Home   |   FAQ   |   Contact Us   |   Photo Gallery   |   Sitemap

Sankara Journal of Computer ApplicationsSJCA

About SJCA

Sankara Journal of Computer Applications (SJCA)
is a peer reviewed journal published by Sankara College of Science and Commerce. The journal publishes papers related with topics including but not limited to Information Technology, Computational Intelligence and Data, Communication Protocols and Standards, Image Processing and Machine Vision, Computer Security and Privacy, Ubiquitous Technologies, Artificial Intelligence, Networking and Cryptography, Wireless Sensor Networks, Mobile Adhoc Networks, Distributed Computing, Data Mining, Parallel Computing, Digital Image Processing, Virtualization Concepts, Cluster Computing, Data Science Technologies, Quantum Computing and Internet of Things (IOT) etc.

Prospective authors should note that only original and previously unpublished manuscripts and papers will be considered for publication. Information regarding paper submission to the computer journal will be intimated shortly once the process starts.

Author Guidelines

Our journal will serve the purpose of providing a platform for Researchers, Students, and Faculties to exhibit their research ideas to the entire community. Apart from regular papers, we also publish special issues on specific topic of interest to the international community.

General Guidelines

SJCA Journals are dedicated to publishing quality research papers that are novel in concept and all other aspects of research.
Submission of an article that requires an understanding that the paper is not already published with other journals.
The content has not been copied or plagiarized in whole or in part from other works.
Articles should be submitted only in MS-Word format and pdf files are NOT accepted.
Articles for submission should strictly follow the format of the template that will be given later after the approval process. 

Authorship

Once the article has been submitted to SJCA, it is understood that the article has been read and approved by all the co-authors and all agreed to the submission of the article. Corresponding author is responsible for the article during the review process and also for the collection and provision of copyrights from each co-author after acceptance.

Publication Ethics

We follow ethical standards to ensure high-quality articles are published and that the research community receives credit for their work. To maintain these standards we provide certain guidelines for the reviewers, authors, publishers and the subscribers.

Peer Review

Reviewers are responsible for deciding on the acceptance of the article for publication. All articles undergo double blind peer review process. Reviewers follow the review guidelines and decide on the articles on the grounds of originality, novelty and plagiarism. Author identity is kept confidential and not revealed to the reviewers. Also reviewers’ comments are confidential and will be made anonymous before passing to the authors.

Prompt Review

Reviewers on acceptance of reviewing the articles are requested to send their review comments promptly to enable the article publication without any delay. Also, if the reviewer feels he/she is unable to provide a prompt review or the subject of the article is beyond his/her scope, can inform the Editorial Committee and excuse himself / herself from the review process.

Confidentiality

Information, novel ideas or content obtained through double blind peer review are kept confidential and should not used for personal advantage.

Standards of Objectivity

Reviews are conducted objectively and comments are posted with supporting arguments. There shall be no personal criticism of the author.

Acknowledgment of Sources

Relevant published work that has not been cited by the author(s) is identified by the reviewers. Any statement that had been previously reported elsewhere should be accompanied by the relevant citation. A reviewer should also bring to the Editorial Committee’s attention any substantial similarity or overlap between the article under consideration and any other published work of which they have personal knowledge.

Conflict of Interest

Reviewers should not review manuscripts in which they have conflicts of interest resulting from competitive, collaborative, or other relationships or connections with any of the authors, companies, or institutions connected to the papers.

 SJCAEDITORIAL BOARD- INTERNAL

Dr.H.Balakrishnan M.Com.,M.Phil.,Ph.D.,
Principal
Sankara College of Science and Commerce, Coimbatore

E-Mail: principalarts@sankara.ac.in 

Prof.S.Nithyanandh MCA.,MBA.,M.Phil.,PGDIB.,M.Sc Psychology.,
Head - Department of MCA
Sankara College of Science and Commerce, Coimbatore

E-Mail: sijca@sankara.ac.in
 

Dr.A.Senthilkumar MCA.,M.Phil.,MBA.,Ph.D.,
Assistant Professor - Department of Computer Science
Sankara College of Science and Commerce
, Coimbatore
E-Mail: computersciencearts@sankara.ac.in

Prof.M.Lingaraj M.Sc.,M.Phil.,
Head - Department of Computer Science
Sankara College of Science and Commerce
, Coimbatore
E-Mail: mcaarts@sankara.ac.in

SJCAEDITORIAL BOARD - EXTERNAL

Dr.K.Arthi MCA.,M.Phil.,Ph.D.,
Assistant Professor - Department of Computer Science
Government Arts College, Coimbatore
E-Mail: dr.arthisekar@gmail.com


Dr.V.Jaiganesh MCA.,M.Phil.,MBA.,Ph.D.,
Associate Professor - PG and Research Department of Computer Science
Dr.NGP Arts and Science College, Coimbatore
E-Mail: webadminarts@sankara.ac.in

SJCA -Volume One - Issue One
WE THANK THE AUTHORS FOR THE RESPONSE    

PAPERS / ARTICLES  

Paper Type : Research Paper
Title : Significance of Software Engineering Techniques  for Development of Business Model
Country : India
Authors : Shriram.S.Zade
State : Nashik

    DOWNLOAD HERE 

Software engineers systematically organised the essence of all past programming experience and created various types of techniques, methodology and discipline. In other words they took efforts to produce software product by systematic manner, cost effectively with engineering approach. Software products are prepared very carefully by considering all possibilities and relevant parameters. This software used for most of the trusted and sensitive areas & people rely on the output of the software. The Business model is the conceptual structure.  It is supporting the feasibility of a business. The contents of business model are its purpose, its goals and its ongoing plans for achieving them.  Manufacturing techniques of software products can be useful for development of Business model.

Software Development Life Cycle (SDLC) models are available and other relevant techniques use for development of software product. The model involves various phases such as Feasibility Study, Requirement Analysis and Specifications, Design, Coding and Unit Testing, Integration and System Testing, Maintenance.  The SDLC phases are support to achieve the contents of business model like purpose, goal, plan etc.  These various phases can be useful as reference phases for development of business model. Different category of Software Development Life Cycles (SDLC) models are available in software engineering techniques for development of software product. Each model has its own specialty. As per the status of software product the model can be selected for development. The similar development techniques can be used for categories product / Business model to refer the suitable model as a reference for development of model. 

This theoretical introductory research approach is to apply the Software Development Life Cycles (SDLC) techniques which can be convenient   for keeping it as a role model for business model/ development of business product.

Keywords- Coding, Engineering, Feasibility, Plan, Specifications

PAPERS / ARTICLES  

Paper Type : Research Paper
Title : Mining Optimal Performance Criteria of Utility Boiler from Diverged Analysis Pattern
Country : India
Authors : Dr.S.Saraswathi & Dr.D.Surendran
State : TamilNadu

  DOWNLOAD HERE 

The substantial growth in power demand throughout globe has resulted in more production with high quality outcome. The power energy consumption needs to be increased hastily due to industrial development and usage litheness. Thermal plant consistency and stability needed to improve the quality is a inspiring task due to advent of active environmental features which roots abnormalities in regular functioning philosophy. Mostly energy outcome of coal fired utility boiler is attained using standard active set points. Thermal plant unit efficiency of the boiler replicates the outcome of coal to steam conversion process which excludes un-ignorable energy loss. This proposed effort tries to derive optimal process criteria to minimize and control energy loss. The detail knowledge about fuel data that defines intermediate resulting data are needed to identify the dependencies and cause that exists in functional procedures of coal fired boiler. The applications of the proven computing tactics are exploited to derive the optimal criteria to obtain efficient boiler process. The optimized operations produce support in less fuel utilization and more cost effective. The applications of required knowledge mining techniques over thermal steam plant elements are focused to produce powerful fault control and decision support system. The request arises to have heightened solution due to the existence of process divergence that reduces preserving effort and enhances system complications. 

Keywords - Analysis, Boiler, Knowledge, Loss, Mining

PAPERS / ARTICLES  

Paper Type : Research Paper
Title : Clustering Techniques to Boost Text Classification
Country : India
Authors : M.Praveena & Dr.V.Jaiganesh
State : TamilNadu

  DOWNLOAD HERE 

Clustering is a technique of data mining. It aims at decision natural separation of data. Objects are grouped depending on the similar nature they share. Similarity is measured depending on different parameters like number of parameters which are in common or lowest allowed difference between any parameters of an object. Data mining techniques include classification, clustering, mining frequent pattern, and correlation. Out of all these, in few decades clustering has gain wide attention of researchers. Clustering involves grouping of data objects which are similar in nature. This helps in the abstraction process of huge amount of data. Once the abstraction process is complete group of data can be represented in more compact manner. This is nothing but data compression. To describe the objects more precisely it needs to be defined by all the possible and meaningful dimensions. As the number of attributes increases finding similarity between objects become difficult. A general boosting algorithm for clustering tasks is proposed, and solutions for directly optimizing two loss functions according to this frame- work are obtained. Experimental results show how the performance of relatively simple and computationally efficient base clustering algorithms could be boosted using the pro- posed algorithm.

Keywords -  Mining, Boosting, Computation, Cluster

PAPERS / ARTICLES  

Paper Type : Research Paper
Title : Authentication Handover and Privacy Protection in 5G HetNets using Software Defined Networking
Country : India
Authors : S.Queenkirubaaananthy & G.Menaka
State : TamilNadu

  DOWNLOAD HERE 

Recently, dandified small cell deployment with overlay coverage through coexisting heterogeneous networks has emerged as a viable solution for 5G mobile networks. However, this multi-tier architecture along with stringent latency requirements in 5G brings new challenges in security provisioning due to the potential frequent handovers and authentications in 5G small cells and Het Nets. In this article, we review related studies and introduce SDN into 5G as a platform to enable efficient authentication hand - over and privacy protection. Our objective is to simplify authentication handover by global management of 5G Het Nets through sharing of user dependent security context information among related access points. We demonstrate that SDN-enabled security solutions are highly efficient through its centralized control capability, which is essential for delay-constrained 5G communications. 

Keywords -  5G, SDN, Het Nets, Security 

PAPERS / ARTICLES  

Paper Type : Research Paper
Title : Survey of Data Mining Techniques used in Healthcare Domain and Diagnosis of Dengue Fever
Country : India
Authors : Pradeep Raj.D & R.Mythili 
State : TamilNadu

    DOWNLOAD HERE 

Healthcare organisations and industries produces huge amount of data everyday. These vast information can be extracted and analysed to obtain patterns which can be used to forcast or predict the future events. Many healthcare organizations have already started collecting healthcare records to systematically use those data to identify patterns and improve health management of a particular population thereby providing improved care and reduced manual work and cost. This paper focuses on the survey of different dengue fever classification and study of a particular population where people are mostly diagnosed with dengue infection. It also discusses critical issues and challenges associated with data mining and healthcare in general. The research found a growing number of data mining applications, including analysis of health care centres for better health policy-making, detection of disease outbreaks. We have collected data from government hospitals. We have applied these data in our fuzzy logic and generated decision tree and compared the performance of other techniques.

Keywords -  Fuzzy, Patterns, Anomalies and Detection

PAPERS / ARTICLES  

Paper Type : Research Paper
Title : Third Party Auditing for Cloud Data Security with AES Algorithm
Country : India
Authors : G.SivaBrindha & Dr.M.Gopi
State : TamilNadu

    DOWNLOAD HERE 

The purpose of this work is to develop an auditing scheme which is at ease, efficient to apply and own the skills which include privacy preserving, public auditing, keeping the statistics integrity alongside confidentiality. Thus the new auditing scheme has been developed consisting of three entities. Data proprietor, TPA and cloud server. The data proprietor performs diverse operations consisting of splitting the document to blocks, encrypting those using AES. It verifies the integrity of records on demand of the users in cloud. The cloud server is used handiest to save the encrypted blocks of facts. This proposed auditing scheme uses AES algorithm for encryption.

Keywords - Cloud Computing, TPA methods, AES Algorithm encryption and decryption.

PAPERS / ARTICLES  

Paper Type : Research Paper
Title : A Review Databases in Cloud Computing
Country : India
Authors : Dr.V.Chitra & R.Kalaivani
State : TamilNadu

    DOWNLOAD HERE 

Cloud databases are effectively used for information-escalated applications, such as storage and mining of huge amount of data or commercial data. These applications are changeable and multiple reason in nature. Databases with the help of these types of applications have to include four important merits: Atomicity, Consistency, Isolation, and Durability (ACID), although employing these databases is not simple for using in the cloud. The aim of this paper is to discover out the merits and demerits of databases widely employed in cloud systems and to review the challenges in developing cloud databases.

Keywords - Introduction, Cloud Computing, Cloud Databases, Challenges.