Computer Science (PG&Research)
- Urdu
- Tamil
- English
- Corporate Economics
- Mathematics
- Computer Science
- Corporate Secretaryship
- Commerce
- Physical Education
- Library
- Urdu
- Tamil
- English (UG,PG&Research)
- Computer Science (PG&Research)
- Commerce (PG&Research)
- Mathematics (PG&Research)
- Business Administration
- Computer Application
- Microbiology
- Physical Education
- Library
- Non-Teaching(Aided)
- Non-Teaching(Management)
About the Department
The PG Department of Information Technology was established in the year 2007 and Research Department of Computer Science was established in the year 2013 with the objective of imparting quality education in the field of Information Technology and Computer Science. The Department has modern facilities for teaching, learning, and research. The Department offers a wide array of research opportunities and programs of study at undergraduate and postgraduate levels. With rapidly evolving technology and the continuous need for innovation, the PG Department of Information Technology and Computer Science has produced quality professionals holding important positions in the IT industry in India. Students both from postgraduate and research courses have been able to secure a place in the IT market even before the completion of their final examination, which gives an idea of strong placement in this department.
Establishment
PG Department of Information Technology was Establishment In the Year of 2007.
Research Department of Computer Science was Establishment In the Year of 2013.
Program Offered
Sl.No |
Name of the Course |
Major Subjects |
Year of Affiliation |
University Name |
01 |
M.Sc. |
Information Technology |
2007 |
Thiruvalluvar University |
02 |
M.Phil. |
Computer Science |
2013 |
Thiruvalluvar University |
Faculties

Dr. M Mohammed Ismail M.Sc., P.G.D.C.A., M.Sc., (IT)., M.Phil., Ph.D.
Head, Associate Professor & Research Supervisor

Dr. P. Rizwan Ahmed MCA., M.Sc., M.Phil., Ph.D.
Head, Assistant Professor (PG Program)
ProfilePublications International Journals [1] Virtual Reality Based Study Of Cluster-Based Protocol In Wireless Sensor Network Dr.P.Rizwan Ahmed
Expand +Publications
International Journals
[1] |
Virtual Reality Based Study Of Cluster-Based Protocol In Wireless Sensor Network Dr.P.Rizwan Ahmed In International Journal of Management, Technology And Engineering (IJMTAE) , , Aug 2018, Volume: 8, Page: 1849-1853.
Abstract [+]
The modern growth in fabricate energy efficient Wireless Sensor Network is liberal a novel way |
[2] |
A Study on Effective Data Mining Techniques with Unstructured of Big Data Dr.P.Rizwan Ahmed In International Journal of Advanced Research in Science and Engineering,(IJARSE), , Sep 2017, Volume: 6, Page: 1781-1788.
Abstract [+]
Big data is collection of data which is vast range and composite data.. Data obtain created from each and every way, from various fields. These big data has structured semi-structured and unstructured kind of data. In today period data is been gathered on great scale. Social media sites, digital images and videos and countless other. Entire world is going so as to near the digitalization. All this kinds of data is well known as big data. Data mining is a process for uncovering a design which is convenient from huge scale data sets. We gather the healthcare information which comprise all the particulars of the sufferer, their symptoms, ill health etc. Formally we gather the information then there will be pre-managing on that information as we require only strain information for our study. Convenient and significant data can be withdraw from this big information with the assist of data mining by managing on that data. The data will be saved in Hadoop. User can access the data by symptoms, disease etc. |
[3] |
Big Data and Cloud Computing Dr.P.Rizwan Ahmed In International Journal of Advanced Research in Science and Engineering,(IJARSE) , , Sep 2017, Volume: 6, Page: 837-846.
Abstract [+]
big data can bring huge benefits to businesses of all size. However, as with any business project, proper preparation and planning is essential, especially when it comes to infrastructure. Until recently it was hard for companies and organizations to get into big data without making heavy infrastructure investments (expensive data warehouses, software, analytics staff, etc.). But times have changed. Now cloud computing has opened up a door to the companies to avoid investing lot of money for infrastructure. |
[4] |
A Study of Events Logs from Elevated Volume of Logistics Information in Spatio-Temporal Data Mining Dr.P.Rizwan Ahmed In International Journal of Advanced Research in Science and Engineering,(IJARSE) , , Aug 2017, Volume: 6, Page: 1640-1644.
Abstract [+]
In logistics, software aids for transportation planning and scheduling are often based in approximations and abstractions that do not take into account real-world data. The aim of this work is to provide an analysis and methodology, based on real-world data, on how to obtain probability density functions for prediction of activity duration. Such information can be used in planning algorithms, like vehicle routing problem, capable of dealing with stochastic time-windows. Given a large spatio-temporal database of events, where each event consists of the fields event ID, time, location, and event type, the aim is to extract valuable information about activities duration. The process is not straightforward since the log is human-influenced creating uncertainty related with the time at which the events are logged. In order to overcome this, a novel framework is proposed: it uses the spatiotemporal trajectories to identify regions-of-interest based on speed, and builds an ROI activity time-line using the activities extracted from event logs. The framework’s ability to estimate activities durations was tested in three different environments: the Amsterdam Airport Schiphol, the Port of Rotterdam and a single vehicle scenario. Experimental results validate the usefulness of the approach at finding probability density functions for prediction of activity durations at specific locations. |
[5] |
Hiking Robots in Natural Territory Dr.P.Rizwan Ahmed In Shanlax International Journal, , Aug 2017, Volume: 5.
Abstract [+]
This paper presents a general framework for planning the quasi-static motion of climbing robots. The framework is instantiated to compute climbing motions of a three-limbed robot in vertical natural terrain. An example resulting path through a large simulated environment is presented. The planning problem is one of five fundamental challenges to the development of real robotic systems able to climb real natural terrain. Each of the four other areas—hardware design, control, sensing, and grasping—is also discussed. Keywords Motion planning, climbing, robotics, legged robots, high-risk access, natural terrain. |
[6] |
ERP Systems and Competitive Advantage: Some Initial Results Dr.P.Rizwan Ahmed In Shanlax International Journal, , Aug 2017, Volume: 5.
Abstract [+]
Enterprise Resource Planning (ERP) systems have become a de facto standard for integrating business functions. But an obvious question arises: if every business is using the same so-called ―Vanilla‖ software (e.g. an SAP ERP system) what happens to the competitive advantage from implementing IT systems? If we discard our custom-built legacy systems in favour of enterprise systems do we also jettison our valued competitive advantage from IT? While for some organisations ERPs have become just a necessity for conducting business, others want to exploit them to outperform their competitors. In the last few years, researchers have begun to study the link between ERP systems and competitive advantage. This link will be the focus of this paper. We outline a framework summarizing prior research and suggest two researchable questions. In conclusion, we present some initial findings from two empirical case studies derived from part of the European food industry. |
[7] |
Enlargement of a Cloud Based Seclusion Monitoring Framework for the Health Division Dr.P.Rizwan Ahmed In International Journal of Advanced Research in Science and Engineering,(IJARSE) , , Jul 2017, Volume: 7, Page: 626-629.
Abstract [+]
Cloud computing is growing in popularity due to its ability to offer dynamically scalable resources provisioned as services regardless of user or location device. However, moving data to the cloud means that the control of the data is more in the hands of the cloud provider rather than the data owner. This is a great challenge that continues to hinder cloud computing from successfully achieving its potential. This is due to the fact that with cloud computing, the storage and processing of private information is done on remote machines that are not owned or even managed by the cloud consumers. This brings about significant security and data privacy concerns that impede the broader adoption of cloud computing, which compromises the vision of cloud computing as a new IT procurement model. |
[8] |
Large Scale Data Analytics of User Performance for Humanizing Substance Deliverance Dr.P.Rizwan Ahmed In International Journal of Advanced Research in Science and Engineering,(IJARSE), , Jul 2017, Volume: 6, Page: 1131-1135.
Abstract [+]
The Internet is fast becoming the de facto content delivery network of the world, supplanting TV and physical media as the primary method of distributing larger files to ever-increasing numbers of users at the fastest possible speeds. Recent trends have, however, posed challenges to various players in the Internet content delivery ecosystem. These trends include exponentially increasing traffic volume, increasing user expectation for quality of content delivery, and the ubiquity and rise of mobile traffic. For example, exponentially increasing traffic—primarily caused by the popularity of Internet video—is stressing the existing Content Delivery Network (CDN) infrastructures. Similarly, content providers want to improve user experience to match the increasing user expectation in order to retain users and sustain their advertisement based and subscription-based revenue models. Finally, although mobile traffic is increasing, cellular networks are not as well designed as their wireline counterparts, causing poorer quality of experience for mobile users. These challenges are faced by content providers, CDNs and network operators everywhere and they seek to design and manage their networks better to improve content delivery and provide better quality of experience. |
[9] |
Using Compound Vision Geometry for Diffusion Tower Re-Enactment Dr.P.Rizwan Ahmed In International Journal of Advanced Technology in Engineering and Science,(IJATES) , , Jul 2017, Volume: 5, Page: 325-329.
Abstract [+]
Automated platforms that conduct power line inspections need to have a vision system which is robust for their harsh working environment. State-of-the-art work in this field focuses on detecting primitive shapes in 2D images in order to isolate power line hardware. Recent trends are starting to explore 3D vision for autonomous platforms, both for navigation and inspection. However, expensive options in the form of specialized hardware is being researched. A cost effective approach would begin with multiple view geometry. Therefore, this study aims to provide a 3D context in the form of a reconstructed transmission pylon that arises from image data. To this end, structure from motion techniques are used to understand multiple view geometry and extract camera extrinsic. Thereafter, a state-of-art line reconstruction algorithm is applied to produce a tower. The pipeline designed is capable of reconstructing a tower up to scale, provided that a known measurement of the scene is provided. Both 2D and 3D hypotheses are formed and scored using edge detection methods before being clustered into a final model. |
[10] |
Analysis of LEACH Algorithm in Wireless Sensor Network Dr.P.Rizwan Ahmed In International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) , , May 2017, Volume: 7, Page: 863-866.
Abstract [+]
Neural networks are good at classification, forecasting and recognition. They are also good candidates of financial forecasting tools. Forecasting is often used in the decision making process. Neural network training is an art. Trading based on neural network outputs, or trading strategy is also an art. We will discuss a seven-step neural network forecasting model building approach in this article. Pre and post data processing/analysis skills, data sampling, training criteria and model recommendation will also be covered in this article. |
[11] |
Challenges in Backing Up and Restoring Enterprise Applications Dr.P.Rizwan Ahmed In International Journal of Advanced Research in Science and Engineering,(IJARSE), , Feb 2017, Volume: 6, Page: 147-151.
Abstract [+]
Backing up and restoring enterprise applications (EAs) are essential operations that are usually done manually by an administrator or semi-automatically by tools. Backing up an enterprise application (EA) consists of backing up all its components together with the environments and operating systems in a consistent way so that the application can be restored and function properly later. There are many challenges for backing up and restoring EAs. This paper proposes a framework for automating the process of backing up and restoring EAs deployed in a cloud environment to ensure the continuous running of these enterprise applications and prevent the loss of data in case failure of applications |
[12] |
A Survey on Secure Data Relocate & File Distribution use of Cloud Service for Mobile Application Dr.P.Rizwan Ahmed In International Journal of Advanced Research in Science and Engineering,(IJARSE) , , Feb 2017, Volume: 6, Page: 372-376.
Abstract [+]
Smart phones are basic needs of our daily life. It’s like a small computer which gives you many facilities such as web browsing, downloading and many more but small data storage space and backup are major problem. On the other hand cloud computing provides efficient computational resources and secure data hosting services. But the data transmission among two secure networks is performed over unsecured network. So need a design to secure data transfer. |
[13] |
Join Indices for Relational Database Management System Dr.P.Rizwan Ahmed In International Journal of Advanced Technology in Engineering and Science,(IJATES) , , Jan 2017, Volume: 5, Page: 706-712.
Abstract [+]
In new application areas of relational database systems, the join operator is used more than in conventional applications. We propose a simple data structure called join index, for improving the performance of joins in the context of complex queries. For most of the joins, updates to join indices incur very little overhead. |
[14] |
Cryptographic Application Programming Interfaces Dr.P.Rizwan Ahmed In International Journal of Science Technology and Management(IJSTM), , Jan 2017, Volume: 6, Page: 364-368.
Abstract [+]
The significance of security devices that protect the numerous transactions, which take place in today‘s distributed virtual environment, cannot be underestimated. The importance of such devices will increase as our society continues to evolve into a cashless electronic society. The continuing increase in the number and size of electronic transactions, the advances in the technology utilized and the growing sophistication of the adversary have led to significant resources being invested in the evaluation and analysis of security devices. There has been a transformation of the traditional security analysis from one focused on mathematical primitives and physical engineering solutions to a holistic approach that seeks to protect against subtle interactions between the cryptographic, logical and physical aspects of such devices that can collude to compromise the security thereof. |
[15] |
Applying Architectural Support for Security Management Dr.P.Rizwan Ahmed In International Journal of Advance Research in Science and Engineering (IJARSE), , Jan 2017, Volume: 6, Page: 299-304.
Abstract [+]
This paper presents a principled approach to network redesign that creates more secure and manageable networks. We propose a new network architecture in which a global security policy defines all connectivity. The policy is declared at a logically centralized Controller and then enforced directly at each switch. All communication must first obtain permission from the Controller before being forwarded by any of the network switches. The Controller manages the policy namespace and performs all routing and access control decisions, while the switches are reduced to simple forwarding engines that enforce the Controller’s decisions. |
[16] |
Applying Big Data Analytics for Energy Efficiency Dr.P.Rizwan Ahmed In International Journal of Advance Research in Science and Engineering (IJARSE), , Dec 2016, Volume: 5, Page: 451-457.
Abstract [+]
Global energy requirements are continuously increasing. Conventional methods of producing more energy to meet this growth pose a great threat to the environment. CO2 emissions and other bi-products of energy production and distribution processes have dire consequences for the environment. Efficient use of energy is one of the main tools to restrain energy consumption growth without compromising on the customer’s requirements. Improving energy efficiency requires understanding of the usage patterns and practices. Smart energy grids, pervasive computing, and communication technologies have enabled the stakeholders in the energy industry to collect large amounts of useful and highly granular energy us-age data. This data is generated in large volumes and in a variety of different formats depending on its purpose and systems used to collect it. The volume and diversity of data also increase with time. All these data characteristics refer to the application of Big Data. |
[17] |
Analysis on Ad Hoc Networks For Multipath Routing P Rizwan Ahmed In International Journal of Information Technology and Management (IJITM), , , Nov 2014, Volume: 7.
Abstract [+]
In this paper we will confer about ad hoc networks for multipath routing. An ad hoc network is a compilation of wireless mobile nodes vigorously forming a |
[18] |
Issues of Multipath Routing Protocol For Mobile Ad Hoc Networks P Rizwan Ahmed In International Journal of Information Technology and Management (IJITM), , , Aug 2014, Volume: 7.
Abstract [+]
In this paper we will discuss about different issues of multipath routing protocol for mobile ad hoc networks. Multi-path routing represents a shows |
[19] |
A Statistic Tasks Assignment for Grid Computing P Rizwan Ahmed In International Journal of Emerging Technology and Research(IJETR), , Jun 2014, Volume: 1, Page: 968-978.
Abstract [+]
Abstract - Tasks assignment in grid computing is a challenge |
[20] |
Role of Mobile Computing in Education P Rizwan Ahmed In International Journal of Emerging Technology and Research(IJETR), , Jun 2014, Volume: 1, Page: 976-981.
Abstract [+]
Abstract— The paper examines information about the role |
[21] |
The State of High Performance Computing in the Cloud P Rizwan Ahmed In International Journal of Advanced Computer Technology, , Apr 2014, Page: 1-4.
Abstract [+]
HPC applications have been gaining lot of attention in the cloud computing world. Most of these applications are scientific applications that require large CPU capabilities and are also data intensive requiring large data storage. Traditionally they have always required large number of computers inter-connected in a network such as clusters or supercomputers. These clusters are difficult to setup and maintain both technically and financially. With the advent of cloud computing and benefits of Infrastructure as a Service (IaaS) and Platform as a Service (PaaS), scientists and researchers are able to deploy their HPC applications in the cloud without worrying about the costs associated with the infrastructure and other costs involved. They also give guarantees on the quality of service (QoS). This paper focuses on documenting some of the research already done in the field of HPC applications and their current state in cloud computing. |
[22] |
Energy Efficient Collision Aware Multipath Routing for Wireless Sensor Networks P Rizwan Ahmed In International Journal of Advanced Computer Technology, , Apr 2014, Page: 1-4.
Abstract [+]
Energy Efficient Collision Aware Multipath |
[23] |
A Study of Mobile IP P Rizwan Ahmed In International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) , , Feb 2014, Volume: 1, Page: 306-317.
Abstract [+]
Connectivity to the Internet while in motion is becoming an extremely important part of computing research and development. Mobile IP, created by the Internet Engineering Task Force (IETF), is a standard protocol that builds on Internet Protocol by making mobility of a user transparent to applications and higher-level protocols such as Transfer Control Protocol. Mobile IP can be seen as the least common mobility denominator – providing seamless macro mobility solutions among the diversity of access. This paper will attempt to introduce Mobile IP from a technical point of view, while taking into consideration that the reader may not know anything about Mobile IP. However, the reader should know some networking basics before reading further. Building on these concepts, this paper will then discuss effective implementations of Mobile IP, the protocols used by Mobile IP and the importance of Mobile IP. This paper will also introduce Mobile IP from |
[24] |
Cloud Computing with Related Enabling Technologies P Rizwan Ahmed In International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) , Dr N.G.P Arts and Science College, Coimbatore, Feb 2014, Volume: 1, Page: 291-297.
Abstract [+]
Cloud Computing is a concept that has been defined differently by many and there seem not to be a consensus. Despite these views, cloud computing is not a complete new idea as it has intricate connections to technologies or domain such as the Grid Computing paradigm, and the general distributed computing. This overview gives the basic concept of cloud computing, and highlights the relationship between Cloud computing and other cloud enabling technologies by providing their similarities and differences. This insight into the essential characteristics of cloud and its enabling technologies provides a good foundation for understanding and a hint on how to leverage desirable strengths of these technologies in the cloud by way of extension and or inheritance. |
[25] |
Mobile Commerce and Related Mobile Security Issues P Rizwan Ahmed In International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) , Dr NGP Arts and Science College, Coimbatore, Feb 2014, Volume: 1, Page: 303-305.
Abstract [+]
This article will discuss how m-commerce conducts transactions of the mobile device through Internet and how these technologies are developed throughout the years. The article will also judge the security and privacy levels when dealing with mobile commerce, and what kind of issues are encountered when using mobile commerce systems. The article will also evaluate the solutions on how m-commerce issues are avoided and how they are tackled by the technology evolution. |
[26] |
Applications & Trends in Data Mining P Rizwan Ahmed In International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) , Dr N.G. P Arts and Science College, Coimbatore, Feb 2014, Volume: 1, Page: 287-290.
Abstract [+]
The advent of computing technology has significantly influenced our lives and two major impacts of this effect are Business data Processing and Scientific Computing. During the early years of the development of computer techniques for business, computer professionals were concerned with designing files to store the data so that information could be efficiently retrieved. There were restrictions on storage size for storing data and on the speed of accessing the data. Needless to say, the activity was restricted to a very few, highly qualified professionals. Then came an era when Database Management System simplified the task. The responsibility of intricate tasks, such as declarative aspects of the programs was passed on to the database administrator and the user could pose his query in simpler languages such as query languages. Thus almost any business-small, medium or large scale began using computers for day-today activities. Now what is the use of all this data? Up to the early 1990’s the answer to this was “NOT much”. No one was really interested in utilizing data, which was accumulated during the process of daily activities. As a result a new discipline in computer science, Data Mining gradually evolved. |
[27] |
Green Computing - Futures P Rizwan Ahmed In International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) , Dr. N.G. P Arts and Science College, Coimbatore, Feb 2014, Volume: 1, Page: 298-302.
Abstract [+]
The concept of green computing has begun to spread in the past few years, gaining increasing popularity. Besides the widespread sensitivity to ecological issues, such interest also stems from economic needs, since both energy costs and electrical requirements of IT industry around the world show a continuously growing trend. Green computing is the environmentally responsible use of computers and related resources. Such practices include the implementation of energy-efficient central processing units (CPUs), Servers and Peripherals as well as reduced resource consumption and proper disposal of electronic waste (e-waste). Green computing is the study and practice of efficient and eco-friendly computing. The principle behind energy efficient coding is to save power by getting software to make less use of the hardware, rather than continuing to run the same code on hardware that uses less power. This paper, first discuss the connotation of green computing and sketch researcher’s view on the next generation of IT systems for green computing. Subsequently, this paper helps to identify key issues relevant to green computing and evaluate different approaches to these problems. Finally, paper point out future directions of research and conclude the paper. |
International Conferences
[1] |
Enlightening Enactment Of Routing Protocols Using MRP Framework Dr.P.Rizwan Ahmed In 3rd International Conference on Recent Advances in Management and Technology , Invertis University, Bareilly, Utter Pradesh, Jan 2021.
Abstract [+]
These days MANET (Mobile Ad-hoc Network) is an amazing remarkably altering or rising technology, for the reason that of its elite nature of scattered mobile devices and self-motivated network topology. The mobile ad-hoc routing protocol follows several principles in wireless MANET’s. The up to date and novel applications based on wireless technology are being produced in the private as well as commercial sectors. A lot of challenges which are facing wireless MANETs like network stability, security, energy efficiency and performance analysis etc. At present wireless ad-hoc network get much more attention because of its accessibility everywhere. As a result researchers produce several routing protocols. In this paper first of all we analyzed the performance investigation of wireless routing protocols on the basis of ROH (Routing Overhead), throughput, end-2-end delay and PDR (Packet Delivery Ratio). After that we proposed an MRP (Mixed Routing Protocol) framework which improve performance. |
[2] |
Convinced Enhancements in Feature Diversity For Data Mining and its Applications in Opinion Mining Dr.P.Rizwan Ahmed In International Virtual Conference on Applied Science , Technology Management and Language Studies (ASTMLS-2020), Sona College of Technology, Salem, Dec 2020.
Abstract [+]
Opinion Mining (OM), which is also known as Sentiment classification or a |
[3] |
Improving Cluster Based Feature Selection using Modified Minimum Spanning Tree Dr.P.Rizwan Ahmed In Sixth International Conference on Computing Paradigm , Don Bosco College, Yeligiri , Dec 2020.
Abstract [+]
The issue of feature subset selection for data of high dimensionality in classifying opinions has been investigated in this paper. Feature selection schemes select the crucial feature subset producing similar or superior classification outcomes compared to the original feature set obtained. Despite their higher efficiencies, wrapper-based feature selection schemes have high overheads of computation. However, the issue is the problem is Non-deterministic Polynomial (NP) hard. This work suggests the clustering scheme based on MST optimized by the Group Search Optimization (GSO) for efficient selection of features. The Amazon camera review dataset is used for evaluating the suggested scheme. Experiments are conducted to evaluate the proposed method and compared with the MRMR feature selection, FCM clustering, and MST based clustering. |
[4] |
Learning on Reliable and Secure Routing Protocol on MANET Dr.P.Rizwan Ahmed In International E-Conference on Recent Development in Science , Engineering, and Information Technology , Madurai Kamaraj University, Madrai, Sep 2020.
Abstract [+]
This survey article intent presents knowledge into the security execution issues related to |
[5] |
A basic interchange methodology for Skillful and Protected Routing in Mobile Adhoc Network Dr.P.Rizwan Ahmed In International E-Conference on Recent Development in Science , Engineering, and Information Technology , Madurai Kamaraj University, Madrai, Sep 2020.
Abstract [+]
Mobile ad hoc networks (MANETs) are a collection of wireless mobile devices with restricted |
[6] |
Virtual Reality Based Study Of Cluster-Based Protocol In Wireless Sensor Network Dr.P.Rizwan Ahmed In International Conference on Research Developments in Applied Science, Engineering and Management (AEM-2018) , The Indian Coouncil of Social Science Research (ICSSR), Panjab University Campus, Chandigarh, Aug 2018.
Abstract [+]
The modern growth in fabricate energy efficient Wireless Sensor Network is liberal a novel way |
[7] |
A Study on Effective Data Mining Techniques with Unstructured of Big Data Dr.P.Rizwan Ahmed In 5th International Conference on “Latest Innovations in Science, Engineering and Management” (ICLISEM - 2017) , International Centre Goa, India , Sep 2017.
Abstract [+]
Big data is collection of data which is vast range and composite data.. Data obtain created from each and every way, from various fields. These big data has structured semi-structured and unstructured kind of data. In today period data is been gathered on great scale. Social media sites, digital images and videos and countless other. Entire world is going so as to near the digitalization. All this kinds of data is well known as big data. Data mining is a process for uncovering a design which is convenient from huge scale data sets. We gather the healthcare information which comprise all the particulars of the sufferer, their symptoms, ill health etc. Formally we gather the information then there will be pre-managing on that information as we require only strain information for our study. Convenient and significant data can be withdraw from this big information with the assist of data mining by managing on that data. The data will be saved in Hadoop. User can access the data by symptoms, disease etc. |
[8] |
Big Data and Cloud Computing Dr.P.Rizwan Ahmed In International Conference on Recent Innovations in Science, Engineering, Humanities and Management (ICRISEHM-17) , Chhatrapati Shahu Maharaj Shikshan Sanstha’s (CSMSS ) College of Polytechnic, Kanchanwadi,Aurangabad – Maharashtra, Sep 2017.
Abstract [+]
Big data can bring huge benefits to businesses of all size. However, as with any business project, proper preparation and planning is essential, especially when it comes to infrastructure. Until recently it was hard for companies and organizations to get into big data without making heavy infrastructure investments (expensive data warehouses, software, analytics staff, etc.). But times have changed. Now cloud computing has opened up a door to the companies to avoid investing lot of money for infrastructure. |
[9] |
A Study of Events Logs from Elevated Volume of Logistics Information in Spatio-Temporal Data Mining Dr.P.Rizwan Ahmed In 10th International Conference on Recent Trends in Engineering Science and Management (ICRTESM-17), Newton’s Institute of Science and Technology, Guntur Dist, Andhra Pradesh, India. , Aug 2017.
Abstract [+]
In logistics, software aids for transportation planning and scheduling are often based in approximations and abstractions that do not take into account real-world data. The aim of this work is to provide an analysis and methodology, based on real-world data, on how to obtain probability density functions for prediction of activity duration. Such information can be used in planning algorithms, like vehicle routing problem, capable of dealing with stochastic time-windows. |
[10] |
Hiking Robots in Natural Territory Dr.P.Rizwan Ahmed In International Conference on Augmented ContemporaryIdeas and Innovation in Business Interventions (ICACIIBI-2017) , Marudhar Kesari Jain College for Women, Vaniyambadi , Aug 2017.
Abstract [+]
This paper presents a general framework for planning the quasi-static motion of climbing robots. The framework is instantiated to compute climbing motions of a three-limbed robot in vertical natural terrain. An example resulting path through a large simulated environment is presented. The planning problem is one of five fundamental challenges to the development of real robotic systems able to climb real natural terrain. Each of the four other areas—hardware design, control, sensing, and grasping—is also discussed. |
[11] |
ERP Systems and Competitive Advantage: Some Initial Results Dr.P.Rizwan Ahmed In International Conference on Augmented ContemporaryIdeas and Innovation in Business Interventions (ICACIIBI-2017) , Marudhar Kesari Jain College for Women, Vaniyambadi, Aug 2017.
Abstract [+]
Enterprise Resource Planning (ERP) systems have become a de facto standard for integrating business functions. But an obvious question arises: if every business is using the same so-called ―Vanilla‖ software (e.g. an SAP ERP system) what happens to the competitive advantage from implementing IT systems? If we discard our custom-built legacy systems in favour of enterprise systems do we also jettison our valued competitive advantage from IT? While for some organisations ERPs have become just a necessity for conducting business, others want to exploit them to outperform their competitors. In the last few years, researchers have begun to study the link between ERP systems and competitive advantage. This link will be the focus of this paper. We outline a framework summarizing prior research and suggest two researchable questions. In conclusion, we present some initial findings from two empirical case studies derived from part of the European food industry. |
[12] |
The Embryonic Classification of Dementia: Inclusion the DSM-5 in a Consequential Historical and Cultural Environment and Contemplative the Expectations of ‘‘Alzheimer’ Dr.P.Rizwan Ahmed In 3rd International Conference on “ Emerging Trends in Engineering and Management Research– (ICETEMR-17) , Institutions of Electronics and Telecommunications Engineers, Pune, India, Jul 2017.
Abstract [+]
Alzheimer’s disease is a 100-year-old concept. As a diagnostic label, it has evolved over the 20th and 21st centuries from a rare diagnosis in younger patients to a worldwide epidemic common in the elderly, said to affect over 35 million people worldwide. In this opinion piece, we use a constructivist approach to review the early history of the terms ‘‘Alzheimer’s disease’’ and related concepts such as dementia, as well as the more recent nosological changes that have occurred in the four major editions of the Diagnostic and Statistical Manual since 1952. A critical engagement of the history of Alzheimer’s disease and dementia, specifically the evolution of those concepts in the DSM over the past 100 years, raises a number of questions about how those labels and emergent diagnoses. |
[13] |
Computerized Technique for Computer-Aided Diagnosis of Dementia based on structural MRI data Dr.P.Rizwan Ahmed In 3rd International Conference on “ Emerging Trends in Engineering and Management Research– (ICETEMR-17) , Institutions of Electronics and Telecommunications Engineers, Pune, India, Jul 2017.
Abstract [+]
Neurodegenerative diseases are frequently associated with structural changes in the brain. Magnetic Resonance Imaging (MRI) scans can show these variations and therefore be used as a supportive feature for a number of neurodegenerative diseases. The hippocampus has been known to be a biomarker for Alzheimers disease and other neurological and psychiatric diseases. However, it requires accurate, robust and reproducible delineation of hippocampal structures. This work utilises a datasets consisting of MR images shared by EADC-ADNI working group . Hippocampus volume is a feature used in this analysis. For the other features we used publicly available brain segmentation package FreeSurfer v.5.1 (FS) (freesurfer.nmr.mgh.harvard.edu) [17] to process the structural brain MRI scans and compute morphological measurements. The FreeSurfer pipeline is fully automatic and provides 184 features per MRI scan in total. Volumes of cortical and sub-cortical structures such as the caudate and average thickness measurements within cortical regions, such as the precuneus. We use the FS features but for hippocampus volume we use the segmentation proposed in [16]. For the diagnosis classification we passed all the features to a C-Support Vector Classifier (C-SVC) with a linear kernel on a 5-fold cross validation. The goal is evaluating the performance of an algorithms for multi-class classification: AD, MCI and controls. Methods that are developed for binary classification can be used for three-way classification by using either a one-vs-one (ovo) or one-vs-all (ova) strategy. In this approach, three classifiers are trained for the three binary problems using the ovo methodology and thereafter their outputs are combined into three predictions. |
[14] |
Enlargement of a Cloud Based Seclusion Monitoring Framework for the Health Division Dr.P.Rizwan Ahmed In 4th International Conference on “ Emerging Trends in Engineering and Management Research– (ICETEMR-17) , Institutions of Electronics and Telecommunications Engineers, Pune, India, Jul 2017.
Abstract [+]
Cloud computing is growing in popularity due to its ability to offer dynamically scalable resources provisioned as services regardless of user or location device. However, moving data to the cloud means that the control of the data is more in the hands of the cloud provider rather than the data owner. This is a great challenge that continues to hinder cloud computing from successfully achieving its potential. This is due to the fact that with cloud computing, the storage and processing of private information is done on remote machines that are not owned or even managed by the cloud consumers. This brings about significant security and data privacy concerns that impede the broader adoption of cloud computing, which compromises the vision of cloud computing as a new IT procurement model. |
[15] |
Large Scale Data Analytics of User Performance for Humanizing Substance Deliverance Dr.P.Rizwan Ahmed In 4th International Conference on “ Emerging Trends in Engineering, Technology, Science and Management – (ICETETSM-17) , Institutions of Electronics and Telecommunication Engineers, Pune, India, Jul 2017.
Abstract [+]
The Internet is fast becoming the de facto content delivery network of the world, supplanting TV and physical media as the primary method of distributing larger files to ever-increasing numbers of users at the fastest possible speeds. Recent trends have, however, posed challenges to various players in the Internet content delivery ecosystem. These trends include exponentially increasing traffic volume, increasing user expectation for quality of content delivery, and the ubiquity and rise of mobile traffic. |
[16] |
Using Compound Vision Geometry for Diffusion Tower Re-Enactment Dr.P.Rizwan Ahmed In 4th International Conference on “ Emerging Trends in Engineering, Technology, Science and Management – (ICETETSM-17) , Institutions of Electronics and Telecommunications Engineers, Pune, India, Jul 2017.
Abstract [+]
Automated platforms that conduct power line inspections need to have a vision system which is robust for their harsh working environment. State-of-the-art work in this field focuses on detecting primitive shapes in 2D images in order to isolate power line hardware. Recent trends are starting to explore 3D vision for autonomous platforms, both for navigation and inspection. However, expensive options in the form of specialized hardware is being researched. A cost effective approach would begin with multiple view geometry. Therefore, this study aims to provide a 3D context in the form of a reconstructed transmission pylon that arises from image data. To this end, structure from motion techniques are used to understand multiple view geometry and extract camera extrinsic. |
[17] |
A Survey on Secure Data Relocate & File Distribution use of Cloud Service for Mobile Application Dr.P.Rizwan Ahmed In 3rd International Conference on “Latest Innovations in Science, Engineering and Management – (ICLISEM-17) , International Centre, Goa, India, Feb 2017.
Abstract [+]
Smart phones are basic needs of our daily life. It’s like a small computer which gives you many facilities such as web browsing, downloading and many more but small data storage space and backup are major problem. On the other hand cloud computing provides efficient computational resources and secure data hosting services. But the data transmission among two secure networks is performed over unsecured network. So need a design to secure data transfer. |
[18] |
Challenges in Backing Up and Restoring Enterprise Applications Dr.P.Rizwan Ahmed In International Conference on Recent Trends in Engineering Science, Humanities and Management (RTESHM-17) , Sri Ramasamy Naidu Memorial College, Sattur, Tamil Nadu, Feb 2017.
Abstract [+]
Backing up and restoring enterprise applications (EAs) are essential operations that are usually done manually by an administrator or semi-automatically by tools. Backing up an enterprise application (EA) consists of backing up all its components together with the environments and operating systems in a consistent way so that the application can be restored and function properly later. There are many challenges for backing up and restoring EAs. This paper proposes a framework for automating the process of backing up and restoring EAs deployed in a cloud environment to ensure the continuous running of these enterprise applications and prevent the loss of data in case failure of applications |
[19] |
Join Indices for Relational Database Management System Dr.P.Rizwan Ahmed In 9th International Conference on Recent Innovations in Science, Engineering and Management (RISEM-17) , Dhurva Institute of Engineering and Technology, Nalgonda, Telangana , Jan 2017.
Abstract [+]
In new application areas of relational database systems, the join operator is used more than in conventional applications. We propose a simple data structure called join index, for improving the performance of joins in the context of complex queries. For most of the joins, updates to join indices incur very little overhead. |
[20] |
Cryptographic Application Programming Interfaces Dr.P.Rizwan Ahmed In 6th International Conference on Recent Trends in Engineering, Science & Management (ICRTESM-17) , Indian Federation of United Nations Associations, New Delhi(India) , Jan 2017.
Abstract [+]
The significance of security devices that protect the numerous transactions, which take place in today‘s distributed virtual environment, cannot be underestimated. The importance of such devices will increase as our society continues to evolve into a cashless electronic society. The continuing increase in the number and size of electronic transactions, the advances in the technology utilized and the growing sophistication of the adversary have led to significant resources being invested in the evaluation and analysis of security devices. There has been a transformation of the traditional security analysis from one focused on mathematical primitives and physical engineering solutions to a holistic approach that seeks to protect against subtle interactions between the cryptographic, logical and physical aspects of such devices that can collude to compromise the security thereof. |
[21] |
Architectural Support for Security Management”, proceedings Dr.P.Rizwan Ahmed In 6th International Conference on Recent Trends in Engineering, Science & Management (ICRTESM-17) , Indian Federation of United Nations Associations, New Delhi(India), Jan 2017.
Abstract [+]
This paper presents a principled approach to network redesign that creates more secure and manageable networks. We propose a new network architecture in which a global security policy defines all connectivity. The policy is declared at a logically centralized Controller and then enforced directly at each switch. All communication must first obtain permission from the Controller before being forwarded by any of the network switches. The Controller manages the policy namespace and performs all routing and access control decisions, while the switches are reduced to simple forwarding engines that enforce the Controller’s decisions. |
[22] |
Security Techniques for Protecting Data In Cloud Computing Dr.P.Rizwan Ahmed In 3rd International Conference on Recent Innovative in Science, Technology, Management and Environment (ICRISTME-16) , ) Indian Federation of United Nations Associations, New Delhi(India) , Dec 2016.
Abstract [+]
From the past few years, there has been a rapid progress in Cloud Computing. With the increasing number of companies resorting to use resources in the Cloud, there is a necessity for protecting the data of various users using centralized resources. Some major challenges that are being faced by Cloud Computing are to secure, protect and process the data which is the property of the user. The main aim of this research is to understand the security threats and identify the appropriate security techniques used to mitigate them in Cloud Computing. |
[23] |
Applying Big Data Analytics for Energy Efficiency Dr.P.Rizwan Ahmed In 3rd International Conference on Recent Innovative in Science, Technology, Management and Environment (ICRISTME-16) , Indian Federation of United Nations Associations, New Delhi(India) , Dec 2016.
Abstract [+]
Global energy requirements are continuously increasing. Conventional methods of producing more energy to meet this growth pose a great threat to the environment. CO2 emissions and other bi-products of energy production and distribution processes have dire consequences for the environment. Efficient use of energy is one of the main tools to restrain energy consumption growth without compromising on the customer’s requirements. Improving energy efficiency requires understanding of the usage patterns and practices. Smart energy grids, pervasive computing, and communication technologies have enabled the stakeholders in the energy industry to collect large amounts of useful and highly granular energy us-age data. This data is generated in large volumes and in a variety of different formats depending on its purpose and systems used to collect it. The volume and diversity of data also increase with time. All these data characteristics refer to the application of Big Data. |
[24] |
Applying Big Data Analytics on Integrated Cyber Security Datasets Dr.P.Rizwan Ahmed In 2nd International Conference on Innovative Trends in Science, Engineering and Management (ICITSEM-16) , YMCA, Connaught Place, New Delhi(India) , Nov 2016.
Abstract [+]
With the growing prevalence of cyber threats in the world, various security monitoring systems are being employed to protect the network and resources from the cyber attacks. The large network datasets that are generated in this process by security monitoring systems need an efficient design for integrating and processing them at a faster rate. In this research, a storage design scheme has been developed using HBase and Hadoop that can efficiently integrate, store, and retrieve security-related datasets. The design scheme is a value-based data integration approach, where data is integrated by columns instead of by rows. Since rowkeys are the most important aspect of HBase table design and performance, a rowkey design was chosen based on the most frequently accessed columns associated with use cases for the retrieval of the dataset statistics. Tests conducted on various schema design alternatives prove that the rate at which the datasets are stored and retrieved using the model designed as part of this research is higher than that of the standard method of storing data in HBase. |
[25] |
Text Mining With Enriched Text For Entity Oriented Retrieval And Text Clustering Dr.P.Rizwan Ahmed In 2nd International Conference on Innovative Trends in Science, Engineering and Management (ICITSEM-16) , YMCA, Connaught Place, New Delhi(India), Nov 2016.
Abstract [+]
Text mining has become a popular research area for discovering knowledge from unstructured text data. A fundamental process and one of the most important steps in text mining is representation of text data into feature vector. Majority of text mining methods adopt a keyword-based approach to construct text representation which consists of single words or phrases. These representation models such as vector space model, do not take into account semantic information since they assume all words are independent. The performance of text mining tasks, for instance Information Retrieval (IR), Information Extraction (IE) and text clustering, can be improved when the input text data is enhanced with semantic information. |
[26] |
Discovering Unseen Values with Predictive Data Mining Dr.P.Rizwan Ahmed In 2nd International Conference on Latest Innovations in Science, Engineering and Management (ICLISEM-16) , The International Center Goa, Panjim, Goa (India), Oct 2016.
Abstract [+]
Data Mining is an analytic process to explore data (usually large amounts of data - typically business or market related) in search of consistent patterns and/or systematic relationships between variables, and then to validate the findings by applying the detected patterns to new sets of data. The main target of data mining application is prediction. Predictive data mining is important and it has the most direct business applications in world. The paper briefly explains the process of data mining which consists of three stages: (1) the Initial exploration, (2) Pattern identification with validation, and (3) Deployment (application of the model to new data in order to generate predictions). Data Mining is being done for Patterns and Relationships recognitions in Data analysis, with an emphasis on large Observational data bases. From a statistical perspective Data Mining is viewed as computer automated exploratory data analytical system for large sets of data and it has huge Research challenges in India and abroad as well. Machine learning methods form the core of Data Mining and Decision tree learning. Data mining work is integrated within an existing user environment, including the works that already make use of data warehousing and Online Analytical Processing (OLAP). The paper describes how data mining tools predict future trends and behaviour which allows in making proactive knowledge-driven decisions. |
[27] |
Analysis of Data Mining Application in Education Domain Dr.P.Rizwan Ahmed In 2nd International Conference on Latest Innovations in Science, Engineering and Management (ICLISEM-16) , The International Center Goa, Panjim, Goa(India), Oct 2016.
Abstract [+]
Data-driven decision support systems, such as data warehouses can serve the requirement of extraction of information from more than one subject area. Data warehouses standardize the data across the organization so as to have a single view of information. Data warehouses can provide the information required by the decision makers. Developing a data warehouse for educational institute is the less focused area since educational institutes are non-profit and service oriented organizations. In present day scenario where education has been privatized and cut throat competition is prevailing, institutes needs to be more organized and need to take better decisions. Institute’s enrollments are increasing as a result of increase in the number of branches and intake. Now a day, any reputed Institute’s enrollments count in to thousands. In view of these factors the challenges for the management are meeting the diverse needs of students and facing increased complexity in academic processes. The complexity of these challenges requires continual improvements in operational strategies based on accurate, timely and consistent information. The cost of building a data warehouse is expensive for any educational institution as it requires data warehouse tools for building data warehouse and extracting data using data mining tools from data warehouse. The present study provides an option to build data warehouse and extract useful information using data warehousing and data mining open source tools. In this paper we have explored the need of data warehouse / business intelligence for an educational institute, the operational data of an educational institution has been used for experimentation. The study may help decision makers of educational institutes across the globe for better decisions. |
[28] |
An Iterative Approach to Exploratory the Usefulness Of Data Sanitization Dr.P.Rizwan Ahmed In International Conference on Recent Innovations in Sciences, Management, Education and Technology (ICRIMET-16) , JCD Vidyapeeth, Sirsa, Haryana (India) , Aug 2016.
Abstract [+]
When data is shared and/or published, the need for revealing data must be balanced with the need for sanitizing it. This is because some information considered “sensitive”, if revealed may cause damaging consequences, for example, privacy violations, legal and financial liabilities, embarrassment, national security risks, and loss of reputation. Although many techniques for sanitizing data have been developed and used over the years, attackers have still managed to de-sanitize data. One of the reasons for this problem is the tremendous growth of publicly available information. Data like telephone numbers, date of birth, movie ratings, personal preferences like favorite movies and favorite food recipes, property records, real-time geolocation information through social media content and photo metadata can now be easily found on the Internet. This has enabled attackers to gather an immense amount of information about a user or a group of users and correlate it with sanitized datasets. Such correlations can lead to many methods of inferring sensitive information. In this dissertation, we show a method by which data can be evaluated to see if it can be sanitized effectively, while maintaining needed utility from the data, and if so, how can it be done optimally. |
[29] |
Performance Evaluation of New Encryption Algorithms With Emphasis On Probabilistic Encryption Dr.P.Rizwan Ahmed In International Conference on Recent Innovations in Sciences, Management, Education and Technology (ICRIMET-16), JCD Vidyapeeth, Sirsa, Haryana (India) , Aug 2016.
Abstract [+]
The necessity of information security within an organization has undergone major changes in the past and present times. In the earlier times physical means is used to provide security to data. With the advent of computers in every field, the need for software tools for protecting files and other information stored on the computer became important. The important tool designed to protect data and thwart illegal users is computer security. Security mechanisms usually involve more than a particular algorithm or protocol for encryption & decryption purpose and as well as for generation of sub keys to be mapped to plain text to generate cipher text. It means that participants be in possession of some secret information (Key), which can be used for protecting data from unauthorized users. Thus a model has to be developed within which security services and mechanisms can be viewed. With the introduction and revolution in communications, one more change that affected security is the introduction of distributed systems which requires carrying of data between terminal user and a set of computers. Network security measures are needed to protect data during their transmission. The mechanisms used to meet the requirements like authentication and confidentiality are observed to be quite complex. As the importance of information systems is ever growing in all most all fields, electronic information takes on many of the roles, earlier they being done on papers. Few information integrity functions that the security mechanism has to support are security and confidentiality of the data to be transmitted and authentication of users. |
[30] |
Secure Web Mining Dr.P.Rizwan Ahmed In Two Days International Conference on Recent Innovations in Engineering, Science, Humanities and Management (ICRIESHM) , Gayatri Vidya Parishad College for Degree & PG Courses, Rushikonda, Visakhapatnam (India) , Aug 2016.
Abstract [+]
Data mining technology has emerged as a means of identifying patterns and trends from large quantities of data. Data mining and data warehousing go hand-in-hand: most tools operate by gathering all data into a central site, then running an algorithm against that data. However, privacy concerns can prevent building a centralized warehouse – data may be distributed among several custodians, none of which are allowed to transfer their data to another site. This project addresses the problem of computing association rules within such a scenario. We assume homogeneous databases: All sites have the same schema, but each site has information on different entities. The goal is to produce association rules that hold globally, while limiting the information shared about each site. In this project, a new protocol is proposed which combines the advantages of the existing approaches to perform privacy preserving in distributed mining of association rules. Both the privacy and performance characteristics of the proposed protocol are studied and compared with the mining and cryptographic approaches. |
[31] |
Data Prefetching Framework for mobile behavior Mining Dr.P.Rizwan Ahmed In International Conference on Innovations in Science, Engineering, Technology and Management(ICISETM-2014), , Paavai College of Engineering, Namakkal, Apr 2014.
Abstract [+]
Data Mining is a widely used technique for discovering valuable information in a complex data set. In this paper we discussed the main issues about Mobile User Behavior Mining. In mobile transaction database, users in the different user groups may have different behaviors. So that we proposed parameter-less clustering algorithm named CO-Smart-CAST. This behavior mining can produce better accuracy of predicting the mobile user information using that algorithm and to provide efficient mining of sequential access in mobile patterns. Here, the clustering method provides a way to calculate the time interval between one transaction to another transaction. We have predicted the behavior of mobile user using CO-Smart-CAST method. This method of process can be done by following ways. 1. Movements and transaction time measurements, 2. Discovering sequence patterns during transaction using clustering and classification. The behavior using communication model can be classified as following three ways. 1. Angry chat, 2. Happy chat, 3. Chat with deep thoughts. To our best knowledge, this work on mining and prediction of mobile behavior with user relation are done simultaneously. Finally, the methods in proposed system will deliver the better performance. |
[32] |
Distributed Trends in Mining and clustering group movement patterns for tracking mining objects Dr.P.Rizwan Ahmed In International Conference on Innovations in Science, Engineering, Technology and Management(ICISETM-2014), Paavai College of Engineering, Namakkal, Apr 2014.
Abstract [+]
In biological research domain like “Study of animal social behavior” and “Wild life migration” object tracking sensor networks are used. In this application concentrating on finding the group of object with similar movement pattern using distributed mining techniques. But generally WSN concentrating on finding moving patterns of single object or all objects. Tracking moving objects having two phases i.e. mining phase and cluster ensembling phase. In first phase of algorithm we find movement patterns based on local data then we are identifying new term of similarity measure of to computing the similarity of moving objects and find relationship between them. In second phase algorithm combine the local grouping results to derive the group relationship from global view. We hope that the final output shows that the proposed mining algorithm achieves good grouping quality and the mining technique helps reduce the energy consumption by reducing the amount of data to be transmitted. |
[33] |
Mining user’s behavior and environments for semantic place prediction Dr.P.Rizwan Ahmed In International Conference on Innovations in Science, Engineering, Technology and Management(ICISETM-2014), , Paavai College of Engineering, Namakkal, Apr 2014.
Abstract [+]
In this work, we propose a novel prediction framework, which takes into account the spatial property, temporal property, users’ behavior and environment at the same time, for semantic place prediction. The core idea of our proposal is to extract features to represent end users’ behaviors in each place related to its semantic. To achieve this goal, we define 54 features to represent end users’ behaviors to capture the key properties of places recorded in MDC Data Set. In our framework, we propose a novel model, namely Multi-Level Classification Model , to solve the imbalanced data problem. Based on the Multi-Level Classification Model, we make semantic prediction of a place by combining several classification models. To our best knowledge, this is the first work on predicting semantic label of places through integrating sub-classification models into a multi-level structure. |
[34] |
Data Mining Applications in Telecommunications Dr.P.Rizwan Ahmed In International Conference on Innovations in Science, Engineering, Technology and Management(ICISETM-2014), , Paavai College of Engineering, Namakkal,, Apr 2014.
Abstract [+]
Telecommunication companies today are operating in highly competitive and challenging environment. Huge volume of data is generated from various operational systems and these are used for solving many business problems that required urgent handling. These data include call detail data, customer data and network data. Data Mining methods and business intelligence technology are widely used for handling the business problems in this industry. The main application areas of BI and Data Mining in telecommunication industry include fraud detection, network fault isolation and improving market effectiveness. |
[35] |
Assessing the Awareness and Perceptions of Academic Staff in Using E-learning Tools for Instructional Delivery in a Post-Secondary Institution: A Case Study Dr.P.Rizwan Ahmed In International Conference on Quality Changes through Research Experiences, Expectations & Enhancement” QCRE3 - 2014, Dr. NGP College of Education & Dr. NGP College of Arts and Science, Coimbatore, Mar 2014.
Abstract [+]
Assessing the Awareness and Perceptions of Academic Staff in Using E-learning Tools for Instructional Delivery in a Post-Secondary Institution: A Case Study |
National Conferences
[1] |
Demonetisation – Impact on Cashless Payment System Dr.P.Rizwan Ahmed In National Conference on Demonetisation Effects on Indian Financial System , Sree Saraswathi Thyagaraja College (Autonomous), Pollachi. , Oct 2017.
Abstract [+]
Demonetization is a generations’ memorable experience and is going to be one of the economic events of our time. Its impact is felt by every Indian citizen. Demonetization affects the economy through the liquidity side. Demonetizing is Progressive shift to a cashless economy with a greater focus on electronic transactions is being envisaged. Rising use of credit/debit cards, net banking and other online payment mechanisms will be another positive effect of demonetization, as these would not only lower transaction costs but some of these could help earn some fee income as well. |
[2] |
Grid Computing Architecture and Benefits Dr.P.Rizwan Ahmed In Fourth National Conference on Data Science and Engineering , Annapoorana Engineering College, Salem, Sep 2017.
Abstract [+]
Grid Computing has become another buzzword after Web 2.0. However, there are dozens of different definitions for Grid Computing and there seems to be no consensus on what a Grid is. |
[3] |
A survey on Cloud Computing Security Threats Dr.P.Rizwan Ahmed In National Conference on Emerging Trends in Big Data and Research Issue, Dr.N.G.P College of Arts and Science, Coimbatore, Feb 2017.
Abstract [+]
Today’s era is completely dependent on computers. Cloud Computing is the most important technology which is diffusing in the sky of IT. It covers number of advantages like resource sharing; provide large servers for data storage on pay per use basis. But some users still have an impression that saving their confidential data on cloud will no longer remain confidential due to security issues. This paper will concentrate on the basic aspect and the nine security threats related to cloud computing. |
[4] |
Securing Data Transfer in Cluster-based Wireless Sensor Networks Dr.P.Rizwan Ahmed In National Conference on Emerging Trends in Big Data and Research Issue, Dr.N.G.P College of Arts and Science, Coimbatore., Feb 2017.
Abstract [+]
A wireless sensor network consists of a large number of battery powered sensor nodes that are capable of sensing and processing the data, and can transmit the data wirelessly to the base station. The effective and practical way for enhancing the performance of WSNs is clustering. As the clusters are formed dynamically and periodically in a cluster based WSN, securing the data transmission in these networks is a critical issue. A secure and efficient data transmission (SET) protocol, called SET-IBS is been recently proposed whose security relies on the hardness of the Diffie-Hellman problem in the pairing domain. Though results show that this protocol has better performance than the existing secure protocols for CWSNs in terms of security overhead and energy consumption, the computational overhead of this protocol is comparatively high. The existing SET-IBS protocol is based on bilinear pairings, where the computation of pairing is time-consuming. This paper aims to provide a reliable and efficient data transmission for CWSNs with low computational overhead using identity based digital signature from elliptic curve digital signature algorithm (IB-ECDSA), which is an identity based signature protocol without pairings, to enhance the existing SET-IBS protocol. As a result, the computation cost can be saved when compared to the existing SET-IBS scheme that uses pairing. |
[5] |
Privacy Preserving Public Auditing for Secure Storage System in Cloud Computing Dr.P.Rizwan Ahmed In National Conference on Emerging Trends in Big Data and Research Issue, Dr.N.G.P College of Arts and Science, Coimbatore, Feb 2017.
Abstract [+]
Cloud Computing is using hardware and software as computing resources to provide service through internet. We can access the data from anywhere, at any time on demand. The major problem in cloud data storage is security. So in order to provide high security, we proposed Privacy Preserving Auditing Protocol along with blow fish algorithm which enables an external auditor to audit user’s outsourced data in cloud without reading the actual data content. We also improved efficiency by means of Batch Auditing. |
[6] |
Survey on Sequential Pattern Mining Dr.P.Rizwan Ahmed In National Conference on Emerging Trends in Big Data and Research Issue, Dr.N.G.P College of Arts and Science, Coimbatore, Feb 2017.
Abstract [+]
Mining sequential patterns has been a focused theme in data mining research for over a decade. One of the promising approaches of SPM is mainly deal with finding the behaviour of a sequential pattern that can help in many analyzing applications like predicting next event. There are several efficient algorithms that cope with the computationally expensive task of sequential pattern mining. One of them is Generalized Sequential Pattern (GSP) mining algorithm which is an Apriori-based algorithm used for sequential pattern mining. The GSP algorithm has several deficiencies whenever the database size is large, too many scanning of database when seeking frequent sequences and very large amount of candidate sequences generated unnecessary. PrefixSpan which is pattern growth method outperforms GSP and solves all above problems. Its main idea is to examine only the prefix subs equences with minimum support. This paper investigates these algorithms by classifying study of SPM algorithms. |
[7] |
Survey on Security in wireless Sensor Network using ECC Dr.P.Rizwan Ahmed In National Conference on Emerging Trends in Big Data and Research Issue, Dr.N.G.P College of Arts and Science, Coimbatore. , Feb 2017.
Abstract [+]
This paper discusses different issues of Wireless Sensor Network (WS N) and the relevance of the Elliptic curve y cryptography. Security in WS N is a greater challenge in WS N due to the processing limitations of sensor nodes and nature of wireless links. Extensive use of WS Ns is giving rise to different types of threats. To defend against the threats proper security schemes are required. Traditionally security is implemented through hardware or software and is generally achieved through cryptographic methods. Limited area, nature of links, limited processing, power and memory of WS Ns leads to strict constraints on the selection of cryptographic techniques. Elliptic Curve Cryptography (ECC) is the best candidate due to its smaller key size. High security despite of smaller key size results in area and power efficient crypto systems. |
[8] |
Wireless Sensor Network on Localization Techniques Dr.P.Rizwan Ahmed In National Conference on Emerging Trends in Big Data and Research Issue, Dr.N.G.P College of Arts and Science, Coimbatore, Feb 2017.
Abstract [+]
Wireless Sensor Network is a type of wireless network which consists of a collection of tiny device called sensor node. Wireless Sensor Network is one of the rapidly developing areas. Applications of Wireless Sensor Network includes remote environmental monitoring, target tracking, etc. Various algorithms are proposed in 2D for location tracking which provides accuracy but in the real world, we require all the three planes for correct estimation and more accuracy in localization. The 2D works on flat terrain but we need to position WSN in harsh terrain also, so we need an algorithm in 3D that provide better accuracy and decrease the error of estimation and provide a real world view also. The goal of our survey is to present the localization techniques of node. |
[9] |
Big Data and Big Data Analytics Dr.P.Rizwan Ahmed In National Conference on Challenges in Computational Research and Applications( NCCCRA – 2017), Sree Saraswathi Thyagaraja College, Pollachi, Jan 2017.
Abstract [+]
Nowadays companies are starting to realize the importance of using more data in order to support decision for their strategies. It was said and proved through study cases that “More data usually beats better algorithms”. With this statement companies started to realize that they can chose to invest more in processing larger sets of data rather than investing in expensive algorithms. The large quantity of data is better used as a whole because of the possible correlations on a larger amount, correlations that can never be found if the data is analyzed on separate sets or on a smaller set. A larger amount of data gives a better output but also working with it can become a challenge due to processing limitations. |
[10] |
Novel Concept of Security Matrix for Cloud Computing Dr.P.Rizwan Ahmed In National Conference on Challenges in Computational Research and Applications( NCCCRA – 2017) , Sree Saraswathi Thyagaraja College, Pollachi , Jan 2017.
Abstract [+]
Cloud computing, a disruptive technology, is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources having its intrinsic potentiality to enhance collaboration and agility along with immense opportunity for cost-reduction through optimized and efficient computing. Its tremendous envision capability to cater components rapidly orchestrated, provisioned, implemented and decommissioned, scaling and on-demand utility-like model of allocation and consumption, is however, not free from some serious drawbacks due to its inherent security breach - a big concern for both for providers and users. With the improvement of technologies, the attackers or hackers are able to launch attack vectors over cloud services causing a headache to all. While threat, privacy, compliance, integrity, security and alike words are no more buzzwords in the recent era of high-end information technology, cloud security has evolved as a significant research area not only for the researchers but also for the cloud providers and users as well. |
[11] |
A Fraud Detection Approach in Telecommunication using Cluster Genetic Algorithm Dr.P.Rizwan Ahmed In National Conference on Challenges in Computational Research and Applications( NCCCRA – 2017) , Sree Saraswathi Thyagaraja College, Pollachi , Jan 2017.
Abstract [+]
In trend mobile is one of the important devices in public sector. In mobile community there are N numbers of vendors, manufacturers available. The telecommunications industry was first to adopt data mining technology. Telecommunication companies day by day generate and store enormous amounts of high-quality data, have a very large customer data base and operate in a rapidly changing and highly competitive business environment. Telecommunication companies utilize data mining technique to improve their marketing efforts, identify fraud and better manage their telecommunication network connection. In this paper we provide an effective solution to identify the fraud detection in telecommunication using Data Mining clustering techniques with GA as well as misbehavior users. We believe this approach will help in our society. |
[12] |
Brief Review and Issues on Cloud Computing Dr.P.Rizwan Ahmed In National Conference on Recent Trends in Engineering, Technology and Management (RTEM-2016) , Karpagam College of Engineering, Coimbatore, Oct 2016.
Abstract [+]
Cloud Computing has become a scalable services consumption and delivery platform in the field of Services Computing. The technical foundations of Cloud Computing include Service-Oriented Architecture (SOA) and Virtualizations o f hardware and software. Cloud computing is the development of parallel computing, distributed computing, grid computing and virtualization technologies which define the shape of a new era. Cloud computing is an emerging model of business computing. In this paper, we explore the concept of cloud architecture and compares cloud computing with grid computing. We also address the characteristics and applications of several popular cloud computing platforms. In this paper, we aim to pinpoint the challenges and issues of cloud computing. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt into cloud computing systems. In this paper, we investigate several cloud computing system providers about their concerns on security and privacy issues. |
[13] |
A Review of Wireless Sensor Network on Localization Techniques Dr.P.Rizwan Ahmed In National Conference on Recent Trends in Engineering, Technology and Management (RTETM -2016) , Karpagam College of Engineering, Coimbatore, Oct 2016.
Abstract [+]
Wireless Sensor Network is a type of wireless network which consists of a collection of tiny device called sensor node. Wireless Sensor Network is one of the rapidly developing areas. Applications of Wireless Sensor Network includes remote environmental monitoring, target tracking, etc. Various algorithms are proposed in 2D for location tracking which provides accuracy but in the real world, we require all the three planes for correct estimation and more accuracy in localization. The 2D works on flat terrain but we need to position WSN in harsh terrain also, so we need an algorithm in 3D that provide better accuracy and decrease the error of estimation and provide a real world view also. The goal of our survey is to present the localization techniques of node. |
[14] |
Grid Computing: An Introduction Dr.P.Rizwan Ahmed In Fourth National Conference on Data Science and Engineering, Annapoorana Engineering College, Salem, Sep 2016.
Abstract [+]
Grid Computing has become another buzzword after Web 2.0. However, there are dozens of different definitions for Grid Computing and there seems to be no consensus on what a Grid is. |
[15] |
Data Security by Adapting Network Security and Cryptographic Paradigms Dr.P.Rizwan Ahmed In National Conference on Advanced Trends in Information Technology (NCATIT – 2016) , Dr. N.G.P College of Arts and Science, Coimbatore, Mar 2016.
Abstract [+]
Network security is one of the significant aspects of |
[16] |
DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis Dr.P.Rizwan Ahmed In National Conference on Advanced Trends in Information Technology (NCATIT – 2016) , Dr. N.G.P College of Arts and Science, Coimbatore, Mar 2016.
Abstract [+]
Security is the most challenging aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Hence the search for the best solution to offer the necessary protection against the data intruders’ attacks along with providing these services in time is one of the most interesting subjects in the security related communities. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. |
[17] |
Multiplication Method in Public Key Cryptosystem Dr.P.Rizwan Ahmed In National Conference on Advanced Trends in Information Technology (NCATIT – 2016) , Dr. N.G.P College of Arts and Science, Coimbatore, Mar 2016.
Abstract [+]
Modular multiplication is an important operation in several public key cryptosystems. This paper brings a novel idea based on the idea in the exponentiation computation. In this paper a new algorithm for modular multiplication for public key cryptosystem is presented. This proposed method is based on the following two ideas.(i) The remainder in regard to n can be constructed from the remainder with modulus (2n+1) and the remainder with modulus (2n+2 ). (ii) It often happens that 2n+1 and 2n+2 can easily be factorized, even if n is a prime number or difficult to be factorized into prime factors. The performance of new algorithm using estimation of the computational complexity is observed, and it is shown that the procedure is much faster than the previous algorithms. |
[18] |
Data Security Issues in Cloud Computing Dr.P.Rizwan Ahmed In National Conference on Advanced Trends in Information Technology (NCATIT – 2016) , Dr. N.G.P College of Arts and Science, Coimbatore., Mar 2016.
Abstract [+]
It is well -known that cloud computing has many potential advantages and many enterprise applications and data are migrating to public or hybrid cloud. But regarding some business-critical applications, the organizations, especially large enterprises, still wouldn’t move them to cloud. The market size the cloud computing shared is still far behind the one expected. From the consumers’ perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor for adoption of cloud computing services. This paper provides a concise but all-round analysis on data security and privacy protection issues associated with cloud computing across all stages of data life cycle. Then this paper discusses some current solutions. Finally, this paper describes future research work about data security and privacy protection issues in cloud. |
[19] |
A Symmetric Key Cryptographic Algorithm Dr.P.Rizwan Ahmed In National Conference on Advanced Trends in Information Technology (NCATIT – 2016) , , Dr. N.G.P College of Arts and Science, Coimbatore., Mar 2016.
Abstract [+]
Any communication in the language that you and I speak—that is the human language, takes the form of plain text or clear text. That is, a message in plain text can be understood by anybody knowing the language as long as the message is not codified in any manner. So, now we have to use coding scheme to ensure that information is hidden from anyone for whom it is not intended, even those who can see the coded data. |
[20] |
A Framework for Efficient Mining And Prediction In A Mobile Commerce Environment Dr.P.Rizwan Ahmed In National Conference on Advanced Trends in Information Technology (NCATIT – 2016) , Dr. N.G.P College of Arts and Science, Coimbatore, Mar 2016.
Abstract [+]
n this paper, we explore a new data mining capability for a mobile commerce environment based on location based service(LBS). The mobile commerce environment has received a lot of interests from both of the industry and academia. A novel framework,called Mobile Commerce Explorer (MCE), used for mining and prediction of mobile users’ movements and |
[21] |
Mobility Data Warehousing and Mining Dr.P.Rizwan Ahmed In National Conference on Advanced Trends in Information Technology (NCATIT – 2016) , Dr. N.G.P College of Arts and Science, Coimbatore., Mar 2016.
Abstract [+]
|
[22] |
Opportunities and Challenges of Big Data Dr.P.Rizwan Ahmed In National Conference on Research Issues in Big Data(NCBD’15) , Rathinam College of Arts and Science (Autonomous), Coimbatore. , Nov 2015.
Abstract [+]
This paper summarizes opportunities and challenges of big data. It identifies important research directions and includes a number of questions that have been debated by the panel. |
[23] |
Big Data in Data Mining Dr.P.Rizwan Ahmed In National Conference on Research Issues in Big Data(NCBD’15) , Rathinam College of Arts and Science (Autonomous), Coimbatore, Nov 2015.
Abstract [+]
The major aspire of this paper is to make a study on the concept Big data and its application in data mining. The paper mainly concentrating different types of big data and its application in knowledge discovery. |
[24] |
Cloud Computing Security Issues P Rizwan Ahmed In National Conference on Recent Advancements in Computing Technology(NCRACT ’14) , Bharath University, Chennai, Apr 2014.
Abstract [+]
The term “cloud computing” has been in the spotlights of IT specialists the last years because of its potential to transform this industry. The promised benefits have determined companies to invest great sums of money in researching and developing this domain and great steps have been made towards implementing this technology. Managers have traditionally viewed IT as difficult and expensive and the promise of cloud computing leads many to think that IT will now be easy and cheap. |
[25] |
Mobile Communication Technology as a tool of educational process Dr.P.Rizwan Ahmed In National Conference on Innovative Trends in Engineering and Technologies NCITET 14 , Excel College of Engineering and Technology, Komarapalayam., Apr 2014.
Abstract [+]
The article describes the application of mobile communication technology for enhancing of educational process. |
[26] |
Secure Hash Algorithm for Public Key Digital Signature Schemes Dr.P.Rizwan Ahmed In National Conference on Information Technology For Sustainable Future(NCITSF`14), Jain University, Bangalore, Apr 2014.
Abstract [+]
Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security protocols. This paper presents a new Secure Hash Algorithm called (SHA-192). It uses a famous secure hash algorithm given by the National Institute of Standard and Technology (NIST).The basic design of SHA-192 is to have the output length of 192.The SHA-192 has been designed to satisfy the different level of enhanced security and to resist the advanced SHA attacks. The security analysis of the SHA-192 is compared to the old one given by NIST and gives more security and excellent results as shown in our discussion. In this paper the digital signature algorithm which is given by NIST has been modified using the proposed algorithms SHA-192. Using proposed SHA-192 hash algorithm a new digital signature schemes is also proposed. The SHA-192 can be used in many applications such s public key cryptosystem, digital signcryption, message authentication code, random generator and in security architecture of upcoming wireless devices like software defined radio etc. |
[27] |
Mining and Clustering of Mobile Transaction Sequences Dr.P.Rizwan Ahmed In National Conference on Information Technology For Sustainable Future(NCITSF`14), Jain University, Bangalore, Apr 2014.
Abstract [+]
The improved capabilities of the recent cellular phones compared to older ones had lead the telephone companies offer a lot of value added services. Emergence of new technologies will lead to emergence of new services increasing the percentage of users for such services. To improve the quality of services provided for the users, mining and clustering of different mobile transaction behavior are useful. For clustering we have LBS based algorithm. LBS based services which are in demand are used to find a location, people, services and to find similarities to predict next behavior of mobile user. |
[28] |
Data Security Maintenance in Distributed Computer Systems Dr.P.Rizwan Ahmed In National Conference of Emerging Trends in Electronics, Instrumentation and Control (EtEIC-2014) , Valliammai Engineering College, Kathankulathur, Chennai, Apr 2014.
Abstract [+]
This research deals with data security management in distributed and client/server computer systems, placing special emphasis on access security. The paper presents the subject of data security management in these systems by describing them, examining their vulnerable points and presenting adequate solutions. The paper includes a survey on the subject of authorization, authentication, encryption and access control - the main components in data security management of distributed systems. |
[29] |
Practical and ethical considerations on the use of cloud computing in accounting P Rizwan Ahmed In Kalaivani College of Technology, Coimbatore, Kalaivani College of Technology, Coimbatore, Mar 2014.
Abstract [+]
Abstract |
[30] |
Wirless/Mobile E-Commerce: Technologies P Rizwan Ahmed In Kalaivani College of Technology, Coimbatore, Kalaivani College of Technology, Coimbatore, Mar 2014.
Abstract [+]
Many technologies and applications have appeared |
[31] |
Security Threats in Cloud Computing Environments P Rizwan Ahmed In Kalaivani College of Technology, Coimbatore, Kalaivani College of Technology, Coimbatore, Mar 2014.
Abstract [+]
Cloud Computing promises cost cutting efficiencies to |
[32] |
The Concept of Sustainable Development and its use for Sustainability Scenarios P Rizwan Ahmed In University of Mysore, University of Mysore, Mar 2014.
Abstract [+]
The problem of conceptual descriptions and evaluation of |
[33] |
Energy Efficient Collision Aware Multipath Routing for Wireless Sensor Networks Dr.P.Rizwan Ahmed In Fifth National Conference on VLSI, Embedded, Communication and Networks (VeCAN2014) , Easwari Engineering College, Chenna, Mar 2014.
Abstract [+]
Multipath routing can reduce the need for route updates, balance the traffic load and increase the data transfer rate in a wireless sensor network, improving the utilization of the limited energy of sensor nodes. However, previous multiple path routing methods use flooding for route discovery and transmit data with maximum power regardless of need, which results in waste of energy. Moreover, often a serious problem of collisions among multiple paths arises. In this paper, we propose an energy efficient and collision aware (EECA) node-disjoint multipath routing algorithm for wireless sensor networks. With the aid of node position information, the EECA algorithm attempts to find two collision- free routes using constrained and power adjusted flooding and then transmits the data with minimum power needed through power control component of the protocol. Our preliminary simulation results show that ECCA algorithm results in good overall performance, saving energy and transferring data efficiently. |
[34] |
The State of High Performance Computing in the Cloud Dr.P.Rizwan Ahmed In Fifth National Conference on VLSI, Embedded, Communication and Networks (VeCAN2014) , Easwari Engineering College, Chennai, Mar 2014.
Abstract [+]
HPC applications have been gaining lot of attention in the cloud computing world. Most of these applications are scientific applications that require large CPU capabilities and are also data intensive requiring large data storage. Traditionally they have always required large number of computers inter-connected in a network such as clusters or supercomputers. These clusters are difficult to setup and maintain both technically and financially. With the advent of cloud computing and benefits of Infrastructure as a Service (IaaS) and Platform as a Service (PaaS), scientists and researchers are able to deploy their HPC applications in the cloud without worrying about the costs associated with the infrastructure and other costs involved. They also give guarantees on the quality of service (QoS). This paper focuses on documenting some of the research already done in the field of HPC applications and their current state in cloud computing. |
[35] |
Role of Ethics in Pervasive Computing Security Dr.P.Rizwan Ahmed In National Conference on Recent Advancements in Computing Technology(NCRACT ’14) , Bharath University, Chennai, Mar 2014.
Abstract [+]
The importance of awareness with regard information systems (IS) security has been recently acknowledged. This paper studies the applicability of one aspect of the awareness approach, namely ethics and morality, to the context of pervasive computing. |
International Seminars
[1] |
Cloud Data Integrity using Digital Signature Dr.P.Rizwan Ahmed In International Seminar on Recent Innovations in Information Technology, Morappoor College of Arts and Science, Dharmapuri, Oct 2018.
Abstract [+]
As more and more information of individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. This paper deals with a security mechanism which ensures the integrity of the data stored in the cloud. In this paper, a password based digital signature technique has been proposed. This combination mechanism provides three way security i.e. data security, authentication and verification. In this paper, I have proposed RSA encryption algorithm for confidentiality of data and for authentication hash algorithm can be implemented and PBKDF2 key derivation function for generating the key for encryption. |
[2] |
Precautions Issues on Cryptography and Network Security Dr.P.Rizwan Ahmed In International Seminar on “Big Data Analytics – Research and Issues, , Morappur Kongu College of Arts and Science, Morappur, Dharmapuri District, Sep 2017.
Abstract [+]
This paper deals with some security issues which are occurred often in some areas like personal systems, Networking in Industries etc. Here we discussed some concepts which are related to encryption techniques in Cryptography like Security attacks, Services and Mechanism, Cryptanalysis, Steganography, Cryptographic attacks, Symmetric and public key algorithm, Conventional, Classical and Transposition techniques. And there is some network security related threats along with their solutions like non-complex, weak network access passwords, viruses and worms, Trojen Horses, SPAM, Phising, Packet sniffers, Shared computers, Zombie computers and botnets. |
[3] |
Challenges and Applications of Internet of Things Dr.P.Rizwan Ahmed In International Seminar on “Big Data Analytics – Research and Issues, Morappur Kongu College of Arts and Science, Morappur, Dharmapuri District, Tamil Nadu , Sep 2017.
Abstract [+]
Nowadays Internet of Things (IoT) gained a great awareness from researchers, since it becomes allowing a communications between machines, objects and everything together with peoples and important technology that promises a smart human being life. In the real world connected to the Internet via wireless network and IOT can use different types of connections like RFID, Bluetooth, WIFI and ZigBee. Technology of IOT becomes smart in every aspect. Since the IOT will provide a means of smart cities, smart healthcare, smart homes and building using this having various important applications as smart energy, grid, transportation, waste management and monitoring. |
[4] |
A Study on Different Keywords Based Search Techniques over Encrypted Data Dr.P.Rizwan Ahmed In International Seminar on “Big Data Analytics – Research and Issues, Morappur Kongu College of Arts and Science, Morappur, Dharmapuri District, Tamil Nadu , Sep 2017.
Abstract [+]
Cloud computing provides several attractive benefits for users like on-demand computing, pay as per use. It brings great convenience to consumers; where shared resources, data and information are provided to computers on-demand and consumer has to pay as per use. Ideally for these services, consumers should be in a position to verify the charges billed to them. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data. But on other hand consumers are facing serious difficulties that how to search the most suitable services from cloud. It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Multiple encryption techniques are invented to encrypt the data. That way encrypted search has become an important problem in security. This is due to a combination of three things: (1) search is now the primary way we access our data; |
[5] |
Data and Visualization Security in Cloud Dr.P.Rizwan Ahmed In International Seminar on “Big Data Analytics – Research and Issues, Morappur Kongu College of Arts and Science, Morappur, Dharmapuri District, Tamil Nadu , Sep 2017.
Abstract [+]
Cloud computing is getting attention of the researchers these days. Large number of users are attached with cloud computing. But as there are several merits of cloud computing some demerits are also there. The one of the greatest threat in cloud computing is security. This security is concerned with data of the users that is present in cloud and is transferred across the clouds and the virtualization concept. In this paper several attacks on cloud are studied and solutions to those threats are compiled. In this paper a secure technique to handle data in cloud and secure virtualization is proposed in this paper. A secure VM migration technique which gives VM isolation guarantee and VM escape protection is proposed here. And it is shown that this security algorithm posses no considerable overhead. |
[6] |
Big Data and Cloud Computing Dr.P.Rizwan Ahmed In International Journal of Advanced Research in Science and Engineering,(IJARSE) , , Sep 2017.
Abstract [+]
big data can bring huge benefits to businesses of all size. However, as with any business project, proper preparation and planning is essential, especially when it comes to infrastructure. Until recently it was hard for companies and organizations to get into big data without making heavy infrastructure investments (expensive data warehouses, software, analytics staff, etc.). But times have changed. Now cloud computing has opened up a door to the companies to avoid investing lot of money for infrastructure. |
National Seminars
[1] |
Quality Enhancement of Higher Education Through E-Learning Dr.P.Rizwan Ahmed In NAAC Sponsored National Seminar on Quality Enrichment and Excellence in Indian Higher Education System in the Era of Globalisation (NS-QEEIHESG ’17) , DB Jain College (Autonomous), Chennai – 97., Feb 2017.
Abstract [+]
E learning is a tool for using information technology to enable user to learn anytime and anywhere in the world. It provides the learners to get information from experts and can be imparted training with the use of internet technological channels and networks, e-learning uses |
[2] |
Quality Assessment and Enrichment in Higher Education Dr.P.Rizwan Ahmed In NAAC Sponsored National Seminar on Quality Enrichment and Excellence in Indian Higher Education System in the Era of Globalisation (NS-QEEIHESG ’17), DB Jain College (Autonomous), Chennai – 97., Jan 2017.
Abstract [+]
E learning is a tool for using information technology to enable user to learn anytime and anywhere in the world. It provides the learners to get information from experts and can be imparted training with the use of internet technological channels and networks, e-learning uses |
[3] |
Present Evaluation Method of Examination Dr.P.Rizwan Ahmed In NAAC Sponsored National Level Seminar on Evaluation Reforms for Quality Education in Higher Education Institutions, Rathnavel Subramaniam College of Arts and science (Autonomous), Coimbatore., Jan 2017.
Abstract [+]
It has been said that the system mostly produces robots who possesses an amazing capacity for storing facts and churning them out at the press of the right button. Qualities like independent thinking, problem solving ability, initiative leadership skills and social competence fall by the wayside as getting high grades becomes their only goal. |
[4] |
Quality and Performance Evaluation of Question Paper Setter Dr.P.Rizwan Ahmed In NAAC Sponsored National Level Seminar on Evaluation Reforms for Quality Education in Higher Education Institutions , Rathnavel Subramaniam College of Arts and science (Autonomous), Coimbatore., Jan 2017.
Abstract [+]
Designing of a quality question paper is an important tool in the hands of a teacher. It is an art but requires knowledge about the parameters of a quality question paper. The means of evaluation of students in our country is based on their performances in exams. A question paper is the basic tool used in an examination. |
[5] |
Reforms in Examination and Education System in India Dr.P.Rizwan Ahmed In NAAC Sponsored National Level Seminar on Evaluation Reforms for Quality Education in Higher Education Institutions , Rathnavel Subramaniam College of Arts and science (Autonomous), Coimbatore., Jan 2017.
Abstract [+]
The examination system of India has remained unchanged for so many years. No doubt this system is full of stress that�s why most of Newspaper and magazines publish articles on this topic during the examination session in the education system of India, ability of a student is decided by an examination. In this system, there is no place for the performance of a student in a full academic session. Scoring more and more marks in exams has become the only aim of a student. First of all, if this system is better than all those who scores good marks in these must be brilliant and successful life. But reality is different now a day most of the institutions do not give admission on marks basis. They have a separate test and this trend is growing rapidly because they have no faith in this examination system. The mindset of the society is also responsible for making the exam a source of stress. If someone scores good marks in examination, then society starts treating him like a hero. On the other hand, if someone scores less mark than society treats him just like an untouchable. At this point one question arises what is the importance of getting more and more marks in an examination? Just getting admission in a reputed educational institution or making a first impression to any employer firm. If anyone gets a job, then he must have to perform well on practical front marks of any examination won�t work there only knowledge will work there. |
[6] |
Performance of WSN using BLE for Building Noise Monitoring Dr.P.Rizwan Ahmed In One Day National Seminar on Wireless Sensor Networks , Adhiparasakthi College of Arts & Science, Kalavai, Sep 2016.
Abstract [+]
Performance of WSN using BLE for Building Noise Monitoring |
[7] |
Rapid Changes in Mobile Computing Environment: An Overview of Security, Privacy and Social Issues of Mobile in Wireless Market Dr.P.Rizwan Ahmed In National Seminar on Recent Trends in Computing Techniques, Arignar Anna College, Krishnagiri, Feb 2015.
Abstract [+]
The use of mobile devices embedded in the surrounding physical environment, users can be provided with transparent computing and communication services at all times and in all places. The complexity of providing such services stems from the fact that the communication devices and the objects with which they interact may both be mobile. Their implementation requires advances in wireless network technologies and devices, development of infrastructures supporting cognitive environments, discovery and identification of mobile computing applications and services, security and an understanding of the cross-layer interactions between all of these components. This paper provides the idea of new mobile computing applications, including location aware and context aware applications, improved networking communication protocols to support evolving needs of mobile computing applications, and better internet backbone services to support next generation mobile computing. This paper also targets IT developers, system architects, and managers looking at how best to develop and deploy mobile applications. |
[8] |
Real-Time Transaction Management in Mobile Computing Systems Dr.P.Rizwan Ahmed In National Seminar on Recent Trends in Computing Techniques, Arignar Anna College, Krishnagiri, Feb 2015.
Abstract [+]
|
[9] |
Use of Chinese Remainder Theorem to Generate Random Numbers for Cryptography Dr.P.Rizwan Ahmed In National Seminar on Recent Trends in Computing Techniques, Arignar Anna College, Krishnagiri. , Feb 2015.
Abstract [+]
Random numbers are the numbers, which play an important role for various network security applications. hers are some techniques that are used to generating random numbers such as” pseudorandom number generator” and “linear congruent generator” also cryptographically generated random numbers” etc. but here we are using the Chinese Reminder Theorem for the purpose of generating Random numbers. In essence, CRT says it is possible to reconstruct integers in a certain range from their residues modulo a set of pair wise relatively prime modulo. |
[10] |
Issues of Multi path Routing Protocol for Mobile Ad hoc Networking Dr.P.Rizwan Ahmed In National Seminar on Emerging Trends in Computer Science and Information Technology, Royal Institute Technology, Education and Research, Ambala, Haryana., Feb 2013.
Abstract [+]
Issues of Multi path Routing Protocol for Mobile Ad hoc Networking |
[11] |
Analysis on Ad hoc Networks for Multi Path Routing Dr.P.Rizwan Ahmed In National Seminar on Research Methology: Use of Information Technology in Research Methods , National Institute for Career Enhancement, Safdarjung Enclave, New Delhi - 29, Jan 2013.
Abstract [+]
Analysis on Ad hoc Networks for Multi Path Routing |
Books
[1] |
ASP.Net Dr.P.Rizwan Ahmed In Margham Publications, Chennai, Feb 2020.
Abstract [+]
Undergraduate and Postgraduate Students |
[2] |
Internet of Things Dr.P.Rizwan Ahmed In Margham Publications, Chennai, Jan 2020.
Abstract [+]
Undergraduate and Postgraduate students |
[3] |
Operating System Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Oct 2019.
Abstract [+]
For UG and PG Students |
[4] |
Open Source Programming Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Oct 2019.
Abstract [+]
For UG and PG Students |
[5] |
Mobile Application Development Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Sep 2019.
Abstract [+]
For Undergraduate Students |
[6] |
Computer Application in Business and Management Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Sep 2019.
Abstract [+]
For UG and PG Students |
[7] |
Decision Support System Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Aug 2019.
Abstract [+]
For Undergraduate Students |
[8] |
Design and Analysis of Algorithm Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Sep 2018.
Abstract [+]
For UG and PG Students |
[9] |
Programming in Java Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Aug 2018.
Abstract [+]
For UG and PG Students |
[10] |
Relational Data base Management System Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Oct 2017.
Abstract [+]
For uG and PG Students |
[11] |
Tally.ERP9 Accounting Software Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Sep 2017.
Abstract [+]
For uG and PG Students |
[12] |
Corel Draw and its Applications Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Sep 2017.
Abstract [+]
For UG and PG Students |
[13] |
Digital Logic and Programming in C Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Sep 2017.
Abstract [+]
For UG and PG students |
[14] |
Computer Application in Business with Tally Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Aug 2017.
Abstract [+]
For UG and PG students |
[15] |
Programming in C++ Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Aug 2017.
Abstract [+]
For UG and PG Students |
[16] |
Programming in C Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Oct 2016.
Abstract [+]
For UG and PG Students |
[17] |
Cyber Law Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Oct 2016.
Abstract [+]
For UG and PG Students |
[18] |
Software Project Management Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Sep 2016.
Abstract [+]
For UG and PG Students |
[19] |
Office Automation Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Sep 2016.
Abstract [+]
For Undergraduate Students |
[20] |
Enterprise Resource Planning Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Aug 2016.
Abstract [+]
For UG and PG Students |
[21] |
Creativity and Innovation Management Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Sep 2015.
Abstract [+]
For UG and PG Students |
[22] |
E-Business and E-Commerce Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Sep 2015.
Abstract [+]
For UG and PG Students |
[23] |
Open Source Software Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Aug 2015.
Abstract [+]
For UG and PG Students |
[24] |
Artificial Intelligence Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Aug 2015.
Abstract [+]
For UG and PG Students |
[25] |
Cryptography Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Oct 2014.
Abstract [+]
For UG and PG Students |
[26] |
Internet and its Applications Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Sep 2014.
Abstract [+]
For UG and PG Students |
[27] |
Programming in C Dr.P.Rizwan Ahmed In University Science Press, New Delhi-2, New Delhi, Sep 2014.
Abstract [+]
For UG and PG Students |
[28] |
Management Information System Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Sep 2014.
Abstract [+]
For UG and PG Students |
[29] |
Mobile Computing Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Aug 2014.
Abstract [+]
For UG and PG Students |
[30] |
Digital Logic and Microprocessor Dr.P.Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Oct 2013.
Abstract [+]
For UG and PG Students |
[31] |
Programming in C++ and Data Structure Dr P Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Aug 2013.
Abstract [+]
For UG and PG Students |
[32] |
Software Testing Dr P Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Feb 2013.
Abstract [+]
For UG and PG Students |
[33] |
Data Mining Dr P Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Feb 2013.
Abstract [+]
For UG and PG Students |
[34] |
Introduction to Information Technology Dr P Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Nov 2012.
Abstract [+]
For UG and PG Students |
[35] |
Data Mining and Data Warehousing Dr P Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Apr 2012.
Abstract [+]
For UG and PG Students |
[36] |
Java Programming Dr P Rizwan Ahmed In APH Publishing Corporation, New Delhi , New Delhi, Mar 2012.
Abstract [+]
For UG and PG Students |
[37] |
Microprocessor and its Applications Dr P Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Sep 2011.
Abstract [+]
For Undergraduate and Postgraduate students |
[38] |
Java Programming Dr P Rizwan Ahmed In Margham Publications, Chennai-17, Chennai, Apr 2010.
Abstract [+]
Fro Undergraduate and Postgraduate Students |
Workshops and Seminars Attended
National Seminars
[1] |
National Level Seminar on Revised on NAAC Assessment and Accreditation Framework Attended, Marudhar Kesari Jain College For Women, Vaniyambadi, 13 Feb 2021 to 13 Feb 2021 |
[2] |
NAAC Sponsored One Day National Level Seminar on Challenges in Revised NAAC Assessment and Accreditation Framework Attended, Marudhar Kesari Jain College For Women, Vaniyambad, 13 Feb 2021 to 13 Feb 2021 |
[3] |
National Seminar on Research Ethics and IPR towards copyright and patent filing. Attended, St. Claret College, Bengaluru and Karnataka State Council of Science and Technology , 29 Apr 2020 to 30 Apr 2020 |
[4] |
UGC Sponsored One Day State Level Seminar on “Big Data Analytics Organized, Mazharul Uloom College, Ambur, 21 Oct 2016 to 21 Oct 2016 |
[5] |
UGC sponsored One Day State Level Workshop on “Cloud Computing – Opportunities and Challenges Organized, Mazharul Uloom College, Ambur, 15 Oct 2016 to 15 Oct 2016 |
National Workshops
[1] |
Wokshop on The Role of IQAC in enhancing Quality in Higher Education Attended, Gujarat National Law University, Gujarat, 21 Nov 2020 to 21 Nov 2020 |
[2] |
Workshop on Primer – The Statistical Software that empowers researchers Attended, Guru Nanak College, Chennai., 19 Nov 2020 to 19 Nov 2020 |
[3] |
Three Days Workshop on “NAAC Assessment and Accreditation: A Step by Step Process Attended, GATES Institute of Technology, Andhra Pradesh , 28 May 2020 to 30 May 2020 |
[4] |
Participated National Workshop on Latex Attended, Stella Marris College, Chennai. , 24 May 2020 to 30 May 2020 |
[5] |
National Workshop on Research Ethics and Plagiarism Control Attended, Anna Leela College of Commerce and Economics, Mumbai , 15 May 2020 to 15 May 2020 |
[6] |
Workshop on Microchips Internet of Things Attended, Sri Venkateswara College of Engineering, Bengaluru., 13 May 2020 to 13 May 2020 |
[7] |
Workshop on The Magic and Mechanics of Good Teaching and Learning Attended, Justice Basheer Ahmed Syeed College for Women, Chennai., 10 May 2020 to 10 May 2020 |
[8] |
Workshop on Ruby Programming Attended, Industry Institute Collaboration Association, Kolkota , 29 Apr 2020 to 29 Apr 2020 |
[9] |
Workshop on Distributed Computing Attended, Industry Institute Collaboration Association, Kolkota , 27 Apr 2020 to 27 Apr 2020 |
[10] |
National Workshop on Fine Tunning Research Planning using Elsevier Tools: Science Direct, Scopus and Mendeley. Attended, K. J. Somaiya College of Science and Commerce, Mumbai., 25 Apr 2020 to 25 Apr 2020 |
[11] |
Workshop on Data Science / Machine Learning Attended, Industry Institute Collaboration Association, Kolkota , 25 Apr 2020 to 25 Apr 2020 |
[12] |
Workshop on Academic Research Report Writing and Research Tools Attended, Sankara College of Science and Commerce. Coimbatore, 09 Apr 2020 to 10 Apr 2020 |
Short Term Courses
[1] |
AICTE sponsored one week Online Short Term Training Programme on “Cyber Security & Block-Chain Technologies” Attended, Gurunanak Institutions Technical Campus, Hyderabad , 16 Nov 2021 to 21 Nov 2021 |
[2] |
Online Short Term Training Program on Incorporating the techniques of Block Chain and Artificial Intelligence to face the security and Privacy challenges of IT Infrastructure Attended, KCG College of Technology, Coimbatore. , 18 Jan 2021 to 23 Jan 2021 |
[3] |
AICTE Sponsored Six Days Short Term Training Program on Applications of Artificial Intelligence Toward Industry Attended, Sri Ram Engineering College, Chennai, 16 Jan 2021 to 22 Jan 2021 |
[4] |
Six Days AICTE Sponsored Online Short Term Training Program on “Cyber Security & Forensics” Attended, Sri Aurobindo Institute of Technology, Indore , 21 Dec 2020 to 26 Dec 2020 |
[5] |
AICTE Sponsored One Week Short Term Training Program on Cyber Security and Block Chain Technology Attended, Guru Nanak Institution Technical Campus, Hyderabad , 16 Dec 2020 to 21 Dec 2020 |
[6] |
AICTE sponsored Six Days Short Term Training Program on Developing R & D culture in Educational Institutes through Project Based Learning Attended, Poornima College of Engineering, Jaipur, 15 Dec 2020 to 20 Dec 2020 |
[7] |
AICTE Sponsored One-Week Short Term TRAINING Programme On Applied Machine Learning Algorithms AND Applications Attended, Annamacharya Institute of Technology and Science, Tirupathiu., 15 Dec 2020 to 20 Dec 2020 |
[8] |
One Week Short Term Training Program on Data Science Unfolding Layer of Knowledge Attended, Acropolis Institute of Technology and Research, Indore. , 14 Dec 2020 to 19 Dec 2020 |
[9] |
AICTE Sponsored Six Days Online Short Term Training Program on Paradigm Shift in Assessment and Evaluation Practices Attended, Amal Jothi College of Enginieering, Kottayam, Kerala., 07 Dec 2020 to 12 Dec 2020 |
[10] |
Six Days Short Term Training Program on Digital Farming Exploration With AI Attended, Vivekanandha College of Technology for Wome, Tiruchengode, 30 Nov 2020 to 05 Dec 2020 |
[11] |
Six Days Online Short Term Training Program on Deep Learning Based Analysis of images using Python Attended, Kalaignar Karunanithi Institute of Technolgoy, Coimbatore , 29 Nov 2020 to 04 Dec 2020 |
[12] |
A Hands - on Approach for Design & Implementation of Digital Circuits using Open Source Computer Tools Attended, SRM Valliammai Engineering College, Chennai, 23 Nov 2020 to 28 Nov 2020 |
[13] |
AICTE Sponsored One Week Short Term Training Program (STTP) on Supporting Open Technologies for Deployed Artificial Intelligence Attended, P.S.R Engineering College, Sivakasi, 14 Nov 2020 to 21 Nov 2020 |
[14] |
AICTE sponsored Short Term Training Programme under AQIS on “SELENIUM WEBDRIVER USING PYTHON Attended, Ramiah Insitute of Technolgy, Bangalore, 11 Nov 2020 to 19 Nov 2020 |
[15] |
AICTE Sponsored One Week Online Short Term Training Programme (STTP) On “Recent Emerging Trends in Wireless Communication using IoT” Attended, Vidya Jyothi Institute of Technology (Autonomous), Hyderabad, 09 Nov 2020 to 16 Nov 2020 |
[16] |
AICTE Sponsored One Week Online Short Term Training Programme (STTP) On Data Analytics and Supporting services using Machine Learning Attended, Dhirajlal Gandhi College of Technology, Salem, 07 Nov 2020 to 12 Nov 2020 |
[17] |
AICTE Sponsored One Week Short Term Training Program (STTP) Phase IV on Machine Learning with Python in Data Science - Applications and Research Perspectives Attended, SRM Institute of Science and Technology, Chennai., 05 Nov 2020 to 09 Nov 2020 |
[18] |
AICTE Sponsored One Week Online Short Term Training Programme (STTP) on Long Range (LoRa) Wireless Area Networks: A Futuristic Approach Attended, KSR Institute for Engineering and Technology, Tiruchengode, 03 Nov 2020 to 08 Nov 2020 |
[19] |
Six Days AICTE SPONSORED ONLINE SHORT TERM TRAINING PROGRAMME on “Leveraging the Power of Serverless Computing: Architectural and Economic Impact, Research Challenges and Issues” Attended, Kongu Engineering College, Erode., 02 Nov 2020 to 07 Nov 2020 |
[20] |
AICTE Sponsored One Week Online Short Term Training Programme (STTP) on Supporting Open Technologies for Deployed Artificial Intelligence Attended, PSR Engineering College, Sivakasi., 27 Oct 2020 to 02 Nov 2020 |
[21] |
One Week Online Short Term Training Programme on “Cyber Security & Block-Chain Technologies Attended, Guru Nanak Technical Institution Campus, Hyderabad., 27 Oct 2020 to 31 Oct 2020 |
[22] |
AICTE sponsored One Week online STTP on "Capacity Building and Training on Geospatial Technologies Attended, Sagi Rama Krishnam Raju Engineering College (Autonomous), Bhimavaram, West Bengal., 26 Oct 2020 to 31 Oct 2020 |
[23] |
One Week Online Short Term Training Programme (STTP) on Artificial Intelligence and 5G Communication Technology Attended, Poornima College of Engineering, Kota., 24 Oct 2020 to 30 Oct 2020 |
[24] |
AICTE Sponsored One Week Short Term Training Programm (STTP) on Research Issues and Challenges in Deep Learning Attended, Sree Ramakrishna Engineering College, Coimbatore, 17 Aug 2020 to 22 Aug 2020 |
[25] |
One Week Short Time Online Course on Use of Research and Analytics to a Write Good Research Outcome Attended, RK Commerce, Amritsar, 26 Apr 2020 to 05 May 2020 |
Trainings
[1] |
R Programming Attended, Spoken Tutorial Project, IIT Bombay, funded by NMEICT, MHRD, Govt. of India, 11 May 2020 to 11 May 2020 |
[2] |
BioPython Attended, Spoken Tutorial Project, IIT Bombay, NMEICT, MHRD, Govt. of India, 11 May 2020 to 11 May 2020 |
[3] |
Arduino Attended, Spoken Tutorial Project, IIT Bombay, NMEICT, MHRD, Govt. of India, 11 May 2020 to 11 May 2020 |
[4] |
LateX Attended, Spoken Tutorial Project, IIT Bombay, NMEICT, MHRD, Govt. of India, 04 May 2020 to 04 May 2020 |
[5] |
Python3.4.3 Attended, Spoken Tutorial Project, IIT Bombay, funded by NMEICT, MHRD, Govt. of India, 22 Apr 2020 to 22 Apr 2020 |
[6] |
Drupal Attended, Spoken Tutorial Project, IIT Bombay, NMEICT, MHRD, Govt. of India, 01 Mar 2020 to 01 Mar 2020 |
[7] |
Avogadro Attended, Spoken Tutorial Project, IIT Bombay, NMEICT, MHRD, Govt. of India, 01 Mar 2020 to 01 Mar 2020 |
[8] |
One Week Training Programme on “Academic Leadership Attended, Islamiah College (Autonomous), Vaniyambadi, 23 Aug 2017 to 29 Aug 2017 |
Others
[1] |
National Level Faculty Development Program on Revolution of Artificial Intelligence in E-Commerce Attended, Sivananda Sarma Memorial R.V. College, Bangalore, 27 Jan 2021 to 27 Jan 2021 |
[2] |
AICTE-ISTE Sponsored Refresher Program on Sensor Flow for Deep Learning with Python Attended, Arunachala College of Engineering for Women, Madural, 25 Jan 2021 to 01 Feb 2021 |
[3] |
Faculty Development Programme on Codeless Machine Learning using R Attended, Kirloskar Institute of Advanced Management Studies, Yantrapur, 21 Dec 2020 to 22 Dec 2020 |
[4] |
Five Days Faculty Development Programme on Internet of Things Attended, Rajasthan technical University, Kota , 20 Dec 2020 to 24 Dec 2020 |
[5] |
Seven days National level Faculty Development Program on "Application of Tools & Techniques in Research Methodology & Accelerate to Publish Article in Scopus and Web of Science" Attended, Hindusthan College of Arts & Science, Coimbatore., 17 Dec 2020 to 24 Dec 2020 |
[6] |
Seven days National level Faculty Development Program on "Application of Tools & Techniques in Research Methodology & Accelerate to Publish Article in Scopus and Web of Science" Attended, Hindusthan College of Arts & Science, Coimbatore., 17 Dec 2020 to 24 Dec 2020 |
[7] |
One Week Online Faculty Development Programme on the theme “Education & Resilience during Covid-19 and Beyond Attended, Army Institute of Education, Greater Noida. , 16 Dec 2020 to 23 Dec 2020 |
[8] |
One Week Faculty Development Program on Applications of Machine Learning of Data Science Attended, Rajastan Technical University, Kota. , 15 Dec 2020 to 19 Dec 2020 |
[9] |
Five Days Online Faculty Development Program on “Machine Learning & Data Science” Attended, Rajasthan Technical University, Kota Arya Institute of Engineering & Technology, Jaipur, 14 Dec 2020 to 18 Dec 2020 |
[10] |
AICTE-ISTE Sponsored Refresher Program on Developing Secure IOT Applications Attended, Shah and Anchor Kutchi Engineering College, Mumbai, 14 Dec 2020 to 19 Dec 2020 |
[11] |
One Week International Level Faculty Development Program on Data Analysis using R Attended, St. Claret College, Bangalore, 07 Dec 2020 to 12 Dec 2020 |
[12] |
Five Days International Academic Summit on Building Global Workforce with Academic Excellence Attended, Ballari Institute of Technology and Management Indonesia., 07 Dec 2020 to 11 Dec 2020 |
[13] |
Faculty Development Programme on Natural Language Processing Attended, Rajasthan technical University, Kota , 07 Dec 2020 to 11 Dec 2020 |
[14] |
National Level Seven Days Online Symposium on NAAC Accreditation Process Attended, B.M.S College for Women, Bengalaur , 23 Nov 2020 to 30 Nov 2020 |
[15] |
Six Days National Level Faculty Development Program FDP on Teaching Learning Practice Attended, Hindustan College of Arts and Science, Coimbatore , 16 Nov 2020 to 21 Nov 2020 |
[16] |
12 Days Faculty Development Programme on Outcome Based Education Attended, Saintgits Institute of Management, Kottayam, 16 Nov 2020 to 28 Nov 2020 |
[17] |
One Week Faculty Development Program on “Smart Vision of IoT in 5G Era Attended, Thangal Musaliar College of Engineering Kollam, Kerala, 09 Nov 2020 to 14 Nov 2020 |
[18] |
International Level FDP on Multiple Intelligence and ways Of Teaching Attended, Sree Narayana Guru College, Coimbatore, 07 Nov 2020 to 07 Nov 2020 |
[19] |
AICTE-ISTE Sponsored Refresher Program on Machine Learning and Pattern Recognition Attended, SSBT's College of Engineering & Technology, Jalgaon., 07 Nov 2020 to 12 Nov 2020 |
[20] |
Two Weeks National Level Online Faculty Development Program on Machine Learning & Artificial Intelligence in Data Science Attended, PACE institute of Technology and Science, Ongle , 03 Oct 2020 to 16 Oct 2020 |
[21] |
One Week Faculty Development Program on Techrainbow cascading digital world Attended, Prestige Institute Management and Research Center. Indore , 24 Aug 2020 to 30 Aug 2020 |
[22] |
One Week Online National Faculty Development Program on Innovative and Effective Teaching & Learning Process Attended, Roorkee College of Management & Computer Applications, Roorkee, 08 Aug 2020 to 14 Aug 2020 |
[23] |
One Week International Faculty Development Programme on "Recent Trends in Computer Science and it's Research Perspective Attended, Marudhar Kesari Jain College For Women, Vaniyambadi., 10 Jul 2020 to 16 Jul 2020 |
[24] |
Faculty Development Programme on "Enhancing Skills in Writing Quality Research Papers" Attended, Sri Bharathi Arts and Science College for Women, Pudukkottai, 26 Jun 2020 to 26 Jun 2020 |
[25] |
7 Days National level FDP on Recent Innovative Technologies Attended, K.S. R College of Arts and Science for Women, Tiruchengode, 25 Jun 2020 to 01 Jul 2020 |
[26] |
Faculty Development Programme on Build Your Future in Machine Learning and Artificial Intelligence Attended, Islamiah Womens Arts and Science College, Vaniyambadi, 23 Jun 2020 to 23 Jun 2020 |
[27] |
Faculty Development Programme on “NLP in Data Science Attended, St. Joseph’s Institute of Technology, Chennai, 20 Jun 2020 to 21 Jun 2020 |
[28] |
National Level Webinar on “CLOUD BUSINESS” Attended, Arumugam Pillai Seethai Ammal College, Sivagangai, 20 Jun 2020 to 20 Jun 2020 |
[29] |
3 day International Faculty Development Programme on ”21st Century Teaching Skills” Attended, Mohamed Sathak Hamid College of Arts and Science for Women,Ramanathapuram, 17 Jun 2020 to 19 Jun 2020 |
[30] |
Faculty Development Program on Teaching & Learning Attended, K.C. College of Engineering & Management Studies & Research, Thane, 16 Jun 2020 to 19 Jun 2020 |
[31] |
International FDP on “Recent Trends in Science and Technology” Attended, Academic Staff College, Suresh Gyan Vihar Univeristy, Jaipur, Rajasthan., 15 Jun 2020 to 20 Jun 2020 |
[32] |
Six Days Faculty Development Program on Latest Trends and Challenges in IT Industry Attended, RMD Engineering College, Chennai, 15 Jun 2020 to 20 Jun 2020 |
[33] |
Faculty Development Programme on Applications of Data Analytics in Data Science Attended, National College(Autonomous), Trichy, 21 May 2020 to 22 May 2020 |
[34] |
Faculty Development Program on Migration of IT Infra Using Cloud Attended, Poornima Institute of Engineering and Technology, Jaipur. , 20 May 2020 to 21 May 2020 |
[35] |
Four Days FDP on Research Prospects and Premises of Deep Learning in Problem Solving. Attended, Nallamuthu Goundar Mahalingam College, Pollachi., 19 May 2020 to 22 May 2020 |
[36] |
Five Days Online FDP on Introduction to Data Science Attended, Guntur Engineering College, Kakinada. , 18 May 2020 to 22 May 2020 |
[37] |
Faculty Development Programme on Industry Perspective on Data Science and Cloud Computing Attended, Sathyabama Institute of Science and Technology, Chennai, 14 May 2020 to 16 May 2020 |
[38] |
Faculty Development Programme on Innovation to Academicians Attended, Ramachandra Engineering college , 11 May 2020 to 16 May 2020 |
[39] |
10 Days Online Faculty Improvement Programme on ‘Developing Teachers’ Overall Personality Attended, Prerna College of Commerce, Nagpur, 11 May 2020 to 20 May 2020 |
[40] |
One Week FDP on Outcome Based Education: A step Towards Excellence. Attended, Government College of Engineering, Karad, Maharashtra, , 11 May 2020 to 15 May 2020 |
[41] |
Three Days Online FDP on Improving Your Research Visibility – Research Impact and Metrics Attended, Velalar College of Engineering and Technology, Erode. , 11 May 2020 to 13 May 2020 |
[42] |
Faculty Awareness Program on NAAC Accreditation Attended, Shri Chhatrapati Shivajiraje College of Engineering, Pune, 10 May 2020 to 15 May 2020 |
[43] |
Faculty Development Programme on Institutional Quality Achievement, Maintenance, and Sustenance Attended, Sri GVG Visalakshmi College for Women, Udumalpet, Tamil Nadu., 09 May 2020 to 09 May 2020 |
[44] |
Faculty Development Programme on Fuzzy Logic Attended, Kristu Jayanti College, Bangaluru, 09 May 2020 to 09 May 2020 |
[45] |
Faculty Development Programm on Course and Curriculum Design in Higher Education Attended, Sri GVG Visalakshmi College for Women, Udumalpet, Tamil Nadu., 08 May 2020 to 08 May 2020 |
[46] |
Faculty Development Programme on Faculty to Administrator Attended, Cauvery College for Women (Autonomous), Trichy , 08 May 2020 to 08 May 2020 |
[47] |
Faculty Development Programme on Big Data Analytics Attended, Hindustan College of Arts and Science, Coimbatore, 08 May 2020 to 08 May 2020 |
[48] |
NAAC Awareness Programme for Faculty Attended, Marathwada Mitramandals Institute of Technology, Pune, 08 May 2020 to 14 May 2020 |
[49] |
Faculty Development Programme on Skill Based Education and Collaborations Attended, Sri GVG Visalakshmi College for Women, Udumalpet, Tamil Nadu., 07 May 2020 to 07 May 2020 |
[50] |
Faculty Development Programme on Data Analytics and Visualization Attended, Jerusalem College of Engineering, Chennai, 07 May 2020 to 07 May 2020 |
[51] |
Faculty Development Programme on Institutional Governance and Best Practices Attended, Sri GVG Visalakshmi College for Women, Udumalpet, Tamil Nadu., 06 May 2020 to 06 May 2020 |
[52] |
Faculty Development Programme on Role of IQAC in Higher Education Institutions Attended, Sri GVG Visalakshmi College for Women, Udumalpet, Tamil Nadu., 05 May 2020 to 05 May 2020 |
[53] |
Faculty Development Programme on Internet of Things Attended, St. Martin Engineering College, Secundarabad. , 05 May 2020 to 07 May 2020 |
[54] |
Faculty Development Programme on Research Collaborations for Quality Research Attended, IQAC and Under UGC PARAMARSH, Sri GVG Visalakshmi College for Women, Udumalpet, Tamil Nadu., 04 May 2020 to 04 May 2020 |
[55] |
Faculty Development Programme on Machine Learning and Artificial Intelligence Attended, Andhra Loyala Institute of Engineering and Technology, Vijayawada, 04 May 2020 to 06 May 2020 |
[56] |
Faculty Development Programme on Innovative Teaching Learning Process in Digital Era Attended, IQAC and Under UGC PARAMARSH, Sri GVG Visalakshmi College for Women, Udumalpet, Tamil Nadu., 03 May 2020 to 03 May 2020 |
[57] |
Faculty Development Programme on Data Science and Machine Learning Attended, Sri Krishna College of Technology, Coimbatore , 02 May 2020 to 04 May 2020 |
[58] |
Faculty Development Programme on Machine Learning Attended, Santhiram Engineering College, Nandyal, Hyderabad, 02 May 2020 to 02 May 2020 |
[59] |
FDP on Research Activities in the Present World –Understanding Interdisciplinary and International Approaches Attended, Sacred Heart College (Autonomou), Tirupattur, 01 May 2020 to 01 May 2020 |
[60] |
Faculty Development Programme on Avogadro Attended, V.O.Chidambaram College, 29 Apr 2020 to 05 May 2020 |
[61] |
Faculty Development Programme on Applications of Geogebra Attended, Hansraj Jivandas College of Education, Khar, Gujarat. , 28 Apr 2020 to 04 May 2020 |
[62] |
Faculty Development Programme on PHP and MySQL Attended, K.M.G College of Arts and Science, Gudiyattam, 27 Apr 2020 to 01 May 2020 |
[63] |
International FDP on Develop the Ability to write Research Proposal. Attended, Adarsh Group of Institutions, Bengalaru, Karnataka , 24 Apr 2020 to 24 Apr 2020 |
[64] |
Online Faculty Development Programme on Engendering the Next Generation Educators Attended, Nehru Arts and Science College, Coimbatore, 23 Apr 2020 to 28 Apr 2020 |
[65] |
Faculty Development Programme on Cyber Security Attended, Vels Univeristy, Chennai, 20 Apr 2020 to 20 Apr 2020 |
[66] |
Faculty Development Programme on Cyber Attack Attended, CMR Group of Institutions, Hyderabad., 19 Apr 2020 to 19 Apr 2020 |
[67] |
Faculty Development Programme on R Programming Attended, Sri Krishna Arts and Science College, Coimbatore., 19 Apr 2020 to 24 Apr 2020 |
[68] |
Faculty Development Programme on Cyber Forensics Attended, Kalasalingam Academic of Research and Higher Education , 18 Apr 2020 to 18 Apr 2020 |
[69] |
Faculty Development Programme on Data Analytics Attended, Rathinam Group of Institutions, Coimbatore, 18 Apr 2020 to 18 Apr 2020 |
[70] |
Faculty Development Programme on Leader - A real role model. Attended, Nallamuthu Gounder Mahalingam College, Pollachi, 16 Apr 2020 to 20 Apr 2021 |
[71] |
Faculty Development Programme on Python Attended, Adhiparasakthi Engineering College, Melmaruvathur, 16 Apr 2020 to 24 Apr 2020 |
[72] |
Faculty Development Programme on Power of Emotional Intelligence-Key to Self Development Attended, Shri Krishnaswamy College for Women, Chennai, 04 Feb 2020 to 05 Feb 2020 |
Awards & Honors
[1] |
Active Young Researcher Award -2018 AR International Research Publications (New Delhi), Sep 2018 |
[2] |
Outstanding Doctoral Best Thesis – 2018 International Association of Research and Development Organization (IARDO), Mar 2018 |
[3] |
Best Educationist Award – 2017 International Institute of Education and Management, New Delhi, Aug 2017 |
[4] |
Active Young Researcher Award -2017 AR International Research Publications (New Delhi), Aug 2017 |
[5] |
Best Research Paper Award 4th International Conference on “ Emerging Trends in Engineering and Management Research– (ICETEMR-17) - Jul 2017 |
[6] |
Best Research Paper Award 3rd International Conference on “ Emerging Trends in Engineering and Management Research– (ICETEMR-17) - Jul 2017 |
[7] |
Best Research Paper Award 4th International Conference on “ Emerging Trends in Engineering, Technology, Science and Management – (ICETETSM-17) - Jul 2017 |
[8] |
Young Researcher Computer Application Integrated Intelligent Research (IIR), Chennai., Jun 2017 |
[9] |
Best Research Paper Award International Conference on Recent Trends in Engineering Science and Management (ICRTESM-17), Mar 2017 |
[10] |
Best Research Paper Award 2nd International Conference on “Innovative Trends in Science, Engineering and Management(ICITSEM-16), Nov 2016 |
[11] |
Active Young Researcher Award -2016 International Research Publications, New Delhi, Oct 2016 |
Memberships
[1] |
Member(AICTSD/HOD/18103) of All India Council For Technical Skill Development (Government of INDIA Registered Organization), New Delhi.. |
[2] |
Member(#160) of International Computer Science and Engineering Society (ICSES), Iran. |
[3] |
Life Member(M4150901620) of International Society for Research and Development, United Kingdom(London) for Life Member. |
[4] |
Senior Member(SNM10100056859) of The Institute of Research Engineers and Doctors for Life Member. |
[5] |
Life Member (No.171162) of International Association of Engineeers (IAENG), Hong Kong for Life Member. |

Mr. S Joseph Gabriel M.C.A., M.Phil
Associate Professor & Research Supervisor

Mr. A. Zakiuddin Ahmed M.Sc., M.Phil., PGDCSM., M.S (Edn. Mgmt)
Assistant Professor & Research Supervisor

Mr. A. Kaleemullah M.Sc., M.Phil., S.E.T.,
Assistant Professor & Research Supervisor
I am Kaleemullah, I have been serving as an Assistant Professor in the Department of Computer Science and Applications, handling classes for UG, PG an
Expand +I am Kaleemullah, I have been serving as an Assistant Professor in the Department of Computer Science and Applications, handling classes for UG, PG and M.Phil. I joined in this esteemed institution in the year 2002. I did B.Sc. Computer Science and M.Sc. Computer Science in Madras Univeristy. I did Master of Philosophy in Computer Science from Periyar University and also Pursuing Ph.D in Computer Science from Periyar University, Salem. I am Qualified in SET Exam in the year 2016. I have been acting for practical examiner for PG and UG,guided 5 scholars, guiding one student,attending examiner for UG and PG valuation, acted as Chief in the Examination Board of BCA of Thiruvalluvar University, Question Paper setters for Self finance, Aided and Autonomous Colleges. Served as a Resource Person for Sri PSG College of Engineering, Coimbatore. My Research areas include software engineering, Data Mining, Opinion Mining, Machine Learning. I have published over 10 research articles in National and International Journals which are indexed in Elseiver Scopus Database. I am the author of three books with ISBN (Digital Logic, System Software and Object Oriented Analysis and Design) which are published in the year 2007.
Publications
International Journals
[1] |
Reactive Search-MST Optimized Clustering Based Feature Selection A Kaleemullah In The Journal of Oriental Research Madras, UGC CARE, Sep 2021, Volume: 1, Page: 114-118.
Abstract [+]
Reactive Search-MST Optimized Clustering Based Feature Selection |
[2] |
Certain Improvements in feature selection for data mining and its applications in opinion mining Kaleemullah A In Journal of Critical Reviews , Scopus, Jan 2020, Volume: 7, Page: 65-71.
Abstract [+]
Certain Improvements in feature selection for data mining and its applications in opinion mining |
[3] |
A survey on Secure Data Relocate and File Distribution use of Cloud Service for Mobile Applications A Kaleemullah In International Journal of Advance Research in Science and Engineering, UGC, Feb 2017, Volume: 06.
Abstract [+]
A survey on Secure Data Relocate and File Distribution use of Cloud Service for Mobile Applications |
[4] |
Analysis of Data Mining Application in Education Domain A Kaleemullah In International Journal of Advanced Technology in Engineering and Science, UGC, Oct 2016, Volume: 04.
Abstract [+]
Analysis of Data Mining Application in Education Domain |
[5] |
Discovering unseen values with predictive data mining A Kaleemullah In International Journal of Innovative Research in Science and Engineering, UGC, Oct 2016, Volume: 02.
Abstract [+]
Discovering unseen values with predictive data mining |
International Conferences
[1] |
A Hybrid Particle Swarm Optimization -Glowworm Swarm Optimization - Minimum Spanning Trees Based Feature Selection in Opinion Mining A Kaleemullah In International Conference on Computing and Intelligent System, Sri Krishna Aditya College of Arts and Science, Coimbatore, Aug 2021.
Abstract [+]
A Hybrid Particle Swarm Optimization -Glowworm Swarm Optimization - Minimum Spanning Trees Based Feature Selection in Opinion Mining |
[2] |
A Hybrid Particle Swarm Optimization -Glowworm Swarm Optimization - Minimum Spanning Trees Based Feature Selection in Opinion Mining A Kaleemullah In A Two Days International Conference on Machine Learning and Neural Information System , Sri Vidya Mandir Arts and Science College, Uthangarai., Mar 2021.
Abstract [+]
A Hybrid Particle Swarm Optimization -Glowworm Swarm Optimization - Minimum Spanning Trees Based Feature Selection in Opinion Mining |
[3] |
Improving Cluster Based Feature Selection Using Modified Minimum Spanning Tree A Kaleemullah In Sixth International Conference on Computing Paradigm, Don Bosco College(Co-Ed), Yelagiri., Dec 2020.
Abstract [+]
Improving Cluster Based Feature Selection Using Modified Minimum Spanning Tree |
[4] |
Convinced Enhancements in Feature Diversity For Data Mining and its Applications in Opinion Mining A Kaleemullah In International Virtual Conference on Applied Science, Technology Management and Language Studies, Sona College of Technology, Salem., Dec 2020.
Abstract [+]
Convinced Enhancements in Feature Diversity For Data Mining and its Applications in Opinion Mining |
National Conferences
[1] |
A Study on Soft Computing A Kaleemullah In National Conference on Soft Computing, Adhiparasakthi College of Arts and Science, Kalavai, Jan 2010.
Abstract [+]
A Study on Soft Computing |
International Seminars
[1] |
Classification of Positive Negative Opinion using KDD and AI A Kaleemullah In International Seminar on Recent Innovations in Information Technolgoy, Morappur Kongu College of Arts and Science, Sep 2018.
Abstract [+]
Classification of Positive Negative Opinion using KDD and AI |
[2] |
Participated A Kaleemullah In International Seminar on Science of Learning and Teaching, Mazharul Uloom College, Ambur, Oct 2016.
Abstract [+]
Participated |
National Seminars
[1] |
Particiapted A Kaleemullah In National Level Seminar on Applied and Pure Mathematics , Mazharul Uloom College, Ambur, Mar 2019.
Abstract [+]
Participated |
[2] |
Particiapted A Kaleemullah In UGC Sponsored One Day National Seminar on Mathematical Computing and Medical Diagnosis, Mazharul Uloom College, Ambur, Jan 2017.
Abstract [+]
Participated |
[3] |
Particiapted A Kaleemullah In First Annual Seminar on Frontier Research Areas in Computer Science , Sacred Heart College(Autonomous), Tirupattur, Mar 2014.
Abstract [+]
Participated |
[4] |
Particiapted A Kaleemullah In National Level Seminar on English , Marudhar Kesari Jain College for Women, Vaniyambadi, Mar 2014.
Abstract [+]
Participated |
[5] |
Particiapted A Kaleemullah In National Seminar on Magic Graphs and Statistical Inferences , Mazharul Uloom College, Ambur, Feb 2011.
Abstract [+]
Participated |
Books
[1] |
Digital Logic and Microprocessor Design A Kaleemullah In Charulatha Publications, Chennai, Chennai, Oct 2007.
Abstract [+]
For Undergraduate Engineering Students |
[2] |
System Software A Kaleemullah In Charulatha Publications, Chennai, Chennai, Oct 2007.
Abstract [+]
For Undergraduate Engineering students |
[3] |
Object Oriented Analysis and Design A Kaleemullah In Charulatha Publications, Chennai, Chennai, Oct 2007.
Abstract [+]
For Undergraduate Engineering Students |
Workshops and Seminars Attended
National Workshops
[1] |
One Day Workshop on Plagiarism Free Research Writing Attended, Mazharul Uloom College, Ambur, 13 Feb 2020 to 13 Feb 2020 |
[2] |
One Day Workshop on Research Article Writing Attended, Don Bosco College(Co-Ed), Yelagiri., 07 Dec 2019 to 07 Dec 2019 |
[3] |
National Workshop on NODEJS Attended, Sacred Heart College(Autonomous), Tirupattur, 23 Feb 2019 to 23 Feb 2019 |
[4] |
UGC Sponsored One Day National Seminar on Career Planning and interview skills Attended, Mazharul Uloom College, Ambur, 08 Feb 2017 to 10 Feb 2017 |
[5] |
One Day Workshop on Google Applications and Soft Skills Attended, B.S. Abdur Rahman University, Chennai, 07 Mar 2014 to 07 Mar 2014 |
International Conferences
[1] |
International Conference on Computing, Cybernetics and Intelligent Information System Attended, VIT University, Vellore, 07 Nov 2013 to 09 Nov 2017 |

Mr. J. Aamir Azeez M.Sc., M.Phil.,
Assistant Professor & Research Supervisor
Alhamdulillah, Almighty has given me enough opportunity to serve in the Higher Education for nearly two decades and moreover in the prestious institut
Expand +Alhamdulillah, Almighty has given me enough opportunity to serve in the Higher Education for nearly two decades and moreover in the prestious institutions of coveted repute.
Thanks to the Management and Principal(s) for offering me to serve as Head in various departments viz, Department of Computer Applications, PG Department of Information Technology and Information System Management at diffrent periods.
Officiated as:
- External Eaminer / Internal Examiner, University Practical Examniations, UG/PG
- Internal Examiner - M. Phil Thesis dissertation
- Examiner / Chief Examiner - University Theory Exams.
- Question Paper Setter - Autonomous Colleges
- Admission Committe Member
- Member - NAAC Criterion III