The following are the research Journals published by the staff members of Information Technology Department

☞ 2019-2020
◽ Image Encryption Method for Watermarking.pdf"
◽ A Data Transmission Protocol for Monitoring Road Surface conditions with security aspects in Cloud Surface.pdf"
◽ A Method for Self-Automatic Penalty System in Signal Jumping with Rfid Congestion System.pdf"
◽ A New Dual-Server Public Key File Encryption with Keyword Search.pdf"
◽ A Study Security Attacks in Cognitive Overlay Networks.pdf"
◽ A Study on Software Metrics based Software Defect Prediction using Data Mining and Machine Learning Techniques.pdf"
◽ Performance and physical design of algorithms with analysis.pdf"
◽ Issue and Challenges in Pen-based Computing Environments using Data Structure.pdf"
◽ A METHODOLOGY FOR MOBILE COLLABORATIVE LEARNING THROUGH DISTRIBUTED COMPUTING.pdf"
◽ Software Defect Prediction Using Various classifiers.pdf"
◽ TWO- STAGE WELL-DRESSED CRAWLER USING ADAPTIVE LEARNING ALGORITHM ON WEB INTERFACES.pdf"
☞ 2018-2019
◽ An Improved Method for Plant Disease Detection in Smart Irrigation System Using IOT.pdf"
◽ Application-of-Fuzzy-Differential-Evolutionary-Algorithms-in-Biological-Data-Mining.pdf"
◽ A-Survey-on-Reliable-Path-Discovery-in-MANET.pdf"
◽ Authenticating Debit & Credit Cards Using Face Recognition Techniques.pdf"
◽ Classification of Histopathological Images using Advanced Machine Learning Techniques.pdf"
◽ classification of histopathological images using advanced machine learning techniques.pdf"
◽ critical evaluation of disatrous probelms.pdf"
◽ Data Retrieval System using IoT with Block Chain Approach-IJSETR.pdf"
◽ Designing Methods for Object Detection Based on Secured System.pdf"
◽ Designing-Decision-Support-Systems-Approaches-using-Entity-Relationship-Data-Schema-A-Survey.pdf"
◽ IOT-Based-Smart-Irrigation-and-Plant-Disease-Detection.pdf"
◽ Naive Bayes Algorithm for Text Mining Algorithm Using Machine Learning.pdf"
◽ Propagation of ESL with the Advanced Android Application.pdf"
◽ TWO- STAGE WELL-DRESSED CRAWLER USING ADAPTIVE LEARNING ALGORITHM ON WEB INTERFACES.pdf"
☞ 2017-2018
◽ A NOVEL DESIGN OF FINGER VEIN RECOGNITION FOR PERSONAL INFORMATION.pdf"
◽ A QUERY ROUTING APPROACH IN PEER 2 PEER NETWORKS.pdf"
◽ A SURVEY ON AUTOMATION TESTING.pdf"
◽ ALUMNI INFORMATION DATABASE.pdf"
◽ AN APPROACH OF MACHINE LEARNING FOR BUILDING SPECIFIC SEARCH ENGINES.pdf"
◽ ANALYZING THE USER BEHAVIOR IN ONLINE SOCIAL NETWORKS.pdf"
◽ ARCHITECTURE OF OBJECT ORIENTED APPLICATION.pdf"
◽ BOOK YOUR BOOKS.pdf"
◽ CORTANA(PERSONAL ASSISTANT).pdf"
◽ DETERMINING ITEM PARAMETERS FOR BETTER TESTING SYSTEMS.pdf"
◽ EFFICIENT MULTI KEYWORD RANKED SEARCH FOR RETRIEVING THE ENCRYPTED CLOUD DATA.pdf"
◽ EFFICIENTLY QUERY PROCESSING AND ASSESSMENT ON ENCRYPTED DATA.pdf"
◽ GREEN COMPUTING.pdf"
◽ PROVIDING SECURITY IN THE NETWORK BASED ON DURATION OF ATTACKS.pdf"
◽ RECOGNIZING DELAYS IN ENGINE ABILITY ADVANCEMENT OF KIDS THROUGH INFORMATION EXAMINATION OF A KEEN PLAY GADGET.pdf"
◽ TIME AND ATTRIBUTE FACTOR COMBINED ACCESS FOR TIME SENSITIVE DATA IN PUBLIC CLOUD.pdf"
◽ Extraordinary Bureau Investigation Robotics for India.pdf"
◽ Improving Cloud Server Security and Data level Security by using an Attribute based access Control Scheme.pdf"
◽ Improving Sentiment Analysis by Using a Unified Framework to Predict Overall Rating of Review Documents.pdf"
◽ Insurance safeguard wireless sensor in medical field.pdf"
◽ MACHINE LEARNING WITH BIG DATA CHALLENGES AND APPROACHES.pdf"
◽ Remote Pellet Telemetry.pdf"
◽ Self-Activated Congestion System and Self-Automated Penality System for Signal Jumping using Rfid.pdf"
◽ THE SECURITY PRADIGM IN CLOUD COMPUTING.pdf"
◽ automatic time table generator.pdf"
◽ security attacks and solutions.pdf"
◽ smart city implementation models based on IOT technology.pdf"
◽ SECURITY USING COLORS AND ARMSTRON NUMBERS.pdf"
◽ Emo Spark-Android Controlled WIFIBLUE TOOTH SOLID SHAPED DEVICE.pdf"