Department Of Computer Application - Publications
2018-2019
No. | Name of the Staff | Title of the Article/Paper | Name of the Book/with Publishers/Name of the Journal/Seminar details | Venue & Date | Position | Level |
1. | Ms.M.Florence Dayana | Implementation of web content extraction of structured data using dotnet framework | (IJCSE)UGC No: 64718, Journal with ISSN NO: 2347-2693 | - | Published | International |
2. | Ms.M.Florence Dayana | An efficient way of relevant data extraction in web content | (IJCSE)UGC No: 64718, Journal with ISSN NO: 2347-2693 | - | Published | International |
3. | Ms.M.Florence Dayana | Automatic Railway Gate Control System using RFID | IJSRCSEIT, Volume-5, Issue-1, Journal with ISSN NO: 2456-3307, PP-303-306. | - | Published | International |
4. | Ms.M.Florence Dayana | E-tax Information System | IJSRCSEIT, Volume-5, Issue-1, Journal with ISSN NO: 2456-3307, PP-289-291. | - | Published | International |
5. | Ms.V.Santhi | Reversible Datahiding in Homomorphic Encrypted Domain by monitoring Ciphertext Group | IJSRCSEIT, Volume-5, Issue-1, Journal with ISSN NO: 2456-3307, PP-303-306 | - | Published | International |
6. | Ms.V.Santhi | Adblock Usage in Web Advertisement | IJSRCSEIT, Volume-5, Issue-1, Journal with ISSN NO: 2456-3307, PP-404-408. | - | Published | International |
2017-2018
S.No | Name of the author | Title of the paper | Name of the Journal | ISBN /ISSN No. |
1 | R. Gomathi Jeyam - V. Shanthi | A Survey on comparative study of minimum spanning tree Algorithm | International Journal Computer Science and Engineering | 2347- 2693 |
2 | M.Florence Dayana | Analysing and improving mining quality of contents from net pages | International Journal of Advanced research in Computer Science and Software Engineering | 2277- 128x |
3 | D. Saritha | A survey on three components of cloud computing: safekeeping, exploration and imminent scope | International Scientific and Research | 2455- 1341 |
4 | V. Shanthi - R. Gomathijayam | Smart health care monitoring -Using sensors based Internet of things and challenges | International Scientific and Research | 2455- 1341 |
5 | P. Nivetha | Divide and Conquer Approach in machine to machine communication | International Scientific and Research | 2455- 1341 |
6 | M.Florence Dayana | Fishermen nautical Border Alert System | International journal of Trend in Scientific and Research | 2456- 6470 |
2016-2017
S.No | Name of the author | Title of the paper | Name of the Journal | ISBN /ISSN No. |
1 | R.Suganya | A Survey on web structure and web usage mining algorithms for web applications | IJSTE with Impact factor 4.57 | 2349-784X |
2 | R.Sathya - M.JancyPriya | A Survey on partitioned based clustering in various applications | IJSRST | 2395 -602X |
3 | K.Sumathi -M.Florence Dayana | Evaluation of pattern of student project management using Android Application | IJSRST | 2395 -602X |
4 | M.Florence Dayana | An Effective web ontology using web crawler systems to measures web similarities | IJETIY | 2319-8613 |
2015-2016
S.No | Name of the author | Title of the paper | Name of the Journal | ISBN /ISSN No. |
1 | M. Florence Dayana | Semantic Searching Technique Based on Ontology | International Journal of Earth Science and Engineering | 978-1-4673-6725-7 |
2 | M. Florence Dayana | Detection of Wormwhole Attack using Bucket Leak Detection Method | National Conference on Innovative Trends in IT NCITIT | 2349-5979 |
3 | M. Florence Dayana | A Reliable and Virtual file Deduplication Techniques for modern Distributed clouds | National Conference on Innovative Trends in IT NCITIT | 2349-5979 |
4 | M. Florence Dayana | Context Aware Access Control model for smart M3 platform | National Conference on Innovative Trends in IT NCITIT | 2349-5979 |
2014-2015
S.No | Name of the author | Title of the paper | Name of the Journal | ISBN /ISSN No. |
1 | M. Florence Dayana | Anthropologist Based Social N/W Analysis and Data Mining Approaches | International Conference on E- Technologies in Anthropology -ICETA 15 with Impact factor 2.5 | 2277 128 X -Vol-5, ISS-3 |
2 | K. Saranya | A Survey of the effect of online privacy information on purchasing behaviour | International Conference on E-Technologies in Anthropology -ICETA 15 with Impact factor 2.5 | 2277 128 X -Vol-5, ISS-3 |
3 | G. Sripriya | Cyber Crime and security issue in Anthropology | International Conference on E-Technologies in Anthropology -ICETA 15 with Impact factor 2.5 | 2277 128 X -Vol-5, ISS-3 |
4 | J. Sinthiya | Educational of Anthropology information security using Cloud computing | International Conference on E- Technologies in Anthropology -ICETA 15 with Impact factor 2.5 | 2277 128 X -Vol-5, ISS-3 |
5 | S.Alamelu Krithiga | Data Mining Techniques in the field of applied Anthropology with respect to social n/w Analysis | International Conference on E-Technologies in Anthropology -ICETA 15 with Impact factor 2.5 | 2277 128 X -Vol-5, ISS-3 |
6 | R.Suganya | Analysis of implementing web usage mining and i- miner in E- Business | International Conference on E- Technologies in Anthropology -ICETA 15 with Impact factor 2.5 | 2277 128 X -Vol- 5, ISS - 3 |
7 | K.Kasanthi | E-learning in Educational Technology towards Health Care | International Conference on E-Technologies in Anthropology -ICETA 15 with Impact factor 2.5 | 2277 128 X -Vol-5, ISS-3 |
8 | D.Ramya | Effects of Anthropology in E-society | International Conference on E-Technologies in Anthropology -ICETA 15 with Impact factor 2.5 | 2277 128 X -Vol-5, ISS-3 |