|
Home > Programs Offered > BE > Computer Science &
Engineering
> Overview |
|
|
|
Research Activity |
Research and Development is the most essential part for the foundation of nation’s economic growth.
The Department research centre is established in the year 2009-10 and it is committed to basic long-term
research in frontier areas, since then. The department has been putting concerted efforts to align R&D focus to
improve UG, PG students and Ph.D research scholars. To enhance the research abilities among students community,
Department regularly conducts many seminars, workshops, and technical talks on advance technologies under its research belt.
|
|
List of Research Scholar Registered for Ph.D
|
Sl.no
|
Name of the Research Scholar
|
Year of Registration
|
Name of the Research Guide
|
01
|
Basavaraj Chunchure
|
2009(Completed)
|
Dr.Seetharam K
|
02
|
Latha P H
|
2011
|
Dr.R.Vasantha
|
03
|
Rajkumar P
|
2013
|
Dr.H.G.Chandrakanth
|
04
|
Vani B
|
2015
|
Dr.Shrishail Math
|
05
|
Chethana D T
|
2015
|
Dr.Seetharam K
|
06
|
Srinivas B V
|
2015
|
Dr.Indrajit Mandal
|
07
|
Sunitha B
|
2018
|
Dr. John Peter
|
|
|
PUBLICATIONS |
Sl.No. |
Name |
Publication |
1 |
Mallamma C G |
Secure based data aggregation against collusion attacks in WSN, IJRTER, 2(10), 122-133, October 2016 |
2 |
Mallamma C G |
Recent trends in sequential rules mining as partly ordered successive rules, IJRTER, 2(8), 247-257, August 2016 |
3 |
Praveen Kumar K V |
A survey on energy efficient routing protocols in WSN, i manager, 4(4), 20-37, May 2016 |
4 |
Praveen Kumar K V |
Energy efficient routing using dynamics cluster approach, IJIP, 10(1), 24-36, April 2016 |
5 |
Praveen Kumar K V |
A Survey on Energy Efficient Routing Protocols In Wireless Sensor Networks. i-manager Journal of Wireless Communications. , 2016 |
6 |
Mallamma CG |
Large scale Optimization using Hybrid approach of cooperatively coevolving particle swarm in WSN, IJERCSE |
7 |
Srinath K S |
Comparative Model for Secure data transmission in Military Network, IJAIR, 2016, 42-46 |
8 |
Srinath K S |
SOAP performance and enhancement in WS-Security, IJERGS, 3(3), 2015, 1192-1200 |
9 |
Srinath K S |
Securing SOA using enhanced TPA and XML signature, IJAIR, 4(6), 2015, 42-46 |
10 |
Mallamma C G |
Large scale optimization using hybrid approach of cooperatively coevolving particle swarm in wireless sensor networks, IJERCSE, 2014, 111-114 |
11 |
Shilpa Patil |
Clustering-based routing protocols for wireless sensor networks, IJAIR, 2014, 81-88 |
12 |
Mallamma C G |
Improving security for smart grid with multilayer consensus ECC based PAKE protocol, IJCSCN, 2014, 99-100 |
13 |
Mallamma C G |
Network Intrustion Detection in Virtual Network Systems and Countermeasure Selection (NIDCS), IOSR Journal of Computer Engineering, 2014, 4-7 |
14 |
Mallamma C G |
Energy efficient control-plane node cooperation for multichannel MAC protocols, IJSHRE, 2014, 1-5 |
15 |
Mallamma C G, Srinath K S, Shankar Rana |
A stream based implementation of secured SOA model using XML encryption and XML signature, (IJCA), 103(2), 2014, 46-51 |
16 |
Sushma K V |
CloudStash: An efficient technique to provide security to multi-clouds, (IJAIR), 2014, 44-47 |
17 |
Srinath K S |
Enhanced TTP Architecture in securing web service, IJAIR, 3(6), 2014, 42-46 |
18 |
Srinath K S |
Implementation of secured web service model using stream based XML encryption and XML signature, IJCTA, 5(3), 2014, 1070-1080 |
19 |
Srinath K S, Mallamma C G, Shankar Rana |
A stream based implementation of secured SOA model using XML encryption and XML signature, (IJCA), 103(2), 2014, 46-51 |
|
|
|
|
|
|
|
|
|
|