Logo


Dr. J. Subash Chandra Bose

Qualification : Ph.D.

Course Specialization Group College Name/University Year of Passing
Ph.D. CSE CSE Anna University, Chennai 2013
M.E. CSE CSE Anna University, Chennai 2007
B.E. EEE EEE Anna University, Chennai 2005

My Publications

S.No Title of the Paper Full Details of Journal Name / Conference Name, Volume number, page number, Date
1 ”Design a Secure and Efficient Health Record Transaction Utilizing Block- Chain (SEHRTB) Algorithm for Health Record Transaction in Blockchain” Journal of Ambient Intelligence and Humanized Computing (AIHC) – Springer.
http://www.springer.com/home?SGWID=0-0-1003-0- 0&aqId=3822667&download=1&checkval=167423c8782d0875652df57cd1827525
2 ” Security Challenges in the IoT DDOS Attacks Classification and detection using SVM based Expert Systems” Computational Intelligence”, Wiley publication. https://onlinelibrary.wiley.com/doi/abs/10.1111/coin.12293.
3 A Hybrid GA/kNN/SVM Algorithm for Classification of data Biohouse Journal of Computer Science (BJCS) USA, ISSN 2379-1500, Biohouse Volume 2 Issue 2, pp 5-11.
4 The Ensemble technique uses variable hidden neurons hierarchical fusion and tenfold cross validation for Detection of Breast masses Biohouse Journal of Computer Science (BJCS) USA, ISSN 2379-1500, Biohouse Volume 2 Issue 2, pp 12-18.
5 ” Vehicle Monitoring System using PIC Microcontroller” International Journal on Computer Science and Engineering (IJCSE), ISSN : 0975-3397 Vol. 8 No.12.
http://www.enggjournals.com/ijcse/doc/IJCSE16-08-12-010.pdf
6 “Cipher text Policy-Attribute Based Encryption for Data Retrieval in DisruptionTolerant Networks” Journal of Industrial Engineering Research, 1(4),Pages: 47-53.
http://www.ajbasweb.com/old/ajbas/2015/Special/47-53.pdf
7 “Secure Information Transmission and Retrieval Using Key Management in Wireless Sensor Network” Journal of Industrial Engineering Research, 1(4), Pages: 69-78.
http://www.iwnest.com/old/JIER/2015/July/69-78.pdf
8 “Enhancement of the system performance in 802.11 using novel asymmetric cooperative cache “Journal of Industrial Engineering Research (ISSN: 2077-4559), 63-68.
http://www.iwnest.com/old/JIER/2015/July/63-68.pdf
9 “Lossless Medical Image Compression using Set Partitioning in Hierarchical Trees (SPIHT) Algorithm” Journal of Industrial Engineering Research (ISSN: 2077-4559), 58-62.
http://www.iwnest.com/old/JIER/2015/July/58-62.pdf
10 “Energy Enhancement in IEEE 802.11 using Hybrid MAC Algorithm” Australian Journal of Basic and Applied Sciences, 9(10) Special 2015, Pages: 39-42 ISSN: 1991-8178.
http://www.ajbasweb.com/old/ajbas_Special_2015.html
11 ” A Survey Based on Image Encryption then Compression Techniques for Efficient Image Transmission” Journal of Industrial Engineering Research, 1(1), Pages: 15-18, (ISSN: 2077-4559)
http://www.iwnest.com/old/JIER/2015/Jan-Feb/15-18.pdf
12 “Detection of Similar Mammogram Image Data Using Various File Attributes“Journal of Industrial Engineering Research, 1(2), Pages: 35-37, (ISSN: 2077-4559).
http://www.iwnest.com/AACE/
13 “An ETC System Using Advanced Encryption Standard and Arithmetic Coding” Middle-East Journal of Scientific Research 23 (5): 932-935, 2015, ISSN 1990-9233, © IDOSI Publication, DOI:10.5829/idosi.mejsr.2015.23.05.22233.
http://www.idosi.org/mejsr/mejsr23(5)15.htm
14 “ Enhancement of the Back-To-Back Throughput Performance of IEEE 802.11 by Routine Fine-Tuning of the Channel Access Probability” Middle-East Journal of Scientific Research 23 (5): 936-939, 2015, ISSN 1990-9233, © IDOSI Publications, DOI: 10.5829/idosi.mejsr.2015.23.05.22233.
http://www.idosi.org/mejsr/mejsr23(5)15.htm
15 “Efficient Use of Network Property in IEEE 802.11 Using RACC Mechanism” Middle-East Journal of Scientific Research 23 (5): 940-943, 2015, ISSN 1990-9233, © IDOSI Publications, DOI: 10.5829/idosi.mejsr.2015.23.05.22233. http://www.idosi.org/mejsr/mejsr23(5)15.htm
16 “Optimization and Generalization of Lloyd’s Algorithm for Medical Image Compression” Middle-East Journal of Scientific Research 23 (4): 647-651, 2015 ISSN 1990-9233 © IDOSI Publications, DOI: 10.5829/idosi.mejsr.2015.23.04.103. http://www.idosi.org/mejsr/mejsr23(4)15.htm
17 ” Efficient Restoration of Corrupted Images and Data Hiding in Encrypted Images” Journal of Industrial Engineering Research, 1(2), Pages: 38-44, (ISSN: 2077-4559), Journal home page: http://www.iwnest.com/AACE/
18 “ Mammogram Image Segmentation Using voronoi Diagram Properties” Journal of Industrial Engineering Research, 1(2), Pages: 30- 40, (ISSN: 2077-4559), Journal home page: http://www.iwnest.com/AACE/
19 “ Energy Efficiency and Security in Cluster Based Wireless Sensor Networks” Journal of Industrial Engineering Research, 1(2), Pages: 30-40, (ISSN: 2077-4559), Journal home page: http://www.iwnest.com/AACE/
20 “TLP Algorithm used effectively improves TCP performance in data transmission and recovery for cluster based WSN’s “ International journal of Computer Science and Information Technology Research, Vol 3. Issue 2, PP (841-848).
21 ” Anti SQL TA vaccine for detection and prevention of SQL injection attacks” Journal of Industrial Engineering Research 1(4), pages 113- 117, ISSN: 2077-4559).
22 “Take Diversion” 1st International Journal of Innovative Research in Computer and Communication Engineering. ISSN (Print): 2320 - 9798 ISSN (Online): 2320 - 9801– 06-07. http://ijircce.com/upload/2014/icgict14/365_1562.pdf
23 “Optimization of bit rate in Medical image Compression” International Journal of Innovative Research in Computer and Communication Engineering. ISSN (Print): 2320 - 9798 ISSN (Online): 2320 - 9801– 06-07. http://ijircce.com/upload/2014/icgict14/365_1562.pdf
24 “Virtual Shopping application for android devices using augmented reality” International Journal of Innovative Research in Computer and Communication Engineering. ISSN (Print): 2320 - 9798 ISSN (Online): 2320 - 9801 – 06-07. http://ijircce.com/upload/2014/icgict14/365_1562.pdf
25 “Acknowledgment based secure authentication method for MANET ” International Journal of Innovative Research in Computer and Communication Engineering. ISSN (Print): 2320 - 9798 ISSN (Online): 2320 - 9801– 06-07. http://ijircce.com/upload/2014/icgict14/365_1562.pdf
26 “Detection of Survival in Mammograms using Cellular Automata Techniques” proceedings of the IAENG. http://www.iaeng.org/WCE2013/doc/titles_A_D.html
27 “Detection of Micro classification in Mammograms using Soft Computing Techniques” European Journal of Scientific and Research. Volume 86, Issue 1 pp 103-122 012.
28 “Detection of Ovarian Cancer through Protein Analysis Using Ant Colony and Particle Swarm Optimization” proceedings of the International journal of Multimedia, Computer Vision and Machine Learning, Volume1, pp. 59-65.
29 “Detection of Masses in Digital Mammograms” International journal of Computer and Network Security, Volume 2, pp. 78-86.
http://journaldatabase.org/articles/detection_masses_digital_mammograms.html. International Conference
30 “Design and Development of robot for aquatic debris using smart phone” IEEE - 5th International Conference on Inventive Computation Technologies.
31 ” A Study on Suffix Trees and their Applications in Genome Sequences using Mummer, International conference on evolutionary computing and mobile sustainable networks, 20-21,2020, will be published in the springer lecture notes on data engineering and communication technologies.
32 “Analysıs of feature extractıon algorıthm usıng two dımensıonal dıscrete wavelet transforms ın mammograms to detect microcalcifications” Springer International conference on IOT, social, mobile, analytics and cloud in Computational vision and bio inspired computing (ISMAC - CVB 2019), March 31-14,2019.
33 “Programmed Water Management System for Irrigation Using Internet of Things” IEEE International Conference on Intelligent Sustainable Systems (ICISS 2019).2020. https://ieeexplore.ieee.org/abstract/document/8908110
34 ” Data collection using CSMA/CD and earliest deadline first (EDF) scheduling in WSN” 4th International Conference on Networking and Computer Application, Proceedings pageno 55-64, ISBN: 9780998900025, 13th - 14th July 2017.
http://www.innovativeresearchpublication.com/2017ban/paper%209.pdf
35 ” Development and designing of fire fighter robotics using cyber security” 2nd International Conference on Anti-Cyber Crimes (ICACC 2017), Proceedings pageno118-122, 26-27, March, 2017. https://ieeexplore.ieee.org/document/7905275
36 ” Lane Departure Detection Using Image Processing Techniques” 2nd International Conference on Anti-Cyber Crimes (ICACC 2017), Proceedings pageno238-241, 26-27, March, 2017. https://ieeexplore.ieee.org/document/7905298
37 ” A Novel Illumination-Invariant Lane Detection System” 2nd International Conference on Anti-Cyber Crimes (ICACC 2017), Proceedings pageno 116-171 , 26-27, March, 2017. https://ieeexplore.ieee.org/document/7905284
38 ” A Novel Mechanism for Indoor Localization in Wireless Sensor Networks” 2nd International Conference on Anti-Cyber Crimes (ICACC 2017), Proceedings pageno36-40, 26-27, March, 2017. https://ieeexplore.ieee.org/document/7905259
39 “Towards the design of Automatic Translation System from an Arabic Sign Language to Arabic Text” International Conference on Inventive Computing and Informatics 2017.
https://ieeexplore.ieee.org/document/8365365
40 “Mammogram Image Segmentation Using Tabu search hybrid with Particle Swarm Optimization” International Conference on Inter Disciplinary Research in Engineering and Technology 2014 – 20,21 August, India. http://edlib.asdf.res.in/2014/icidret/icidret2014.html
41 “A New Intelligent Optimization Technique for Magnetic Resonance Image Analysis” International Conference on Inter Disciplinary Research in Engineering and Technology 2014 – 20,21 August, India. http://edlib.asdf.res.in/2014/icidret/icidret2014.html
42 “Applying Keystroke and Mouse Dynamics for Personal Authentication using Artificial Bee Colony Optimization Technique” International Conference on Inter Disciplinary Research in Engineering and Technology 2014 – 20,21 August, India. http://edlib.asdf.res.in/2014/icidret/icidret2014.html
43 “Performance Analysis of Various Preprocessing Techniques in Mammogram Image” International Conference on Inter Disciplinary Research in Engineering and Technology 2014 – 20,21 August, India. http://edlib.asdf.res.in/2014/icidret/icidret2014.html
44 “Securing Image Data’s using Cellular Automata Techniques” International conference on Cryptography and Security – 18-20 July, 2014, Bangkok, Kingdom of Thailand. http://edlib.asdf.res.in/2014/iccs/iccs2014006.html
45 “Identification of Suspicious Region in Secured-Mammograms with Two Dimensional Wavelets and Genetic Operators”International conference on Cryptography and Security – 18-20 July, 2014, Bangkok, Kingdom of Thailand. http://edlib.asdf.res.in/2014/iccs/iccs2014006.html
46 “Multi-Secret Semantic Visual Cryptographic Protocol for Securing Image Communications” International conference on Cryptography and Security – 18-20 July, 2014, Bangkok, Kingdom of Thailand. http://edlib.asdf.res.in/2014/iccs/iccs2014006.html
47 “Multiple Travelling Salesman Problem Using Genetic Algorithm” 3rd International Conference on Competency Building Strategies in Business and Technology for Sustainable Development – 25th, February, 2014.
48 “Take Diversion” 1st International Conference on Global Innovations in Computing Technology – 06- 07,March,2014.
http://www.icgict14.in/downloads/proceedings.pdf
49 “A Novel Image Fusion Using NSCT” 7th International Conference on Recent Trends in Communication and Technology – 12th -13th, March, 2014. http://www.icgict14.in/downloads/proceedings.pdf
50 “Optimization of bit rate in Medical image Compression” 1st International Conference on Global Innovations in Computing Technology – 06-07,March,2014.
http://www.icgict14.in/downloads/proceedings.pdf
51 “Virtual Shopping application for android devices using augmented reality ”1st International Conference on Global Innovations in Computing Technology – 06-07,March,2014.
http://www.icgict14.in/downloads/proceedings.pdf
52 “Acknowledgment based secure authentication method for MANET ” 1st International Conference on Global Innovations in Computing Technology – 06-07,March,2014.
http://www.icgict14.in/downloads/proceedings.pdf
53 “Detection of Ovarian Cancer through Protein Analysis Using Ant Colony and Particle Swarm Optimization” proceeding on 3rd International Conference on Advanced Computing & Communication Technologies, Nov 2008.
54 “Meta heuristic Algorithms for Detection of Ovarian Cancer” proceedings on ADCOM – 2008, Anna University, Chennai, Dec 2008
55 “Prediction based Medical image lossless compression using demosaicing technique” proceedings on National Conference on Emerging Trends in Computing Technology, October 2010.
56 “Enhanced Algorithm for Image Coding” proceedings on DRDO Sponsored on National Conference on Advanced Computing Systems, February 2010.
57 “Novel Approach for Misbehavior detection in adhoc Network” proceedings on National Conference on Advanced Computing systems, March 2009.
58 “Medical Data Sets Compression Based On Constituency of Interest” proceedings on National Conference on Advanced Computing systems, March 2009.
59 “Robotics as firefighters” proceedings on National Conference on Advanced Computing systems, March 2009.
60 “To retain Existence on Earth” proceedings on National Conference on Recent trends in advanced Computing, Sep 2008.
61 “Does “Good” Triumph over “Evil” proceedings on National Conference on emerging trends in technology, Mar 2007.
62 “Enhancing data analysis with noise removal using Micro cluster” proceeding on National Conference on Emerging trends in technology, Mar 2007.