Publications

2011
Sherly KK, Justy J. SQL Injection Disclosure using BLAH Algorithm. International conference on Advances in Computing and Communications in computer and information sciences. 2011;191:693–702 .
Sebastian MP, K SK, G. SK. Suffix Separation in Statistical Machine Translation from English to Malayalam using Sandhi Rules. National Conference on Indian Language Computing. 2011.
Shobana JS, Paramasivan B, Prakash VM. A Survey on Congestion Control in Wireless Sensor Networks (WSN). CiiT International Journal of Wireless Communications. 2011;3(5):363–370.
Naveen N. Tamper Detection and Authentication in JPEG 2000 Images Using Chaotic Watermarking Scheme. In: IEEE International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011). ; 2011.
George R, S. S. Terminal Sliding Mode Control for Spacecraft Formation Flying and Comparison with Sliding Mode Control. In: National Level Conference on Recent Trends in energy Management and Control 2011. Vazhakulam: Viswajyothi College of Engineering and Technology, Vazhakulam; 2011.
Jaseena K. Text Watermarking using Combined Image and Text for Authentication and Protection Anita J. International Journal of Computer Applications(IJCA). 2011;20(4):8-13.
P.B R. ‘Theoretical Formulation for Detecting Diseases using Mathematical Morphology and Fractal Geometry’ . International Journal of Information Science and Computer MathematicsISSN: 1829 – 4969,. 2011;Volume 3(No.2):79-89.
Binu A, Kumar SG. Virtualization techniques: a methodical review of XEN and KVM. In: International Conference on Advances in Computing and Communications. Springer, Berlin, Heidelberg; 2011. p. 399–410.
S CK. WEB SERVICE BASED E-LOGISTICS APPLICATION. In: International conference on web service computing (ICSWC 2011). ; 2011.
Prakash VM, Shobana JS, Infant AP. Wipe Out Brute Force and Malware Based Victim Attacks Using One-Time Password and Grid-Clear-CAPTCHA (GCC) – Analytical Study. CiiT International Journal of Networking and Communication Engineering. 2011;3(3):177–182.
2010
Sam CA, C.K. V. An Advanced method for Energy Regeneration in Electric Vehicles. ECM 2010. 2010.
Sebastian MP, Sheena KK, Santhosh KG. Alignment Model and Training Technique in SMT from English to Malayalam. of Third International Conference, Contemporary ComputingCommunications in Computer and Information Science. 2010;Volume 94:pp 305-315 . noida.pdf
Thankachan PT, Madhu DG, Bhasi DM. Application of Concurrent Engineering in a Manufacturing Industry. International Journal of Computer Integrated Manufacturing. 2010;23(5):425–440.
K.K S. An Application Oriented Psycho motor Approach on BOAT Decision Tree Classifier in Data Mining. International Seminar on Innovative in Pedagogical Approaches . 2010.
Sherly KK, Nedunchezhian R. Boat Adaptive Credit Card Fraud Detection System. IEEE International Conference on Computational Intelligence and Computing Research, ICCIC-2010. 2010:1-7.
Panthalookaran V. CFD-assisted optimization of chimney-like flows to cool an electronic gadget. Journal of Electronic Packaging . 2010;132(3).
JOHN JOMINA. CHAOTIC CRYPTOGRAPHY. In: NATIONAL CONFERENCE ON NEXT GENERATION COMPUTER PARADIMS. ; 2010.
Sebastian MP, K SK, G. SK. A Classification of Sandhi Rules for Suffix Separation in Malayalam. 38th All India Conference of Dravidian Linguists. 2010. tvm.pdf
Varghese C. Cloud Computing Interoperability for Virtual Machine Mobility . National conference on Advanced Computing Interoperability for Virtual Machine Mobility . 2010.
Krishna DD, Gopikrishna M, Aanandan CK. A compact printed inverted cone antenna for UWB based applications. In: IEEE; 2010. p. 420 - 423.

Pages