| Title | Authors | Month, Year | Publication details |
|---|---|---|---|
| Completed Online Faculty Development Program Microsoft power BI | Happy | 09/06/2025 to 11/06/2025 | HRDC of APJ Abuul Kalam Technological University and Nest Digital Academy |
| Participated in the Five-Day Online Faculty Development Programme on ‘Exploring AI Applications through MATLAB: From Image Processing to Generative AI’ Conducted by the Department of Artificial Intelligence and Data Science | Happy A | 19-05-2025 to 23-05-2025. | Jyothi Engineering college in association with CoreEL Technologies, Bangalore and MathWorks |
| Participated & completed AICTE Training And Learning (ATAL) Academy Faculty Development Program on Indian Health, Wellness & Psychology (including Ayurveda) | Happy A | 20/01/2025 to 25/01/2025. | NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE |
| Five Days FDP on “Generative AI :Trends, Tools, Research & Techniques” | Happy A | 12/02/2025 – 16/02/2025 | Dhannish Ahamed Institute of Technology |
| Six Days FDP on “Introduction to Machine Learning (AMT 305) and Python & Machine Learning Lab (AML 311) | Happy A | Nov 11- 16 , 2024 | Mar Baselios Christian College of Engineering and Technology in collaboration with PencilBitz |
| Blockchain Powered Supply Chain Management in Small and Medium Scale Industries | Anand Haridas, Thahseen Shadat, Fathima Nazrin S., Devaprasad V., Diya S. | Jun 2021 | International Research Journal of Modernization in Engineering Technology & Science. Volume:03, Issue:06, June-2021 |
| Handbook of Blockchain Basics | Anand Haridas | Apr 2021 | Amazon Kindle e-book. |
| To Design Smart and Secure Purchasing System Integrated with ERP using Blockchain Technology. | Anand Haridas, Juhi Shree, Dhanush G. A., Priyanka Kumar, Anala Sravani, Kanimozhi N. R. | Nov 2020 | 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA). DOI: 10.1109/ICCCA49541.2020.9250884 |
| RM Chain: A Block Chain System for Risk Monitoring in Supply Chain Network | Anand Haridas | Aug 2020 | Journal of Network Security Computer Networks Volume-6, Issue-2 (May-August, 2020) |
| Blockchain Based Crowd Funding for Startups | Anand Haridas, Mrudula R., Bavitha B., Clincy Baby, Aswathy M. | May 2020 | International Journal of Scientific Research & Development (IJSRD), vol. 8, issue 3 |
| S Chain: A Block Chain System for Small and Medium Sized Enterprises | Anand Haridas, Mrudula R., Clincy Baby | 2020 | International Journal of Current Engineering and Scientific Research Orgnization, vol. 7, issue 2 |
| Puzzle Based Highly Secure Steganography | Siva Shankar S. | Feb. 2017 | ICAMMAET Conference |
| A Robust Image Encryption in Semantic Content for High Security | Siva Shankar S., Rangarjan Alwar, M. Rajeshkhanna, Rajasekaran S. | Sept. 2016 | International Journal of Control Theory and Applications |
| Entity Recognition in Malayalam Using Fuzzy Support Vector Machine | Lakshmy G., Janu R. Panikar, Meera M. | Aug. 2016 | International Conference in Information Science |
| Data Hiding in Encrypted Images Using Arnold Transform | Siva Shankar S., A. Rangarajan | Aug. 2016 | ICTACT Journal on Image and Video Processing, vol. 7, issue 1 |
| A comparative study in image compression using halftoning based block truncation coding for color image | Meharban M. S., Priya S. | Apr. 2016 | International Journal on Cybernetics and Informatics, vol. 5, issue 2 |
| A Review on Image Retrieval Technique | Meharban M. S., S. Priya | Apr. 2016 | Bonfiring International Journal of Advances in Image Processing, vol. 6, issue 2 |
| QR Code Security Using Proxy Re-Encryption | Akhil N.V., Athira S., Vijay, Deepa S. Kumar | Mar. 2016 | International Conference on Circuit, Power and Computing Technologies |
| A Hybrid Scheme of DDBTC Encoding and CCF, BPF Extraction for Image Retrieval Process with Relevance Feedback | Meharban M. S., S. Priya | Feb. 2016 | International Journal for Engineering and Future Technology, vol. 1, issue 1 |
| DSPAA: A Data Sharing Platform with Automated Annotation | Keethana I. P., T. Aby Abahai | Feb. 2016 | Elsevier International Conference on Computational Modeling and Security, vol. 85 |
| Secure Two Factor Authentication using QR | Akhil N.V., D. S. Kumar | Jan. 2016 | Joint International Conference ICPCIT 2016 and ICAIECES 2016 |
| Color Visual Cryptography Scheme for Natural Image Using Complement Cover and Share Authentication | Dr. R. Ramesh Kumar, S. Chandramathi | Jan. 2016 | Asian Journal of Information Technology |
| A survey on selection of efficient web service based on service quality | Arun S., Aravind Srinivas C. V., Johith Sundar, Roshan Sanu | Jan. 2016 | International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, issue 1 |
