Year : 2024
Deep Learning Models for Brain Tumor Classification
Cite this Research Publication :
Sunitha E.V, “Deep Learning Models for Brain Tumor Classification”, Grenze International Journal of Engineering and Technology, Grenze ID: 01.GIJET.10.2.540, 941 – 947, Volume 10, Issue 1, 2024.
Year : 2019
Automatic Code Generation From UML State Chart Diagrams
Cite this Research Publication : Sunitha E. V., Philip Samuel, “Automatic Code Generation From UML State Chart Diagrams”, IEEE Access ,2019.
Publisher : IEEE
Year : 2018
Object constraint language for code generation from activity models
Cite this Research Publication : E.V. Sunitha , Philip Samuel, “Object constraint language for code generation from activity models”, Information and Software Technology, Elsevier, 2018.
Publisher : Elsevier
Year : 2016
Automatic code generation using unified modeling language activity and sequence models
Cite this Research Publication : E.V. Sunitha , Philip Samuel, "Automatic code generation using unified modeling language activity and sequence models." IET Software, 2016.
Year : 2015
Enhanced security approach on social networks by K anonymization
Cite this Research Publication : Jithimol P.S, Sunitha EV, “Enhanced Security Approach on Social Networks by K Anonymization”, International Journal of Applied Engineering Research (IJAER) , ISSN 0973-4562, Vol. 10, 2015, pp -18214-18218.
Year : 2015
A Refinement to the Single Sign-On Authentication For Distributed Computer Networks
Cite this Research Publication : Asha Kurian, Sunitha EV, “A Refinement to the Single Sign-On Authentication For Distributed Computer Networks”, International Journal of Applied Engineering Research (IJAER), ISSN 0973-4562, Vol. 10, 2015, pp -18130-18134, SCOPUS.
Year : 2015
Watermarking of Relational Databases using Video
Cite this Research Publication : Anju Paul, Sunitha EV, “Watermarking of Relational Databases using Video”, International Journal of Science, Engineering and Technology Research (IJSETR),2015.
Year : 2014
Unobservable Routing Scheme Resistant Against Dos Attacks Using AODV Protocol
Cite this Research Publication : Aryadevi KR, Sunitha EV, “Unobservable Routing Scheme Resistant Against Dos Attacks Using AODV Protocol”,International Journal of Emerging Trends in Engineering and Development, ISSN 2249-6149, 2014 volume 2.4, pp-565-572.
Year : 2014
Performance And Net security Enhancement In Opass Authentication Protocol System
Cite this Research Publication : Malu P Thankachan, Sunitha EV, “Performance And Net security Enhancement In Opass Authentication Protocol System”, International Journal of Emerging Trends in Engineering and Development, ISSN 2249-6149, 2014 volume 2.4, pp- 515- 523.
Year : 2014
Semantics Aware Statistical Algorithm To Detect Spam Zombies And Worms In Network
Cite this Research Publication : Uthara Thampi, Sunitha EV, “Semantics Aware Statistical Algorithm To Detect Spam Zombies And Worms In Network”, International Journal of Emerging Trends in Engineering and Development, ISSN 2249-6149 , 2014 volume 2.4, pp - 460-468.
Year : 2014
Translation of Behavioral Models to Java Code and Enhance With State Charts
Cite this Research Publication :
Sunitha E.V, Philip Samuel, Translation of Behavioral Models to Java Code and Enhance With State Charts, International Journal of Computer Information Systems and Industrial Management Applications. Volume 6 2014 pp. 294 -304. ISSN 2150-7988.
Year : 2009
Document Type Definition for the XMI Representation of UML2.0 Activity Diagram
Cite this Research Publication : Philip Samuel, Sunitha E.V, “Document Type Definition for the XMI Representation of UML2.0 Activity Diagram”, International Journal of Recent Trends in Engineering, Impact Factor -4.1 Vol.1 2009,pp. 206- 210. ISSN 2455–1457.