ME Computer Science Engineering

Post Graduate course of Computer Science and Engineering was established in the year 2005 with 18 students as intake. The alacrity of the students to learn makes it easier for the Department of Computer Science and Engineering to produce top-notch engineers who are being recruited by companies all over the world.

The Department is proud to produce more number of Anna University rank holders every year. CSE Department is equipped with excellent teaching faculties, including high quality computer laboratory with state of the art equipment to support the learning process. The Department of Computer Science and Engineering strives to for qualified engineers to create a sustainable world and enhance the global quality of  life.

Objective:

To impart teaching & training in various areas of Computer Science and Engineering based on

  • To establish the Department of Computer Science and Engineering as a quality learning environment and as a centre for advanced studies in Computer Science and Engineering.
  • In terms of inspiring teachers, state-of-the-art facilities, experience sharing and widening he knowledge horizon, interacting with experts from academia and industry, facilitating the student in the process of growth in the computer field.
  • To motivate the students to be innovative in the field of Computer Science and Engineering

Vision of the Department

Our vision is to offer up to date and flexible programs which will allow our graduates to be competitive in the job market. We strive to provide a hands-on approach in teaching computer related courses. To this end we are increasing the capacity of our computer laboratories as well as equipping them with the latest in hardware and software.

Mission of the Department

M1 (Research with Latest Tools): To provides exposure to the students in the latest tools and technologies in the area of computer hardware and software, and to enable them  perform research in all branches of the computing field

M2( Industrial Environment & Quality Education): Our main task is to prepare students for careers in industry or to pursue advanced graduate studies with an excellent knowledge  in all computer related fields

M3 (Human Potential): To develop human potential to its fullest extent so that intellectually capable and optimistic leaders can emerge in range of professions

Program Educational Objectives

PEO1: Develop proficiency as a computer science engineer with an ability to solve a wide range of computational problems and have sustainable development in industry or any other work environment.

PEO2: Analyze and adapt quickly tone environments and technologies, gather new information, and work on emerging technologies to solve multidisciplinary engineering problems.

PEO3: Possesstheabilitytothinkanalyticallyandlogicallytounderstandtechnicalproblemswithcomputational systems fora lifelong learning which leads topdressing search.

PEO4: Adopt ethical practices to collaborate with team members and team leaders to build technology with cutting-edge technical solutions for computing systems

PEO5: Strongly focus on-design thinking and critical analysis to create innovative products and become entrepreneurs.

241151/ DATA STRUCTURES LAB

241152/ NETWORKING LAB

241253/ OPERATING SYSTEM LAB

241254/ WEB TECHNOLOGY LAB

241151 DATA STRUCTURES LAB

LIST OF EXPERIMENTS

1

Min Heap
2

Deaps
3

Leftist Heap
4

Graph coloring using backtracking
5

0/1 Knapsack using Dynamic Programming
6

Convex hull
7

Quick Sort
8

Tries
9

B-Tree
10

AVL Tree

241152 NETWORKING LAB

  1. Socket Programming
    1. TCP Sockets
    2. UDP Sockets
    3. Applications Using Sockets
  2. Simulation of Sliding Window Protocol
  3. Simulation of Routing Protocols
  4. Development of applications such as DNS/ HTTP/ E – mail/ Multi – user Chat
  5. Simulation of Network Management Protocols
  6. Study of Network Simulator Packages – such as opnet, ns2, etc.

241253 OPERATING SYSTEM LAB

MULTIPROCESSOR OPERATING SYSTEMS

PROGRAM 1 – Semaphores – Multiprocessor operating systems

Assume there are three processes: Pa, Pb, and Pc. Only Pa can output the letter A, Pb B, and Pc C. Utilizing only semaphores (and no other variables) the processes are synchronized so that the output satisfies the following conditions

Assume there are three processes: Pa, Pb, and Pc. Only Pa can output the letter A, Pb B, and Pc C. Utilizing only semaphores (and no other variables) the processes are synchronized so that the output satisfies the following conditions

  1. A B must be output before any C’s can be output
  2. B’s and C’s must alternate in the output string, that is, after the first B is output, another B cannot be output until a C is output. Similarly, once a C is output, another C cannot be output until a B is output
  3. he total number of B’s and C’s which have been output at any given point in the output string cannot exceed the number of A’s which have been output up to that point

PROGRAM 2 – Multithreading – Multiprocessor operating systems

The Cigarette Smokers Problem

Consider a simulation with three smoker threads and one agent thread. Each smoker continuously makes a cigarette and smokes it. But to make a cigarette, a smoker needs three ingredients: tobacco, paper, and matches. One of the smoker threads has only paper, another has only tobacco, and the third has only matches. The agent thread has an infinite supply of all three materials. The three smoker threads are initially blocked. The agent places two randomly chosen (different) ingredients on the table and unblocks the one smoker who has the remaining ingredient. The agent then blocks. The unblocked smoker removes the two ingredients from the table, makes a cigarette, and smokes it for a random amount of time, unblocking the agent on completion of smoking the cigarette. The agent then puts out another random two of the three ingredients, and the cycle repeats

Write a multi-class multithreaded Java program that uses a monitor to synchronize the agent thread and the three smoker threads. Do not mechanically translate semaphore code into monitor code! The agent thread executes in an agent object created from an agent class. Each smoker thread executes in a smoker object. All smoker objects are created from one smoker class whose constructor is used to specify the ingredient possessed by the smoker object. A driver class with a main method constructs the objects and starts the threads.

Use a single monitor object instantiated from a class Control for synchronization. Each of the four threads invokes a synchronized monitor method for its synchronization. No semaphores are allowed. No synchronized blocks are allowed, only synchronized methods. No busy waiting is allowed. No calls to nap inside a synchronized method are allowed (do not nap while holding the monitor object’s lock, that is, while inside a synchronized method or while inside a method called by a synchronized method)

PROGRAM 3 – Multiple sleeping barbers – Multiprocessor operating systems

Write a multi-class multithreaded Java program that simulates multiple sleeping barbers, all in one barbershop that has a finite number of chairs in the waiting room. Each customer is instantiated from a single Customer class, each barber is instantiated from a single Barber class.

Network operating systems

PROGRAM 4 – Network operating systems

Establish a Lab setup for the following network operating systems based programs based on the skills in networking on your own. E.g. for identifying networking hardware, identifying different kinds of network cabling and network interface cards can be done.

Exercises

  1. Identifying Local Area Network Hardware
  2. Exploring Local Area Network Configuration Options
  3. Verifying TCP/IP Settings
  4. Sharing Resources
  5. Testing LAN Connections

Real time operating systems

PROGRAM 5 – Real time operating systems

A real-time program implementing an alarm clock shall be developed. [Alarm clock, using C and Simple_OS]

The program shall fulfill the following requirements:

Clock with alarm functionality shall be implemented, It shall be possible to set the time, It shall be possible to set the alarm time, the alarm shall be enabled when the alarm time is set, the alarm shall be activated when the alarm is enabled, and when the current time is equal to the alarm time, an activated alarm must be acknowledged. Acknowledgement of an alarm shall lead to the alarm being disabled, the alarm is enabled again when a new alarm time is set, an alarm which is not acknowledged shall be repeated every 10 seconds. The program shall communicate with a graphical user interface, where the current time shall be displayed, and where the alarm time shall be displayed when the alarm is enabled. It shall be possible to terminate the program, using a command which is sent from the graphical user interface.

Database operating systems

PROGRAM 6 – Transactions and Concurrency -Database operating systems

Exercises Assume any application(e.g.banking) on your own and do the following exercises

Exercises Assume any application(e.g.banking) on your own and do the following exercises

  1. Investigate and implement the Object Store’s concurrency options.
  2. Implement the concurrency conflict that occurs between multiple client applications.
  3. Observe and implement the implication of nested transactions.

Distributed operating systems

PROGRAM 7 – Distributed operating systems

Design a RMI Lottery application. Each time you run the client program — “java LotteryClient n”, the server program “LotteryServer” will generate n set of Lottery numbers. Here n is a positive integer, representing the money you will spend on Lottery in sterling pounds. Write this program in a proper engineering manner, i.e. there should be specifications, design (flow chart, FD, or pseudo code), coding, test/debug, and documentation.

Consider a distributed system that consists of two processes which communicate with each other. Let P be a state predicate on the local state of one process and Q be a state predicate on the local state of the other process. Assume that neither P nor Q are stable (i.e. closed). Design a superimposed computation which detects that there exists an interleaving of underlying events in this system where at some state P ^Q holds. (A superposed computation is one that does not a_ect the underlying system; it may
ead” but not write” the state of the underlying system. Events in a superposed computation may occur in at the same instant as the underlying events and/or at di_erent instants.) State any assumptions you make. [Hint: Use vector clocks.]

241254 WEB TECHNOLOGY LAB

  1. Creation of HTML pages with frames, links, tables and other tags
  2. Usage of internal and external CSS along with HTML pages
  3. Client side Programming
    1. Java script for displaying date and comparing two dates
    2. Form Validation including text field, radio buttons, check boxes, list box and other controls
  4. Usage of ASP/JSP objects response, Request, Application, Session, Server, ADO etc
    1. Writing online applications such as shopping, railway/air/bus ticket reservation system with set of ASP/JSP pages
    2. Using sessions and cookies as part of the web application
  5. Writing Servlet Program using HTTP Servlet
  6. Any online application with database access
  7. Creation of XML document for a specific domain
  8. Writing DTD or XML schema for the domain specific XML document
  9. Parsing an XML document using DOM and SAX Parsers
  10. Sample web application development in the open source environment

Anna University Rank Holders

2020-2022

SNo. Register no Name Department CGPA Rank
1 421620405001 Arunkumar r M.e. / cse 9.30 7

2019-2021

No. Register No Name Department CGPA RANK
1 421619405002 Ummae Salma A M.E. / CSE 9.00 11

2016-18

No. Register No Name Department CGPA RANK
1 421616405002 ARCHANA P M.E. / CSE 8.85 14
2 421616405001 ANGELIN NIVEDITA S M.E. / CSE 8.48 39
3 421616405003 ASWINI S M.E. / CSE 8.47 40
4 421616405010 VANI S M.E. / CSE 8.45 41
5 421616405007 SARUMATHY B M.E. / CSE 8.41 44

2015-17

No. Register No Name Department CGPA Rank
1 421615405002 LAVANYA R M.E. / CSE 8.56 35
2 421615405006 NIVEDHITHA S M.E. / CSE 8.48 41

Staff Activities

Journal Published (2020-2021)

S.No Faculty name Paper title Identified journal Paper link
1 Dr.T.Priyaradika
Devi
Cloud Based Secure Travel Identity Citizen Data Mining System IJMA(Web of Science)
ISSN 0038-111X
Accepted & Paid
An Efficient And Privacy Preserving Cloud Computing Biometric Identification Scheme Elsevier
ISSN: 2214-7853
Accepted & Paid
2 S.Prasanna Decentralized Cloud Security by Using Block chain Innovative Method Journal Of Critical Review(Scopus)
Issn:2394-5125
https://www.jcreview.com/?mno=103866
Self-Destruction Of Data In Cloud Using
Asymmetric Key With Key Generator
Elsevier
ISSN: 2214-7853
https://www.sciencedirect.com/science/article/pii/S2214785320365378
3 V.Mathavan Android Application For Spontaneous Soil Constant Monitoring And Controlling System Using Raspberry Pi Journal Of Critical Review(Scopus)
Issn:2394-5125
https://www.sciencedirect.com/science/article/pii/S2214785320365330
War Field Soldier Body Condition Monitoring system Elsevier
ISSN: 2214-7853
Elsevier
ISSN: 2214-7853
http://www.jcreview.com/?mno=103844
4 S.Thulasidass Hash Algorithm For Secure Data Transmission Using Qr Code In Cloud Computing Journal Of Critical Review(Scopus)
Issn:2394-5125
http://www.jcreview.com/?mno=103858
Liver Tumor Diagnosis By Using Image Processing Techniques Elsevier
ISSN: 2214-7853
Elsevier
ISSN: 2214-7853
https://www.sciencedirect.com/science/article/pii/S2214785320365421
5 S.Vanakovarayan J48, Cart And Navie Bayesian Algorithm For Performance Analysis Of Software Quality Prediction Journal Of Critical Review(Scopus)
Issn:2394-5125
http://www.jcreview.com/?mno=103845
Classification Using Fundus Image Of Eye By Cnn Method And Self- Sufficient Glaucoma Detection Elsevier
ISSN: 2214-7853
Elsevier
ISSN: 2214-7853
https://www.sciencedirect.com/science/article/pii/S2214785320365366
6 J.Lalithavani Cloud Server Used For Smart Home Automation and Management Elsevier
ISSN: 2214-7853
https://www.sciencedirect.com/science/article/pii/S2214785320382699
Emergency Vehicles Automatic Path Clearance Framework Using Fuzzy K Means Algorithm Solid State Technology
ISSN 0038-111X
http://solidstatetechnology.us/index.php/JSST/article/view/5039
7 S.Pradeepa A New Modern Agriculture Technique Using IOT With Hydroponic Vertical farming Solid State Technology
ISSN 0038-111X
http://solidstatetechnology.us/index.php/JSST/article/view/49
Smart women Self Defense Device Pepper Spray Automated Emergency Calling and Location Sharing Lecture Notes on Computational Science and Engineering Accepted & Paid
8 E.Lavanya Convolution Networks For Motion Detection In Smart Gadgets Elsevier
ISSN: 2214-7853
https://www.sciencedirect.com/science/article/pii/S2214785320365342
Multiple Path Storage by using cloud Data Security Solid State Technology
ISSN 0038-111X
http://solidstatetechnology.us/index.php/JSST/article/view/5040
9 E.Indra Sustainability of Service Provisioning System Under Stealth DOS Attack Journal of Green Engineering
ISSN: 2245-4586
http://www.jgenng.com/volume10-issue8.php
10 R.Mohan Prototype For Face Recognition Based Smart Door Lock Using Raspberry Pi Journal Of Critical Review(Scopus)
Issn:2394-5125
http://www.jcreview.com/?mno=107956
Secured Routing Protocol For Energy Efficient In Manet Solid State Technology
ISSN 0038-111X
Accepted & Paid
11 K.Madhan Centralized Scheduling Mesh Topology To Prevent Interference By Using Designing Route Algorithm Solid State Technology
ISSN 0038-111X
http://solidstatetechnology.us/index.php/JSST/article/view/5042
Classification Of Queries Using Svm And C4.5Algorithm In Micro Blogging Supported Classroom Journal Of Critical Review(Scopus)
Issn:2394-5125
http://www.jcreview.com/?mno=23414
12 V.Bharathi Parking Guidance System Model Using Raspberry Elsevier
ISSN: 2214-7853
https://www.sciencedirect.com/science/article/pii/S2214785320382523
Denial Of Service Attack Detection For Model Based Prediction Solid State Technology
ISSN 0038-111X
http://www.solidstatetechnology.us/index.php/JSST/article/view/5036
13 T.Ragupathi Performance Assessment Of Different Machine Learning Algorithms For Medical Decision Support Systems Springer https://link.springer.com/chapter/10.1007/978-3-030-43192-1_103
Iot With Cloud Based Diabetes Diagnosis And Classification Model Using Optimal Kernel Extreme Learning Machine Solid State Technology
ISSN 0038-111X
http://solidstatetechnology.us/index.php/JSST/article/view/5044
14 D.Saranya Deep CNN Model for Driver Activity Recongnition for Intelligent Vechicles Ijeter(Scopus)
Issn:1546-1955
http://www.warse.org/IJETER/static/pdf/file/ijeter828102020.pdf
Proficient Smart Health System Using Internet of Things Journal Of Ijasret(Scopus)
Issn:2207-6360
Accepted & Paid
15 D.Murali Linear Regression And Neural Networks Algorithm To Predicting The Real-Time Parameters Of Temperature And Humidity

Journal Of Critical Review(Scopus)
Issn:2394-5125

ISSN: 2214-7853

http://www.jcreview.com/?mno=103867
Find The Attacker –Multiple Attacks In Cloud Environment Using Big Data Analysis Elsevier
ISSN: 2214-7853
https://www.sciencedirect.com/science/article/pii/S2214785320385035

Patent Details:(2020-2021)

S.No Name of The Faculty Title Patent Number Journal Number Date Of Publication
1 Mr. S. Prasanna
Mr. V. Mathavan
Mr. S. Thulasidass
Mr. S.vanakovarayan
Mr. R. Mohan
Mr. K. Madhan
Mr. T. Ragupathi
Mr. D. Murali
design of effiecient water management system for agriculture using iot 202041045034 44/2020 30/10/20
2 Dr. T. Priyaradhikadevi
Mrs. E. Lavanya
Mrs.e. Indra
Mrs.j. Lalithavani
Mrs.s. Pradeepa
Mrs.v. Bharathi
Ms d.saranya
Detection of Leaf Diseases Using Machine Learning and Fuzzy Logic 202041045035 44/2020 30/10/20

Journal Published (2021-2022)

S.No Faculty Name Title Journal Name Year Issue No & Voloume No Scopus /SCI/SCIE
1 Dr.T.PriyaradhikaDevi A Multi Agent Approach For Personalized Hypertension risk Predection INT-JECSE 2022 Vol 14, Issue 02 WOS
2 Dr.T.PriyaradhikaDevi ANN Based E-Commerce Distribution Optimization of Rice Agricultural Products Based on Consumer Statisfaction Jouurnal of Aquatic Science 2022 Vol 13, Issue 01 WOS
3 S.Prasanna Application of mi based prediction of the deep learning cnn model to enhancement and Scheduling the gpu utilization of the ds International Journal of Aquatic Science 2022 Vol 13, Issue 01 WOS
4 S.Prasanna Iot Based Secured Real-Time Health
Monitoring System Using Arduino
MONITORING SYSTEM USING ARDUINO
YMER 2022 Vol 21, Issue 11 Scopus
5 V.Mathavan Coconut Tree Disease Segmentaion Using Fuzzy Rough C-Meansclustering Algorithm Journal of Neuroquantology 2022 Volume 20, Issue No.8 Scopus
6 V.Mathavan Wormhole Attack Detection in RPL- Protocol based on RSSI Value Journal of Algebraic Statistics 2022 Volume 13, issue No 3, WOS
7 P.R.Jayanthi Facial Expression Recognition by Using Convolutional Neural Network Journal of Neuroquantology 2022 Volume 20, Issue No.15 Scopus
8 P.R.Jayanthi Flood Prediction Analysis Using Supervised Machine Learning Techniques Journal Of Algebraic Statistics 2022 Volume 13,Issue No. 3 WOS
9 E.Lavanya IOT Based Multipurpose Roboty for Military Application Neuroquantology 2022 Vol 20 Issue 15 Scopus
10 E.Lavanya Detection Covid-19 by Image Segmentation Ct Based on Artificial Intelligent Technique Journal Of Algebraic Statistics 2022 Vol 13 WOS
11 E.Indra Facial Expression Recognition by Using Convolutional Neural Network Neuroquantology 2022 Vol 20 Issue 15 Scopus
12 E.Indra Flood Prediction Analysis Using Supervised Machine Learning Techniques Journal Of Algebraic Statistics 2022 Vol 13 WOS
13 S.Pradeepa IOT Based Multipurpose Roboty for Military Application Journal of Neuroquantology 2022 Volume 20, Issue No.15 Scopus
14 S.Pradeepa Detection Covid-19 by Image Segmentation Ct Based on Artificial Intelligent Technique Journal Of Algebraic Statistics 2022 Volume 13, issue No 3, WOS
15 S.Vanakovarayan Wormhole Attack Detection in RPL- Protocol based on RSSI Value Journal of Algebraic Statistics 2022 Volume 13, issue No 3, WOS
16 S.Vanakovarayan Skin Canser Identification And Classification Using Lenet Convolution Neural Network Telematique 2022 Volume 21, Issue No.1 WOS
17 R.Mohan Crime Data Analytic And Prediction Using Machinelearning Algorithm INT-JECSE 2022 Vol 14, Issue 02 WOS
18 R.Mohan Brain Storm Optimization With Deep Learning Based Intrusion Detection System in VANET IJETT 2022 Vol 2, Issue No 14 Scopus
19 K. Madhan Deep Learning Techniques Used For Detection Of Disease In Tomato Plants Taylor and Francis 2022 Book Chapter Scopus
20

Air Pollution Monitoring System Using
Iot And Artificial Intelligence

IOT AND ARTIFICIAL INTELLIGENCE

YMER 2022 Vol 21 Issue 10 Scopus
21 T.Ragupathi

The Real Time Remote Image Scene Classification Frompre-Trained
And Custom Weights

AND CUSTOM WEIGHTS

INT-JECSE 2022 Vol 14, Issue 02 WOS
22 D.Saranya Health monitoring system based on IoT Journal of Health Sciences 2022 Vol 02, Issue 06 Scopus
23 D.Saranya Adaptive Intelligence System based on the Internet of Things for Patient Monitoring in Remote Area IEEE Explore 2022 (ICCCI) IEEE
24 An Automated Framework For Dynamic Web Information Retrieval Using Deep Learning IEEE Explore 2022 (ICCCI) IEEE
25 G.Selvapriya

Bidirectional Lstm Based Hybrid Deep Learning Frameworks
Forcardiacar Rhythmiaclassification

FORCARDIACAR RHYTHMIACLASSIFICATION

INT-JECSE 2022 Vol 14, Issue 06 WOS
26 Industrial Iot Applications for AI Edge Computing Technology Journal Of Algebraic Statistics 2022 Vol 13, issue No. 3 WOS
27 G.Selvakumari

Bidirectional Lstm Based Hybrid Deep Learning Frameworks
Forcardiacar Rhythmiaclassification

FORCARDIACAR RHYTHMIACLASSIFICATION

INT-JECSE 2022 Vol 14, Issue 06 WOS
28 Industrial Iot Applications for AI Edge Computing Technology Journal Of Algebraic Statistics 2022 Vol 13, issue No. 3 WOS
29 S.Shanmuganathan Smart Algorithm To Secure Web Based Applications From SQL Injection Attacks Journal of Algebraic Statistics 2022 Volume 13, No 3, WOS
30 Classification of Melanoma and Nevus in Digital Images for Diagnosis of
Skin Cancer
Telematique 2022 Volume 21, Issue No.1 WOS
31 D.Srinivasan Smart Algorithm To Secure Web Based Applications From SQL Injection Attacks Journal of Algebraic Statistics 2022 Volume 13, No 3, WOS
32 Classification Of Melanoma And Nevus In Digital Images For Diagnosis Of Skin Cancer Telematique 2022 Volume 21, Issue No.1 WOS
33 G.Saraswathi High Level Security Management In Mobile Ad-Hoc networks by using superman INT-JECSE 2022 Vol 14, Issue 06 WOS
34 Cloud Based Monitored System for Smart Agriculture
1G. Saraswathi, 2K. Kavitha,
1 Assistant
Journal Of Algebraic Statistics 2022 Vol 13, issue No. 3 WOS
35 K.Kavitha High Level Security Management In Mobile Ad-Hoc networks by using superman INT-JECSE 2022 Vol 14 WOS
36 Cloud Based Monitored System for Smart Agriculture Journal Of Algebraic Statistics 2022 Vol 13 WOS

Patent Details:(2021-2022)

S.No Type of the patent Patent title Published date Staff members in patent
1 INDIAN PATENT IOT BASED SMART VENTILATOR SYSTEM 2022 DR.T.Priyaradhikadevi
MR. S. Prasanna
MR. V. Mathavan
MR. S. Vanakovarayan
MR. R. Mohan
MR.K.Madhan
MR. T. Ragupathi
MRS. E. Lavanya
MRS.E.Indra
Mrs.J.Lalithavani
Mrs.S.Pradeepa
Ms.D.Saranya Mrs.G.Selvapriya Mr.D.Srinivasan Mr.S.Shanmuganathan Mrs.G.Selvakumari Mrs.B.Indhumathy
2 INDIAN PATENT MACHINE LEANING BASED DEBIT CARD AND CREDIT CARD FRAUD DETECTION TECHNIQUE 2022 DR.T.PRIYARADHIKADEVI MRS. E. LAVANYA, MRS. E. INDRA, MRS.J.LALITHAVANI MRS. S.PRADEEPA, MS. D. SARANYA, MRS. G. SELVAPRIYA, MS. G. SARASWATHI, MRS. K. KAVITHA , MRS.G.SELVAKUMARI
3 Indian Patent Design System Of Iot-Driven Sensor Monitoring Digital Health System For Personalized Medicine 2022 Mr.S.Prasanna , Mr.V.Mathavan, Mr.S.Vanakovarayan, Mr.R.Mohan, Mr.K.Madhan, Mr.T.Ragupathi, Mr.S.Shanmuganathan, Mr.D.Srinivasan

Journal Published:(2022-2023)

S.No Faculty Name Title Journal Name Year Issue No & Voloume No Scopus /SCI/SCIE
1 R. Mohan, G. Prabakaran, T. Priyaradhikadevi Blockchain Assisted Chaotic Chameleon Swarm Optimization Based Clustering Technique in Vehicular Ad Hoc Networks International Journal of Computer Networks and Applications (IJCNA) 7/14/2023 2395-0455 https://www.ijcna.org/
R. Mohan, G. Prabakaran, T. Priyaradhikadevi Brain Storm Optimization with Deep Learning-Based Intrusion Detection System in Vehicular Adhoc Networks IJEEE Jul-23 2348-8379 https://www.internationaljournalssrg.org/IJEEE/archive.html