Dr. S. Satheesh Kumar
Qualification : Ph.D. (Anna University)
Designation : Assoc. Professor
Email: [email protected]
Details of Educational Qualification:
| Course | Specialization | Group | College Name/University | Year of Passing |
|---|---|---|---|---|
| Ph.D. | CSE | CSE | Anna University | 2018 |
| M.E. | CSE | CSE | Kongu Engineering College, Anna University | 2010 |
| B.E. | CSE | CSE | Pavaai Engineering College, Anna University | 2008 |
List of Publications
| S.No | Title of the Paper | Full Details of Journal Name / Conference Name, Volume number, page number, Date |
|---|---|---|
| 1 | A Survey on Multipath Routing Protocols in Wireless Sensor Networks | International Journal of Information Technology Infrastructure ISSN: 2320 - 2629, vol.3, No.14 |
| 2 | A Survey on Security in Smart Grid Environment | International Journal of Intellectual Advancements and Research in Engineering Computations vol.3, No.17, Issue.6, Page No.706-711 |
| 3 | Division and Replication of Data in Grid for Optimal Performance and Security | International Journal of Grid Computing & Applications vol.7, No.1 |
| 4 | Optimal Performance and Security for Data in Grid using TDEA | South Asian Journal of Engineering & Technology ISSN: 2454– 9617, vol.2, No.17 |
| 5 | An Resilient Hierarchical Authentication Scheme Based Byzantine Attack Detection in Mobile Ad Hoc Networks | Journal of Computational and Theoretical Nanoscience ISSN: 5195–5202 vol.14 |
| 6 | An Secured Data Transmission in Manet Networks with Optimizing Link State Routing Protocol Using ACO-CBRP Protocols | IEEE Xplore ISBN: 978-1- 5386-4552-9 |
| 7 | Defending against jellyfish attacks using cluster-based routing protocol for secured data transmission in MANET | International Journal of Cluster Computing ISBN:10849–10860 |
| 8 | An Optimal Path Computation Scalability in Software Defined Networks by using Hierarchical Distributed Control Plane | International Journal of Science, Technology and Development ISSN: 0950- 0707 |
| 9 | Classification of Customers Data using Naïve Bayes Classifier in Data Mining | International Journal of Science, Technology and Development ISSN: 0950- 0707 |
| 10 | An Efficient Resource Allocation For Cloud Mechanism Using Obsas | International Journal of Science, Technology and Development ISSN: 0950- 0707 |
| 11 | Verifiable Cloud Server Public Key Encryption with Keyword Search from Lattice in FMRSM | The International journal of analytical and experimental modal analysis Volume XIII, Issue XII |
| 12 | Cloud Security over Multiple Cloud Service Providers | The International journal of analytical and experimental modal analysis Volume XIV, Issue I |
| 13 | Secure Calculating Evaluation of the Job Seeker Based on the Performance | The International journal of analytical and experimental modal analysis Volume XIV, Issue II |
| 14 | Exploring New Opportunities to Defeat Low-Rate DDOS Attack in Container-Based Cloud Environment | The International journal of analytical and experimental modal analysis Volume XIV, Issue III |
| 15 | Supporting Privacy Protection and Data Encryption Technology | The International Journal of Engineering Sciences Volume 13, Issue 7 |
| 16 | Unsupervised Learning Based Mining of Academic Data Sets for Students’ Performance Analysis | The International Journal of Engineering Sciences Volume 13, Issue 7 |
| 17 | Predictions of Sars-Cov-2 Covid-19 using Ensemble and Other Classifier of Machine Learning | The International Journal of Engineering Sciences Volume 13, Issue 10 |
| 18 | Privacy Preserving Security Spam Detection Technique for Protecting The IOT Devices Using Machine Learning | The International journal of analytical and experimental modal analysis Volume 14, Issue 11 |
| 19 | Detecting Fake Reviews using Multi-Dimensional Representation with Fine Grained Aspects Plan | The International journal of analytical and experimental modal analysis Volume 14, Issue 11 |
| 20 | Recognize Human Face Reactions using Convolutional Neural Network Techniques | The International journal of analytical and experimental modal analysis Volume 14, Issue 11 |
| 21 | Ep-Satty-MCDM based business decision-making model using behaviour and review data | Journal of Intelligent Data Analysis Volume 28, Issue 2 |
| 22 | Modified wild Horse Herd Optimization based Bhattacharyya error constraint (BEC) based L2-norm Linear discriminant analysis (LDA) method for the sentiment analysis | Journal of Electrical Systems (JES) Volume 20, Issue 6s |
| 23 | Data Science and Its Applications in Cyber Security | International Journal of Engineering Science and Advanced Technology (IJESAT) Volume 24, Issue 2 |
| 24 | Heart Stroke Prediction Using Machine Learning Algorithms | International Research Journal on Advanced Engineering and Management Volume 2, Issue 6 |
| 25 | An Effective Deep Learning-Based Intrusion Detection System for the Healthcare Environment | International Journal of Computational Intelligence and Applications Volume 12, Issue 9 |
| 26 | Human Age Prediction Based on Gender Image Recognition | IEEE-5th International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS 2024) Volume 22, Issue 9 |
| 27 | Biological Profile | IEEE-5th International Volume 22, Dr.S.Satheesh 1.10 |
| 28 | Estimation of the Human Skeleton based Forensic Identification using Deep Learning Image Classification | Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS 2024) Issue 9 |
| 29 | Enhanced Machine Learning Approach for Detecting Spammers in Industrial Mobile Cloud Computing Environment | IEEE-5th International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS 2024) Volume 22, Issue 9 |
| 30 | CNN LIPNET: Automated Lip Reading Using Deep Convolutional Neural Networks | 2025 Fifth IEEE Sponsored International Conference on Advances in Electrical, Computing, Communications and Sustainable Technologies (ICAECT 2025) Volume 2s, Issue 3 |
| 31 | Smart Heath Solution: Intelligent web-based system for personalized yoga and dietary recommendations for chronic disease management using machine learning | International Journal of Scientific Development and Research Volume 10, Issue 1 |
| 32 | An Effective Deep Learning-Based Intrusion Detection System for the Healthcare Environment | International Journal of Computational Intelligence and Applications Volume 17, Issue 3 |
| 33 | A Novel Feature Extraction and Siamese Zeiler and Fergus Forward Taylor NetworkBased Rice Plant Leaf Disease Detection | Journal of Phytopathology Volume 173, Issue 7 |
| 34 | A Biometric Authentication Via Fingerprint Recognition Instead of Password Protection | Journal of Computational Intelligence in Bioinformatics National November 2011 |
| 35 | Location Based Routing for Wireless ADHOC Network | International Conference on Research and Development Prospects on Engineering and Technology International March 2013 |
| 36 | Survey on Multipath Routing Protocols in Wireless Sensor Networks | International Journal of Information Technology Infrastructure International July 2014 |
| 37 | A Novel Resources Allocation Method for Multicasting using CAC Approach | Recent Advanced in Science, Engineering and Technologies National March 2015 |
| 38 | Division and Replication of Data in GRID for optimal Performance and Security | National Conference on Recent Trends in Engineering & Technology National February 2016 |
| 39 | Optimal Performance and Security for Data in GRID using TDEA | Emerging Trends in Science, Engineering & Technology International March 2016 |
| 40 | An Energy Utilization of Merging Protocol in Sensor Networks by using VELCT scheme | International Conference on Green, Intelligence Computing and Communication Systems International March 2016 |
| 41 | An Energy Utilization of Clustering Protocol by using VELCT scheme in Sensor Networks | National Conference on Technological Advancements in Engineering National March 2016 |
| 42 | Global Sensor Development and Local Convergence Recovery Scheme for Smart Environment on Quality through innovations in Engineering 2016 | National Level Conference National March |
| 43 | Improved Conversation Session Time in Centralized Island Multicast Protocol | International e- Conference on Advanced Research in Science, Engineering, Technology and Management |
| 44 | Thyroid Prognosticating by Categorizing Techniques of Data Mining | International e- Conference on Advanced Research in Science, Engineering, Technology and Management International July 2020 |
Books
- Dr. Satheesh Kumar, Dr. V K Senthil Ragavan & Dr. G Rosline Nesa Kumari titled Computer Organization and Architecture Published on 2021 Publisher: Research India Publications, New Delhi
- Dr. Satheesh Kumar & Dr.S.Satheesh titled Experimental study of recent issues in underwater data communication under different water channels Published on 2023 Publisher: AETS Global
- Dr. Satheesh Kumar, Dr.V.K.Senthil Ragavan; Dr.S.Satheesh Kumar; Manoj Kumar;Dr.Santhosh Kumar; Dr.Siva shanker titled Fundamentals of ChatGPT and its Application Published on 2024 Publisher: Well Tech International Publishing House
