Computer Science and Engineering (UG)

computer engineeringcomputer engineeringcomputer engineeringcomputer engineering

Computer Science and Engineering - Centre of Excellence

SONA NET ( SONA NETWORK COMPUTING RESEARCH CENTRE )                           

2013-2014

  1. S.Sridevi, R. Priyadharashini, M.Usha, “Priority – Based Timeslot assignment in MAC protocol for heterogeneous traffic in wireless sensor networks”, ICTACT- 2014.
  2. S.Sridevi, G. Rumeniya, M.Usha, “A Novel Node Disjoint Multipath Routing Protocol for QOS based Traffic in Wireless Sensor networks”, ICTACT – 2014.
  3. S.Sridevi, and M. Usha, “Towards a cross layer framework for improving QOS of delay sensitive heterogeneous WMSNs”, IEEE International Conference on Computing communication and network technologies, July 4-6, 2013.
  4. P. Shanmugaraja, S. Vasanthi, D. Balamurugan, S. Chandrasekar, “Design and Implementation of Transport Relay Translator and its security Mitigations”, International Journal of Engineering and Technology (IJET), Vol 5 No 4 , pp. no: 3439-3442, Aug-Sep 2013.
  5. D. Balamurugan , P. Shanmugaraja, S. Chandrasekar, D. Jayaprakash, “UDP Worm Detection In IPV6 networks using entropy variation”, International Journal of Soft Computing, 2013 (Accepted for publication).
  6. P.Shanmugaraja, D. Balamurugan, S. Chandrasekar, “Security Attacks on IPv4 to IPv6 Transitions – Possible Mitagation Techniques”, International Journal of Soft Computing(Accepted).
  7. K.Jaya Bharathy A.Prithiviraj Dr. K. Krishnamoorthy,” Optimizing handover performance for heterogeneous wireless networks in pmipv6 “,International Journal of Advanced Research in Computer Science, ISSN No. 0976-5697 , Volume 5, No. 1, Jan-Feb 2014 .

2012-2013

  1. S. Sridevi and M. Usha, “Dynamic priority and fairness based congestion control framework for heterogenous WMSNs”, European Journal of Scientific Research, Vol 93, Issue 4, December 2012, pp 594-610.
  2. R. Sumathi and M. Usha, ” Microstructure Development by Controlling Grain Size”, Journal of Computer Science and Control Systems, Vol. 5, No. 2, October 2012, pp 27-32.
  3. S.Sridevi, M.Usha, G.Pauline Amertha Lithurin, “Performance Analysis of Priority based Congestion Control for Heterogeneous Traffic in Multipath Wireless Sensor Networks”, CiiT International Journal of Wireless Communication, Volume 4, No. 9, June 2012, pp. 482-487.
  4. S.Sridevi, M.Usha, C.Arivazhagan, “Performance Evaluation of Quality Based Bidirectional Reliability Protocol for Wireless Sensor Networks”, CIIT International Journal of Wireless Communication, Volume 4, No. 9, June 2012, pp. 506-512.
  5. M. Usha, J. Akilandeswari and S.D. Fiaz, “ An efficient QoS framework for Cloud Brokerage Services “, International Symposium on “Cloud and Services Computing” ISCOS 2012, December 16-19, 2012, NIT-K, Surathkal.
  6. D. Balamurugan, S. Chandrasekar, D. Jaya Prakash, M.Usha, “Analysis of Entropy Based DDoS Attack Detection to Detect UDP Based DDoS Attacks in IPv6 Networks”, International Journal of Information and Computation Technology (IJICT), vol 3, No 10,pp. no: (25-28), March 2013.
  7. P.Shanmugaraja, D. Balamurugan, S. Chandrasekar, “An approach to secure Teredo Tunneling Technology”, International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 3, March – 2013.
  8. S.R.Sharanya, A.Prithiviraj, “Improving vertical handover performances in network based IPv6 domain”, International Journal of Information and Computation Technology (ISSN-0974-2239) Volume-3, Number-6, 2013, Page 487-490.
  9. S.R.Sharanya, A.Prithiviraj,  “Improving vertical handover performances in network based IPv6 domain” at International Congress on “Innovative Trends in Information Technology and computing science for competitive world (ITITCSWO-2013) at Jawaharlal Nehru University, New Delhi on 2nd March 2013.
  10. A.Prithiviraj,  “QOS Efficient Hnadover in Network Based IPv6 Domain”, NAC – CISS, March - 2013.

2011-2012

  1. M.Usha, Indira Priyadharshini Masilamani, “Routing Protocol using Cross-Layer Technique for Wireless Ad Hoc Sensor Networks”, International Journal of Computer Applications, Vol 30, No. 9, September 2011, pp. 43-48.
  2. P. Kavitha and M. Usha, “Classifier Selection Model for Network Intrusion Detection Using Data Mining”,  CiiT International Journal of Data Mining and Knowledge Engineering, September 2011, pp. 744-748.
  3. S.Sridevi and M. Usha , “Taxonomy of Transport Protocols for Wireless Sensor Networks”, International Conference on Recent Trends in Information Technology ICRTIT’11, MIT, Anna University, Chennai, and IEEE Madras Section, 3-5 June,2011, pp. 467-472, ISBN: 978-1-4577-0588-5.
  4. M.Usha and B.Prabadevi, “Multi-sensor Video surveillance System with Sensor Fusion for Human Detection”,  International Conference on Advanced Computing , Networking and Security ADCONS-2011, Vol.1, NITK Suratkal, 16-18 December 2011, pp. 37-45.
  5. R. Sumathi and M. Usha, “Implementation of Controllers for Microstructure Development”, Proc. of First International Conference in Instrumentation and Control ICIC 2011, 2-3, Sep 2011, PSG College of Tech, Coimbatore.
  6. M.Usha, KM.Shiva Ramesh, J.Akilandeswari, “Security Orchestration Framework for Private Cloud using modified UCONABCD model”, International Conference on Advanced Computing, Networking and Security ADCONS-2011, Vol.1, NITK Suratkal, 16-18 December 2011, pp-270-275.
  7. S.Sridevi, M.Usha, C.Arivazhagan, “Quality Based Bidirectional Reliability Protocol for Wireless Sensor Networks”,  3rd International Conference on Trends in Information Sciences and Computing TISC-2011, Sathyabama University, Chennai, India, , 8th & 9th December 2011, pp 115-119.
  8. S.Sridevi, M.Usha, G.Pauline, “Priority Based Congestion Control for Heterogeneous Traffic in Multipath Wireless Sensor Networks”, International Conference on Computer Communication and Informatics (ICCCI-2012), Sakthi College of Engineering, Coimbatore, India, 10-12 January 2012, pp 615-619.
  9. D. Balamurugan, S. Chandrasekar, S. Heyshanthini Pandiyakumari, M. Usha, “Traceback of DDoS attacks using Entropy variation for low rate attacks”, in the proceedings of the ICICP’2012 held at Mahendra Engineering College during March 29th – 31st, 2012.
  10. A.Prithivi Raj , Jithina jose PMIPV6- HC – MIH: An approach for improving Handover performance in NGWN. IEEE International conference on computing, Electronic , and Electrical Technology (ICCEET-2012). Noorul Islam Engineering College, IEEE Conference Publications, Page 910-914.
  11. Jose J, Prithiviraj. A presented a paper entitled “PMIPV6-MIH-HC: A SURVEY ON IMPROVING HANDOVER PERFORMANCE IN NGWN” in the ICICP’2012 held at Mahendra Engineering College during March 29th – 31st.
  12. A.Prithiviraj, “PMIPV6 Survey on Handover performance”, National Conference on Topical Trends in Computing Science, Sudharshan Engineering College, Sathyamangalam, Pudhukottai, March – 2012.
  13. Prof.E.Sam Linson , Gowtham G,” Trust creation in VANET environment”, International conference on computing, Electronic and Electrical Technology (ICCEET - 2012).
  14. Samlinson E , Dhayanithi Jaganathan “A Framework for Spoken English Evaluation- Voice and Accent Trainer (VAT) “, in in international Conference on Advanced Computing, Networking and Security (Adcons-2011) at NITK Surathkal, Mangalore.
  15. Samlinson E  and Dhayanithi Jaganathan,”A Framework of Smart e-Learning Enrichment for Visually Challenged: e-SCRIBE " , in international Conference on Advanced Computing, Networking and Security (Adcons-2011) at NITK Surathkal,Mangalore,
  16. B. Thanikaivel and B. Pranisha,”Fast and Secured Data transmission in MANET”, in International Conference -ICCCI-2012(IEEE) at Sri Shakthi Institute of Engineering and Technology, Jan 10 to 12, 2012.