Counselling Code

MCA - Publication

  • International Conference on Soft Computing and Network Secu

  • Branch Toppers

Latest News Feed




  • S.Sundararajan, "Cloudnymous Network and Data Security Model for Cloud", International Journal of Scientific Research and Management, Vol.5, Iss.1, pp.5089-5101, 2017.
  • P.Thinakaran, "Examining the security and privacy practices in cloud computing", Asian Journal of Information Technology, Vol.15, Iss.7, pp:1199-1206, 2016. (Annexure-I)


  • R.Sivakumar, " A Novel and Efficient Hybrid Authenticated trust Mehanism for clustered wireless sensor network", International Journal of Applied Engineering Research, Vol.10., No.12, pp (32663-32679), July 2015.
  • R.Sivakumar, "Designing a Novel Framework of Load Balancing Cluster with Target Coverage Problem and Trust Evaluation for Military Wireless Sensor Networks", International Journal of Advances in Engineering and Emerging Technology (IJAEET), Vol. 7, No. 9, pp. 597-614, October 2015 
  • R.Sivakumar, "A Novel Improved Hybrid Authenticated Trust Systems With Fuzzy Logic For Trust Evaluation In Military Wireless Sensor Networks", Middle-East Journal of Scientific Research, Vol. 24, Issue 3, pp. 705-711, April 2016, ISSN 1990-9233. (Annexure –II)


  • M.Senthilkumar, "Lead Seven Day Maximum And Minimum  Air Temperature Prediction", Australian Journal Of Basic And Applied Sciences, Vol.8(1), Jan 204, p.442,447
  • R.Sivakumar, "A Novel Framework To Detect Malicious Attacks In Web Applications", International Journal Of  Research In Computer Applications And Information Technology, Vol.2, Iss.1 (Jan-Mar 2014)
  • S.Sundararajan, "An Efficient Data Ranking Technique Based On Bicluster Score", International Journal Of Emerging Trends In Engineering And Development, Vol.4, Iss.4 (Jul 2014)
  • S.Sundararajan, "An Efficient Hybrid Approach For Data Clustering Using Dynamic K-Means Algorithm And Firefly Algorithm", ARPN Journal Of Engineering And Applied Sciences, Vol. 9, Iss.8 (AUG 2014)
  • N.Sathya bhama, " A Class based feature evaluation using Combination Technique", Australian Journal Of Basic And Applied Sciences, Vol.8(17), (Nov 2014) (Annexure –II)
  • S.Sundararjan, “An Hybrid Technique for Data Clustering Using Genetic Algorithm with Particle Swarm Optimization”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.4, Iss.12, (Dec 2014). (Annexure –II)
  • R.Sivakumar, "An Authentication based Malicious Website Detection in Commercial Websites", International Journal of Science, Technology and Management, Vol.4, Iss.2 (Feb 2015)


  • M.Renugadevi, "An Investigation Of Noise  Removing Techniques Used In Spatial Domain Image Processing", International Journal Of Computer Science And Mobile Computing, Vol.2, Iss.7 (Jul 2013)
  • N.Sathya bhama, "Comparison Of Classification Algorithms Life Neural Networks, Support Vector Machine And Naïve Theorem And Back Propagation For Email Classification", International Journal Of Research In Engineering And Advanced Technology, Vol.1, Iss.5 (Oct-Nov 2013)
  • K.Kalaivani, "Health Care Status And Demand Of Cancer Survivors And Parental Stress In Mother’s Of Children With Cancer", International Research Journal Of  Finance And Economics, Iss.112 (Aug 2013)