The following are the research Journals published by the staff members of Information Technology Department ☞ 2019-2020 ◽ Image Encryption Method for Watermarking.pdf" ◽ A Data Transmission Protocol for Monitoring Road Surface conditions with security aspects in Cloud Surface.pdf" ◽ A Method for Self-Automatic Penalty System in Signal Jumping with Rfid Congestion System.pdf" ◽ A New Dual-Server Public Key File Encryption with Keyword Search.pdf" ◽ A Study Security Attacks in Cognitive Overlay Networks.pdf" ◽ A Study on Software Metrics based Software Defect Prediction using Data Mining and Machine Learning Techniques.pdf" ◽ Performance and physical design of algorithms with analysis.pdf" ◽ Issue and Challenges in Pen-based Computing Environments using Data Structure.pdf" ◽ A METHODOLOGY FOR MOBILE COLLABORATIVE LEARNING THROUGH DISTRIBUTED COMPUTING.pdf" ◽ Software Defect Prediction Using Various classifiers.pdf" ◽ TWO- STAGE WELL-DRESSED CRAWLER USING ADAPTIVE LEARNING ALGORITHM ON WEB INTERFACES.pdf" ☞ 2018-2019 ◽ An Improved Method for Plant Disease Detection in Smart Irrigation System Using IOT.pdf" ◽ Application-of-Fuzzy-Differential-Evolutionary-Algorithms-in-Biological-Data-Mining.pdf" ◽ A-Survey-on-Reliable-Path-Discovery-in-MANET.pdf" ◽ Authenticating Debit & Credit Cards Using Face Recognition Techniques.pdf" ◽ Classification of Histopathological Images using Advanced Machine Learning Techniques.pdf" ◽ classification of histopathological images using advanced machine learning techniques.pdf" ◽ critical evaluation of disatrous probelms.pdf" ◽ Data Retrieval System using IoT with Block Chain Approach-IJSETR.pdf" ◽ Designing Methods for Object Detection Based on Secured System.pdf" ◽ Designing-Decision-Support-Systems-Approaches-using-Entity-Relationship-Data-Schema-A-Survey.pdf" ◽ IOT-Based-Smart-Irrigation-and-Plant-Disease-Detection.pdf" ◽ Naive Bayes Algorithm for Text Mining Algorithm Using Machine Learning.pdf" ◽ Propagation of ESL with the Advanced Android Application.pdf" ◽ TWO- STAGE WELL-DRESSED CRAWLER USING ADAPTIVE LEARNING ALGORITHM ON WEB INTERFACES.pdf" ☞ 2017-2018 ◽ A NOVEL DESIGN OF FINGER VEIN RECOGNITION FOR PERSONAL INFORMATION.pdf" ◽ A QUERY ROUTING APPROACH IN PEER 2 PEER NETWORKS.pdf" ◽ A SURVEY ON AUTOMATION TESTING.pdf" ◽ ALUMNI INFORMATION DATABASE.pdf" ◽ AN APPROACH OF MACHINE LEARNING FOR BUILDING SPECIFIC SEARCH ENGINES.pdf" ◽ ANALYZING THE USER BEHAVIOR IN ONLINE SOCIAL NETWORKS.pdf" ◽ ARCHITECTURE OF OBJECT ORIENTED APPLICATION.pdf" ◽ BOOK YOUR BOOKS.pdf" ◽ CORTANA(PERSONAL ASSISTANT).pdf" ◽ DETERMINING ITEM PARAMETERS FOR BETTER TESTING SYSTEMS.pdf" ◽ EFFICIENT MULTI KEYWORD RANKED SEARCH FOR RETRIEVING THE ENCRYPTED CLOUD DATA.pdf" ◽ EFFICIENTLY QUERY PROCESSING AND ASSESSMENT ON ENCRYPTED DATA.pdf" ◽ GREEN COMPUTING.pdf" ◽ PROVIDING SECURITY IN THE NETWORK BASED ON DURATION OF ATTACKS.pdf" ◽ RECOGNIZING DELAYS IN ENGINE ABILITY ADVANCEMENT OF KIDS THROUGH INFORMATION EXAMINATION OF A KEEN PLAY GADGET.pdf" ◽ TIME AND ATTRIBUTE FACTOR COMBINED ACCESS FOR TIME SENSITIVE DATA IN PUBLIC CLOUD.pdf" ◽ Extraordinary Bureau Investigation Robotics for India.pdf" ◽ Improving Cloud Server Security and Data level Security by using an Attribute based access Control Scheme.pdf" ◽ Improving Sentiment Analysis by Using a Unified Framework to Predict Overall Rating of Review Documents.pdf" ◽ Insurance safeguard wireless sensor in medical field.pdf" ◽ MACHINE LEARNING WITH BIG DATA CHALLENGES AND APPROACHES.pdf" ◽ Remote Pellet Telemetry.pdf" ◽ Self-Activated Congestion System and Self-Automated Penality System for Signal Jumping using Rfid.pdf" ◽ THE SECURITY PRADIGM IN CLOUD COMPUTING.pdf" ◽ automatic time table generator.pdf" ◽ security attacks and solutions.pdf" ◽ smart city implementation models based on IOT technology.pdf" ◽ SECURITY USING COLORS AND ARMSTRON NUMBERS.pdf" ◽ Emo Spark-Android Controlled WIFIBLUE TOOTH SOLID SHAPED DEVICE.pdf"