S.No | Details |
1 | Dr.G. Singaravel , Prakash, M , Haphazard Enhanced and personalized Anonymization for privacy Preserving Data Mining on Sensitive Data Sources, International Journal of Business Intelligence and Data Mining, Vol: 13, Issue:4, 1743-8195, 2018 |
2 | Dr.G. Singaravel , Eswaramoorthi, R , Improved Artificial Bee Colony Optimization Approach in UWBOFDM for Frequency Offset Estimation, Journal of Testing and Evaluation, 0090-3973, 2018 |
3 | Dr.G. Singaravel , Kaveen.P., , Simulation of Efficient Life-Time in Clustering Approaches for New Approach in Wireless Sensor Network, Bonfring International Journal of Networking Technologies and Applications, Vol: 5, Issue:1, 2277-5099, 2018 |
4 | Dr.G. Singaravel , Karuppusamy S Kaveen.P., , Scrum Investigation Analysis for Android Application, Bonfring International Journal of Networking Technologies and Applications, Vol: 5, Issue:1, 2277-5099, 2018 |
5 | Dr.G. Singaravel , Kanimozhi.,, Combining Image Security and Authentication Using Sift and Zernike Moments, Bonfring International Journal of Networking Technologies and Applications, Vol: 5, Issue:1, 2277-5099, 2018 |
6 | Dr.G. Singaravel , Kavitha N S., , Survey on Data Aggregation through Orthogonal Set Method for Wireless Sensor Network, Bonfring International Journal of Networking Technologies and Applications, Vol: 5, Issue:2, 2277-5099, 2018 |
7 | Dr.G. Singaravel, Ramya. T , A Traffic Sign Motion Restoration Model Based on Border Deformation Detection, International Journal of Emerging Technology in Computer Science , Vol: 20, Issue:02, 0976-1353, 2016 |
8 | Dr.G. Singaravel , Sivaranjani. T , An Efficient Object Classification Based On ELM, Imperial Journal of Interdisciplinary Research (IJIR, Vol: 2, Issue:5, 2454-1362, 2016 |
9 | Dr.G. Singaravel , Sachidhanandam P., , Efficient Data Aggregation in sensor Nodes through linear motion of mobile sink, Asian Journal of Information Technology(Medwell Journals), Vol: 15, Issue:15, 1682-3915, 2016 |
10 | Singaravel G , Sudarsanam P, Optimal Ring Routing Path Management Algorithm for Energy Efficient Sink Node of WSN, International Journal of Printing, Packaging , Vol: 4, Issue:4, 2320-4387, 2016 |
11 | Dr.G. Singaravel , Rejesh. M. , Performance Measure of Network I/O Workload In Virtualized Data Center Using Hypervisor, International Journal of Pharmacy , Vol: 8, Issue:4, 2016 |
12 | Dr.G. Singaravel , Senthil.J , Human Oriented Authentication Using Fingerprint Recognition for Secure Environment, International Journal of Pharmacy , Vol: 8, Issue:4, 2016 |
13 | Dr.G. Singaravel ,Sachidhanandam P., , A Life Time Enhancement of the Sensor Nodes through Linear Motion of the Mobile Sink, , Vol: 10, 0973-4562, 2015 |
14 | Dr.G. Singaravel , Sakthivel M., Adaptability and Flexibility Investigation of the Reusable Code Analytical Skill Intensity of Developer in Agile Methodology, International Journal of Applied Engineering Research, Vol: 10, 0973-4562, 2015 |
15 | Dr.G. Singaravel Sivakumar P., Prakash M , Efficient Methods for Distinction Preclusion in Data Mining, International Journal of Applied Engineering Research, Vol: -16, 0973-4562, 2015 |
16 | Dr.G. Singaravel , Arulmozhi S , Software Process Implementation Framework for Automatic Generation of Work Flow Model Testing, International Journal of Applied Engineering Research, Vol: 10, 0973-4562, 2015 |
17 | Dr.G. Singaravel , Arulmurugan R, and Anguraj S., , Enhanced Task Scheduling Scheme for Hadoop Map Reduce Systems, International Journal of Emerging Technology in Computer Science , Vol: 15, Issue:1, 0976-1353, 2015 |
18 | Dr.G. Singaravel , Prakash, M , An approach for prevention of privacy breach and information leakage in sensitive data mining, International journal of Computers and Electrical Engineering, Vol: 45, 0045-7906, 2015 |
19 | Dr.G. Singaravel , Mithun Brindha S , Fuzzy interference approach based prioritization of security requirements, Indian Journal of Innovations and Developments, Vol: 3, Issue:4, 2277-5390, 2015 |
20 | Dr.G. Singaravel , Sivaranjani. T , Survey on Object Classifications in Image Processing, International Journal for Scientific Research , Vol: 3, Issue:8, 2321-0613, 2015 |
21 | Dr.G. Singaravel , Deepan Shakaravarthy. V , Survey on Agile Software Development Project using Scrum, International Journal for Scientific Research , Vol: 3, Issue:8, 2321-0613, 2015 |
22 | Dr.G. Singaravel , Prakash, M , Haphazard Anonymization: A novel algorithm for approach for privacy and knowledge preservation, International Journal of Applied Engineering Research, Vol: 5, Issue:10, 0973-4562, 2015 |
23 | Dr.G. Singaravel, Kaveen P , Image Fraud Identification Using Illuminant Analysis, International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE),, Vol: 2, Issue:1, 2320-9801, March, 2014 |
24 | Dr.G. Singaravel and Dhanasekaran R , Denial of Service Attack in Distributed Wireless Network by Distributed Jammer Network: A Birth-Death Random Process Analysis?, Journal of Computer Science(JCS), Vol: 10, Issue:8, 1549-3636, March, 2014 |
25 | Dr.G. Singaravel and Prakash, M. , An Analysis of Privacy Risks and Design Principles for Developing Countermeasures in Privacy Preserving Sensitive Data Publishing?, Journal of Theoretical and Applied Information Technology, Vol: 62, Issue:1, 1992-8645, April, 2014 |
26 | Dr.G. Singaravel and Rejesh. M. , ?I/O Workload in Virtualized Data Center Using Hypervisor?, International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), Vol: 2, Issue:6, 2321-8169, August, 2014 |
27 | Dr.G. Singaravel, Prakash, M, A Review on Approaches, Techniques and Research Challenges in Privacy Preserving Data Mining, Australian Journal of Basic and Applied Sciences, Vol: 8, Issue:10, 1991-8178 , July, 2014 |
28 | Dr.G. Singaravel ,Prakash, M , A framework for high performance and strict privacy preserving data mining algorithms, A framework for high performance and strict privacy preserving data mining algorithms, Vol: 3, Issue:4, 2348-7550, 2014 |
29 | Dr.G. Singaravel, Palanisamy V and Krishnan A. , Adaptive reusability risk analysis (ARRA) model, International Journal of Computer Science and Network Security(IJCSNS), Vol: 10, Issue:2, 1738-7906, February, 2010 |
30 | Dr.G. Singaravel, Dr.B.G. Geetha, Palanisamy V., and Krishnan A, ?Standard system centric adaptable risk analysis for clone transformation of software project?, International Journal of computer application in Engineering ,Technology and Sciences, IJ-CA-ETS, Vol: 1, Issue:2, 0974 ? 3596, 2009 |
31 | Dr.G. Singaravel, Palanisamy V. and Krishnan A, Ethics Understanding of Software Professional in Risk Reducing Re usability Coding Using Inclusion Set Theory?, International Journal of Computer Science and Information Security (IJCSIS), Vol: 6, Issue:2, 1947 5500, December, 2009 |
32 | Dr.G. Singaravel, Dr.B.G. Geetha, Palanisamy V, and Duraiswamy K. , A Tool for Testing of Inheritance Related Bugs in Object Oriented Software, Journal of Computer science, Vol: 4, Issue:1, 1549-3636, January, 2008 |
33 | Dr.G. Singaravel, Dr.B.G. Geetha , Assessment and people Risk Management in software project, International Journal of Computer Science and Applications, Vol: 1, Issue:2, 0972-9038, August, 2008 |
34 | Dr.G. Singaravel and Kaveen P , The Future Wireless Network, |