News Update:
Dr. Maria Celestin Vigila S
Dr. Maria Celestin Vigila S

Associate Professor

celesleon@yahoo.com

Education
  • Ph.D. - Computer Science and Engineering, Anna University, Chennai (2013)
  • M.E. - Computer Science and Engineering, Arulmigu Kalasalingam College of Engineering, Srivilliputhur (1999)
  • B.E. - Computer Science and Engineering, Noorul Islam College of Engineering, Kumaracoil (1996)

Experience
  • Associate Professor , Noorul Islam Centre for Higher Education, Kumaracoil. (2010-09-18 - Present)
  • Assistant Professor, Noorul Isalm College of Engineering, Kumaracoil (2004-04-01 - 2010-09-17)
  • Lecturer, Noorul Isalm College of Engineering, Kumaracoil (1999-01-04 - 2004-03-31)

Journal Publications
  • Hybrid Tasmanian Devil and Elephant Herding Model-Based Optimal Cluster Head Selection and Routing in MANET by Mitha Rachel Jose, S. Maria Celestin Vigila, IETE Journal of Research (2024)
  • A Novel Dual Strategy Based Cluster Head selection and Reliable Path Establishment using Modified Particle Swarm Optimization by Mitha Rachel Jose and S. Maria Celestin Vigila, VDI-Z Integrierte Produktion (2024)
  • Autoencoder and CNN for Content-based Retrieval of Multimodal Medical Images by Suresh Kumar J S, Maria Celestin Vigila S, International Journal of Advanced Computer Science and Applications (2024)
  • Decentralized Device Authentication for Cloud systems with Block chain using Skip Graph Algorithm by Sammy F, Maria Celestin Vigila S, Computer Assisted Methods in Engineering and Science (2023)
  • WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services by Edwin Singh C. and Maria Celestin Vigila, S, Intelligent Automation & Soft Computing (2023)
  • Fuzzy based intrusion detection system in MANET by Edwin Singh C. and Maria Celestin Vigila, S, Measurement: Sensors (2023)
  • Development of novel methodology for gene identification?based classification of leukaemia disorder by J. Briso Becky Bell, Ananth Rajkumar, S. Maria Celestin Vigila, M. Gerald Arul Selvan, J. S. Binoj, Research on Biomedical Engineering (2023)
  • An investigation of machine learning-based intrusion detection system in mobile ad hoc network by Edwin Singh C. and Maria Celestin Vigila, S., , International Journal of Intelligent Engineering Informatics (2023)
  • Anomaly Detection in Cloud Using Hexabullus Optimisation-Enabled Fuzzy Classifier with Smart Contract-Enabled Secure Communication by Sammy F. and Maria Celestin Vigila, S, Journal of Information & Knowledge Management (2023)
  • F-CAPSO: Fuzzy Chaos Adaptive Particle Swarm Optimization for Energy-Efficient and Secure Data Transmission in MANET by Mitha Rachel Jose, S. Maria Celestin Vigila, Expert Systems with Applications (2023)
  • A Trust Management Scheme for Intrusion Detection System in MANET using Weighted Naïve Bayes Classifier by Fouziah Hamza, Maria Celestin Vigila. S, International Journal of Engineering Trends and Technology (2022)
  • Taylor-feedback deer hunting optimisation algorithm for intrusion detection in cloud using deep maxout network by Sobin Soniya. S and Maria Celestin Vigila. S, International Journal of Intelligent Information and Database Systems (2022)
  • An Efficient Blockchain Based Data Access with Modified Hierarchical Attribute Access Structure with CP-ABE Using ECC Scheme for Patient Health Record by Sammy F and Maria Celestin Vigila, S, Security and Communication Networks (2022)
  • A network intrusion detection system in cloud computing environment using dragonfly improved invasive weed optimization integrated Shepard convolutional neural network by Sobin Soniya. S and Maria Celestin Vigila. S, International Journal of Adaptive Control and Signal Processing (2022)
  • Securing Utility Computing using Enhanced Elliptic Curve Cryptography and Attribute Based Access Control Policy by Saira Varghese and Maria Celestin Vigila S, International Journal of Grid and Utility Computing (2022)
  • Integrated Elephant Herd Optimization and Reputation Signaling Game for efficient Intrusion Detection in Mobile Ad hoc Networks by Fouziah Hamza, Maria Celestin Vigila S, Design Engineering (2021)
  • Feedback deer hunting optimization algorithm for intrusion detection in cloud based deep residual network by Sobin Soniya, S. and Maria Celestin Vigila, S., International Journal of Modeling, Simulation, and Scientific Computing (2021)
  • Protection of Encrypted Medical Image using Consent based Access Control by Mancy L and Maria Celestin Vigila S, International Journal of Medical Engineering and Informatics (2021)
  • Cluster Head Selection Algorithm for MANETs using Hybrid Particle Swarm Optimization-Genetic Algorithm by Fouziah Hamza and Maria Celestin Vigila, S, International Journal of Computer Networks and Applications (2021)
  • A Novel Method for Mapping Plaintext Characters to Elliptic Curve Affine points over Prime Field and Pseudorandom Number Generation by Saira Varghese and Maria Celestin Vigila, S., International Journal of Computer Information Systems and Industrial Management Applications (2020)
  • Data Integrity Method for Dynamic Auditing in Cloud Environment by Joneston Dhas J.L. and Maria Celestin Vigila, S, Indian Journal of Computer Science and Engineering (2020)
  • Protecting Big Data in Public Cloud by Enhanced RBAC by Joneston Dhas J.L. and Maria Celestin Vigila, S., Indian Journal of Computer Science and Engineering (2020)
  • Gene Expression Analysis to Mine Highly Relevant Gene Data in Chronic Diseases and Annotating its GO Terms by Briso Becky Bell J. and Maria Celestin Vigila, S., EAI Endorsed Transactions on Energy Web (2020)
  • A Review on Privacy Preserving Big Data Process by Joneston Dhas J.L., Maria Celestin Vigila, S. and Ezhil Star C., Journal of Advanced Research in Dynamical and Control Systems (2019)
  • Medical Image Protection using Diffusion, Substitution and Reversible Data Hiding based on Prediction by Mancy L and Maria Celestin Vigila S, International Journal of Security and Networks (2019)
  • Gene Selection Approaches for Classifying Disease Relevant Data Sample by Briso Becky Bell J. and Maria Celestin Vigila, S., International Journal of Engineering and Technology (2018)
  • A new diffusion and substitution based cryptosystem for securing medical image applications by Mancy L and Maria Celestin Vigila, S., International Journal of Electronic Security and Digital Forensics (2018)
  • Implementing Big Data Privacy with MapReduce for Multidimensional Sensitive Data by Vineetha Venugopal and Maria Celestin Vigila S., International Journal of Applied Engineering Research (2018)
  • A Framework on Security and Privacy-Preserving for Storage of Health Information Using Big Data by Joneston Dhas J.L., Maria Celestin Vigila, S. and Ezhil Star C., International Journal of Control Theory and Applications (2017)
  • Cytotoxicity, Genotoxicity and Cell Adhesion Study of Electrospun Silk/Surface Modified Nanosilica Composite for Bone Regeneration Applications by Princy Alexander, Praseetha P.K. and Maria Celestin Vigila S., International Journal of Pharma and Bio Sciences (2017)
  • A Survey on CIA Triad for Cloud Storage Services by Sammy F. and Maria Celestin Vigila, S., International Journal of Control Theory and Applications (2016)
  • Botnet Detection using Flow Clustering and Conversation by Arya Sreedhar and Maria Celestin Vigila, S., Journal of Emerging Technologies (2015)
  • Hiding of Confidential Data in Spatial Domain Images using Image Interpolation by Maria Celestin Vigila, S. and Muneeswaran, K. , International Journal of Network Security (2015)
  • Biometric Security System over finite field for Mobile Applications by Maria Celestin Vigila, S., Muneeswaran, K. and Berkin Albert Antony, W. , IET Information Security (2015)
  • Encryption and Watermarking Technique for Secure Transfer of Medical Images by Devika, M. and Maria Celestin Vigila, S. , International Journal of Applied Engineering Research (2014)
  • A New Elliptic Curve Cryptosystem for Securing Sensitive Data Applications by Maria Celestin Vigila, S. and Muneeswaran, K. , International Journal of Electronic Security and Digital Forensics (2013)
  • Nonce based Elliptic Curve Cryptosystem for Text and Image Applications by Maria Celestin Vigila, S. and Muneeswaran, K. , International Journal of Network Security (2012)
  • Key Generation based on Elliptic Curve over Finite Prime Field by Maria Celestin Vigila, S. and Muneeswaran, K. , International Journal of Electronic Security and Digital Forensics (2012)
  • Secure and Efficient Centralized Key Management for Wireless Broadcast Services by Jegana, R., Maria Celestin Vigila, S. and Muneeswaran, K. , International Journal of Image Processing and Network Techniques (2011)
  • ECC based Contributory Group Key Computation Scheme using One Time Pad by Maria Celestin Vigila, S. and Muneeswaran, K. , Journal of Computing (2011)
  • Authenticated Sequence of Systems for Reliable Broadcast using Key Transfer Protocol by Karthika, R.A. and Maria Celestin Vigila, S. , Universal Journal of Applied Computer Science and Technology (2011)
  • A Novel Position Dependent Data Encryption for Mobile Information Security by Maria Celestin Vigila, S. and Muneeswaran, K., Journal of Emerging Technology (2008)

Books Published
  • Lecture Notes in Networks and Systems, ISBN: Computing and Network Sustainability, Publisher: Springer
  • Soft Computing Systems , ISBN: Communications in Computer and Information Science Series, Publisher: Springer
  • Lecture Notes in Electrical Engineering, ISBN: Advances in Communication Systems and Networks, Publisher: Springer
  • Lecture Notes in Networks and Systems, ISBN: 978-981-16-0739-4, Publisher: Springer, Singapore
  • Soft Computing Systems, Genic Disorder Identification and Protein Analysis using Soft Computing Methods, ISBN: 978-981-13-1936-5 , Publisher: Springer, Singapore
  • Soft Computing Systems, Forecasting of Stock Market by Combining Machine Learning and Big Data Analytics, ISBN: 978-981-13-1936-5 , Publisher: Springer
  • Lecture Notes in Networks and Systems, Review of Machine Learning-Based Intrusion Detection Techniques for MANETs, ISBN: 978-981-13-7150-9, Publisher: Springer
  • Lecture Notes in Electrical Engineering, Advances in Communication Systems and Networks, An Efficient Multi-Authority Attribute Based Encryption Technique for Storing Personal Health Record by Compressing the Attributes, ISBN: 978-981-15-3991-6, Publisher: Springer
  • Lecture Notes in Networks and Systems, An Energy-Efficient Cluster Head Selection in MANETs Using Emperor Penguin Optimization Fuzzy Genetic Algorithm, ISBN: 978-981-19-8825-7, Publisher: Springer
  • Lecture Notes in Networks and Systems, An Energy-Efficient Cluster Head Selection in MANETs Using Emperor Penguin Optimization Fuzzy Genetic Algorithm, ISBN: 978-981-19-8825-7, Publisher: Springer
  • Computational Engineering and Machine Learning Algorithms, FDR-FLC Flow Direction Routing Based Fuzzy Logic Control for Cluster Head Selection and optimal Routing in MANET, ISBN: 978-0-7354-4694-6, Publisher: AIP Publishing
  • Lecture Notes in Networks and Systems, Analysis of Cloud-Based Intrusion Detection System, ISBN: 978-981-16-0739-4, Publisher: Springer

Patents
  • Fusion of DNA Sequence and Hyper Chaotic Technique for Securing Medical Image Applications, 201941025600, 2019, Indian Patent Office - Utility - Granted

Conferences
  • An Efficient Deep Learning Model for Content Based Medical Image Retrieval, Global Conference in Emerging Technology (May 9, 2025)
  • Securing IoT Data using Attribute Based Encryption , International Conference on Innovations in Engineering and Technology (April 2, 2025)
  • A Secure Biometric-Enhanced Cryptosystem for Cloud-Based Data Protection , International Conference on Innovations in Engineering and Technology (April 2, 2025)
  • Enhancing Post-Quantum Cryptographic Key Security: A Machine Learning-Based Entropy Validation Approach, International Conference on Innovations in Engineering and Technology (April 2, 2025)
  • A Detailed Review of Cryptographic and Biometric Security Mechanisms for Safeguarding Sensitive Healthcare Data in Cloud Computing Environments, International Conference on Communication and Computational Technologies (February 15, 2025)
  • A Survey on Enhancing Cloud Data Security Using Blockchain Technology, International Conference on Computational Intelligence and Communication Networks (December 23, 2024)
  • A Comprehensive Study on Cryptography to Secure IOMT Data, International Conference on Recent Advances in Cloud Computing and Communication Technology (September 6, 2024)
  • Securing IoMT using Quantum Cryptography and Post-Quantum Cryptography-A Review, International Conference on Networks, Image and Security (August 23, 2023)
  • Review on Polycystic Ovarian Disease detection using Artificial Intelligence Techniques, International Conference on Networks, Image and Security (August 23, 2023)
  • A Review on Content Based Image Retrieval Techniques, IEEE International Conference on Circuit Power and Computing Technologies (August 11, 2023)
  • FDR-FLC Flow Direction Routing Based Fuzzy Logic Control for Cluster Head Selection and optimal Routing in MANET, International conference on Material Science and Computational Engineering (November 18, 2022)
  • An Energy-Efficient Cluster Head Selection in MANETs using Emperor Penguin Optimization-Fuzzy Genetic Algorithm, International Conference on Recent Trends in Computing (June 3, 2022)
  • Revocable and Scalable Access to Personal Health Records in a Cloud Computing Environment, IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (March 10, 2022)
  • Random Optimal Search Based Significant Gene Identification and Classification of Disease Samples, IEEE International Conference on Innovations in Power and Advanced Computing Technologies (November 27, 2021)
  • Analysis of Cloud-Based Intrusion Detection System, International Conference on Information and Communication Technology for Competitive Strategies (December 11, 2020)
  • An Efficient Multi-Authority Attribute Based Encryption Technique for Storing Personal Health Record by Compressing the Attributes, International Conference on Communication Systems and Networks (December 12, 2019)
  • Consent based Access Control Mechanism for Encrypted Medical Image, IEEE International Conference on Intelligent Computing, Instrumentation and Control Technologies (July 5, 2019)
  • Protecting Big Data in Public Cloud by Merging Attribute Based Encryption and Role Based Access Control, International Conference on Networks Image and Security (April 11, 2019)
  • Cryptographically Secure Data using Secure Multi Party Computation, International Conference on Networks Image and Security (April 10, 2019)
  • Review of Machine Learning-Based Intrusion Detection Techniques for MANETs, International Conference on ICT for Sustainable Development (August 30, 2018)
  • Genic Disorder Identification and Protein Analysis using Soft Computing Methods, International Conference on Soft Computing Systems (April 20, 2018)
  • Forecasting of Stock Market by Combining Machine Learning and Big Data Analytics, International Conference on Soft Computing Systems (April 19, 2018)
  • A Review on Reversible Data Hiding Techniques in Encrypted Medical Image, IEEE International Conference on Intelligent, Computing Instrumentation and Control Technologies (July 7, 2017)
  • A Varied Approach to Attribute Based Access Model for Secure Storage in Cloud, IEEE International Conference on Innovations in information Embedded and Communication Systems (March 18, 2017)
  • Continuous Feature Selection Approaches for Identifying Highly Expressed Genes, International Conference on Computing Technologies (March 17, 2017)
  • Machine Learning based Classifiers for Detecting Intrusion, International Conference on Computing Technologies (March 17, 2017)
  • Survey on CIA Triad for Cloud Storage Services, International Conference on Power, Circuit and Information Technologies (May 19, 2016)
  • Intrusion Detection System: Classification and Techniques, IEEE International Conference on Circuit, Power and Computing Technologies (March 18, 2016)
  • A Survey on Protection of Medical Images, IEEE International Conference on Control, Instrumentation, Communication and Computational Technologies (December 18, 2015)
  • A Comparative Analysis on Cloud Data Security, IEEE Global Conference on Communication Technologies (April 23, 2015)
  • Encryption and Watermarking Technique for Secure Transfer of Medical Images, International Conference on Modeling, Optimization and Computing (April 10, 2014)
  • Biometric Encryption System Based on Delaunay Indexing, IEEE International Conference on Circuit, Power and Computing Technologies (March 20, 2013)
  • Elliptic Curve based Key Generation for Symmetric Encryption, IEEE International Conference on Signal Processing, Communication, Computing and Networking Technologies (July 21, 2011)
  • Implementation of Text based Cryptosystem using Elliptic Curve Cryptography, IEEE International Conference on Advanced Computing (December 15, 2009)
  • Implementation and Analysis of Text based Elliptic Curve Cryptosystem, International Conference on Computing Technologies (December 9, 2009)
  • Performance Analysis of Elliptic Curve Cryptography in Wireless Security, International conference on Emerging Adaptive Systems and Technologies (October 25, 2007)

Projects
  • Maria Celestin Vigila.S - Genic Disorder Identification and Protein Analysis using Soft Computing Approach
  • Maria Celestin Vigila.S - Gene Expression Analysis for Internal Disease Identification

Faculty Development Programs (FDP)
  • Traditional Knowledge Systems in Health Care - Faculty Development Program (May 26, 2025 to May 31, 2025)
  • Mastering the Technologies Shaping Education and Industry - Faculty Development Program (May 19, 2025 to May 23, 2025)
  • TensorFlow for Machine Learning - Faculty Development Program (August 27, 2024 to August 31, 2024)
  • Google Cloud Computing Foundations - Faculty Development Program (August 19, 2024 to October 11, 2024)
  • Intellectual Property Rights and Patents - Faculty Development Program (May 20, 2024 to May 24, 2024)
  • Palo Alto Cloud Security Fundamentals - Faculty Development Program (May 13, 2024 to May 17, 2024)
  • Cloud Practitioner (AWS) - Faculty Development Program (March 27, 2023 to March 31, 2023)
  • Machine Learning & Deep learning using Python - Faculty Development Program (January 4, 2022 to January 8, 2022)
  • Blockchain Technologies and its Applications - Faculty Development Program (December 6, 2021 to December 10, 2021)
  • Artificial Intelligence - Faculty Development Program (September 20, 2021 to September 24, 2021)
  • Software Automation through Selenium and Machine Learning using Python - Faculty Development Workshop (June 21, 2021 to June 25, 2021)
  • Emerging Technologies in IT Industry 2020 - Faculty Development Program (July 6, 2020 to July 10, 2020)
  • Cyber Security Essentials - Faculty Development Program (June 18, 2020 to June 24, 2020)
  • Modern IOT technology Tools and Design for Real Time Applications - Faculty Development Program (June 3, 2020 to June 9, 2020)
  • Data Science - Faculty Development Program (May 4, 2020 to May 8, 2020)
  • Mobile App Development - Faculty Development Program (February 24, 2020 to February 28, 2020)
  • Programming in C++ - NPTEL – AICTE Faculty Development Program (July 29, 2019 to September 29, 2019)
  • Introduction to Internet of Things - NPTEL – AICTE Faculty Development Program (July 18, 2019 to October 18, 2019)
  • Cryptography and Network Security - NPTEL – AICTE Faculty Development Program (January 28, 2019 to April 19, 2019)
  • Certificate in .NET Programming - Certificate in .NET Programming (May 29, 2010 to June 5, 2010)

Online Courses
  • Google Cloud Computing Foundations - NPTEL (August 19, 2024 to October 11, 2024)
  • Programming in C++ - NPTEL (July 29, 2019 to September 29, 2019)
  • Introduction to Internet of Things - NPTEL (July 18, 2019 to October 18, 2019)
  • Cryptography and Network Security - NPTEL (January 28, 2019 to April 19, 2019)

Events Organized
  • Dr.Maria Celestin Vigila.S - International Conference on Networks Image and Security
  • Dr. Maria Celestin Vigila S - Workshop on Machine Learning using Python
  • Dr. Maria Celestin Vigila S - International Conference on Networks, Image and Security
  • Dr. Maria Celestin Vigila S - Professional Development Programme on Application of Artificial Intelligence and Operations Research in Industry
  • Dr. Maria Celestin Vigila S - Seminar on Internet of Things
  • Dr. Maria Celestin Vigila S - Seminar on AGI: The Next Frontier in Human-AI Collaboration
  • Dr. Maria Celestin Vigila S - Professional Development Programme on Transformers in AI: From Data to Dialogue and Personalization
  • Dr. Maria Celestin Vigila S - Workshop on Cyber Security
  • Dr.Maria Celestin Vigila.S - Software Testing and Quality Assurance Workshop

Awards
  • Dr. Maria Celestin Vigila S - Certificate of Appreciation
  • Maria Celestin Vigila.S - Received “Women Engineer Award” by The Institution of Engineering and Technology (IET) in the year 2011 - 2012.
  • Maria Celestin Vigila.S - Received Certificate of Appreciation for publishing research paper which has been listed in SCOPUS Database by Noorul Islam Centre for Higher Education, Kumaracoil.
  • Maria Celestin Vigila.S - Received “Elite with Silver and Topper Certificate” in Cryptography and Network Security by NPTEL in the year 2018-2019.
  • Maria Celestin Vigila.S - Received “Elite with Silver and Topper Certificate” in Introduction to Internet of Things and “Elite Certificate” in Programming in C++ by NPTEL in the year 2019-2020.
  • Maria Celestin Vigila.S - Received “Staff Achiever Award” by Noorul Islam Centre for Higher Education, Kumaracoil in the year 2019-2020.

Guest Activities
  • No guest activities available.

Additional Contributions
  • Workshop - Cyber Security (March 14, 2025)
  • Training Program - Industry 4.0 and Digital Twin (March 7, 2025)
  • Training Program - Role of AI in Transforming Innovation and IP Management (December 17, 2024)
  • Training Program - Transformers in AI: From Data to Dialogue and Personalization (November 28, 2024)
  • Workshop - An Insight into Deep Learning (September 25, 2024)
  • Training Program - Application of Artificial Intelligence and Operations Research in Industry (May 28, 2024)
  • Training Program - Innovating Education: The Rise of AI in Schools and Universities (May 22, 2024)
  • Training Program - The Transformative Role of AI in Education (May 11, 2024)
  • Training Program - Automation using PLC (May 3, 2024)
  • Workshop - Designing for Digital Learning: e-Content Development and Delivery (April 30, 2024)
  • Workshop - Strategies for Elevating University Impact through Research, Innovation and Extension (April 29, 2024)
  • Workshop - Digital Defenders – Strengthening Security Awareness (March 22, 2024)
  • Workshop - Agile Technology and Web Application Development (February 24, 2023)
  • Training Program - Microsoft Azure Fundamentals (December 17, 2022)
  • Workshop - The power of Open Source Technologies (October 19, 2022)
  • Workshop - Machine Learning using Python (November 23, 2021)
Back