Multiple Logos
College Logo
Admission 2025-2026
Online Fee Payment
Curriculam & Syllabus

List of Conference Publications by Our Staff & Students

  • R. Gracy Star; F. Ramesh Dhanaseelan; J. Shajeen, "Error Resilient Transmission of Color Mosaic Images Using Combined Approach", Int. Conf. on Smart Systems and Inventive Tech., ICSSIT 2019.
  • A. Arjuna, R. Reena Rose, "Performance Analysis of Various Contrast Enhancement techniques with Illumination Equalization on Retinal Fundus Images", International Conference on Smart Systems and Inventive Technology, ICSSIT 2019.
  • Beulah & F. Ramesh Dhanaseelan, "Comparison of De-Duplication Methods for Data Storage", International Conference on Applied Mathematics and Theoretical Computer Science, ICAMTCS-2018.
  • Jeya Sutha & Ramesh Dhanaseelan, "Detection of Breast Cancer Based on Fuzzy Frequent Itemsets Mining", ICAMTCS-2018.
  • Jeya Sutha & Ramesh Dhanaseelan, "A Survey on Fuzzy Association Rule Mining", ICICT’17, Sept 2017.
  • M. Jeya Sutha and Dr. F. Ramesh Dhanaseelan, "Closed Frequent Itemsets Mining Over Data Streams for Visualizing Network Traffic", ICCPCT, 2015.
  • Mala A, Dr. Ramesh Dhanaseelan F, "Improved Prefetching by Mining Frequent Itemsets from Web Logs", International Conference on Energy Efficient Technologies for Sustainability, 2014.
  • S. Sahaya Nirmala, Dr. F. Ramesh Dhanaseelan, "A New Fuzzy Rule-based Clustering Algorithm", National Conference on Computing Intelligence and Applications, April 2013.
  • V. Abarna Devi, Mrs. R. Reena Rose, "Effective Image Retrieval Using CBIR", NCCIA, April 2013.
  • Ms. Ansilin Mini, M. M. Janeela Theresa, "Tri-key Scheme for Separable Reversible Data Hiding in Encrypted Image", NCCIA, April 2013.
  • G. Raga Lekshmi, M. Jeya Sutha, "English Handwritten Character Recognition", NCCIA, April 2013.
  • M. Shiny, Dr. F. Ramesh Dhanaseelan, "An Efficient Way to Detect DDOS Attacks Using Intrusion Prevention System", NCCIA, April 2013.
  • John Sowmya J, Jencewin J, "OPass: A Novel Authentication Scheme Using Long-term Password Against Password Stealing", NCCIA, April 2013.
  • Priyanga E. N., Mrs. M. Jasmine Annie Genefer, "A Wireless Sensor Network Using Batch Signature Verification for Mobile Sinks", NCCIA, April 2013.
  • Shermila Thangam. A, Mrs. J. Jencewin, "IP Traceback on a Hybrid Approach", NCCIA, April 2013.
  • M. M. Janeela Theresa, V. Joseph Raj, "Selection of Optimal Pattern for Better Performance of Fuzzy Neural Network in Criminal Law", EEECS’12, European University of Lefke, Turkey.
  • M. M. Janeela Theresa, V. Joseph Raj, "Analogy Making in Criminal Law with Neural Network", Emerging Trends in Electrical and Computer Technology, 2011.
  • R. Reena Rose, A. Suruliandi, "Improving Performance of Texture Based Face Recognition System by Segmenting Face Region", ACEEE Int. J. on Network Security, 2011.
  • R. Reena Rose, A. Suruliandi, "Combining Texture with Geometry for Performance Enhancement of Facial Recognition Techniques", IEEE Int. Conf., SXCCE, 2011.
  • F. Ramesh Dhanaseelan, E. R. Naganathan, "DT*-Tree: A New Extended Main Memory Database Index Structure", NCCSA, 2008.
  • F. Ramesh Dhanaseelan, E. R. Naganathan, "A New Method for Finding Frequent Itemsets Using Candidate Generation", ICACC, 2007.