Critical Software Systems: An Approach Based on UGF", Strategic Engineering for Cloud Computing and Big Data Analytics, pp. 83-99, 2017.
Selvarani, R.., and R.. Bharathi, "A Novel Safety Metric SMEP for Performance Distribution Analysis in Software System", Strategic Engineering for Cloud Computing and Big Data Analytics, Cham, Springer International Publishing, pp. 51-61, 2017.
Gautham,.., R. Meghana, and .. Saritha, "A Survey on Evaluation of Code Clone", IEEE International Conference on Computing Methodologies and Communications, 2017.
2016
Asmita, H.., J. Sreenivas, N. S. Kannan, and .. Saritha, "Accident Avoidance and Detection", International Journal of Latest Technology in Engineering,Management & Applied Science, vol. V, issue V, pp. 71-74, 2016.
Deepti, C.., M. N. Renuka Devi, and G.. Madhavi, "An Analysis of the Current Challenges in Efficient Video Processing", International Conference on Advances in Computing Logic, Sciences and Technology - 2016, vol. 6: AnanthaLakshmi Institute of Technology and Sciences,Anantpur,Andhra Pradesh, pp. 4-11, 2016.
Bora, K., S.. Saha, A.. Surbhi, M. Safonova, S.. Routh, and A. Narasimhamurthy, "CD-HPF: New habitability score via data analytic modeling", Journal of Astronomy and Computing (JAC), vol. 17, pp. 129-143, 2016.
Devi, M. N. Renuka, A.. Srinivasa, and G.. Srinivasa, "Detection of Multiple, Co-Occurring Actions in Video Frames", IEEE International Conference on Wireless Communications,Signal Processing and Networking: Sri Sivasubramaniya Nadar College of Engineering, Chennai, 2016.
Sheela, D.., E. Soni, and V. Soni, "Mobile and Android cloud computing: A survey", International Journal of Scientific & Engineering Research, vol. 7, issue 3, pp. 167-173, 2016.
Karthik, S.., and S. K. Murthy, "Segmentation and Recognition of Handwritten Kannada Text Using Relevance Feedback and Histogram of Oriented Gradients - A Novel Approach", International Journal of Advanced Computer Science and Applications, vol. 7, issue 1: IJACSA, pp. 472-476, 2016.
Kumar, A., S. Das, and C.. Deepti, "A Wi-Fi Direct based Mobile Application for Early Response to Persons in Emergency Situations", The SIJ Transactions on Computer Networks & Communication Engineering (CNCE), vol. 4, issue 2, pp. 19-24, 2016.
2015
Sinha, S., and K. Bora, "The Apartment service dispatch strategy and load estimation", InternationalJournal of Advanced Engineering Research, vol. 10: Research India Publications, pp. 43716-43721, 2015.
Karthik, S.., N. Sinha, C. S. Akshatha, A. Verma, and K. Chaitra, "Conversion of algorithm to an executable", National conference on Recent Innovations in Science and Engineering, 2015.
Bharathi, R.., and R.. Selvarani, "A Framework for the Estimation of OO Software Reliability using Design Complexity Metrics", The IEEE International Conference on Trends in Automation, Communication and Computing Technologies (ITACT 2015): IEEE, pp. 19-25, 2015.
Karthik, S.., and S. K. Murthy, "Handwritten Kannada Characters Recognition using BRISK descriptors", International Conference on Innovations in Computer Science and Information Technology, 2015.
Karthik, S.., and S. K. Murthy, "Handwritten Kannada Numerals Recognition Using Histogram of Oriented Gradient Descriptors and Support Vector Machines", Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2: Springer, pp. 51-57, 2015.
Karthik, S.., and S. K. Murthy, "Handwritten Kannada Numerals Recognition using Structural Features and Support Vector Machines", International Conference on Innovations in Computer Science and Information Technology, 2015.
Jayadevappa, S.., D.. S. Sandesh, I.. Priyanka, P. Naik, and A. Kumar, "Parallel Implementation and Performance Evaluation of Facial Recognition Algorithms Using Open Source Technologies", 8th International Conference on Advances in Pattern Recognition (ICAPR 2015), 2015.
2014
Karthik, S.., and S. K. Murthy, "Handwritten Kannada Numerals recognition using SURF descriptors", International Multi Conference on Innovation in Engineering & Technology, 2014.
Rathod, S.., and C.. Deepti, "An Integrated Fast Reroute Approach for Routing Protection in IP Networks", Int. Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), vol. 2, issue 5, pp. 4015-4020, 2014.
Jayadevappa, S.., and S.. Arjun, Intelligent Shopping Cart (filed), , 2014.
Sheela, D.., and G.. Mahadevan, "Mobile agent based enhanced security for wireless sensor networks", International Journal of Business Data Communications and Networking (IJBDCN), vol. 10, issue Issue 2: IGI Global publications, pp. 16-30, 2014.
2013
Shivanagu, R.., and C.. Deepti, "An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wireless Sensor Networks", Int.Journal of Foundations in Computer Science and Technology(IJFCST),, vol. 3, issue 3, pp. 31-40,, 2013.
Mamatha, H. R., S.. Karthik, and S. K. Murthy, "Classifier Fusion Method to Recognize Handwritten Kannada Numerals", arXiv preprint arXiv:1301.0167, 2013.
Syama, M.., and C.. Deepti, "Energy Efficient Source Authentication method for False Data Filtering in WSN", International Conference on Electrical Engineering and Computer Science: IRNET, 2013.
Syama, M.., and C.. Deepti, "An Evaluation of Energy Efficient Source Authentication M Methods for False Data Filtering in WSN", Int. Journal of Security, Privacy and Trust Management(IJSPTM), vol. 2, issue 2, pp. 33-41, 2013.
Syama, M.., and C.. Deepti, "An Evaluation of enroute filtering methods for False Data Injection attacks in WSN", Int. Journal of Engineering Research and Technology(IJERT), vol. 2, issue 4, pp. 345-350, 2013.
Sinha, S., and S.. Saha, "Extending and Improvising Service Discovery in MANET-relevant work and future proposal", International Conference on Information Science and Technology Applications (ICISTA-2013): Atlantis Press, 2013.
Deepti, C.., "A Framework for Monitoring Interface for Local Area Networks via Personal Bluetooth Computing", Int. Journal of Computer Applications (IJCA), vol. 63, issue 17, pp. 27-30, 2013.
Karthik, S.., S.. Saha, and G.. Chaithra, "A new relevance feedback based approach for efficient image retrieval", International Journal of Computer Applications, vol. 61, issue 14: Foundation of Computer Science, 2013.
Jayadevappa, S.., and D.. Sandesh, "Real Time Drowsy Driver Detection using Haarcascade Samples", 2nd International Conference on Advanced Information Technology & Applications (ICAITA-13), 2013.
Sheela, D.., and G.. Mahadevan, "A Security Approach using Mobile Agents for Wireless Sensor Networks", European Journal of Scientific Research, vol. 101, issue 3, pp. 372-386, 2013.
Shivanagu, R.., and C.. Deepti, "A Security Mechanism against Reactive Jammer Attack in Wireless Sensor Networks Using Trigger Identification Service", Int. Journal of Security, Privacy and Trust Management(IJSPTM), vol. 2, issue 2, pp. 43-54, 2013.
Shivanagu, R.., and C.. Deepti, "A Security Mechanism against Reactive Jammer Attack in Wireless Sensor Networks Using Trigger Identification Service", Int. Journal of Security, Privacy and Trust Management(IJSPTM), vol. 2, issue 2, pp. 43-54, 2013.
Sheela, D.., G.. Mahadevan, and R. M. S. Parvathy, "Security services for DoS, Hello flooding and Traffic Analysis in WSN using Mobile agents", International Review on Computers and Software (I.RE.CO.S.), vol. 8, issue 7: Praise worthy prize publications, pp. 1564-1570, 2013.
Karthik, S.., H. R. Mamatha, and S. K. Murthy, "A Statistical and Structural Feature Based Approach for the Recognition of Isolated Handwritten Kannada Characters", International Conference on Human Computer Interface, pp. 23-24, 2013.
Joy, S. P., and P. Chandran, "Toward a Computational Trust Model for Secure Peer-to-Peer Communication", Managing Trust in Cyberspace: CRC Press, pp. 131, 2013.
2012
Karthik, S.., H. R. Mamatha, and S. K. Murthy, "An Approach based on Run Length Count for Denoising the Kannada Characters", International Journal of Computer Applications, vol. 50, issue 18: Foundation of Computer Science, 2012.
Giri, A., and P. Reddy, "Blood Bank Management using Clouds", INFONIX-2012, 2012.
Giri, A., S. Katwani, and S. Nagarjun Satish, Comprehensive study on cloud computing technology & solution providers, , 2012.
Sheela, D.., V. R. Srividhya, A. Begam, .. Anjali, and G. M. Chidanand, "Detecting Black hole attacks in wireless sensor networks using mobile agent", ICAIES 2012, Singapore: PSRC, pp. 45-48, 2012.
Giri, A., N. Agarwal, and .. Shashank, "Efficient Vehicular Routing using ACO Strategies", National Conference On Networking , Image Processing & Multimedia -NaCoNIM- 2012, 2012.
Deepitha, K. R., and A. Giri, Ensuring Correctness and Error Localisation In Cloud, , vol. 4, issue 4, pp. 621-625, 2012.
Mamatha, H. R., S.. Karthik, and S. K. Murthy, "Feature based recognition of handwritten Kannada numerals-A comparative study", Computing, Communication and Applications (ICCCA), 2012 International Conference on: IEEE, pp. 1-6, 2012.
Menon, S., and S.. Jayadevappa, "A Generic Language for Hardware & Software, Are We There Yet? An Explorative Case Study Examining the Usage of SystemC Mulitcore Programming", 17th NASCUG, 2012.
Sheela, D.., V. R. Srividhya, and G.. Vrushali, "A mobile agent based security system of wireless sensor networks against cloning & sink hole attacks", ICCTAI 2012, Penang, Malaysia, issue 299-304: PSRC, 2012.
Sheela, D.., and G.. Mahadevan, "Mollifying the Effect of Cloning, Sink Hole and Black Hole Attacksin Wireless Sensor Networks using Mobile Agents with Several Base Stations", International Journal of Computer Applications, vol. 55, issue 9: Foundation of Computer Science, 2012.
Giri, A., S. Kataria, and K.. Nagaraj, Outages in Different Cloud Services, , 2012.
Giri, A., S.. Saha, and S. Kataria, "Outages Revenue-Loss generalized model in Cloud Computing", Cloud Computing & Service Engineering ( CLUSE - 2012), 2012.
Giri, A., R.. Deepthi, and V.. Kavya, "Performance Analysis of IPv4 & IPv6 across various operating systems", EMERGING TRENDS IN INFORMATION TECHONOLOGY, 2012.
Giri, A., J. R. Desai, and S.. Saha, "Theoretical Framework for a Secure Multicast in Cloud Scenario", IOAJ. Internet Computing, 2012.
Jayadevappa, S.., H. Arfath Syed, and S. Sridhar, VEHICLE MANAGEMENT SYSTEM, , issue US 9,068,374 B2, 2012.
2011
Vidya, A.., D.. Usha, B. M. Rashma, K. R. Venugopal, and L. M. Patnaik, "Computational Methods in Biological Sequence Analysis for Comlexity Reduction", The International Journal of Information Processing, vol. 5, issue 3: IK publications, pp. 37-46, 2011.
Karthik, S.., H. R. Mamatha, and S. K. Murthy, "A DFT Based Algorithmic Approach To Recognize The Handwritten Kannada Numerals", CSI National Conference on Emerging Trends in Information and Communication technologies, 2011.
Giri, A., and M.. Poornima, "Dynamic Load-Balanced Broadcast for Data-Intensive Applications on Clouds", National Conference On EMERGING TRENDS IN INFORMATION TECHONLOGY, 2011.
Sheela, D.., and G.. Mahadevan, "Efficient approach to detect clone attacks in Wireless sensor networks", 3rd International Conference on Electronics Computer Technology, vol. 5: IEEE, pp. 194-198, 2011.
Karthik, S.., S. K. Murthy, K. Uma Chembrolu, and V. Sridhar, "Improved Image Search and Retrieval based on Dominant Colors", International Journal of Computer Science & Informatics, vol. 1, issue 2: Interscience publications, pp. 30-33, 2011.
Karthik, S.., H. R. Mamatha, and S. K. Murthy, "Kannada Characters Recognition - A Novel Approach Using Image Zoning and Run Length Count", CiiT International Journal of Digital Image Processing, vol. 3, issue 16: Coimbatore Institute of Information Technology, pp. 1059-1062, 2011.
Karthik, S.., H. R. Mamatha, and S. K. Murthy, "Kannada characters recognition-a novel approach using image zoning and run length count", Digital Image Processing, vol. 3, issue 16: Coimbatore Institute of Information Technology, pp. 1059-1062, 2011.
Sheela, D.., N. C. Kumar, and G.. Mahadevan, "A non cryptographic method of sink hole attack detection in wireless sensor networks", International Conference on Recent Trends in Information Technology: IEEE, pp. 527-532, 2011.
Jayadevappa, S.., P. B. O. Kumar, .. Roopa, and A. K. Arjun, "A Novel Low Cost Intelligent Shopping Cart", 2nd IEEE International Conference NESEA 2011, 2011.
Menon, S., and S.. Jayadevappa, "A Novel System-Level Methodology for the Design and Implementation of Multiplexed Master-Slave System-on-Chip components using Object-Oriented Patterns", International Journal of Design, Analysis and Tools for Integrated Circuits and Systems, vol. 2, issue 1, pp. 60-69, 2011.
Sheela, D.., S.. Nirmala, S. Nath, and G.. Mahadevan, "A Recent Technique to Detect Sink Hole Attacks in WSN", ICICS 2011, Bangkok, Thailand: PSRC, pp. 36-43, July 8-9, 2011.
Sheela, D.., S.. Nirmala, S. Nath, and G.. Mahadevan, "A Recent technique to detect sink hole attacks in WSN", White paper, Anna University, 2011.
Bandyopadhya, D., S. Nath, D.. Sheela, and G.. Mahadevan, "A Scalable Secured Approach in Wireless Sensor Networks", ICCTAI 2011,Pattaya, Thailand, pp. 48-52, 2011.
Bandyopadhya, D., S. Nath, D.. Sheela, and G.. Mahadevan, "A Scalable Secured Approach in Wireless Sensor Networks", International Conference on Computational Techniques and Artificial Intelligence, pp. 48-52, 2011.
2010
Deepti, C.., "Design and Implementation of a Monitoring Interface using Bluetooth Ad hoc Networking", National Level Paper Presentation Conference: Sathyabhama University, Chennai, 2010.
Joy, S. P., and P. Chandran, "A formal framework for comparing group key agreement protocols with partial forward secrecy", IEEE 4th International Conference on Internet Multimedia Services Architecture and Application (IMSAA): IEEE, pp. 1-6, 2010.
Jayadevappa, S.., A. Ravi, R.. Bajarangbali, B.. Vivekanada, N. Pawar, and .. Rajesh, "GC 2010-104: Embedded Based Remote Access Analog Electronics Laboratory", 9th Global Colloquium on Engineering Education, 2010.
Jayadevappa, S.., and S.. Deepa, "GC 2010-6 The next generation Engineer Expectations, Challenges & Opportunities! A Simple Case study in Indian Context", 9th Global Colloquium on Engineering Education, 2010.
Mahadevan, G.., and D.. Sheela, "New Security protocol for Wireless Sensor Networks", ICCSIT-2010, RLJIT Bangalore, 2010.
Giri, A., and Y. Patel, A New Wireless Web Access Mode based on Cloud Computing, , 2010.
Menon, S., and S.. Jayadevappa, "A Pattern Based Methodology for the Design and Implementation of Multiplexed Master-Slave devices at the System-Level Use-case: Modeling a Level-2 Cache IP module at Transaction Level", IEEENESEA 2010, 2010.
Giri, A., and H. S. Mohan, Security Improvements on AES (Rijndael) Algorithm, , 2010.
Devi, M. N. Renuka, S.. Saha, and S. P. Deshpande, "Snow Classifier based Rapid Face Detection and Recognition Method", International Conference on Computer Science and Engineering, pp. 978-93, 2010.
2009
Jayadevappa, S.., and R.. Shankar, "The Changing Ways of Computer Science &Engineering Education: A Suitable Pedagogy to Adapt Better", ASEE-09, 2009.
Kumar, T., L. S. Rashmi, and S.. Jayadevappa, "Interactive Response System", International Conference On Management Technology For Educational Practices, 2009.
2008
Deepti, C.., and R.. Selvarani, "Unisys Safe Guard Disaster Recovery Solution", National Level Paper Presentation Conference: Dayananda Sagar Institutions, 2008.