Share market Analysis
PhD - Information and Communication Engineering(ICE)
M.Tech in Computer and Information Technology (C&IT)
B.E., Computer Science Engineering
Worked as a Head and Professor in Computer Science and Engineering department of M.I.E.T Engineering College, Trichy – 07 and karpagam College of Engineering, (Autonomous) Coimbatore From March 2017 to August 2018
Worked as a Head and Associate Professor in the Computer Science and Engineering department of M.I.E.T Engineering College, Trichy – 07, from December 2011 to February 2017
Worked as an Asst. Prof in Computer Science and Engineering department of M.I.E.T Engineering College, Trichy - 07 Tamilnadu, from July 2005 to November 2011
Worked as a Lecturer in Computer Science and Engineering department of Bharath Niketan Engineering College, Aundipatti, Theni, Tamilnadu, from December 2001 to December 2004.
Working as an Assistant Professor in the department of computer science, Cihan University – Duhok, Kurdistan Region, Iraq, from September 2018 – to date
Worked as a Professor in the Department of Information Technology of Karpagam College of Engineering, (Autonomous) Coimbatore from November 2017 – August 2018
Assistant Professor (July 2006 to November 2011) (5 Years 4 months) Worked as an Asst. Prof in Computer Science and Engineering department of M.I.E.T Engineering College, Trichy - 07 Tamilnadu, from July 2006 to November 2011. Associate Professor (December 2011 to February 2017) (6 Years 2 month) Worked as a Head and Associate Professor in the Computer Science and Engineering department of M.I.E.T Engineering College, Trichy – 07, from December 2011 to February 2017. Professor (March 2017 to November 2017) (9 Months) Worked as a Head and Professor in Computer Science and Engineering department of M.I.E.T Engineering College, Trichy – 07. From March 2017 to November 2017
Lecturer (December 2001 to December 2004) (4 Years) Worked as a Lecturer in Computer Science and Engineering department of Bharath Niketan Engineering College, Aundipatti, Theni, Tamilnadu, from December 2001 to December 2004. Assistant Professor (January 2005 to May 2006) (1 Year 5 Months) Worked as an Assistant Professor in the Computer Science and Engineering department of Bharath Niketan Engineering College, Aundipatti, Theni, Tamilnadu, from January 2005 to May 2006.
IGI Global Book Chapter - Research Advancements in Smart Technology, Optimization, and Renewable Energy Mohamed Uvaze Ahamed Ayoobkhan (Department of Computer Science, Cihan University-Erbil, Kurdistan Region, Iraq), Yuvaraj D. (Department of Computer Science, Cihan University-Duhok, Kurdistan Region, Iraq), Jayanthiladevi A. (Computer Science and Information Science, Srinivas University, Mangalore, India), Balamurugan Easwaran (Department of Computer and Mathematical Sciences, University of Africa, Toru-Orua, Nigeria) and ThamaraiSelvi R. (Bishop Heber College, India)
Image processing subject was handled for M.E Computer science students during the academic year 2016-2017
Data warehouse and Data mining was handled during the academic year 2015-2016
Visual cryptographic scheme is specially designed for secret image sharing in the form of shadow images. The basic idea of visual cryptography is to construct two or more secret shares from the original image in the form of chaotic image. In this paper, a novel secret image communication scheme based on visual cryptography and Tetrolet tiling patterns is proposed. The proposed image communication scheme will break the secret image into more shadow images based on the Tetrolet tiling patterns. The secret image is divided into 4×4 blocks of tetrominoes and employs the concept of visual cryptography to hide the secret image. The main feature of the proposed scheme is the selection of random blocks to apply the tetrolet tilling patterns from the fundamental tetrolet pattern board. Single procedure is used to perform both tetrolet transform and the scheme of visual cryptography. Finally, the experimental results showcase the proposed scheme is an extraordinary approach to transfer the secret image and reconstruct the secret image with high visual quality in the receiver end.
DBTMA relies entirely on RTS/CTS dialogue for un-collided transmission of data. The purpose is to improve the QoS at MAC layer by developing it over 802.11e standard. However, DBTMA does not guarantee real-time constraints without efficient method for controlling the network loads. The main challenges in MANETs include prediction of the available bandwidth, establishing communication with neighboring nodes and predicting the consumption of bandwidth flow. These challenges are provided with solutions using Contention-Aware Admission Control (CACP) protocol. In this paper, the EDBTMA protocol is combined with CACP protocol that introduces bandwidth calculation using admission control strategy. The calculation includes certain metrics like: admission control and bandwidth consumption. To compute the bandwidth of channel, bandwidth utilization and traffic priority is distinguished through dual busy tone is proposed. This operates distinctly on its own packet transmission operation. This CACP mechanism defends the conventional traffic flows from new nodes and based on the measured status information of the channel, it QoS of the admitted flows is maintained. This ensures maximum amount of bandwidth flows accommodated by resources and determines the resources in a system meet the new flow requirements while maintaining existing bandwidth flow levels.
The ability of the Cloud to share information and provide certain services to the network linked people. The resources are provided according to the need of the user. In cloud, the user's data are moved to the large data storage, which must be secured. The various organization have expressed concerns about security aspects of cloud computing. One of the major perspectives is to provide security to one's data, which is stored remotely from the user's location. This paper describes an enhanced approach for the already used data security model in cloud environment. The proposed data security model includes generation of OTP using HMAC (Hash based message authentication code) for user authentication process. This paper also includes a comparative MD5 and SHA algorithms for the better implementation of the model. This model best suits for any of the layers in it, to achieve this we use certain encryption algorithms that convert original text to the form that is not understood by the third party. Finally, data availability can be considered as a major concern, which is viewed as threat associated with the cloud environment. To overcome this problem, we generally replicate our data and store it in various locations.
Content-based image retrieval (CBIR) has been popular in recent times due to the necessity of storing large database of images in information processing and biomedical applications. However, the accurate retrieval of images and retrieval time are the two major challenges in CBIR systems. Most of the existing works focus on searching the whole database; hence, the retrieval process becomes a time consuming process. This paper proposes an efficientCBIR system, which retrieves images accurately with reasonable retrieval time using the combination of color histogram, edge, and texture features. Initially, the searching is done based on the color similarity and texture using modified Color Difference Histogram (CDH). Then, an edge orientation technique is applied only on the identified images to create a combined feature space. This process greatly reduces the time required for retrieval process due to the absence of fusion process which is quite normal in CBIR systems. Simulations are conducted on the standard databases to show the superior performance of the proposed CBIR system in terms of retrieval time and accuracy
The perfect image retrieval and retrieval time are the two major challenges in CBIR systems. To improve the retrieval accuracy, the whole database is searched based on many image characteristics such as color, shape, texture and edge information which leads to more time consumption. This paper presents a new fuzzy based CBIR method, which utilizes colour, shape and texture attributes of the image. Fuzzy rule based system is developed by combining color, shape, and texture feature for enhanced image recovery. In this approach, DWT is used to pull out the texture characteristics and the region based moment invariant is utilized to pull out the shape features of an image. Color similarity and texture attributes are extorted using customized Color Difference Histogram (CDH). The performance evaluation based on precision and BEP measures reveals the superiority of the proposed method over renowned obtainable approaches
Received college Trophy for producing the highest pass percentage result among all Dept in MIET Engineering college, in Anna University Examination April / May 2016
100 % Result obtained in Object-Oriented Analysis and Design subject, Anna university examination, Nov/Dec 2014
Received Fund from Tamil Nadu Science Society for the final year student project Rs.10,000/-
Publons - Web of Science