Faculty Details - CSE

Details

Profile

B.E(CSE),[M.E (CSE)]


Her Area of Interest lies in Cloud computing, Data Warehousing & Mining, Big data, Software Engineering, Fuzzy logic, Computer Networks, System Software, Database Management systems domain.

Teaching

PJava Programming
Data warehousing and Mining
System Software
Management information system
Database management systems
E-commerce
Software Agents
Software Project Management
Software Engineering
Computer Networks
Project Work
Enterprise Resource Planning
Object Oriented System Analysis and Design

Research

Minor Research Project
Minor Research Project on Fuzzy based Multimedia Authentication System for Cloud Computing of Rs.50,000/- by SCSVMV University.

Value Added Courses
1) Certified person in Academic Alliance Programme on Cloud Infrastructure and services (CIAS) by EMC2

Publications

Conferences

1) OPTIMISTIC FUZZY BASED SIGNATURE IDENTIFICATION IN CLOUD USING MULTIMEDIA MINING AND ANALYSIS TECHNIQUES, S.A. ENGINEERING COLLEGE, INTERNATIONAL 978-1-4673-5787-6G
2) AN EFFICIENT IMPLEMENTATION OF VALIDATING THE CLIENT LEVEL SECURITY FACTORS FOR THE CLOUD APPLICATIONS, DR.M.G.R EDUCATIONAL AND RESEARCH INSTITUTE UNIVERSITY, INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING (ICAES’13) 978-81-908980-6-5
3) OPTIMIZED DATA ANALYSIS IN CLOUD COMPUTING, VIVEKANANDA ENGINEERING COLLEGE, INTERNATIONAL 978- 81-9065-1
4) PREDICTIVE DATA ANALYSIS IN CLOUD USING BIG DATA ANALYTIC TECHNIQUES, ASSOCIATED NETWORK: UACEE, HOTEL G TOWER, KUALA LUMPUR, MALAYSIA, INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ELECTRONICS ENGINEERING, CSEE - 2014 ISBN: 978-1-63248-000-2 DOI: 10.15224/978-1-63248-000-2-32
5) SECURED DATA STORAGE WITH ENHANCED TPA AUDITING SCHEME USING MERKLE HASH TREE IN CLOUD COMPUTING, S.R.I ENGINEERING COLLEGE AND TECHNOLOGY, INTERNATIONAL CONFERENCE ON ENGINEERING AND APPLIED SCIENCES (ICEAS’14) 893-04-2984
6) A TRUST BOUNDARY MODEL FOR USER AUTHENTICATION IN CLOUD USING IAM AND FUZZY APPROACH, NITTE MEENAKSHI INSTITUTE OF TECHNOLOGY BANGALORE, INDIA, AN ELSEVIER INTERNATIONAL CONFERENCE ON EMERGING RESEARCH IN COMPUTING INFORMATION,COMMUNICATION AND APPLICATIONS (ERCICA’14), 721-04-241
7) A SECURITY MECHANISM IN CLOUD ENVIRONMENT TO MIGRATE THE USER APPS FROM NON-SECURE CLOUD TO SECURE CLOUD BY USING HYPER-V PHENOMENON, VIT BUSINESS SCHOOL, VIT UNIVERSITY, VELLORE, INTERNATIONAL CONFERENCE ON SCIENCE, ENGINEERING AND TECHNOLOGY (SET- 2014) 635-03-34
8) SECURE HYPERVISOR TECHNOLOGY FOR PROTECTING USER CONTENT IN CLOUD ENVIRONMENT BY USING FUZZY TECHNIQUES, IRAJ AT CHENNAI, INSTITUTE OF RESEARCH AND JOURNALS ASSOCIATION WITH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND COMPUTER SCIENCE (ICCCS-2014) 302-94-33
9) A CLUSTER BASED SIGNATURE EVALUATION MECHANISM FOR PROTECTING THE USER DATA IN CLOUD ENVIRONMENT THROUGH FUZZY ORDERING APPROACH, SRI SAI RAM ENGINEERING COLLEGE, CHENNAI, INDIA. IEEE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES, (ICCCT-15), ISBN: 978-1-4799-7623-2/15/
10) AN APPROACH FOR SECURING THE CLIENTS DATA IN CLOUD STORAGE WITH NETWORK CODING FUNCTION VIA MULTI AUTHORITY AUDITING (MAA) SCHEME, JAWAHARLAL NEHRU UNIVERSITY (JNU, CONENTION CENTER), NEW DELHI INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ENGINEERING SCIENCES AND MANAGEMENT (ICRTESM)-2015, ISBN: 835-922-23-08
11) DIFFERENT LEVELS OF INTRUDERS BY USING DATA MINING TECHNIQUE”, DEPT OF CSE , R.M.K ENGG COLLEGE, NCCNS-2012, NATIONAL CONFERENCE ON CLOUD COMPUTING AND NETWORK SECURITY
12) AN EFFICIENT PROTOCOLS FOR CONTRACT SIGNING USING RSA SIGNATURE SCHEMES, TAGORE ENGINEERING COLLEGE, CHENNAI, NCRICT’11, NATIONAL CONFERENCE ON RECENT INNOVATIONS IN COMPUTING TECHNOLOGY.
13) AN IMPLEMENTATION OF USER AUTHENTICATION SYSTEM BY USING LOG MANAGEMENT AND CLOUD COMPUTING TECHNIQUES, ADHIPARASAKTHI COLLEGE OF ENGINEERING, MELMARUVATHUR, NCDM’12, NATIONAL CONFERENCE ON DATA MINING
14) INTRUSION DETECTION SYSTEM IN CLOUD TECHNIQUE, S.A ENGG COLLEGE, CHENNAI, NATIONAL CONFERENCE ON ADVANCES IN COMPUTING & NETWORKING (NCACN’12)

Journals

1) AN EFFICIENT IMPLEMENTATION OF VALIDATING THE CLIENT LEVEL SECURITY FACTORS FOR THE CLOUD APPLICATIONS, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH AND TECHNOLOGY (IJERT), 2278-0181, VOL-2 ISSUE 4, PAGE NO-9
2) OPTIMISTIC FUZZY BASED SIGNATURE IDENTIFICATION IN CLOUD USING MULTIMEDIA MINING AND ANALYSIS TECHNIQUES, IEEE XPLORE DIGITAL LIBRARY, 978-1-4673-5786-9 ISSUE 9
3) PREDICTIVE DATA ANALYSIS IN CLOUD USING BIG DATA ANALYTIC TECHNIQUES, INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTER SCIENCE AND ITS APPLICATIONS (IJCSIA)-SEEK DIGITAL LIBRARY (IRED) 6378-000-2-32, ISSUE 11
4) ENABLING SECURITY SERVICE USING CONTENT BASED MESSAGE FILTERING SYSTEM ON OSN USER WALLS, INTERNATIONAL JOURNAL OF SCIENCE AND TECHNOLOGY (IJST), 2321-91-9X ISSUE 4
5) A SECURITY AWARE USER ACCESS PRIVILEGES IN CLOUD THROUGH FUZZY REASONING APPROACH, INTERNATIONAL JOURNAL OF DISTRIBUTED AND CLOUD COMPUTING, ISSN: 2321-6840 VOLUME 2, ISSUE 2, DECEMBER 2014
6) A SECURITY SOLUTION FOR CLOUD USERS TO PROTECT THE PRIVATE DATA THROUGH FUZZY BAYESIAN DECISION METHOD(FBDM), INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS (IJCA), ISBN No: 973-93-80885-63-1, DOI:10.5 120/19911-2024 VOLUME-113, NUMBER-16, 2015
7) A CONTENT PROTECTION SCHEME FOR CLOUD CLIENTS THROUGH NETWORK CODING TECHNIQUE IN CLOUD (PAGE: 610-617), INTERNATIONAL JOURNAL OF ADVANCE RESEARCH IN SCIENCE AND ENGINEERING (IJARSE) ISSN-2319-8354(EVOL. NO.4, SPECIAL ISSUE (01), MARCH 2015
8) AN APPROACH FOR SECURING THE CLIENTS DAT A IN CLOUD STORAGE WITH NETWORK CODING FUNCTION VIA MULTI AUTHORITY AUDITING (MAA) SCHEME, INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN COMPUTER SCIENCE (IJARCS), ISSN NO: 0976-5697 VOLUME-6, No:2, March-2015
9) AN IMPLEMENTATION OF IMPROVING THE SERVICE ACCESSIBILITY FOR CLOUD USERS BY USING TRAFFIC REDUNDANCY ELIMINATIION (TRE) MECHANISM WITH PACK TECHNIQUE INTERNATIONAL JOURNAL OF COMPUTER SCIENCE TRENDS AND TECHNOLOGY (IJCSIT), ISSN: 2347-8578,Page No:115-123, Volume 3, Issue-1

Others

Seminar 11
Workshop 18
Conference 14
Refresher Course 2
Other Training Programme 2