Dr. V. Arun
Qualification : Ph.D.
Course | Specialization | Group | College Name/University | Year of Passing |
---|---|---|---|---|
Ph.D. | CSE | CSE | Sathyabama University, Chennai | 2017 |
M.S. | Software Systems | CSE | Bharathiar University, Coimbatore | 2004 |
B.E. | Electronics & Instrumentation Engineering | Electronics & Instrumentation Engineering | Annamalai University, Chidambaram | 2002 |
Note : Students are advised to meet me in Room No : WB - 214 at any time other than my class hours mentioned in the below timetable for any discussions related to the subjects & research.
My Schedule for 2021-22
My Publications
S.No | Title of the Paper | Full Details of Journal Name / Conference Name, Volume number, page number, Date |
---|---|---|
1 | "An Analytical Timeout Interval based Buffer Allocation Using Dynamic Adaptive Routers for QOS in Network" | Journal of Advance Research in Dynamical & Control Systems, 2019 |
2 | Delivering QOS with Security of Encrypted Tracer and Checker Model in MANET | International Journal of Advanced Intelligence Paradigms Inderscience, PP 342-351, Volume 7, No 3/4, 2015 |
3 | Cubic Bezier Curve Approach for Automated Off-line Signature Verification with Intrusion Identification | Journal of Mathematical Problems in Engineering, Hindawi Publication, 2014 |
4 | Delivering QOS with security of Encrypted Tracer and Checker Model in MANET | International Conference on Intelligent Computing and Data Science, SASTRA University, Thanjavur, 2014 |
5 | Concealed Mobile Agent using Cloud File Service | IEEE International Conference on Advances in Engineering and Technology, E.G.S Pillay Engineering College, ISBN 978-1-4799-4949-6@IEEE, 2014 |
6 | Layered Approach with Tracking Code using Concealed Mobile Agent | National Conference on Technological Research in Information Technology, Andhra Pradesh, India, 2014 |
7 | Mobile Agent – Based Memory Tracer Using Host-Based Intrusion Detection System for Safeguarding Critical Memory | Taylor and Francis of Information Security Journal: A Global Perspective, PP 98-103, Volume 22, Issue 2, 2013 |
8 | Versioning File System in Cloud Computing with Intrusion Detection using Mobile Agent | CiiT International Journal of Wireless Communication, PP 163-169, Volume 5, No 4, 2013 |
9 | Secure Sandbox for Mobile Computing Host with Shielded Mobile Agentv | Indian Journal of Applied Research : Information Technology, PP 47-48, Volume 3, Issue 9, 2013 |
10 | Type Based Vital Memory Access in Specific Shielded Mobile Agent | International Conference on Mathematical Computing Engineering, VIT University, PP 501-506, Vol II, 2013 |
11 | Intrusion Detection in Cloud Computing Using Mobile Agent | National Conference on Advances in Computing and Technology, VIT-Chennai, 2013 |
12 | Mobile Agent in InVANET-Traffic Management | Networks and Communication, CCSIT, Springer PP 10-20, LNICST 84, Part I, 2012 |
13 | Encrypted Tracer and Checker Model | Journal of Emerging Technologies : Image Processing and Networking, PP 23-27, Volume 6, No 2, 2011 |
14 | Tracer and Checker Model Against Malicious Mobile Agent | National Conference on Wireless Information and Networking in Global Systems (WINGS), KLNEC-Madurai, 2011 |
- Participated in Digital Skills Readiness Program at Wipro Technologies, Bangalore from 15 to 22 May 2019.
- Participated in International Conference on Global Congress on Computing Media Technologies (GCMT), Sathyabama University, Chennai, 2015