Home > Programs Offered > BE > Computer Science & Engineering > Overview
   
Research Activity

Research and Development is the most essential part for the foundation of nation’s economic growth. The Department research centre is established in the year 2009-10 and it is committed to basic long-term research in frontier areas, since then. The department has been putting concerted efforts to align R&D focus to improve UG, PG students and Ph.D research scholars. To enhance the research abilities among students community, Department regularly conducts many seminars, workshops, and technical talks on advance technologies under its research belt.

List of Research Scholar Registered for  Ph.D

Sl.no

Name of the Research Scholar

Year of Registration

Name of the Research Guide

01

Basavaraj Chunchure

2009(Completed)

Dr.Seetharam K

02

Latha  P H

2011

Dr.R.Vasantha

03

Rajkumar P

2013

Dr.H.G.Chandrakanth

04

Vani B

2015

Dr.Shrishail Math

05

Chethana D T

2015

Dr.Seetharam K

06

Srinivas B V

2015

Dr.Indrajit Mandal

07

Sunitha B

2018

Dr. John Peter

 

PUBLICATIONS

Sl.No. Name Publication
1 Mallamma C G Secure based data aggregation against collusion attacks in WSN, IJRTER, 2(10), 122-133, October 2016
2 Mallamma C G Recent trends in sequential rules mining as partly ordered successive rules, IJRTER, 2(8), 247-257, August 2016
3 Praveen Kumar K V A survey on energy efficient routing protocols in WSN, i manager, 4(4), 20-37, May 2016
4 Praveen Kumar K V Energy efficient routing using dynamics cluster approach, IJIP, 10(1), 24-36, April 2016
5 Praveen Kumar K V A Survey on Energy Efficient Routing Protocols In Wireless Sensor Networks. i-manager Journal of Wireless Communications. , 2016
6 Mallamma CG Large scale Optimization using Hybrid approach of cooperatively coevolving particle swarm in WSN, IJERCSE
7 Srinath K S Comparative  Model for Secure data transmission in Military Network, IJAIR, 2016, 42-46
8 Srinath K S SOAP performance and enhancement in WS-Security, IJERGS, 3(3), 2015, 1192-1200
9 Srinath K S Securing SOA using enhanced TPA and XML signature, IJAIR, 4(6), 2015, 42-46
10 Mallamma C G Large scale optimization using hybrid approach of cooperatively coevolving particle swarm in wireless sensor networks, IJERCSE, 2014, 111-114
11 Shilpa Patil Clustering-based routing protocols for wireless sensor networks, IJAIR, 2014, 81-88
12 Mallamma C G Improving security for smart grid with multilayer consensus ECC based PAKE protocol, IJCSCN, 2014, 99-100
13 Mallamma C G Network Intrustion Detection in  Virtual Network Systems and Countermeasure Selection (NIDCS), IOSR Journal of Computer Engineering, 2014, 4-7
14 Mallamma C G Energy efficient control-plane node cooperation for multichannel MAC protocols, IJSHRE, 2014, 1-5
15 Mallamma C G, Srinath K S, Shankar Rana A stream based implementation of secured SOA model using XML encryption and XML signature, (IJCA), 103(2), 2014, 46-51
16 Sushma K V CloudStash: An efficient technique to provide security to multi-clouds,  (IJAIR), 2014, 44-47
17 Srinath K S Enhanced TTP Architecture in securing web service, IJAIR, 3(6), 2014, 42-46
18 Srinath K S Implementation of secured web service model using stream based XML encryption and XML signature, IJCTA, 5(3), 2014, 1070-1080
19 Srinath K S, Mallamma C G, Shankar Rana A stream based implementation of secured SOA model using XML encryption and XML signature, (IJCA), 103(2), 2014, 46-51
 
 
 
 
Follow us on: