RESEARCH

The search for knowledge is closely linked to the object of study; that is, to the reconstruction of the facts that will provide an explanation to an observed event and that at first sight can be considered as a problem. It is very human to seek answers and satisfy our curiosity. 

S. NoName of the Supervisor, DesignationNo. of Scholars ApprovedArea of ResearchPart time Scholars
registered
Full time Scholars
registered
1Dr.Rajeswari Mukesh8Network Security10
2Dr.R.Kavitha4Data Mining, Deep Learning22
3Dr.R.Mythili4Information Security, Block Chain Technology00
4Dr.B.Dwarakanath4Machine Learning10
5Dr.M.Latha4Medical Image Processing10
6Dr.R.Deeptha4Network Security, Deep Learning20
Title of paperName of the author/sName of journalYear of publicationISSN number
AN ANALYSIS OF SECURITY PERSPECTIVE IN INDUSTRIAL IOTR.Kavitha, R.Malathi,S.S.Subashka RameshInternational Journal of Early Childhood Special Education (INT-JECSE)2022-231308-5581
Analysis of Human Activities in Smart Home Using Abnormal Activity Recognition Algorithm (AAR) and Visualization TechniquesR.M.Rani, R.Kavitha,DeepthaInternational Journal of Early Childhood Special Education (INT-JECSE)2022-231308-5581
IoT battery management system in electric vehicle based on LR parameter estimation and ORMeshNet gateway topologyP santhosh kumarsustainable energy technologies and assessments2022-232213-1388
A Novel Feature Selection with Hybrid Deep Learning Based Heart Disease Detection and Classification in the e-Healthcare EnvironmentDwarakanath B, Latha MComputational Intelligence and Neuroscience2022-231687-5273
Microscopic image analysis in breast cancer detection using ensemble deep learning architectures integrated with web of thingsP santhosh kumarBiomedical Signal Processing and Control2022-231746-8108
A REVIEW ON SMART HOME ENVIRONMENT AND CONSEQUENCES OF CYBER SECURITY ATTACKS ON SMART HOMESGundala Venkata Rama Lakshmi, Deeptha R., Venkatesh Sharma KNEUROQUANTOLOGY2022-231303-5150
Privacy preserving integrated way with cloud securityKalyanaraman B, Kavitha RNEUROQUANTOLOGY2022-231303-5150
Artificial Intelligence based Predictive and Prescriptive analytics on Clinical data using Data AnalyticsLiza M Kunjachen, Kavitha RNEUROQUANTOLOGY2022-231303-5150
Swarm Intelligence-Based Clustering and Routing Using AISFOA-NGWO for WSNMs.AishwaryaThird Congress on Intelligent Systems2022-23978-981-19-9224-7
Road traffic sensitive routing for efficient waste collection by leveraging varying traffic patternsMr.SubburajMeasurement: Sensors2022-232665-9174
A novel automated komodo Mlipir optimization-based attention BiLSTM for early detection of diabetic retinopathyDr.R.KavithaSignal, Image and Video Processing2022-231863-1711
AVQS-NN: Adaptive Virtualization for Quantum Services for application support using Neural NetworksDr.P.Santhosh KumarApplied Soft Computing2022-231568-4946
Spectrum Management in 6G HetNet Based on SmartContracts and Harmonized Software-Defined
Networking-Enabled Approach
S. Markkandan,P. Santhosh Kumar,Prathipa R,K. Vengatesan,Garikapati BinduInternational Journal of Computer Networks and Applications (IJCNA)2022-232395-0455
A Mutual Intrusion Detection System for MANET to Address DDoS attacks using Data Mining TechniquesK. Bala; P N Renjith; M Latha.; S.T. SanthanalakshmiIEEE Xplore2022-23978-1-6654-9200-3
A Comprehensive Survey on Various QoS Routing Protocols in MANETsDeeptha R,Danesh K,Preethi Parameswari S, Aishwarya B, Subbu Raj SEuropean Chemical Bulletin2022-2320635346
Secured Data Transmission for Smart Grid System using Blockchain Technology with a Trusted Gaming Token Honeypot AlgorithmDr. Deeptha R,Dr. Rajeswari Mukesh, Dr.S.E. JayanthiInternational Journal ofINTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING2022-232147-6799
A Comprehensive Survey on Various QoS Routing Protocols in MANETsDeeptha R,Danesh K,Preethi Parameswari S, Aishwarya B, Subbu Raj SEuropean Chemical Bulletin2022-2320635346
An efficient early detection of diabetic retinopathy using dwarf mongoose optimization based deep belief networkA.Abirami,R.KavithaConcurrency and Computation2022-231532-0626
Website Vulnerability ScannerDeeptha R,K.Sujatha,D.Sasireka,R. Neelaveni,R.Pavithra GuruJOURNAL OF POPULATION THERAPEUTICS AND CLINICAL2022-231198581X, 17106222
Radial basis function networks with lightweight multiscale
fusion strategy-based underwater image enhancement
R. Mythili, B. Sathya bama, P. Santhosh Kumar,Sanchali Das,
Ramya Thatikonda,Syed Inthiyaz
Expert Systems2022-2314680394, 02664720
INTELLIGENT DATA SECURITY FOR CLOUD COMPUTING USING PARTIAL
HOMOMORPHIC ENCRYPTION
Sindhu V, Rajeswari MukeshJournal of Data Acquisition and Processing2022-231004-9037
Detection Of TuberculosisUsingImage Enhancementand SegmentationS.Subburaj, Anish. T. PJournal of Survey in Fisheries Sciences2022-232368-7487
DECENTRALIZED MEDICINE SUPPLY
CHAIN MANAGEMENT AND ELIMINATE
COUNTERFEIT MEDICINE USING BLOCKCHAIN
Subburaj.SEuropean Chemical Bulletin2022-232063-5346
GREENIE—Smart Home with Smart Power TransmissionNoor Alleema, N., Babeetha, S., Hariharan, V.L., Sangeetha, S., Shraddha, H.Advances in Intelligent Systems and Computing2021-22Print: ISBN978-981-15-5565-7 Online ISBN
978-981-15-5566-4
Proof of Policy (PoP): A New Attribute-Based Blockchain Consensus ProtocolR. Mythili & Revathi VenkataramanComputational Methods and Data Engineering2021-22978-981-15-6876-3
Encrypted NAS using Raspberry Pi 4R Mythili, Pullyala Nithin Reddy, B Keerthivasan, V Sooriya2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques, ICEECCOT 2021 – Proceedings2021-22978-1-6654-3272-6
Eye Movement Signal Classification for Developing
Human-Computer Interface Using Electrooculogram
B.DwarakanathJournal of Healthcare Engineering https://www.hindawi.com/journals/jhe/2021/7901310/2021-22ISSN: 2356-6140 (Print) ISSN: 1537-744X (Online) DOI: 10.1155/8086
App Doppelganger Detection via Artificial Neural NetworkS. BabeethaTurkish Journal of Computer & Mathemetical Education2021-22ISSN 1309-4653
Energy Efficient Cross Layer MAC Protocol for Wireless Sensor Networks in Remote Area Monitoring ApplicationsR.Rathna, L.Mary Gladence, V.Maria Anu, J.Sybi CynthiaJournal of Information Systems and Telecommunication (JIST)2021-222322-1437
A Novel Intelligence Hybrid Optimized Analytics and Streaming Engine for Medical Big DataDr.B.Dwarakanath, M. Thilagaraj, V. Pandimurugan, P. Naveen, M. S. Hema,
S. Hariharasitaraman, N. Arunkumar, Petchinathan Govindan
Computational and Mathematical Methods in Medicine2021-22ISSN (Online): 1748-6718
A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETsR. DeepthaWebology2021-221735-188X
Survey on Opportunistic Routing Protocols in Multihop Wireless NetworksR. DeepthaWebology2021-221735-188X
Scientific recognition of image manipulation using Histogram Equalization and Median FilteringN.Noor Alleema , Shwetha Shanmugam , Sandhiya Bharathidasan , Kajal KasatInternational journal of advanced science and technology2020-212005-4238
Light Fidelity SystemNoor Alleema, N., Khatri, A., Gupta, A., Senapatil, D.Advances in Intelligent Systems and Computing2020-21Print ISBN: 978-981-15-2779-1,Online ISBN
978-981-15-2780-7
Smart Photo ClickerNoor Alleema, N., Prasad, R., Priyanka, A., Bhandari, AAdvances in Intelligent Systems and Computing2020-21Print ISBN: 978-981-15-2779-1,Online ISBN
978-981-15-2780-7
Interference of Cyber Endanger using Support Vector MachineR Kavitha, K Malathi, Liza M Kunjachenhttps://ieeexplore.ieee.org/document/91042112020-2110.1109/ICCCI48352.2020.9104211
Highly Contrasting Image Colorization with Deep LearningK. Malathi; R. Kavitha; M.K. Lizahttps://ieeexplore.ieee.org/document/93689362020-2110.1109/ICADEE51157.2020.9368936
Pixel based method for Text to Image EncryptionK. Malathi; R. Kavitha; M.K. Lizahttps://ieeexplore.ieee.org/document/92974782020-2110.1109/ICECA49313.2020.9297478
An attribute-based lightweight cloud data access control using hypergraph structureR. Mythili, Revathi Venkataraman & T. Sai RajThe Journal of Supercomputing2020-210920-8542
An enhanced kernel weighted collaborative recommended system to alleviate sparsityS.Babeetha,International Journal of Electrical and Computer Engineering (IJECE)2020-212722-2578
ENHANCED INTRUSION DETECTION TECHNIQUE WITH IP TRACEBACKN.Sabiyath Fatima, N.Noor Alleema and S.Abhishek Avilala KumarGEDRAG & ORGANISATIE REVIEW2020-210921-5077
Self-Intelligent Analysis of Human Activity Recognition based on CNNR Kavitha, K Malathi, Liza M KunjachenGEDRAG & ORGANISATIE REVIEW2020-210921-5077
Text Document Clustering Using K-means and Dbscan by Using Machine LearningR.M.Rani,GEDRAG & ORGANISATIE REVIEW2020-210921-5077
Recognition and classification of diabetic retinopathy utilizing digital fundus image with hybrid algorithmsDr.K.Malathi Dr.R.KavithaInternational Journal of Engineering and Advanced Technology2019-202249-8958 (online)
Automatic Unauthorized Parking DetectorH. SangeethaInternational Journal of Engineering and Advanced Technology (IJEAT)2019-202249-8958 (online)
Smart Irrigation Systems using Sensors and GSMH.Sangeetha , S.Abinayaa,International Journal of Recent Technology and Engineering (IJRTE)2019-202277-3878 (Online)
Automatic Unauthorized Parking DetectorR Jayaraj,International Journal of Engineering and Advanced Technology (IJEAT)2019-202249-8958 (online)
Cloud Runtime Framework for User-Level Security Auditing for the Cloud SystemS. PandiarajInternational Journal of Engineering and Advanced Technology (IJEAT)2019-202249-8958 (online)
A Unified Approach to Defend the Timing Analysis Attacks on Web TrafficS. Pandiaraj,International Journal of Engineering and Advanced Technology (IJEAT)2019-202249-8958 (online)
Enabling Cloud Database Security Using Third Party AuditorS Pandiaraj,International Journal of Engineering and Advanced Technology (IJEAT)2019-202249-8958 (online)
Generation of Frequent sensor epochs using efficient Parallel Distributed mining algorithm in large IOTR.M.Rani,Computer Communications2019-200140-3664
Iot Based Speech Recognition Controlled Car using ArduinoR.VeeramaniInternational Journal of Engineering and Advanced Technology2019-202249-8958 (online)
Text Document Clustering Using K-means and Dbscan by Using Machine LearningN. Noor AlleemaInternational Journal of Engineering & Advanced Technology(IJEAT)2019-202249-8958 (online)
Hand Gesture Robot Car using ADXL 335Jayaraj RInternational Journal of Recent Technology and Engineering (IJRTE)2019-202277-3878 (Online)
Recognition and Classification of Diabetic Retinopathy utilizing Digital Fundus Image with Hybrid AlgorithmsKavitha.R,International Journal of Emgineering & Advanced Technology(IJEAT)2019-202249-8958 (online)
Text Document Clustering using K-Means and Dbscan by using Machine LearningT.H. Feiroz khan, N.Noor Alleema, Narendra Yadav, Sameer Mishra, Anshuman ShahiInternational Journal of Engineering and Advanced Technology (IJEAT)2019-202249-8958
Attacks in Wireless sensor networks- A ResearchB.Sathya Bama,International Journal of Innovative
Technology and Exploring
Engineering (IJITEE)
2019-202278-3075
Discovery of Knowledge Using Association Rules in Wireless Sensor Epocs-a SurveyR.M.RaniInternational Journal of Engineering & Technology2018-192227-524X
GUARD: an intrusion detection framework for routing protocols in multi-hop wireless networksT.K.ThivakaranJournal of wireless networks2017-18853-913
Sl.NoPatent TitleName of the participantYear of collaboration
1DEEP LEARNING BASED SYSTEM AND METHOD FOR DETECTION OF FACEMASKDr.P.Santhosh Kumar2021-22
2Artificial intelligence and machine learning based Facial recognition system for songs selectionMrs N.Noor Alleema, Mrs.S.Babeetha2021-22
3Cardiovascular Disease Prediction System using Machine LearningDr.R.Deeptha2021-22
4ARTIFICIAL INTELLIGENCE & OPEN CV BASED INTELLIGENT BIRD JOURNEYS TRACKING & MIGRATION FORECASTS IN REAL TIME USING PYTHON LANGUAGEDr.B.Dwarakanath, Dr.R.Deeptha, Dr.R.Kavitha, Dr.R.Rathna2021-22
5IoT Driven Sensor-based Crop Recommendation System using Machine Learning for Smart AgricultureDr.P.Santhosh Kumar, Dr.B.Dwarakanath, Dr.M.Latha2021-22
6IoT, Machine Learning Based Intelligent Intrusion Detection Systems for Detecting Cyber ThreatsDr.P.Santhosh Kumar2021-22
7Human Activity Tracking and Monitoring for Healthcare System using Faster Encryption of IoT SensorB.Sathyabama2021-22
8Natural Language Processing Based Hate Speech Recognition by Using Discrete Feed Forward Perceptron Neural NetworkDr. M. Kirubanantham
Dr. R. Rathna
Dr. R. Deeptha
Mr. R. Veeramani
Mr. S. Pandiaraj
2021-22
9MACHINE LEARNING BASED OBESITY ANALYSIS FOR EARLY DETECTION OF HEART DISEASEDr.P.Santhosh Kumar2021-22
10IMPROVING THE SECURITY OG INTERNET OF THINGS APPLICATION DEVICES USING LOGICAL NODE OF VIRTUAL OVER LAY NETWORK(INVON)Dr.R.Kavitha, M.K.Liza2020-21
11REAL TIME HONEYPOT BASED INTRUSION DETECTION FOR CLOUD COMPUTINGMrs N.Noor Alleema, Mrs.S.Babeetha ,Mr.Sivamohan , Mrs.M.k.Liza2019-20
12A Secured Data Transmission System and Method ThereofDr.M.Mythili2018-19

The Department of Information Technology inaugurated the SRMIST-Steinbeis Indo- German Cyber Security Engineering & Research Centre (IGCERC) @ BMS Block, 7th Floor, SRMIST, Ramapuram on 21.11.2022 from 11.30 a.m to 12.30 p.m. IGCERC shall be a Centre of Excellence & a nodal point in the country for providing Innovations and Trained Manpower to the Cyber Security Industry. The centre was inaugurated by our respected Chief Director, Dean (E&T), Associate Dean (IIE), VP(Academics) along with the industry partners Mr. Vineet Kumar Goyal – Director, Steinbeis Foundation India, Mr. Gautam Pillai- Business Head, Mr. VedantBhonsle-Senior Associate-Partner Business, NxtGenDatacentre& Cloud Technologies and Mr. AbhjeetNath– CEO, Soffit Infrastructure Services Pvt Ltd.  Various cyber security projects were demonstrated by the students of CSE and IT to the Industry panel during the inauguration.

Objectives of the CoE

Cyber Security CoE aims to:

  • Upskill Faculty members and students in Cyber Security through National & International Level Conferences, FDPs, STTPs, Workshops, Seminars and Webinars.
  • Facilitate internationally recognized certifications in collaboration with foreign universities in the field of Cyber Security & Digital Forensics.
  • Organize national and international contests such as Hackathon in Cyber Security, Capture The Flag (CTF) etc.
  • Collaborate with the Industry to do real time projects in Cyber Security.

Benefits for the University (SRM) and its Students

1.Ready to be deployed manpower (Engineering / science graduates) for the industry – with real time projects / internships with industry partners (in India and in Germany)

2.Better Employment Opportunities

3.Additional Exposure for the students in additional topics like project management, client management, quality management, thus ensuring better employment and faster growth opportunities

4.Students will Get Opportunity to do further studies in Germany

5.Real World Experience and Entrepreneurship will be added feature

6.International Projects

Benefits for the University (SRM) and its faculty

1.Training of the faculty in application technology

2.Involvement of the faculty in industry and in engineering projects

3.Involvement of the faculty in time bound research projects

4.New IP creation – research papers in journals & IP rights sharing between faculty and university

5.Revenue generation through training and consultancy

6.Real World Experience and Entrepreneurship Will be added feature