Department of CS, CA & IT

The Department of Computer Science, Applications & Information Technology was established with B.Sc. Computer Science in the year 1995 and has progressed to offer Post Graduate Course and Research Programmes. The UG degree in Information Technology was introduced in the year 2007 and Computer Technology in the year 2014. The department provides a current and comprehensive learning environment for the students. The department fosters personal and professional growth for both students and faculty. It is committed to impart quality education by providing strong fundamental knowledge complemented by extensive practical training. With academic autonomy, the department regularly updates its curriculum and syllabi enabling the students to apply latest techniques, methods and tools to solve problems in all domains.

Programmes
  1. Under Graduate Programmes
    • B.Sc. Computer Science
    • BCA Computer Applications
    • B.Sc. Information Technology
    • B.Sc. Computer Technology
  2. Post Graduate Programmes
    • M.Sc. Computer Science
    • MCA Computer Applications
  3. Research Programme
    • Ph.D. Computer Science
Curriculum
Syllabus
Name Qualification Designation Email ID
Dr.D.Shanmuga Priyaa MCA, M.Phil., Ph.D Professor shanmugapriyaait@kahedu.edu.in
Dr.S.Veni M.Sc., M.Phil, Ph.D. Professor venics@kahedu.edu.in
Dr.R.Gunasundari MCA, M.Phil, Ph.D. Associate Professor gunasundari.r@kahedu.edu.in
Dr.S.Sheeja MCA, M.Phil., Ph.D Associate Professor sheejaca@kahedu.edu.in
Dr.E.J.Thomson Fredrik M.Sc.,MCA,M.Phil.,Ph.D., Associate Professor thomsonfredrikca@kahedu.edu.in
Dr.N.V.Balaji M.Sc., M.Phil, Ph.D Associate Professor balaji.nv@kahedu.edu.in
Dr.S.Manju Priya M.Sc., M.Phil, Ph.D. Associate Professor manjupriyacs@kahedu.
edu.in
A.Jeeva
rathinam M.Sc., M.Phil., (Ph.D) Assistant Professor jeevarathinamcs@kahedu.edu.in
P.Nagarajan MCA, M.Phil., (Ph.D) Assistant Professor nagarajan.p@kahedu.edu.in
B.Bharathi M.Sc., M.Phil, (Ph.D.) Assistant Professor bharathi.b@kahedu.edu.in
Dr.S.Hemalatha MCA, Ph.D Assistant Professor Hemalatha.s@kahedu.
edu.in
K.B
anuroopa MCA, M.Phil., (Ph.D) Assistant Professor banuroopacs@kahedu.edu.in
Dr.M.Mohan Kumar MCA, M.Phil , Ph.D Assistant Professor mohankumarcs@kahedu.
edu.in
K.K
athirvel M.Sc., M.Phil.(Ph.D) Assistant Professor kathirvelcs@kahedu.edu.in
Dr.P.Tamil Selvan MCA, M.Phil., Ph.D Assistant Professor tamilselvancs@kahedu.
edu.in
G.Man
ivasagam MCA, M.Phil, (Ph.D) Assistant Professor manivasagamit@kahedu.edu.in
G.Anitha MCA, M.Phil., (Ph.D) Assistant Professor anithaca@kahedu.edu.in
J.Hema Gowri MCA, M.Phil Assistant Professor hemagowrics@kahedu.
edu.in
K.Ka
laiselvi MCA, M.Phil., M.E Assistant Professor kalaiselvica@kahedu.edu.in
Dr.S.Kowsalya MCA, M.Phil., M.E. SET Ph.D., Assistant Professor kowsalyaca@kahedu.edu.in
S.A.Sathya Prabha M.Sc. M.Phil., B.Ed., Assistant Professor sathyaprabhacs@kahedu.edu.in
K.Veerasamy M.Sc., M.E., (Ph.D) Assistant Professor veerasamyca@kahedu.edu.in
U.Prathibha MCA, Assistant Professor prathibhaca@kahedu.edu.in
D.Manjula MCA, M.Phil., Assistant Professor manjula.d@kahedu.edu.in
K.Yuvaraj MCA, M.Phil., Assistant Professor yuvaraj.k@kahedu.edu.in
J.Ramyabharathi MCA, M.Phil., Assistant Professor ramyabharathica@kahedu.edu.in
Dr.K.Prathapchandran MCA, M.Phil, Ph.D Assistant Professor prathapchankdranca@kahedu.edu.in
N.Manonmani M.Sc., M.Phil. Assistant Professor manonmani.n@kahedu.edu.in
R.Nithya M.Sc., M.Phil. Assistant Professor nithyaca@kahedu.edu.in
P.G.Sivagaminathan M.Sc., M.Phil., (Ph.D) Assistant Professor sivagaminathan.pg@kahedu.edu.in
M.Saranya M. Sc., M.Phil. Assistant Professor saranya.m@kahedu.edu.in
Dr.T.Genish M.Sc., Ph.D Assistant Professor genish.t@kahedu.edu.in
A.Jenneth MCA,M.Phil.,(Ph.D) Assistant Professor jennethca@kahedu.edu.in
M.Thillainayaki MCA,M.Phil., MBA.,(Ph.D) Assistant Professor thillainayagica@kahedu.edu.in
B.Brindha M.Sc., M.Phil., Assistant Professor brindha.b@kahedu.edu.in
S.Sujatha M.Sc., (M.Phil) Assistant Professor sujatha.s@kahedu.edu.in
J.Rajeswari M.Sc., (M.Phil) Assistant Professor rajeswari.j@kahedu.edu.in
Dr.R.Nithya MCA, P.hD Assistant Professor nithya.r@kahedu.edu.in
R.Bhuvaneswari MCA, M.Phil Assistant Professor bhuvaneswari.r@kahedu.edu.in
G.Kowshalya MCA, M.Phil Assistant Professor kowshalya.g@kahedu.edu.in
Dr.S.Uma maheswari M.Sc., M.Phil., Ph.D Assistant Professor umamaheswari.s@kahedu.edu.in
B.Shamile MCA, Assistant Professor shamile.b@kahedu.edu.in

Library – Dept. Library and General library

In Department Library 321 reference books are available for faculty and student reference.

Internet facilities for staff and students

All the members are provided net access in department and computer lab and internet facility with 1GBPS NKN Connectivity in BSNL and 45 Mbps in Airtel. WiFi Connectivity provided for faculty and students.

Total number of class rooms : 20
Students’ laboratories

  • 2003 Server: IBM X 3400 Server 7975i1S – 1
  • Computer’s : 376
  • Printer: 6
  • LCD Projector : 6

Paper publications by the Faculty Members

Best Five Papers Faculty wise:

Dr.S.Veni

  1. Karthik,R. Veni ,S. Shiva Kumar, B L. 2017.Improved Evolutionary Algorithm based Fuzzy Adaptive Resonance Theory Map (IEA-FARTM) Classifier for Intrusion Detection System .Journal of Adv Research in Dynamical & Control Systems. 05- Special issue 2017: 113-119. ( Impact Factor 0.22)
  2. Veni ,S. Elavarasan, G. 2017. Efficient Technique for Privacy Preserving Publishing of Set Valued Data on Cloud Journal of Adv Research in Dynamical & Control Systems. 05- Special issue 2017: 120-128. ( Impact Factor 0.22)
  3. Veni ,S. Nirmala,A.P.2016. An Enhanced Approach for Performance Improvement using Hybrid Optimization Algorithm with K-means++ in a Virtualized Environment. Indian Journal of Science and Technology.9(48) : 1-6. ( Impact Factor 0.564)
  4. RafidhaRehiman, K,A. Veni, S. 2016. A Secure Authentication Infrastructure for IoT Enabled Smart Mobile Devices – AnInitialPrototypeIndian Journal of Science and Technology. 9(9) :0974- 6846. ( Impact Factor 0.564)
  5. Tamilselvan , P. Veni , S. 2016. Social Ant Based Sensitive Item Hiding with Optimal Side Effects for Data Publishing. Indian Journal of Science and Technology.9(9): 1.-9. ( Impact Factor 0.564)

Dr.R.Gunasundari

  1. Gunasundari Ranganathan and Thara Lakshmipathy, June 2017. Model of Genetic Fuzzy Artmap Classifier (GFAM) for Gastric Cancer Data Classification. ARPN Journal of Engineering and Applied Sciences, Vol.12(11) : 3509 -3517.( Impact Factor 0.765)
  2. Thara Lakshmipathy and Gunasundari Ranganathan , Dec 2016. Significance of data mining techniques in disease diagnosis and biomedical research – a survey, IIOABJ,
    7( 1) : 284-292.( Impact Factor 0.55)
  3. J. Rajeswariand R. Gunasundari, December 2016. EMPWC: Expectation Maximization with Particle Swarm Optimization based Weighted Clustering for Outlier Detection in Large Scale Data, IJCTA, © International Science Press, 9(36) : 517-531.
    ( Impact Factor 0.33)
  4. Srividhya. J and R. Gunasundari , December 2016. Test suite minimization and empirical analysis of optimization algorithms, Journal of Theoretical and Applied Information Technology(JATIT), 94(1).( Impact Factor 0.33)
  5. R. Gunasundari and R. Jayadurga, 2016. A Novel Approach in Vehicle Object Classification System with Hybrid of Central and Hu Moment Features using Back Propagation Algorithm, Indian Journal of Science and Technology, 9(26) : 1- 7.( Impact Factor 0.564)

Dr.S.Sheeja

  1. V.S. Lavanya and Dr.S.Sheeja, “Detection of Fetal Spine Abnormalities Using Image Processing Technique” , Karpagam Journal of Computer Science, Accepted for publication in Vol 10, April 2016.
  2. Cimi Thomas.M and Dr.S.Sheeja, “Enhancing Security of Elliptic Curve ElGamal Encryption Using a Polyalphabetic Symmetric Cipher ”, Karpagam Journal of Computer Science, Vol 10, issue. O4, June 2016.
  3. Peter Kulandairaj and Dr.S.Sheeja, “Efficacy of Deep Learning Using Softmax Regression in Comparison the Single Layer to Multi-Layer Convolution Network in Predicting Cervical Cancer”, Journal of Advance Research in Dynamical and Control System, April 2017.
  4. Ranjana Sriram and Dr.S.Sheeja, “Efficient Data Cleaning Algorithm, Innovative and Rapid Unique User Identification Algorithm Using Modified Hashing and Binary Search Technique for Web Usage Mining”, Journal of Advance Research in Dynamical and Control System, April 2017
  5. Dr.Sheeja and V.S.Lavanya, “Empirical Model Decomposition Based Svm Classifier For Abnormality Detection In Fetus”, International Journal of Control Theory and Applications, Volume 10 , Number 12 , March 2017.

Dr.S.ManjuPriya

  1. Keerthy AS and ManjuPriya S. 2016 , Lempel-Ziv-Welch Compression of DNA Sequence Data with Indexed Multiple Dictionaries, International Journal of Applied Engineering Research,12(12),5610-5615 (Impact Factor 0.16).
  2. VijayaMaheswari M and ManjuPriya S.2017, A Textual Pattern Encoding Method for Privacy Preservation in Social Streams,05-Special Issue,129-134 (Impact Factor 0.22).
  3. Keerthy A S and ManjuPriya S. 2016,Comparative analysis of Data Compression and Pattern Matching Techniques for Biological Big Data, International Journal of Advanced Research in Computer Engineering & Technology, 5, 199-205 (Impact Factor 3.696).
  4. Kirubha V and ManjuPriya S. 2016, Survey on Data Mining Algorithms in Disease Prediction, International Journal of Computer Trends and Technology, 38(3), 124-128 (Impact Factor 1.494).
  5. ManjuPriya S and Jeevarathinam A.2015, A Study on Energy Routing Algorithms Using Clustering in Wireless Sensor Networks,International Journal of Advanced Research in Computer Science and Software Engineering,5(6), 467-472 (Impact Factor
  1. 2.5).

A.Jeeva

rathinam

  1. A.Jeevarathinam, Dr.S.Manju Priya “Comparative Study on Data Compression Algorithm for Wireless Sensor Network”, Karpagam JCS Vol.11 Issue 4 May – June 2017
  2. A.Jeevarathinam, Dr.S.Manju Priya COMPARISON ON HIERARCHICAL ROUTING PROTOCOLS IN WSN, Karpagam JCS Vol.10 Issue 5 July – August 2016
  3. ManjuPriya S and Jeevarathinam A.2015, A Study on Energy Routing Algorithms Using Clustering in Wireless Sensor Networks,International Journal of Advanced Research in Computer Science and Software Engineering,5(6), 467-472 (Impact Factor 2.5).
  4. K. Lakshmi, K.Thilagam, K. Rama, A.Jeevarathinam, S.Manju Priya “Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET”, Computer Techology & Applications,Vol 3 (1),146-151,JAN-FEB 2012

Dr.D. ShanmugaPriyaa

  1. ShanmugaPriyaa D., Dr.S.Karthikeyan, 2012. Examining Various Denoising Techniques in Video Processing System, Indexed in IEEE Xplore.
  2. Dr.ShanmugaPriyaa,D., S.Kowsalya An Adaptive Behavioral Learning Techniques based Bilateral Asymmetry detection in Mammogram Images” , Indian Journal of Science and Technology (IJST), Volume 9 (SI), Pg. 1-8, December 2016. (Impact Factor- 1.8)
  3. Dr.ShanmugaPriyaa,D., S.Kowsalya , 2015. An Enhanced Approach for Preprocessing of Mammogram Images using Inverse Daubechies Wavelet Transform and Non-Linear Diffusion, International Journal of Computer Applications 130 (5), 6-12 (Impact Factor- 0.752)
  4. Dr.Shanmuga Priyaa,D.,R.Sridevi, 2015. An Ensemble approach on Missing Value Handling in Hepatitis Disease Dataset, International Journal of Computer Applications 130 (17), 23-27. (Impact Factor- 0.752)
  5. Dr.ShanmugaPriyaa,D., S.Kowsalya , 2016. An integrated approach for detection of masses and macro calcification in mammogram images using dexterous variant median fuzzy c-means algorithm, Intelligent Systems and Control (ISCO), 2016 10th International Conference, pg:1-6

B.Bharathi

  1. B.Bharathi,V.Vasanthi ,P.Nagarajan , and Dr.M.Hemalatha.2010. A Perspective Analysis of routing protocols in wireless sensor network, International Journal on Computer Science and Engineering 2(8) 2511 – 2518
  2. B Bharathi, RM Kumar, AN Singh, V Vasanthi, M Hemalatha. 2011. 4G–fourth generation wireless systems requirements and technical challenges, Journal of Theoretical and Applied Information Technology 31(1). 29-35 (Impact Factor 1.02)
  3. B.Bharathi, Mr.G.Manivasagam, Dr.M.Anand Kumar 2017. Metricsfor Performance Evaluation of EncryptionAlgorithms, International Journal of Advance Research in Science and Engineering, 6(3) 62-72 ( Impact Factor 2.83)
  4. B. Bharathi ,S. Sundar Kumar, K. Kathirvel 2016. IPV6: A General Survey. International Journal of Engineering science and Computing, 6(4) 3636-3639 ( Impact Factor 3.868)
  5. B.Bharathi T. Sumathi, Dr. M. Hemalatha A .Edwin Robert.2011. Image Fusion Algorithm Based on Wavelet Transform and IDFC Transform. Global Journal of Computer Application and Technology 1(2). 184-190

Dr.S.Hemalatha

  1. N.NAGA SARANYA, G.PADMAPRIYA, S.HEMALATHA , M.HEMALTHA.2011. An Evaluation Of K-Means Based Ann Using Forest Fire Data In Spatial Data Mining Journal of Theoretical and Applied Information Technology(JATIT) .Vol. 34.No.1 Page.No.029 -033 .Scopus. IF:1.71
  2. S.Hemalatha and M.Hemalatha. 2014. Certain Investigation on Missing Value Imputation Techiques . International Journal of Computer Technology andApplications(IJCTA) 2014. Volume 5(1):323-329 IF:2.015
  3. S.Hemalatha and M.Hemalatha . 2014. Prediction of Missing Values in Datasets using Association Rule Mining International Journal of Applied Engineering Research . (IJAER) 2014.Volume 9( 23) : 19789-19800. Scopus Indexed
  4. Dr.S.Hemalatha and S.Punitha . 2016.An Approach towards Missing Values Using Kernel Technique in Heterogeneous Dataset. International Journal of Multidisiplinary Educational Research (IJMER). Volume 5-Issue 4(5) :152 – 170 IF:3.318.
  5. Dr. S. Hemalatha and S. Rajeshwari . 2016. Optimum Controlling of the SAUVE-QUI-PUET Energy using the CAFA Technique, Institute of Integrative Omics and Applied Biotechnology. Volume 7-Issue 9 683
  1. – 688.

K.B

anuroopa

  1. K.Banuroopa, Dr. D.Shanmugapriya, “Audio Fingerprinting-What, Why and How?” Karpagam Journal of computer science, Page no:9-12, Nov-Dec 2016.

M.Mohankumar

  1. M. Mohan Kumar, Dr. M. Anand Kumar “A Green It Star Model Approach for Software Development Life Cycle”, International Conference On Recent Trends In Engineering Science And Management (ICRTESM -2015). Jawaharlal Nehru University, New Delhi – India March 15, 2015
  2. M. Mohan Kumar ,Dr. M. Anand Kumar, ,” Empirical Study on Green and Sustainable Software Engineering”, Advances in Software Engineering and Systems- ISBN: 978-1-61804-277-4:95-105
  3. M. Mohan Kumar, Dr. M. Anand Kumar,” Green Database Design Model in Software Development Life Cycle Phase,Indina journal of Science and techonology vol (9)30,August 2016
  4. M. Mohan Kumar, Dr. M. Anand Kumar,” Green based Software Development Life CycleModel for Software Engineering, Indian journal of Science and techonology vol (9)32,August 2016
  5. M.mohankumar, Venkatesan.S,” Cyber Crime: Perspective of Indian vs Europe CyberCrime,”International journal of Advanced Technology in Engineering and Science Vol no(5)Issue No:6, Issnno:2348-7550 ,India June 2017.

K.KATHIRVEL

  1. B.Bharathi ,S. Sundar Kumar, K. Kathirvel 2016. IPV6: A General Survey. InternationalJournal of Engineering science and Computing, 6(4) 3636-3639 ( Impact Factor 3.868)
  2. K.kathirvel, K.Yuvaraj, D.Manjula, International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 5, Issue 12 December 2016, A Case Study on Intrusion Detection on Mobile Security using SIM and PDA,(1-14 ) (Impact Factor 2.65 )
  3. N.R.Suganya, R.Venkateswaran, K.Kathirvel,” Combined Text Water Marking” , International Journal of Computer Science and Information Technologies, Vol. 1 (5) , 2010, 414-416 (Impact Factor 3.2) Vol 1(5) Page :414 to 416
  4. N.R.Suganya , R.Venkateswaran, K.Kathirvel International Journal of Computer Science and Information Technologies, “A Survey on Detecting Domain Errors in Programs “Vol. 2 (5) , 2011, 2277 – 2279

P.Tamil Selvan

  1. P.Tamil Selvan,S.Veni, “A Survival Study on Privacy Preservation of Data Sharing with Optimal Side Effects”,International Journal of Engineering Research and Technology, Volume 4,issue 6,June2015
  2. P.Tamil Selvan,S.Veni “An Investigation Study on Privacy Preserving of Data Item with Constraint Minimization for Data Publishing” International Journal of Engineering Technology, Management and Applied Sciences,Volume 4,Issue 1,January 2016,ISSN 2349-4476.
  3. P.Tamil Selvan,S.Veni” Social Ant based Sensitive Item Hiding with Optimal Side Effects for Data Publishing” Indian Journal of Science and Technology, Vol 9(2), DOI: ijst/2016/v9i2/81159, January 2016
  4. P.Tamil Selvan,S.Veni” Swarm Optimizer Based On The Sensitive Rule Hiding With The Constraints Minimization For The Data Publishing” International Journal of Advanced Research in Computer Science, Volume 7, No. 4, July-August 2016
  5. P.Tamil Selvan,S.Veni” Privacy Preserving Accuracy Constrain In Optimized Ant -Based Algorithms “International Journal of Computer & Mathematical Sciences, Volume 5, Issue 10, October 2016

G. Manivasagam

  1. G.Manivasagam, A.EdwinRobert, N.Sasirekha, Dr.M.Hemalatha. 2011. Reverse Engineering for Malicious Code Behavior Analysis using Virtual Security Patching, International Journal of Computer Applications 26(4). 41-45. (Impact Factor 3.1524)
  2. G.Manivasagam ,N.R.Suganya, R.Venkateswaran, K.Kathirvel, M.Mohankumar, 2011. International Journal of Computer Science and Information Technologies 2(5). 2277-2279. (Impact Factor 3.2)
  3. Mr.B.Bharathi, Mr.G.Manivasagam, Dr.M.Anand Kumar 2017. Metricsfor Performance Evaluation of EncryptionAlgorithms, International Journal of Advance Research in Science and Engineering, 6(3) 62-72 ( Impact Factor 2.83)

G.Anitha

  1. G. Anitha, M. Hemalatha, 2016, Certificate Revocation List Distribution using Minimum Spanning Tree, Australian Journal of Basic and Applied Sciences 10 (1). (0.425)
  2. G. Anitha, M. Hemalatha, 2015, Certificate Revocation List Distribution Based on Road Map Distance Protocol (RMDP) in Vanet, International Review on Computers and Software 10 (3). (0.339)
  3. G. Anitha, M. Hemalatha, 2014, Intrusion prevention and Message Authentication Protocol (IMAP) using Region Based Certificate Revocation List Method in Vehicular Ad hoc Networks, International Journal of Engineering and Technology 6 (2).
  4. G. Anitha, K. Roselin Mary Clare, 2012, Performance Analysis of Various VANET Routing Protocols, CiiT Wireless Communications. (0.572)
  5. G.Anitha, J.Ramya Bharathi, S.Jeevitha, 2016 “Storage Security In Vanet Using Cognitive Radio”, Journal of Computer Science,Vol.11 issue:01

J.Hemagowri

  1. J.Sangeetha and Hemagowri.J, 2012.Bottled Water – A Necessity and Expectation of Consumer, Conference Proceeding – “Contemporary Issues In Global Business Management, ISBN: 978-93-80426-69-3, Vol 2. Pg.No:32
  2. J. Hemagowri, B.Brinda. 2013. A Study on proactive Protocol in AD-Hoc Network. International Journal of Modern Engineering Research [IJMER]. 03(4)
  1. :01-04

K.Ka

laiselvi

  1. K. Kalaiselvi and K.Thilagam, 2014,”Survey on Ontology Construction Methodologies”, Karpagam Journal of Computer Science, Vol.8, Issue 2 pp. 117 – 122
  2. K.Veerasamy, S. Punitha, K. Kalaiselvi, 2015,“Graph Segmentation and Fractal Techniques in Image Segmentation and Compression”, International Journal of Innovations & Advancement in Computer Science, Volume 4, Issue4 : 40-44 ( Impact Factor 2.65 )

Ms. S.Kowsalya

  1. Kowsalya S and ShanmugaPriyaa D 2016, An Adaptive Behavioral Learning Techniques based Bilateral Asymmetry detection in Mammogram Images , Indian Journal of Science and Technology (IJST), 9 (SI), 1-8 (Impact Factor 0.564)
  2. Kowsalya S and ShanmugaPriyaa D 2015, “An Enhanced Approach for the Preprocessing of Mammogram Images using Inverse Daubechies Wavelet Transform and Non-Linear Diffusion”, International Journal of Computer Science (IJCA), 130(5), 6-15 (Impact Factor 0.752).
  3. Kowsalya S and ShanmugaPriyaa D 2015, A Survey on Diagnosis Methods of Breast Cancer using Mammography”, International Journal of Engineering Technology Science and Research (IJETSR), 2(4),100-107 (Impact Factor 2.120).
  4. Kowsalya S 2014, An Improved Feature Subset Selection Method Using Clusters, International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS), 7(4), 421-426 (Impact Factor 6.20)
  5. Kowsalya S 2013, A Survey on Feature Subset Selection Algorithms using Filter Method, Karpagam Journal of Computer Science, 1.

S.Joyce

  1. N.Krithika,S.A.SathyaPrabha,S.Joyce “Transfigure Disburden Android Application Using Cloud” Journal of Computer Science(JCS), volume 9 Issue Nov-Dec 2014.

S.A.SathyaPrabha

  1. Sindhu.V,S.A.SathyaPrabha,Veni.S, and M.Hemalatha “Thoracic Surgery Analysis Using Data Mining Techniques” in “International Journal of Computer Technology & Applications”,Vol 5(2),578-586 March-April 2014.
  2. N.Krithika,S.A.SathyaPrabha,S.Joyce “Transfigure Disburden Android Application Using Cloud” Journal of Computer Science(JCS), volume 9 Issue Nov-Dec 2014

K.Veerasamy

  1. Graph Segmentation and Fractal Techniques in Image Segmentation and Compression, K. Veerasamy and S. Punitha, International Journal of Innovations & Advancement in Computer Science, Volume 4, Issue4 April 2015 ISSN 2347 – 8616 Impact Factor Value 2.65
  2. Software Engineering Framework for software Industry using Heterogeneous and Composite System, K. Veerasamy and S. Punitha International Journal of Advance Research in Computer Science and Management Studies, Volume 3, Issue 7 July 2015. Impact Factor Value 6.047
  3. Design and Implementation of Online Service Executive Information System Based on Web Service, K. Veerasamy and S. Punitha International Journal of Advance Research in Computer Science and Management Studies, Volume 3, Issue 7 July 2015. Impact Factor Value 6.047
  4. Perception on Big Data and Its Analytics, K. Veerasamy, International Journal of Industrial Engineering and Management Science, Special Issue, Vol 6, Dec. 2016 PP 194-196

Dr.K.Prathanchandran

  1. Sivagurunathan,s K.Prathapchandran, 2016.Trust based Security schemes in Self – Organized Networks (SON). Handbook of Research on Self-Organized Mobile Communication Technologies. IGI Global.92-114. (Scopus Indexed)
  2. Sivagurunathan, S A.Sebastian, K.Prathapchandran 2016.Internet of Things for Developing Smart Sustainable Cities (SSC): A Security Perspective. Connectivity Frameworks for Smart Devices: The Internet of Things from a Distributed Computing Perspective. Springer.01.(Scopus Indexed)
  3. S.Sivagurunathan, K.Prathapchandran.2015. A Centralized Trust Computation model for secure group formation in Military based Mobile Ad Hoc networks Using Stereotypes. Advances in Intelligent Systems and Computing. Springer. 412.427-438. (Scopus Indexed)
  4. S.Sivagurunathan, K.Prathapchandran. 2015. Trust based Authentication Scheme to Remove Malicious in Mobile Ad Hoc Networks. International Journal of Applied Engineering Research. 23348-23353. (Scopus Indexed)
  5. S.Sivagurunathan, K.Prathapchandran.2014. Trust and Cluster based Authentication Schemes in Mobile Ad Hoc Networks. ISBN: 978-1-4799-3611-3, IEEE Digital Library DOI:10.1109/EPSCICON.2014.6887502. 1-5. (Scopus Indexed)

Dr.E.J.Thomson Fredrik

  1. E.J.Thomson Fredrick and Dr.G.Radhamani,2016 “Active Rule Based Fuzzy Triggers for XML Database Systems using Advanced XML Schema, International Arab Journal of Information Technology, Vol 14,No.3. ( Impact Factor 0.92 )
  2. Jothish Chembath and Thomson Fredrik, E.J.,2016, Enhanced Clustering Based Approach for Predicting Next Web Page using Web Log Data- A Study, European Journal of Scientific Research, Vol.140(4). pp.394-401. ( Impact Factor 0.71 )
  3. Karthikeyan,S., Thomson Fredrik, E.J.,2016, An Efficient Clustering Approach using Hybrid Swarm Intelligence based Artificial Bee Colony- Firefly Algorithm, Indian Journal of Science and Technology, Vol.9, Issue 39. ( Impact Factor 0.71 )
  4. Karthikeyan,S., Thomson Fredrik, E.J, 206, Optimal Clustering Approach of Multi Objective Scatter Search Simulated Annealing with Hierarchical Agglomerative Clustering for Clustering Problems, International Journal of Control Theory and Applications, Vol. 28,Issue 28. ( Impact Factor 0.74 )
  5. Jothish Chembath and E.J. Thomson Fredrik ,2017, An Empirical Analysis of Algorithms to Predict Next Web Page Using Web Log Data, International Journal of Applied Engineering Research,Volume 12, Number 16, pp.5648-5654, ( Impact Factor 0.14 )

D.Sampath Kumar

  1. D.Sampathkumar, S.Veni ““An Accessible Energy Efficient Routing Protocols for Mobile Ad Hoc Networks” in Journal of Computer Science(JCS), volume 10 Issue 6 OCT 2016

K.Kiruthika

  1. K.Kiruthika and R.Parimala, 2016.Prop up the Farming Community with E-Services: Web Based Services for Agriculture,International Journal Of Engineering And Computer Science, 5(12) 19458-19462 ( Impact Factor 2.83)

D.Manjula

  1. K.kathirvel, K.Yuvaraj, D.Manjula, International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 5, Issue 12 December 2016, A Case Study on Intrusion Detection on Mobile Security using SIM and PDA,(1-14 ) (Impact Factor 2.65 )
  2. K.Yuvaraj, D.Manjula 2017, International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 6, Issue 3 March 2017, An investigation of Classification Techniques in Data Mining for Heart Disease Diagnosis,(18-24) ( Impact Factor 2.65 )
  3. K.Yuvaraj, D.Manjula 2017, JCS, A Survey On Heart Disease And Breast Cancer Prediction By Using Data Mining Techniques( 144-151 )

K.Yuvaraj

  1. K.kathirvel, K.Yuvaraj, D.Manjula, International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 5, Issue 12 December 2016, A Case Study on Intrusion Detection on Mobile Security using SIM and PDA,(1-14 ) (Impact Factor 2.65 )
  2. K.Yuvaraj, D.Manjula 2017, International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 6, Issue 3 March 2017, An investigation of Classification Techniques in Data Mining for Heart Disease Diagnosis,(18-24) ( Impact Factor 2.65 )
  3. K.Yuvaraj, D.Manjula 2017, JCS, A Survey On Heart Disease And Breast Cancer Prediction By Using Data Mining Techniques( 144-151 )

J.Ramyabharathi

  1. J. Ramyabharathi, N.Vijayalakshmi, S.Omprakash, 2016 International Journal of Emerging Technologies in Engineering Research (IJERER), “Protocol Based K-means clustering Technique using Matlab Application”, Volume 4, Issue 3
  2. G. Anitha, J.RamyaBharathi, S.Jeevitha, Dr.S.Sheeja, December 2016 , Karpagam Jouranl of Computer Science ,“Storage Security In Vanet Using Cognitive Radio”, ,Vol.11 issue:01

P.G.Sivagaminathan

  1. P.G.Sivagaminathan, “Research Challenges in Extracting Personal Name Pseudonyms from the Web”, International Journal of Computer science and Information Technologies [IJCSIT], 2012 (Impact Factor 5.15)
  2. M.Thangaraj,P.G.Sivagaminathan, “A Web Robot for Extracting Personal Name Aliases”, International Journal of Applied Engineering Research [IJAER], Jan 2015
  3. M.Thangaraj, P.G.Sivagaminathan, “Discovery of Drug Brand Names from the Web”, International Journal of Advancements in Technology,[IJAT], July 2016 (Impact Factor 0.31)
  4. M.Thangaraj, P.G.Sivagaminathan, “An Improved Generic Crawler using Poisson Fit Distribution”, Communications on Applied Electronics [CAE], Foundation of Computer Science, New York, USA,Oct 2016

N. Manonmani

  1. N.Manonmani. Dr. Anna Saro Vijendran, A study on Image Authentication and Recovery Techniques, International Journal of Innovations in Engineering and Technology (IJIET), Volume 7 Issue 2 August 2016 – (Impact factor – 0.672 )
  2. N. Manonmani. Dr. Anna Saro Vijendran, A Review on Multimodal biometrics using palmprint recognition techniques, International Journal for Research & Development (IJRDT), Volume-6, Issue-3 (Oct-16) – (Impact factor – 3.82)
  3. N. Manonmani. Dr. Anna Saro Vijendran, Palmprint Recognition: Multi-Biometric Authentication System using Left and Right Palmprint combined with Password Verification, International Journal of Modern Trends in Engineering and Science (IJMTES), Volume-6,Issue-3 (Oct-16) – (Impact factor – 2.02)

Dr.T.Genish

  1. K. Somasundaram and T. Genish, “Modified Otsu Thresholding Technique” International Conference on Mathematical Modelling and Scientific Computation, pp. 445-448, vol. 283, Springer-Verlag, 2012 (Scopus Indexed).
  2. K. Somasundaram and T. Genish, “Binarization in Magnetic Resonance Images (MRI) of Human Head Scans with Intensity Inhomogeneity”, International Conference on Computational Science, Engineering and Information Technology, pp. 244-247, 2012 (ACM Digital Library,Scopus Indexed).
  3. K. Somasundaram and T. Genish, “Segmentation of Hippocampus from Human Brain MRI using Mathematical Morphology and Fuzzy Logic” International Conference on Emerging Trends in Science, Engineering and Technology, pp. 269-273, 2012 (IEEE Xplore, Scopus Indexed).
  4. K. Somasundaram and T. Genish, “An atlas based method to segment the hippocampus from MRI of human head scans” International Journal of Computational Intelligence and Informatics, pp. 7-13, vol. 5, 2015
  5. K. Somasundaram and T. Genish, “The knowledge based segmentation of hippocampus from sagittal T2-weighted magnetic resonance images (MRI) of human brain using k-means clustering”, National Conference on Communication and Computing Technologies, 2016

A.Jenneth

  1. Jenneth, K. Thangavel, 2016 “Shared Neighbor Clustering Approach based on Affinity Propagation” ,International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 7 (2016) pp 4874-4877.
  2. A. Jenneth, K. Thangavel,2016 “Dimensionality Reduction based on Hubness Property using Feature Weighting Method for Clustering”, Indian Journals of Science and Technology, Vol 9(19).
  3. Jenneth, K. Thangavel ,2016 “Greedy Algorithm using K-Means to Identify Similar Documents based on Granular Computing” International journal for trends in engineering & technology volume 15 issue 1.
  4. Jenneth, K. Thangavel, 2016 “Ranking Algorithm for Documents using Clustering Ranking Algorithm for Documents using Clustering”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 9. ( Impact Factor 0.553 )

M.Thillainayaki

  1. M.Thillainayaki, M.Hemalatha, 2016, Mining PPIs using recent methods and algorithms, International Journal of Applied Engineering Research, 07-2016:5297-5303.
  2. M.Thillainayaki, M.Hemalatha, 2017, Weighted Random Walk on PPI Network,International Journal of Advanced Research, Ideas and innovations in Technology , 03-2017:1049 – 1055.
  3. M.Thillainayaki, M.Hemalatha,2017, A Protein Database as DaaS in the Cloud Environment, International Journal of Computer Engineering & Technology, 08-2017:100 – 110.
  4. M.Thillainayaki, M.Hemalatha,2017 Protein Protein Interaction Identification using Weighted Graphs by Random Walks, International Journal of Science & Engineerinf Research, 08-2017:972-978

B.Brindha

  1. B.Brindha, C.Baranikumari, J.Hemagowri 2013 A Review on Mobile Ad Hoc Networks routing Protocols.
  • EventsNational /International Conferences
    1. 5th National Conference on topic “Recent Trends and Advances in the Field of Information Technology” (NCIT 2017) on 22.09.2017
    2. National Conference on “Emerging Trends in Computing and Communication” (NCCC’17) was conducted on 17.02.2017 .Dr.M.Hanumanthappa Professor & Chairman, Department of Computer Science & Applications, Bangalore University, Bangalore, has acted as the chief guest of the inaugural function.
    3. A Karpagam Academy of Higher Education sponsored 4th National Conference on “Recent trends and Advances in Information Technology” on 23.09.2016 with Dr. Devi, Bharathiar University Coimbatore as a resource person which had 250 Participants

    National Seminar

    1. National Seminar on “Open Source Software Computing Tools for Researchers” on 27.01.2017 by Dr. D. H. Manjaiah, Professor, Department of Computer Science, Mangalore University Mangalagangotri, Mangalore- 574 199 Karnataka.
    2. National Seminar on “Tools And Techniques To Do A Research & To Improve Scholarly Writing Skills” was conducted on 30/07/2016. Dr.B.Ramdoss, Former Head & Professor, Dept. of Computer Applications, National Institute of Technology, Tiruchirappalli has acted as the Resource Person

    National & State Level Workshop

    1. Two day state level workshop on “Computer Training for Mobile Applications and Tools” for School Headmasters and Teachers from 29.05.2017 to 30.05.2017
    2. State level workshop on “Internet of Things (IoT)” Programme for School Headmasters and Teachers on 15.04.2017
    3. National Workshop on “Cyber Security” was conducted on 03.03.2017. Mr. C. Balan, Joint director, CDAC, Thiruvananthapuram, has acted as the Resource Person.
    4. Dr.T.Senthil Kumar Associate Professor, Department of Computer Science and Engineering, Amirta School of Engineering, conducted a workshop on 2.9.2016 Mobile Application Development using Android
    5. Mr.M.Easwaran , Software Engineer, Poras Technologies India Pvt ltd, Coimbatore, conducted a Workshop on “Android in Mobile Application” on 21.02.2015 for 150 students of Depatment of Computer Science.

    Technical Symposium

    1. State Level Technical Symposium “INFOSIUM 2017” conducted on 28.02.2017.
    2. Conducted state level technical Symposium “Infosium 2K16” on 02.03.2016 , Jointly organized by department of Computer Science, Computer Applications, Information Technology

    Guest Lecture

    1. Conducted Project Training on 29.07.2017 in Citizen Centric Mobile App for e- Governance service. V.Karthi, Senior Software Developer, NIC,Chennai. acted as Resource person.
    2. Conducted guest Lecture on 13.07.2017 in Advanced Java, Servelts and Java Beans. Mr.Senthil, Senior Trainer, Sri Krishna I-Tech, Coimbatore acted as resource person.
    3. Conducted guest Lecture on 30.06.2017 in Advanced Trends in DOT NET Techonoliges Mr.K.Jeeva, Senior Software Engineer, ASCENTZ Techonologies, Coimbatore acted as resource person.
    4. One day Seminar on “Script Language – JOOMLA” by Mr.Sunil Jose, Director, Amulya Infotech India Pvt.Ltd, Coimbatore on 27.01.2017
    5. Guest Lecture on Real Time Applications of Operations Research on 06.01.2017 by Dr.T.Amudha, Assistant Professor, Department of Computer Science, Bharathiar University, Coimbatore
    6. Conducted One-Day Training Programme in Oracle 11g Database. Ms.Nivedha Trainer, Sri Krishna I-Tech, Coimbatore acted as resource person.
    7. Conducted guest Lecture in “Big Data” on 10/03/2016. Mr.Ravi Venkatraman, Senior Consultant & Head of Deliver Excellence, HP Sofware University, Coimbatore acted as resource person
    8. Guest Lecture on E- Learning on 27.09.16 by Mrs. V.Rachel, Assistant Professor, Department of Computer Science, Avinashilingam University for Women, Coimbatore
    9. Conducted guest Lecture in “Internet of Things” on 23/08/2016. Mr.P.S.Felix, Senior Project Manager of CG-VAK Software & Exports Ltd., Coimbatore acted as resource person.
    10. Conducted guest Lecture in “Big Data on 23/09/2016. Ms.B.Ashwini, Project Leader, Accent TechnoSoft, Coimbatore acted as resource person.
    11. Conducted guest Lecture in Problem solving Techniques for Programming Languages on 6.02.2015. Ms.Shanthini, Associate Professor, Department of Computer Applications, Sri Ramakrishna Institute of Technology, Coimbatore acted as resource person
    12. Conducted guest Lecture in Internet of Things on 15.12.2015. Dr. R. Lawrance, Director, Department of MCA, Ayya Nadar Janaki Ammal College, Sivakasi acted as resource person.