1 |
Ajit Danti |
Transfer Learning-Based Osteoporosis Classification Using Simple Radiographs |
International Journal of Online and Biomedical Engineering (iJOE). / 19 / 8 / 66 - 87 |
2626-8493 |
|
2023 |
2 |
Aruna S K |
An Advanced and Ideal Method
for Tumor Detection and Classification
from MRI Image Using Gamma
Distribution and Support Vector Machine |
Smart Innovation, Systems and Technologies / / / 439 - 447 |
2190-3026 |
|
2023 |
3 |
Boppuru Rudra Prathap |
Machine Learning and Artificial Intelligence Techniques for Detecting Driver Drowsiness |
Journal of Automation, Mobile Robotics and Intelligent Systems / 6 / 2 / 64 - 73 |
1897-8649 |
|
2023 |
4 |
Boppuru Rudra Prathap |
Human behavior analysis on political retweets using machine learning algorithms |
Measurement: Sensors / 27 / / 1 - 5 |
2665-9174 |
|
2023 |
5 |
Boppuru Rudra Prathap |
Spatio-temporal Crime Analysis and Forecasting on Twitter Data Using Machine Learning Algorithms |
SN Computer Science / 4 / / 1 - 22 |
2662-995X |
|
2023 |
6 |
Boppuru Rudra Prathap |
Comprehensive study of the relationship between multiverse and big data |
Measurement: Sensors / 27 / / 1 - 5 |
2665-9174 |
|
2023 |
7 |
Cherukuri Ravindranath Chowdary |
Machine Learning and Artificial Intelligence Techniques for Detecting Driver Drowsiness |
Journal of Automation, Mobile Robotics and Intelligent Systems / 6 / 2 / 64 - 73 |
1897-8649 |
|
2023 |
8 |
Cherukuri Ravindranath Chowdary |
Realization of Humanoid Doctor and Real-Time Diagnostics of Disease Using Internet of Things, Edge Impulse Platform, and ChatGPT |
Annals of Biomedical Engineering / 51 / 8 / 1 - 3 |
1573-9686, 0090-6964 |
|
2023 |
9 |
Divya Vetriveeran |
An Advanced and Ideal Method
for Tumor Detection and Classification
from MRI Image Using Gamma
Distribution and Support Vector Machine |
Smart Innovation, Systems and Technologies / / / 439 - 447 |
2190-3026 |
|
2023 |
10 |
Jayapandian N |
Visiting Indian Hospitals Before, During and After COVID |
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems / 30 / 1 / 111 - 123 |
0218-4885 |
|
2023 |
11 |
Jenefa J |
Secure IBS Scheme for Vehicular Ad Hoc Networks |
Smart Innovation, Systems and Technologies / 313 / / - |
2190-3018 |
|
2023 |
12 |
Jenefa J |
A Hybrid Approach Against Black Hole Attackers Using Dynamic Threshold Value and Node Credibility |
IEEE Access / 11 / / 91595 - 91603 |
2169-3536 |
|
2023 |
13 |
Jyothi Thomas |
A Review of Deep Learning Methods in Automatic Facial Micro-expression Recognition |
Lecture Notes on Data Engineering and Communications Technologies / 163 / / 1 - 16 |
2367-4512 |
|
2023 |
14 |
Jyothi Thomas |
An Efficient Deep Learning Framework FPR Detecting and Classifying Depression Using Electroencephalogram Signals |
Lecture Notes in Networks and Systems / 647 / / 1179 - 1188 |
2367-3389 |
|
2023 |
15 |
Kukatlapalli Pradeep Kumar |
Machine Learning and Artificial Intelligence Techniques for Detecting Driver Drowsiness |
Journal of Automation, Mobile Robotics and Intelligent Systems / 6 / 2 / 64 - 73 |
1897-8649 |
|
2023 |
16 |
Kukatlapalli Pradeep Kumar |
Human behavior analysis on political retweets using machine learning algorithms |
Measurement: Sensors / 27 / / 1 - 5 |
2665-9174 |
|
2023 |
17 |
Kukatlapalli Pradeep Kumar |
Structural health monitoring using AI and ML based multimodal sensors data |
Measurement: Sensors / / / - |
2665-9174 |
|
2023 |
18 |
Kukatlapalli Pradeep Kumar |
Comprehensive study of the relationship between multiverse and big data |
Measurement: Sensors / 27 / / 1 - 5 |
2665-9174 |
|
2023 |
19 |
Manohar M |
Sensitive crop leaf disease prediction based on computer vision
techniques with handcrafted features |
International Journal of Systems Assurance Engineering and Management / 14 / / 1 - 32 |
0975-6809 |
|
2023 |
20 |
Mary Anita E A |
A comprehensive review of AI based intrusion detection system |
Measurement:Sensors / / / - |
2665-9174 |
|
2023 |
21 |
Mary Anita E A |
Artificial Neural Network with Firefly Algorithm-Based Collaborative Spectrum Sensing in Cognitive Radio Networks |
KSII Transactions on Internet and Information Systemsthis link is disabled, 2023, 17(7), pp. / 17 / 7 / 1951 - 1975 |
1976-7277 |
|
2023 |
22 |
Mary Anita E A |
Secure IBS Scheme for Vehicular Ad Hoc Networks |
Smart Innovation, Systems and Technologies / 313 / / - |
2190-3018 |
|
2023 |
23 |
Mary Anita E A |
Integrity assured multi-functional multi-application secure data aggregation in
wireless sensor networks (IAMFMA-SDA) |
Journal of Intelligent and Fuzzy Systems / 45 / / 1453 - 1472 |
1064-1246 |
|
2023 |
24 |
Mary Anita E A |
A Hybrid Approach Against Black Hole Attackers Using Dynamic Threshold Value and Node Credibility |
IEEE Access / 11 / / 91595 - 91603 |
2169-3536 |
|
2023 |
25 |
Raghavendra S |
Operational pattern forecast improvement with outlier detection in metro rail transport system |
Springer Nature / / / - |
1380-7501 |
|
2023 |
26 |
Raghavendra S |
Analysis and prediction of seed quality using machine learning |
International Journal of Electrical and Computer Engineering / 13 / 5 / 5770 - 5781 |
2088-8708 |
|
2023 |
27 |
Rakoth Kandan Sambandam |
Applications of Classification and Recommendation Techniques to Analyze Soil Data and Water Using IOT |
Smart Innovation, Systems and Technologies / / / 215 - 223 |
2190-3026 |
|
2023 |
28 |
Rakoth Kandan Sambandam |
An Advanced and Ideal Method
for Tumor Detection and Classification
from MRI Image Using Gamma
Distribution and Support Vector Machine |
Smart Innovation, Systems and Technologies / / / 439 - 447 |
2190-3026 |
|
2023 |
29 |
Sandeep Kumar |
Heart Disease Prediction?A Computational Machine Learning Model Perspective |
Smart Innovation, Systems and Technologies / 351 / 1 / 281 - 293 |
2190-3018 |
|
2023 |
30 |
Shamanth N |
Energy-Efficient Long-Range Sectored Antenna for Directional Sensor Network Applications |
IETE Journal of Research / / / 1 - 11 |
0377-2063 |
|
2023 |
31 |
Sujatha A K |
Heart Disease Prediction?A Computational Machine Learning Model Perspective |
Smart Innovation, Systems and Technologies / 351 / 1 / 281 - 293 |
2190-3018 |
|
2023 |
32 |
Sujatha A K |
Drought Prediction-A Comparative Analysis of Supervised Machine Learning Techniques |
Smart Innovation, Systems and Technologies / 351 / 1 / 295 - 307 |
2190-3018 |
|
2023 |
33 |
Vinodha D |
Integrity assured multi-functional multi-application secure data aggregation in
wireless sensor networks (IAMFMA-SDA) |
Journal of Intelligent and Fuzzy Systems / 45 / / 1453 - 1472 |
1064-1246 |
|
2023 |
34 |
Addapalli V N Krishna |
Impulse noise recuperation from grayscale and medical images using supervised curve fitting linear regression
and mean filter? |
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) / 28 / 2 / 777 - 786 |
2502-4752 |
|
2022 |
35 |
Addapalli V N Krishna |
Securing Grayscale Image Using Improved Arnold Transform and ElGamal Encryption |
Journal of Electronic Imaging / 31 / 6 / 063012-1 - 063012-14 |
1017-9909 |
|
2022 |
36 |
Ajit Danti |
Multi-layer Stacking-based Emotion Recognition using Data Fusion Strategy |
International Journal of Advanced Computer Science and Applications(IJACSA) / 13 / 6 / 433 - 442 |
2156-5570 |
|
2022 |
37 |
Ajit Danti |
Relevance of Psychophysiological and Emotional Features for the Analysis of Human Behavior ? A Survey |
ECS Transactions / 107 / 1 / 607 - 626 |
1938-5862 |
|
2022 |
38 |
Ajit Danti |
Classification of Psychological Disorders by Feature Ranking and Fusion using Gradient Boosting Classification of Psychological Disorders |
) International Journal of Advanced Computer Science and Applications / 14 / 2 / 287 - 294 |
2156-5570, 2158-107X |
|
2022 |
39 |
Alok Kumar Pani |
Gaussian Mutation-Spider Monkey Optimization (GM-SMO) Model for Remote Sensing Scene Classification |
Remote Sensing / 14 / 24 / 1 - 20 |
2072-4292 |
|
2022 |
40 |
Alok Kumar Pani |
Normalized Attention Neural Network with Adaptive Feature Recalibration for Detecting the Unusual Activities Using Video Surveillance Camera |
International Journal of Safety and Security Engineering / 13 / 1 / 51 - 58 |
2041-904X |
|
2022 |
41 |
Aruna S K |
Machine Learning Based Time Series Analysis for COVID-19 Cases in India |
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) / 2022 / / 1932 - 1937 |
2575-7288 |
|
2022 |
42 |
Aruna S K |
Improved Henon Chaotic Map-based Progressive Block-based visual cryptography strategy for securing sensitive data in a cloud EHR system |
International Journal of Intelligent Networks / 3 / / 109 - 112 |
2666-6030 |
|
2022 |
43 |
Aruna S K |
Identification of Dry Bean Varieties Based on Multiple Attributes Using CatBoost Machine Learning Algorithm |
Scientific Programming / 2023 / / 1 - 21 |
1058-9244 |
|
2022 |
44 |
Aruna S K |
Security Issues in Intrusion Detection - Review |
Mathematical Statistician and Engineering Applications / 71 / 3s2 / 47 - 58 |
2094-0343 |
|
2022 |
45 |
Balachandran K |
EPCA Enhanced Principal Component Analysis for Medical Data Dimensionality Reduction |
SN Computer Science / 4 / 3 / 1 - 14 |
2661-8907 |
|
2022 |
46 |
Balachandran K |
Optimal Shortest Path Routing over Wireless Sensor Networks Using Constrained Genetic Firefly Optimization Algorithm |
Lecture Notes in Networks and Systems / 608 / 1 / 643 - 654 |
2367-3370 |
|
2022 |
47 |
Balamurugan M |
A multi-preference integrated algorithm for deep learning based recommender framework |
Concurrency and Computation Practice & Experience / / / - |
1532-0634 |
|
2022 |
48 |
Balamurugan M |
Enhanced Security for Large-Scale 6G Cloud Computing: A Novel Approach to Identity based Encryption Key Generation |
Journal of Machine and Computing / 3 / 2 / 080 - 091 |
2789-1801 |
|
2022 |
49 |
Balamurugan M |
Analysis of Nifty 50 index stock market trends using hybrid machine learning model in quantum finance
|
International Journal of Electrical and Computer Engineering / 13 / 3 / 3549 - 3560 |
2088-8708 |
|
2022 |
50 |
Bejoy B J |
Network Based Detection of IoT Attack Using AIS-IDS Model |
Wireless Personal Communications / / / - |
0929-6212 |
|
2022 |
51 |
Bejoy B J |
A generic cyber immune framework for anomaly detection using artificial immune systems |
Applied Soft Computing / 130 / 2022,109680 / - |
1568-4946 |
|
2022 |
52 |
Bejoy B J |
IEEHR: Improved Energy Efficient Honeycomb Based Routing in MANET for Improving Network Performance and Longevity |
Wireless Personal Communications / / / - |
0929-6212 |
|
2022 |
53 |
Boppuru Rudra Prathap |
An Improved and Efficient YOLOv4 Method for Object Detection in Video Streaming |
Lecture Notes in Networks and Systems / 462 / / 305 - 316 |
2367-3389, 2367-3389 |
|
2022 |
54 |
Boppuru Rudra Prathap |
A Statistical Analysis and Comparison of the spread of Swine Flu and COVID-19 in India |
Malaysian Journal of Medicine and Health Sciences / 18 / 6 / 92 - 99 |
2636-9346 |
|
2022 |
55 |
Boppuru Rudra Prathap |
Geo-spatial crime density attribution using optimized machine learning algorithms |
International Journal of Information Technology (Singapore) / / / - |
2511-2104 |
|
2022 |
56 |
Chinthakunta Manjunath |
Analysis of Nifty 50 index stock market trends using hybrid machine learning model in quantum finance
|
International Journal of Electrical and Computer Engineering / 13 / 3 / 3549 - 3560 |
2088-8708 |
|
2022 |
57 |
Chinthakunta Manjunath |
Twitter sentiment analysis on online food services based on elephant
herd optimization with hybrid deep learning techniqueTwitter sentiment analysis on online food services based on elephant
herd optimization with hybrid deep learning technique |
Cluster Computing / / / - |
1386-7857 |
|
2022 |
58 |
Chinthakunta Manjunath |
Twitter sentiment analysis on online food services based on elephant
herd optimization with hybrid deep learning technique |
Cluster Computing / / / - |
1386-7857 |
|
2022 |
59 |
Chinthakunta Manjunath |
Normalized Attention Neural Network with Adaptive Feature Recalibration for Detecting the Unusual Activities Using Video Surveillance Camera |
International Journal of Safety and Security Engineering / 13 / 1 / 51 - 58 |
2041-904X |
|
2022 |
60 |
Debarka Mukhopadhyay |
Smart Mobile Device to Trace Moving Rogue Objects in Smart City Utilizing Dynamic Source Dynamic Destination Tracking Algorithm |
IETE Journal of Research / / / 1 - 8 |
0377-2063 |
|
2022 |
61 |
Diana Jeba Jingle I |
A Privatized Approach in Enhanced Spam Filtering Techniques using TSAS over Cloud Networks |
International Journal of Intelligent Enterprise / 9 / 3 / 332 - 343 |
1745-3232 |
|
2022 |
62 |
Diana Jeba Jingle I |
Design of Grover's Algorithm over 2, 3 and 4-Qubit Systems in Quantum Programming Studio |
International Journal of Electronics and Telecommunications / 68 / 1 / 77 - 82 |
2300-1933, 2081-8491 |
|
2022 |
63 |
Diana Jeba Jingle I |
IoT enabled lung cancer detection and routing algorithm using CBSOA-based ShCNN |
International Journal of Adaptive Control and Signal Processing / 37 / 1 / 224 - 243 |
0890-6327 |
|
2022 |
64 |
Diana Jeba Jingle I |
FACVO-DNFN: Deep learning-based feature fusion and Distributed Denial of Service attack detection in cloud computing |
Knowledge-Based Systems / 261 / / 110 - 132 |
0950-7051 |
|
2022 |
65 |
Diana Jeba Jingle I |
Design of Low power 4-bit Flash ADC Using Multiplexer Based Encoder in 90nm CMOS Process |
International Journal Of Electronics And Telecommunications / 68 / 3 / 565 - 570 |
2081-8491 |
|
2022 |
66 |
Divya Vetriveeran |
Smart Precision Irrigation Techniques Using
Wireless Underground Sensors in Wireless
Sensors |
IEEE Xplore / / / 2072 - 2077 |
2575-7288 |
|
2022 |
67 |
Divya Vetriveeran |
3D CNN-Based Classification of Severity in COVID-19 Using CT Images |
Lecture Notes in Networks and Systems / / / 301 - 312 |
2367-3389 |
|
2022 |
68 |
Ganesh Kumar R |
Certain Investigation of Medical Image analysis using Object Recognition and Semantic Segmentation |
Journal of Pharmaceutical Negative Results / 13 / 9 / 4484 - 4492 |
2229-7723 |
|
2022 |
69 |
Ganesh Kumar R |
Adaptive hybrid bird swarm optimization based efficient transmission in WSN |
Journal of Pharmaceutical Negative Results / 14 / 2 / 480 - 484 |
2229-7723 |
|
2022 |
70 |
Ganesh Kumar R |
Banking Cloud with Blockchain Security and Error Recovery Process |
NeuroQuantology / 20` / 10 / 11355 - 11364 |
1303-5150 |
|
2022 |
71 |
Ganesh Kumar R |
IOT-BASED cyber security identification model through machine learning technique |
Measurement: Sensors / 27 / / 1 - 8 |
2665-9174 |
|
2022 |
72 |
Ganesh Kumar R |
Performance Analysis of User Behavior Pattern Mining Using Web Log Database for User Identification |
Soft Computing: Theories and Applications / 627 / / 347 - 356 |
2367-3370 |
|
2022 |
73 |
Gokulapriya R |
Performance Analysis of User Behavior Pattern Mining Using Web Log Database for User Identification |
Soft Computing: Theories and Applications / 627 / / 347 - 356 |
2367-3370 |
|
2022 |
74 |
Jayapandian N |
An Intelligent Web Caching System for Improving the Performance of a Web-Based Information Retrieval System |
International Journal on Semantic Web and Information Systems / 16 / 4 / 26 - 45 |
1552-6283 |
|
2022 |
75 |
Jayapandian N |
Improving Routing Data Security in Wireless Sensor Network Using Clustering Range Indicators Essentials in SMDSRNGs Method |
Wireless Personal Communications / 125 / 3 / 1 - 12 |
1572-834X |
|
2022 |
76 |
Jayapandian N |
Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm |
Wireless Personal Communications / 120 / 1 / 2428 - 2447 |
1572-834X |
|
2022 |
77 |
Jayapandian N |
The Future Warfare with Multidomain Applications of Artificial Intelligence: Research Perspective |
Networks and Systems / 351 / / 329 - 341 |
2367-3370 |
|
2022 |
78 |
Jayapandian N |
Energy-Efficient Cluster in Wireless Sensor Network Using Life Time Delay Clustering Algorithms |
Computer Systems Science and Engineering / 43 / 1 / 77 - 86 |
0267-6192 |
|
2022 |
79 |
Jayapandian N |
Artificial Intelligence Technological Revolution in Education and Space for Next Generation |
Lecture Notes in Networks and Systems / 461 / 1 / 371 - 382 |
2367-3370 |
|
2022 |
80 |
Jayapandian N |
COVID-19 Pandemic: Review on Emerging Technology Involvement with Cloud Computing |
Lecture Notes in Networks and Systems / 461 / 1 / 223 - 233 |
2367-3370 |
|
2022 |
81 |
Jeno Lovesum S P |
A Study on Experimental Analysis of Best Fit Machine Learning Approach for Smart Agriculture |
SN Computer science / / / - |
2661-8907 |
|
2022 |
82 |
Jeno Lovesum S P |
Smart Steering Wheel for Improving Driver?s Safety Using Internet of Things |
SN Computer science / / / - |
2661-8907 |
|
2022 |
83 |
Julian Benadit P |
A Crowdsourcing Approach to Develop Machine Learning Models to Quantify
Radiographic Joint Damage in Rheumatoid Arthritis |
JAMA Network Open / 5 / 8 / 1 - 13 |
2574-3805 |
|
2022 |
84 |
Julian Benadit P |
Multi-atlas Graph Convolutional Networks and Convolutional Recurrent Neural Networks-Based Ensemble Learning for Classification of Autism Spectrum Disorders |
SN Computer Science volume / 4 / 213 / 1 - 9 |
2661-8907 |
|
2022 |
85 |
Julian Benadit P |
Phishing attack detection using Machine Learning |
Measurement: Sensors / 24 / / - |
2665-9174 |
|
2022 |
86 |
Jyothi Mandala |
Ar-HGSO: Autoregressive-Henry Gas Sailfish Optimization enabled deep learning model for diabetic retinopathy detection and severity level classification |
Biomedical Signal Processing and Control / 77 / / - |
1746-8094 |
|
2022 |
87 |
Jyothi Mandala |
BSLnO: Multi-agent based distributed intrusion detection system using Bat Sea Lion Optimization-based hybrid deep learning approach |
International Journal of Adaptive Control and Signal Processing / 36 / 8 / 1909 - 1930 |
0890-6327 |
|
2022 |
88 |
Jyothi Thomas |
Non-destructive silkworm pupa gender classification with X-ray images using ensemble learning |
Artificial Intelligence in Agriculture / 6 / / 100 - 110 |
2589-7217 |
|
2022 |
89 |
Jyothi Thomas |
A Machine Learning Model to Predict Suicidal Tendencies in Students |
Asian Journal of Psychiatry / 79 / 103363 / - |
1876-2018 |
|
2022 |
90 |
Jyothi Thomas |
Gender Identification of Silkworm Pupa and Automated Cocoon Cutting Machine for Benefiting the Sericulture Grainages in Karnataka |
Lecture Notes in Networks and Systems / / / 372 - 381 |
2367-3370 |
|
2022 |
91 |
Jyothi Thomas |
A Review of Deep Learning Methods in Cervical Cancer Detection |
Lecture Notes in Networks and Systems / / / 624 - 633 |
2367-3370 |
|
2022 |
92 |
Kanmani P |
An Intelligent Web Caching System for Improving the Performance of a Web-Based Information Retrieval System |
International Journal on Semantic Web and Information Systems / 16 / 4 / 26 - 45 |
1552-6283 |
|
2022 |
93 |
Karthikeyan H |
A Malicious Botnet Traffic Detection Using Machine
Learning |
Journal Of Pharmaceutical Negative Results / 13 / 4 / 968 - 977 |
2229-7723 |
|
2022 |
94 |
Kukatlapalli Pradeep Kumar |
Secure Authenticated Communication Via Digital Signature And Clear List In VANETs |
ECS Transactions / 107 / 1 / 20065 - 20071 |
1938-5862 |
|
2022 |
95 |
Kukatlapalli Pradeep Kumar |
A Statistical Analysis and Comparison of the spread of Swine Flu and COVID-19 in India |
Malaysian Journal of Medicine and Health Sciences / 18 / 6 / 92 - 99 |
2636-9346 |
|
2022 |
96 |
Manohar M |
Enhanced radial basis function neural network for tomato plant disease leaf image segmentation |
Ecological Informatics (ScienceDirect Q1 Journal) / 70 / / 1 - 19 |
1574-9541 |
|
2022 |
97 |
Manohar M |
Dirichlet Feature Embedding with Adaptive Long
Short-Term Memory Model for Intrusion Detection
System |
Journal of System and Management Sciences / 12 / 4 / 398 - 412 |
1816-6075 |
|
2022 |
98 |
Manohar M |
Balancing module in evolutionary optimization and Deep Reinforcement Learning for multi-path selection in Software Defined
Networks |
Physical Communication / 56 / / 1 - 10 |
1874-4907 |
|
2022 |
99 |
Manohar M |
Twitter sentiment analysis on online food services based on elephant
herd optimization with hybrid deep learning technique |
Cluster Computing / / / - |
1386-7857 |
|
2022 |
100 |
Manohar M |
Classification of a New-Born Infant?s Jaundice Symptoms Using a Binary Spring Search
Algorithm with Machine Learning |
Revue d'Intelligence Artificielle / 37 / 2 / 257 - 265 |
0992-499X |
|
2022 |
101 |
Manohar M |
Twitter sentiment analysis on online food services based on elephant
herd optimization with hybrid deep learning techniqueTwitter sentiment analysis on online food services based on elephant
herd optimization with hybrid deep learning technique |
Cluster Computing / / / - |
1386-7857 |
|
2022 |
102 |
Manu Elappila |
Dynamic Channel Allocation in Wireless Personal Area Networks for Industrial IoT Applications |
Advances in Cognitive Science and Communications / / / - |
2195-3996 |
|
2022 |
103 |
Mary Anita E A |
A Neuro Fuzzy with Improved GA for Collaborative Spectrum Sensing in CRN |
Intelligent Automation and Soft Computing / 34 / 2 / 1093 - 1108 |
1079-8587, 2326-005X |
|
2022 |
104 |
Mary Anita E A |
IM-EDRD from Retinal Fundus Images Using Multi-Level Classification Techniques |
Intelligent Automation and Soft Computing / 35 / 1 / 567 - 580 |
1079-8587, 2326-005X |
|
2022 |
105 |
Mary Anita E A |
Energy Efficient Evolutionary Algorithm based
Clustering with Route Selection Protocol for IoT Assisted Wireless Sensor Networks |
International Journal of Computer Networks and Applications (IJCNA) / 9 / 3 / 328 - 339 |
2395-0455 |
|
2022 |
106 |
Mary Anita E A |
Improved Security of the Data Communication in VANET Environment Using ASCII-ECC Algorithm |
Wireless Personal Communication / 128 / 2 / 759 - 776 |
0929-6212 |
|
2022 |
107 |
Mausumi Goswami |
Intelligent approach to automate a system for simulation of nanomaterials |
AIP Conference Proceedings / 2690 / 1 / 1 - 020035 |
0094-243X, 1551-7616 |
|
2022 |
108 |
Mithun B N |
Applying Encryption and Decryption Algorithm for Data Security in Cloud |
International Journal of Engineering and Modern Technology / 8 / 2 / 16 - 23 |
2504-8848, 2695-2149 |
|
2022 |
109 |
Natarajan K |
Flexible and cost-effective cryptographic
encryption algorithm for securing unencrypted
database files at rest and in transit |
MethodsX / / / - |
2215-0161 |
|
2022 |
110 |
Natarajan K |
Assimilating sense into disaster recovery databases and judgement framing proceedings for the fastest recovery |
International Journal of Electrical and Computer Engineering / 13 / 4 / 4234 - 4245 |
2088-8708 |
|
2022 |
111 |
Natarajan K |
Assimilating sense into disaster recovery databases and judgement framing proceedings for the fastest recovery |
International Journal of Electrical and Computer Engineering (IJECE) / 13 / 4 / 4234 - 4245 |
2088-8708 |
|
2022 |
112 |
Naveen J |
A multi-preference integrated algorithm for deep learning based recommender framework |
Concurrency and Computation Practice & Experience / / / - |
1532-0634 |
|
2022 |
113 |
Raghavendra S |
Facial emotion recognition using convolutional neural networks |
Materials Today: Proceedings / / / - |
2214-7853 |
|
2022 |
114 |
Raghavendra S |
Customized mask region based convolutional neural networks for un-uniformed shape text detection and text recognition |
International Journal of Electrical and Computer Engineering / 13 / 1 / 413 - 424 |
2088-8708 |
|
2022 |
115 |
Rajkumar Rajavel |
Cloud-enabled Diabetic Retinopathy Prediction System using optimized deep Belief Network Classifier |
Journal of Ambient Intelligence and Humanized Computing / / / - |
1868-5145 |
|
2022 |
116 |
Rajkumar Rajavel |
Cognitive Fuzzy-based Behavioral Learning System for Augmenting the Automated Multi-issue Negotiation in the E-commerce Applications
|
Journal of Internet Technology / 23 / 6 / 1335 - 1342 |
1607-9264 |
|
2022 |
117 |
Raju G |
A generic cyber immune framework for anomaly detection using artificial immune systems |
Applied Soft Computing / 130 / 2022,109680 / - |
1568-4946 |
|
2022 |
118 |
Raju G |
An improved frequent pattern tree: the child structured frequent pattern tree CSFP-tree |
Pattern Analysis and Applications / / / - |
1433-755X |
|
2022 |
119 |
Raju G |
Person Identification by Models Trained Using Left and Right Ear Images Independently |
Advances in Computer Science Research / / / 281 - 288 |
2352-538X |
|
2022 |
120 |
Raju G |
A Novel Fuzzy-Based Thresholding Approach for
Blood Vessel Segmentation from Fundus Image |
Journal of Advances in Information Technology / 14 / 2 / 185 - 192 |
1798-2340 |
|
2022 |
121 |
Raju G |
Ear Recognition Using Rank Level Fusion of Classifiers Outputs |
Online and Biomedical Engineering / 19 / 3 / 127 - 141 |
2626-8493 |
|
2022 |
122 |
Rakoth Kandan Sambandam |
Smart Precision Irrigation Techniques Using
Wireless Underground Sensors in Wireless
Sensors |
IEEE Xplore / / / 2072 - 2077 |
2575-7288 |
|
2022 |
123 |
Rakoth Kandan Sambandam |
Security Issues in Intrusion Detection - Review |
Mathematical Statistician and Engineering Applications / 71 / 3s2 / 47 - 58 |
2094-0343 |
|
2022 |
124 |
Rakoth Kandan Sambandam |
3D CNN-Based Classification of Severity in COVID-19 Using CT Images |
Lecture Notes in Networks and Systems / / / 301 - 312 |
2367-3389 |
|
2022 |
125 |
Rekha V |
Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter |
International Journal of Power Electronics and Drive Systems (IJPEDS) / 13 / 4 / 2086 - 2097 |
2088-8694 |
|
2022 |
126 |
Rekha V |
Machine Learning Based Time Series Analysis for COVID-19 Cases in India |
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) / 2022 / / 1932 - 1937 |
2575-7288 |
|
2022 |
127 |
Samiksha Shukla |
Malicious URL Detection Using Machine Learning Techniques |
Intelligent Sustainable Systems / 458 / / 657 - 669 |
2367-3370 |
|
2022 |
128 |
Sandeep Kumar |
Special Issue: Computational Intelligence |
Journal of Computational Biology / 29 / 6 / 495 - 496 |
1066-5277 |
|
2022 |
129 |
Sandeep Kumar |
Sigmoidal Particle Swarm Optimization for Twitter Sentiment Analysis |
Computers, Materials & Continua / 74 / 1 / 897 - 914 |
1546-2226 |
|
2022 |
130 |
Sandeep Kumar |
Multiway Relay Based Framework for Network Coding in Multi-Hop WSNs |
Computers, Materials & Continua / 74 / 1 / 1199 - 1216 |
1546-2226 |
|
2022 |
131 |
Sandeep Kumar |
An Anomaly Detection Framework for Twitter Data |
Applied Sciences / 12 / 21 / 1 - 16 |
2076-3417 |
|
2022 |
132 |
Sandeep Kumar |
Memetic Spider Monkey Optimization for Spam Review Detection Problem |
Big Data / 11 / 02 / 137 - 149 |
2167-6461 |
|
2022 |
133 |
Santanu Roy |
SVD-CLAHE boosting and balanced loss function for Covid-19 detection from an imbalanced Chest X-Ray dataset |
Computers in Biology and Medicine / / / - |
0010-4825 |
|
2022 |
134 |
Santhrupth B C |
Sugarcane Leaf Disease Detection and Classification:
Current State and Future Directions |
International Journal of All Research Education and Scientific Methods (IJARESM) / / / - |
2455-6211 |
|
2022 |
135 |
Sathish Kumar R |
Cloud-enabled Diabetic Retinopathy Prediction System using optimized deep Belief Network Classifier |
Journal of Ambient Intelligence and Humanized Computing / / / - |
1868-5145 |
|
2022 |
136 |
Shamanth N |
Dynamic Channel Allocation in Wireless Personal Area Networks for Industrial IoT Applications |
Advances in Cognitive Science and Communications / / / - |
2195-3996 |
|
2022 |
137 |
Sujatha A K |
EPCA Enhanced Principal Component Analysis for Medical Data Dimensionality Reduction |
SN Computer Science / 4 / 3 / 1 - 14 |
2661-8907 |
|
2022 |
138 |
Sujatha A K |
Optimal Shortest Path Routing over Wireless Sensor Networks Using Constrained Genetic Firefly Optimization Algorithm |
Lecture Notes in Networks and Systems / 608 / 1 / 643 - 654 |
2367-3370 |
|
2022 |
139 |
Sundara Pandiyan S |
Phishing attack detection using Machine Learning |
Measurement: Sensors / 24 / / - |
2665-9174 |
|
2022 |
140 |
Sundara Pandiyan S |
An energy efficient approach of deep learning based soft sensor for air quality management. |
Measurement: Sensors / 24 / / - |
2665-9174 |
|
2022 |
141 |
Vandana Reddy |
Gender Identification of Silkworm Pupa and Automated Cocoon Cutting Machine for Benefiting the Sericulture Grainages in Karnataka |
Lecture Notes in Networks and Systems / / / 372 - 381 |
2367-3370 |
|
2022 |
142 |
Vandana Reddy |
Optimal Shortest Path Routing over Wireless Sensor Networks Using Constrained Genetic Firefly Optimization Algorithm |
Lecture Notes in Networks and Systems / 608 / 1 / 643 - 654 |
2367-3370 |
|
2022 |
143 |
Addapalli V N Krishna |
Encryption Then Steganography Framework On High Capacity Data Hiding In Grayscale Images |
J. Math. Comput. Science / 11 / 4 / 4960 - 4980 |
1927-5307 |
|
2021 |
144 |
Addapalli V N Krishna |
Intrusion Detection System Using Deep Learning Methodologies
|
J. Math. Comput. Science / 11 / 5 / 5278 - 5295 |
AYUSH CHOUBEY, |
|
2021 |
145 |
Addapalli V N Krishna |
An efficient Non linear Access Policy Based on Quadratic Residue for Ciphertext Policy Attribute Based Encryption |
Journal of Theoretical and Applied Information Technology / 99 / 21 / 5050 - 5057 |
1992-8645 |
|
2021 |
146 |
Addapalli V N Krishna |
Selfi segmentation in Video using N frame ensemble |
IEEE Access / 9 / 1 / 163348 - 163362 |
2169-3536 |
|
2021 |
147 |
Addapalli V N Krishna |
An Efficient Access Policy with Multi linear Secret haring scheme in Cipher text policy Attribute based encryption |
Journal of Theoretical and Applied Information Technology / 100 / 5 / 1404 - 1411 |
1817-3195 |
|
2021 |
148 |
Ajit Danti |
Fake News Detection Using Linguistic Inquiry With Syllable Pattern Of Words Based On CNN Approach |
GIS SCIENCE JOURNAL / 9 / 4 / 914 - 925 |
1869-9391 |
|
2021 |
149 |
Alok Kumar Pani |
Road Traffic Prediction and Optimal Alternate Path Selection Using HBI-LSTM and HV-ABC |
Indian Journal of Science and Technology / 15 / 15 / 689 - 699 |
0974-5645 |
|
2021 |
150 |
Alok Kumar Pani |
An Approach for Recognizing Multinational License Plate using Generalized Character Sequence Detection |
Journal of Emerging Technologies and Innovative Research / 9 / 5 / 211 - 218 |
2349-5162 |
|
2021 |
151 |
Alok Kumar Pani |
Road Traffic Prediction and Optimal
Alternate Path Selection Using
HBI-LSTM and HV-ABC
|
Indian Journal of Science and Technology / 15 / 15 / 689 - 699 |
0974-5645 |
|
2021 |
152 |
Aruna S K |
Development and evaluation of the bootstrap resampling technique based statistical prediction model for Covid-19 real time data : A data driven
approach |
Journal of Interdisciplinary Mathematics / Not Available / Not Available / - |
0972-0502 |
|
2021 |
153 |
Aruna S K |
Implementation of a Heart Disease Risk Prediction Model Using Machine Learning |
Computational and Mathematical Methods in Medicine / / / 1 - 14 |
1748-670X |
|
2021 |
154 |
Balachandran K |
Root cause analysis of COVID-19 cases by enhanced text mining process |
International Journal of Electrical and Computer Engineering (IJECE) / 12 / 2 / 1807 - 1817 |
2088-8708 |
|
2021 |
155 |
Balachandran K |
eHED2SDG: A Framework Towards Sustainable Professionalism & Attaining SDG through Online Holistic Education in Indian Higher Education |
ECS Transactions / 106 / / - |
1938-5862, 1938-6737 |
|
2021 |
156 |
Balachandran K |
Selfi segmentation in Video using N frame ensemble |
IEEE Access / 9 / 1 / 163348 - 163362 |
2169-3536 |
|
2021 |
157 |
Balachandran K |
An Efficient Access Policy with Multi linear Secret haring scheme in Cipher text policy Attribute based encryption |
Journal of Theoretical and Applied Information Technology / 100 / 5 / 1404 - 1411 |
1817-3195 |
|
2021 |
158 |
Balamurugan M |
Deep Learning for Stock Market Index Price Movement Forecasting Using Improved Technical Analysis |
International Journal of Intelligent Engineering and Systems (IJIES) / / / - |
2185-3118 |
|
2021 |
159 |
Balamurugan M |
An Efficient Access Policy with Multi linear Secret haring scheme in Cipher text policy Attribute based encryption |
Journal of Theoretical and Applied Information Technology / 100 / 5 / 1404 - 1411 |
1817-3195 |
|
2021 |
160 |
Boppuru Rudra Prathap |
Authentication of symmetric cryptosystem using anti-aging controller-based true random number generator |
Applied Nanoscience (Switzerland) / / / - |
2190-5509 |
|
2021 |
161 |
Boppuru Rudra Prathap |
Wireless Sensor Data Acquisition and Control Monitoring Model for Internet of Things Applications |
Scientific Programming / / / - |
1058-9244 |
|
2021 |
162 |
Boppuru Rudra Prathap |
Wireless Communication for Robotic Process Automation Using Machine Learning Technique |
Wireless Communications and Mobile Computing / / / - |
1530-8669 |
|
2021 |
163 |
Boppuru Rudra Prathap |
Machine Learning Techniques for Detecting and Forecasting Disorders in Children Using Pupillometry Data |
Journal of Algebraic Statistics / 13 / 1 / 612 - 620 |
1309-3452 |
|
2021 |
164 |
Boppuru Rudra Prathap |
Blockchain Enabled Model for Minimizing Post Harvest Losses |
ECS Transaction / 106 / / - |
1938-5862,1938-6737 |
|
2021 |
165 |
Chinthakunta Manjunath |
Deep Learning for Stock Market Index Price Movement Forecasting Using Improved Technical Analysis |
International Journal of Intelligent Engineering and Systems (IJIES) / / / - |
2185-3118 |
|
2021 |
166 |
Daniel D |
An enhanced network intrusion detection system for malicious crawler detection and security event correlations in ubiquitous banking infrastructure |
International Journal of Pervasive Computing and Communications / ahead-of-print / ahead-of-print / AOP - AOP |
1742-7371 |
|
2021 |
167 |
Daniel D |
Enhanced Energy Efficient Routing for Wireless Sensor Network Using Extended Power Efficient Gathering in Sensor Information Systems (E-PEGASIS) Protocol |
Procedia of Computer Science / 194 / / 89 - 101 |
1877-0509 |
|
2021 |
168 |
Daniel D |
AI-based Power Screening Solution for SARS-CoV2 Infection: A
Sociodemographic Survey and COVID-19 Cough Detector |
Procedia of Computer Science / 194 / / 255 - 271 |
1877-0509 |
|
2021 |
169 |
Diana Jeba Jingle I |
A Collaborative Defense Protocol against Collaborative Attacks in Wireless Mesh Networks |
International Journal of Enterprise Network Management / 12 / 3 / 199 - 220 |
1748-1260 |
|
2021 |
170 |
Ganesh Kumar R |
Optimising QoS with load balancing in cloud computing applying dual fuzzy technique |
International Journal of Intelligent Enterprise / 8 / 4 / 323 - 341 |
1745-3240 |
|
2021 |
171 |
Ganesh Kumar R |
Automated Brain Imaging Diagnosis and Classification Model using Rat Swarm Optimization with Deep Learning based Capsule Network |
International Journal of Image and Graphics / / / - |
0219-4678, 1793-6756 |
|
2021 |
172 |
Gnana Prakasi O S |
Chest Diseases Prediction from X-ray Images using CNN Models: A Study |
International Journal of Advanced Computer Science and Applications / 12 / 10 / 236 - 243 |
2156-5570 |
|
2021 |
173 |
Gnana Prakasi O S |
PoseNet based Model for Estimation of
Karate Poses |
Journal of Innovative Image Processing / 4 / 1 / 16 - 25 |
2582-4252 |
|
2021 |
174 |
Jayapandian N |
Securing cloud data against Cyber-Attacks Using Hybrid Aes With Mht Algorithm |
International Journal of Computing / 19 / 4 / 561 - 568 |
1727-6209 |
|
2021 |
175 |
Jayapandian N |
Hybrid shuffled frog leaping and improved biogeography-based optimization algorithm for energy stability and network lifetime maximization in wireless sensor networks |
International Journal of Communication Systems / 34 / 4 / 1 - 16 |
1099-1131 |
|
2021 |
176 |
Jayapandian N |
Security Threats and Privacy Issues in Cloud Data |
Lecture Notes on Data Engineering and Communications Technologies / 58 / / 309 - 316 |
2367-4512 |
|
2021 |
177 |
Jayapandian N |
Enhancing the confidentiality of text embedding using image steganography in spatial domain |
AIP Proceedings / 2387 / 1 / 140013 - 140018 |
0094-243X |
|
2021 |
178 |
Jayapandian N |
Usage Data for Predicting User Trends and Behavioral Analysis in E-Commerce Applications |
International Journal of Information Systems in the Service Sector (IJISSS) / 13 / 4 / 40 - 61 |
1935-5688 |
|
2021 |
179 |
Jenefa J |
Secure Authentication Schemes for Vehicular Adhoc Networks: A Survey |
Wireless Personal Communications / / / - |
0929-6212 |
|
2021 |
180 |
Jenefa J |
Identity-based message authentication scheme using proxy vehicles for vehicular ad hoc networks |
Wireless Networks The Journal of Mobile Communication, Computation and Information / 27 / / 3093 - 3108 |
1022-0038 |
|
2021 |
181 |
Jenefa J |
A self-cooperative trust scheme against black hole attacks in vehicular ad hoc networks |
International Journal of Wireless and Mobile Computing / 21 / 1 / 59 - 65 |
1741-1084, 1741-1092 |
|
2021 |
182 |
Julian Benadit P |
An Improved Web Caching System With Locally Normalized User Intervals |
IEEE ACCESS / 9 / / 112490 - 112501 |
2169-3536 |
|
2021 |
183 |
Jyothi Mandala |
An Integrated Reinforcement DQNN Algorithm to Detect Crime Anomaly Objects in Smart Cities. |
International Journal of Advanced Computer Science and Applications / / / 348 - 352 |
2158-107X, 2156-5570 |
|
2021 |
184 |
Jyothi Mandala |
BSLnO: Multi-agent based distributed intrusion detection system using Bat Sea Lion Optimization-based hybrid deep learning approach |
International Journal of Adaptive Control and Signal Processing / / / - |
0890-6327, 1099-1115 |
|
2021 |
185 |
Jyothi Mandala |
Comprehensive Review on Video Watermarking Security Threats, Challenges, and Its Applications |
ECS Transactions / 107 / 1 / 13833 - 13838 |
1938-6737 |
|
2021 |
186 |
Jyothi Thomas |
A Review on Existing Methods and Classification Algorithms Used for Sex Determination of Silkworm in Sericulture |
Advances in Intelligent Systems and Computing / 1351 / / 567 - 579 |
2194-5357 |
|
2021 |
187 |
Jyothi Thomas |
A Survey on Arrhythmia Disease Detection Using Deep Learning Methods |
Lecture Notes in Networks and Systems / 419 / / 55 - 64 |
2367-3370 |
|
2021 |
188 |
Jyothi Thomas |
Leaf Disease Identification in Rice Plants Using CNN Model |
Lecture Notes on Data Engineering and Communicati ons Technologies / / / - |
2367-4512 |
|
2021 |
189 |
Kanmani P |
Chest Diseases Prediction from X-ray Images using CNN Models: A Study |
International Journal of Advanced Computer Science and Applications / 12 / 10 / 236 - 243 |
2156-5570 |
|
2021 |
190 |
Karthikeyan H |
Cloud-assisted Parkinson disease identification system for remote patient monitoring and diagnosis in the smart healthcare applications |
Concurrency Computation Practice and Experience / / / - |
1532-0634 |
|
2021 |
191 |
Karthikeyan H |
EFS- CC: Ensemble Feature Selection-using Correlation and Cross-Validation Score to Predict Heart Disease in the Healthcare Industry |
Dynamic systems and Applications / 30 / 8 / 1346 - 1361 |
1056-2176 |
|
2021 |
192 |
Karthikeyan H |
Usage Data for Predicting User Trends and Behavioral Analysis in E-Commerce Applications |
International Journal of Information Systems in the Service Sector (IJISSS) / 13 / 4 / 40 - 61 |
1935-5688 |
|
2021 |
193 |
Kukatlapalli Pradeep Kumar |
Evaluate and Design the Mini Hexagon-Shaped Monopole Antenna Controller to Minimize Losses in the Unit |
Journal of Nuclear Energy Science & Power Generation Technology / 10 / 9 / 1 - 6 |
2325-9809 |
|
2021 |
194 |
Kukatlapalli Pradeep Kumar |
Digital Forensics Investigation for Attacks on Artificial Intelligence |
ECS Transactions / 106 / / - |
1938-5862,1938-6737 |
|
2021 |
195 |
Kukatlapalli Pradeep Kumar |
Secure Authenticated Communication Via Digital Signature and Clear List in Vanets |
ECS Transactions / 106 / / - |
1938-5862,1938-6737 |
|
2021 |
196 |
Kukatlapalli Pradeep Kumar |
Blockchain Enabled Model for Minimizing Post Harvest Losses |
ECS Transaction / 106 / / - |
1938-5862,1938-6737 |
|
2021 |
197 |
Kukatlapalli Pradeep Kumar |
Wireless Sensor Data Acquisition and Control Monitoring Model for Internet of Things Applications |
Scientific Programming / / / - |
1058-9244 |
|
2021 |
198 |
Manohar M |
Road Traffic Prediction and Optimal
Alternate Path Selection Using
HBI-LSTM and HV-ABC
|
Indian Journal of Science and Technology / 15 / 15 / 689 - 699 |
0974-5645 |
|
2021 |
199 |
Manohar M |
Road Traffic Prediction and Optimal Alternate Path Selection Using HBI-LSTM and HV-ABC |
Indian Journal of Science and Technology / 15 / 15 / 689 - 699 |
0974-5645 |
|
2021 |
200 |
Mary Anita E A |
Identity-based message authentication scheme using proxy vehicles for vehicular ad hoc networks |
Wireless Networks The Journal of Mobile Communication, Computation and Information / 27 / / 3093 - 3108 |
1022-0038 |
|
2021 |
201 |
Mary Anita E A |
Discrete Integrity Assuring Slice-Based Secured Data Aggregation
Scheme for Wireless Sensor Network (DIA-SSDAS) |
Wireless Communications and Mobile Computing / 2021 / / 1 - 17 |
1530-8677, 1530-8669 |
|
2021 |
202 |
Mary Anita E A |
A self-cooperative trust scheme against black hole attacks in vehicular ad hoc networks |
International Journal of Wireless and Mobile Computing / 21 / 1 / 59 - 65 |
1741-1084, 1741-1092 |
|
2021 |
203 |
Mary Anita E A |
Secure Authentication Schemes for Vehicular Adhoc Networks: A Survey |
Wireless Personal Communications / / / - |
0929-6212 |
|
2021 |
204 |
Mausumi Goswami |
A Fuzzy Based Approach for Empirical Analysis of Unstructured Data |
Journal of Computational and Theoretical Nanoscience / 17 / 9-10 / 4375 - 4379 |
1546-1955, 1546-1963 |
|
2021 |
205 |
Mausumi Goswami |
A Comparative Analysis of Opinions and Sentiments on Clean India Campaign and Sustainability Goals of 2030 |
AIP Conference Proceedings / / / - |
0094-243X, 1551-7616 |
|
2021 |
206 |
Mausumi Goswami |
A Comparative Study of the Impact of Thermal Indices on Indian Coral Ecosystem |
AIP Conference Proceedings / / / - |
0094-243X, 1551-7616 |
|
2021 |
207 |
Mausumi Goswami |
Exploring Sustainable and Affordable Cancer Care using Artificial Intelligence |
ECS Transactions / 106 / / - |
1938-5862, 1938-6737 |
|
2021 |
208 |
Mausumi Goswami |
eHED2SDG: A Framework Towards Sustainable Professionalism & Attaining SDG through Online Holistic Education in Indian Higher Education |
ECS Transactions / 106 / / - |
1938-5862, 1938-6737 |
|
2021 |
209 |
Mausumi Goswami |
Towards Sustainable Living through Sentiment Analysis during Covid19 |
ECS Transactions / 106 / / - |
1938-5862,1938-6737 |
|
2021 |
210 |
Mausumi Goswami |
Sustainability & Comparative Impact Analysis of Coral Reef Bleaching in Indian Context |
ECS Transactions / 106 / / - |
1938-5862,1938-6737 |
|
2021 |
211 |
Natarajan K |
Malevolent Application of Bots-Detecting and Forecasting the Prospect of Bots Triggering Misinformation Spread Using the Machine Learning Approach |
International journal of special education / 37 / 3 / 13209 - 13224 |
0827-3383 |
|
2021 |
212 |
Naveen J |
FO-DPSO Algorithm for Segmentation and Detection of Diabetic Mellitus for Ulcers |
International Journal of Image and Graphics / / / - |
1793-6756 |
|
2021 |
213 |
Naveen J |
Energy-Aware Multilevel Clustering Scheme for Underwater Wireless Sensor Networks |
IEEE ACCESS / 10 / / 55868 - 55875 |
2169-3536 |
|
2021 |
214 |
Naveen J |
Fake News Detection Using Linguistic Inquiry With Syllable Pattern Of Words Based On CNN Approach |
GIS SCIENCE JOURNAL / 9 / 4 / 914 - 925 |
1869-9391 |
|
2021 |
215 |
Raghavendra S |
Passenger Flow Prediction From Afc Data Using Station Memorizing Lstm For Metro Rail Systems |
Neural Network World / 31 / 3 / 173 - 189 |
1210-0552 |
|
2021 |
216 |
Raghavendra S |
A Credit Scoring Heterogeneous Ensemble Model Using Stacking and Voting |
Indian Journal of Science and Technology / 15 / 7 / 300 - 308 |
0974-6846 |
|
2021 |
217 |
Rajkumar Rajavel |
Cost-enabled QoS aware task scheduling in the cloud management system |
Journal of Intelligent & Fuzzy Systems / 41 / 5 / 5607 - 5615 |
1875-8967 |
|
2021 |
218 |
Rajkumar Rajavel |
Cloud service negotiation framework for real-time E-commerce application using game theory decision system |
Journal of Intelligent & Fuzzy Systems / 41 / 5 / 5617 - 5628 |
1875-8967 |
|
2021 |
219 |
Raju G |
A Novel Threshold based Method for Vessel Intensity Detection and Extraction from Retinal Images |
International Journal of Advanced Computer Science and Applications / 12 / 6 / 546 - 554 |
2156-5570 |
|
2021 |
220 |
Raju G |
A new framework for contour tracing using Euclidean distance mapping |
Int. J. Computational Vision and Robotics / 11 / 5 / 542 - 553 |
1752-9131 |
|
2021 |
221 |
Raju G |
SR-Mine: Adaptive Transaction Compression Method for Frequent Itemsets Mining |
Arabian Journal for Science and Engineering / Online first / / - |
2193-567X, 2191-4281 |
|
2021 |
222 |
Raju G |
A Fusion Based Approach for Blood Vessel Segmentation
from Fundus Images by Separating Brighter Optic Disc |
Pattern Recognition and Image Analysis / 31 / 4 / 811 - 820 |
1054-6618 |
|
2021 |
223 |
Raju G |
A novel optimised method for speckle reduction in
medical ultrasound images |
International Journal of Automation and Control / 16 / 2 / 137 - 161 |
1740-7516 |
|
2021 |
224 |
Ramanujam E |
Xenobots: A Remarkable Combination of an Artificial
Intelligence-Based Biological Living Robot |
International Journal of Sociotechnology and Knowledge Development / 14 / 1 / 1 - 11 |
1941-6253 |
|
2021 |
225 |
Ramesh Vatambeti |
An Adaptive Cluster based Vehicular Routing Protocol
for Secure Communication |
Wireless Personal Communications / / / - |
0929-6212 |
|
2021 |
226 |
Ramesh Vatambeti |
An IoT-based agriculture maintenance using pervasive computing with machine learning technique |
International Journal of Intelligent Computing and Cybernetics / / / - |
1756-378X |
|
2021 |
227 |
Ramesh Vatambeti |
An Efficient Routing Strategy for Energy Management
in Wireless Sensor Network Using Hybrid Routing Protocols |
Wireless Personal Communication / / / - |
1572-834X, 0929-6212 |
|
2021 |
228 |
Ramesh Vatambeti |
Enhancing the energy efficiency for prolonging the
network life time in multi-conditional multi-sensor
based wireless sensor network |
Journal of Control and Decision / / / - |
2330-7706 |
|
2021 |
229 |
Ramesh Vatambeti |
Bitcoin Price Prediction Using Machine Learning and Artificial Neural Network Model |
Indian journal of science & technology / 14 / 27 / 2300 - 2308 |
0974-5645 |
|
2021 |
230 |
Ravi Kumar Y B |
Statistical Features Learning to Predict Crop Yield in Regional Areas |
International Journal of Electrical and Computer Engineering / 12 / / - |
2088-8708 |
|
2021 |
231 |
Rekha V |
Fake News Detection Using Linguistic Inquiry With Syllable Pattern Of Words Based On CNN Approach |
GIS SCIENCE JOURNAL / 9 / 4 / 914 - 925 |
1869-9391 |
|
2021 |
232 |
Samiksha Shukla |
A Systematic Review of Challenges and Techniques of Privacy-Preserving Machine Learning |
Data Science and Security. Lecture Notes in Networks and Systems / 290 / / 19 - 41 |
2367-3370, 2367-3389 |
|
2021 |
233 |
Sandeep Kumar |
Analysis and predictions of spread, recovery, and death caused by COVID-19 in India |
Big Data Mining and Analytics / 4 / 2 / 65 - 75 |
2096-0654 |
|
2021 |
234 |
Sandeep Kumar |
Early Identification and Detection of Driver Drowsiness by Hybrid Machine Learning |
IEEE Access / 9 / / 162805 - 162819 |
2169-3536 |
|
2021 |
235 |
Sandeep Kumar |
Improved Feature Selection Method for the Identification of Soil Images Using Oscillating Spider Monkey Optimization |
IEEE Access / 9 / / 167128 - 167139 |
2169-3536 |
|
2021 |
236 |
Sandeep Kumar |
Epidemic Prediction using Machine Learning and Deep Learning Models on COVID-19 Data |
Journal of Experimental & Theoretical Artificial Intelligence / / / - |
1362-3079 |
|
2021 |
237 |
Sandeep Kumar |
Semantic Analysis and Topic Modelling of Web-Scrapped COVID-19 Tweet Corpora through Data Mining Methodologies |
Healthcare / 10 / 5 / 1 - 30 |
2227-9032 |
|
2021 |
238 |
Sandeep Kumar |
Plant Identification Using Fitness-Based Position Update in Whale Optimization Algorithm |
Computers, Materials & Continua / 71 / 3 / 47194736 - |
1546-2226 |
|
2021 |
239 |
Sandeep Kumar |
Performance Analysis of Machine Learning Algorithms for Classifying Hand Motion-Based EEG Brain Signals |
Computer Systems Science and Engineering / 43 / 3 / 1095 - 1107 |
0267-6192 |
|
2021 |
240 |
Sathish Kumar R |
IoT based Tracking Application to monitor goods carrying vehicle for Public Distribution System in India |
International Journal of Enterprise Network Management / 12 / 3 / 275 - 296 |
1748-1260 |
|
2021 |
241 |
Sathish Kumar R |
Forest Optimization Algorithm Implementation using Sphere Mathematical Function |
International Journal of Engineering and Advanced Technology (IJEAT) / 10 / 5 / 104 - 110 |
2249-8958 |
|
2021 |
242 |
Sathish Kumar R |
Bitcoin Price Prediction Using Machine Learning and Artificial Neural Network Model |
Indian journal of science & technology / 14 / 27 / 2300 - 2308 |
0974-5645 |
|
2021 |
243 |
Sathish Kumar R |
Cost-enabled QoS aware task scheduling in the cloud management system |
Journal of Intelligent & Fuzzy Systems / 41 / 5 / 5607 - 5615 |
1875-8967 |
|
2021 |
244 |
Sathish Kumar R |
Cloud service negotiation framework for real-time E-commerce application using game theory decision system |
Journal of Intelligent & Fuzzy Systems / 41 / 5 / 5617 - 5628 |
1875-8967 |
|
2021 |
245 |
Sujatha A K |
Optimized Stacking Ensemble (OSE) for Credit Card Fraud Detection using Synthetic Minority Oversampling Model |
Indian Journal of Science and Technology / 14 / 32 / 2607 - 2615 |
0974-5645, 0974-6846 |
|
2021 |
246 |
Sujatha A K |
An Enhanced Ensemble of Long Short-Term Memory and Vector AutoRegression for Energy Consumption Forecasting |
Indian Journal of Science and Technology / 14 / 43 / 3227 - 3236 |
0974-5645, 0974-6846 |
|
2021 |
247 |
Sujatha A K |
Root cause analysis of COVID-19 cases by enhanced text mining process |
International Journal of Electrical and Computer Engineering (IJECE) / 12 / 2 / 1807 - 1817 |
2088-8708 |
|
2021 |
248 |
Venkatachalam K |
Cross-Layer Hidden Markov Analysis for Intrusion Detection |
https://www.techscience.com/journal/cmc / 70 / 2 / - |
1546-2226 |
|
2021 |
249 |
Venkatachalam K |
Improved Dragonfly Optimizer for Intrusion Detection Using Deep Clustering CNN-PSO Classifier |
Computers, Materials & Continua / 70 / 3 / 5949 - 5965 |
1546-2226 |
|
2021 |
250 |
Venkatachalam K |
Covid-19 CT Lung Image Segmentation Using Adaptive Donkey and Smuggler Optimization Algorithm |
Computers, Materials & Continua / 71 / 1 / 1133 - 1152 |
1546-2226 |
|
2021 |
251 |
Venkatachalam K |
Brain Image Classification Using Time Frequency Extraction with Histogram Intensity Similarity |
Computer Systems Science and Engineering / 41 / 2 / 445 - 460 |
0267-6192 |
|
2021 |
252 |
Venkatachalam K |
Machine Learning Technique to Detect Radiations in the Brain |
Computer Systems Science and Engineering / 42 / 1 / 149 - 163 |
0267-6192 |
|
2021 |
253 |
Xavier C |
On Statistical Tools in Finding Equitable Antimagic Labeling of Complete Graphs |
Lecture Notes in Networks and Systems / 190 / / 985 - 995 |
2367-3370 |
|
2021 |
254 |
Addapalli V N Krishna |
A Study on the effect of canny edge detection on Downscaled images |
Pattern Recognition and Image Analysis / 30 / 3 / 372 - 381 |
1054-6618 |
|
2020 |
255 |
Addapalli V N Krishna |
Survey on Attribute-based Encryption in Cloud Computing |
International Journal of Network Security / 22 / 5 / 863 - 868 |
1816-353X |
|
2020 |
256 |
Addapalli V N Krishna |
Portrait Segmentation Using Ensemble of Heterogeneous Deep-Learning Models |
Entropy / 23 / 197 / 1 - 20 |
1099-4300 |
|
2020 |
257 |
Addapalli V N Krishna |
Analyzing the Total Household data of different states in India based on Census and evaluating their relative performance using Machine Learning |
Solid State Technology / 63 / I4 / 1469 - 1474 |
0038-111X |
|
2020 |
258 |
Addapalli V N Krishna |
Crime Analysis and Forecasting on Spatio Temporal News Feed Data?An Indian Context |
Studies in Bigdata / 90 / / 307 - 327 |
2197-6503 |
|
2020 |
259 |
Alok Kumar Pani |
An efficient algorithmic technique for feature selection in IoT based intrusion detection system |
Indian Journal of Science and Technology / 14 / 1 / 76 - 85 |
0974-5645 |
|
2020 |
260 |
Alok Kumar Pani |
A Big Data Analysis Using Fuzzy Deep Convolution Network Based Model for
Heart Disease Classification |
International Journal of Intelligent Engineering and Systems / 14 / 2 / 147 - 156 |
2185-3118 |
|
2020 |
261 |
Alok Kumar Pani |
A Big Data Analysis Using Fuzzy Deep Convolution Network Based Model for
Heart Disease Classification |
The International Journal of Intelligent Engineering and Systems / 14 / 2 / 147 - 156 |
2185-3118 |
|
2020 |
262 |
Aruna S K |
Performance Analysis of Deterministic Finite Automata and Turing Machine Using JFLAP Tool |
Journal of Circuits, Systems and Computers / / / - |
0218-1266 |
|
2020 |
263 |
Balachandran K |
A Two-Stepped Feature Engineering Process for Topic Modeling Using
Batchwise LDA with Stochastic Variational Inference Model |
International Journal of Intelligent Engineering and Systems / 13 / 4 / 333 - 345 |
2185-3118 |
|
2020 |
264 |
Balachandran K |
Identification of misconceptions about corona outbreak using trigrams and weighted TF-IDF model |
Journal of Advanced Research in Dynamical and Control Systems / 12 / 05-Special Issue / 524 - 533 |
1943-023X |
|
2020 |
265 |
Balachandran K |
Survey on Attribute-based Encryption in Cloud Computing |
International Journal of Network Security / 22 / 5 / 863 - 868 |
1816-353X |
|
2020 |
266 |
Balachandran K |
EMONET: A Cross Database Progressive Deep Network for Facial Expression Recognition |
International Journal of Intelligent Engineering and Systems / 13 / 6 / 31 - 41 |
2185-3118 |
|
2020 |
267 |
Balachandran K |
Engagement Detection through Facial Emotional Recognition Using a Shallow
Residual Convolutional Neural Networks |
International Journal of Intelligent Engineering and Systems / 14 / 2 / 236 - 247 |
2185-310X |
|
2020 |
268 |
Balachandran K |
Multimodal emotional analysis through hierarchical video summarization and face tracking |
Multimedia Tools and Applications / / / - |
1573-7721 |
|
2020 |
269 |
Balachandran K |
Crime Analysis and Forecasting on Spatio Temporal News Feed Data?An Indian Context |
Studies in Bigdata / 90 / / 307 - 327 |
2197-6503 |
|
2020 |
270 |
Balamurugan M |
Skin lesion classification using decision trees and random forest algorithms |
Journal of Ambient Intelligence and Humanized Computing / / / 1 - 13 |
1868-5137, 1868-5145 |
|
2020 |
271 |
Balamurugan M |
Survey on Attribute-based Encryption in Cloud Computing |
International Journal of Network Security / 22 / 5 / 863 - 868 |
1816-353X |
|
2020 |
272 |
Bejoy B J |
Enhanced AIS Based Intrusion Detection System Using Natural Killer Cells |
Journal of Cyber Security and Mobility / 9 / 4 / 515 - 534 |
2245-1439 |
|
2020 |
273 |
Bejoy B J |
Automatic Classification of ISAR Images |
Design Engineering (Toronto) / 2021(4) / 4 / 298 - 314 |
0011-9342 |
|
2020 |
274 |
Bijeesh T V |
A hybrid level set based approach for surface water delineation using landsat-8 multispectral images |
Engineering Letters / 29 / 2 / 624 - 633 |
1816-0948, 1816-093X |
|
2020 |
275 |
Bijeesh T V |
Surface water detection and delineation using remote sensing images: a review of methods and algorithms |
Sustainable Water Resources Management / 6 / 4 / 1 - 23 |
2363-5037 |
|
2020 |
276 |
Boppuru Rudra Prathap |
Spatio-Temporal Crime Analysis Using KDE and ARIMA Models in the Indian Context. |
International Journal of Digital Crime and Forensics (IJDCF) / 12 / 4 / 1 - 19 |
1941-6210 |
|
2020 |
277 |
Boppuru Rudra Prathap |
An effective face recognition system based on Cloud-based IoT with a deep learning model |
Microprocessors and Microsystems / 81 / / 1 - 8 |
0141-9331 |
|
2020 |
278 |
Boppuru Rudra Prathap |
Fixed Angle Video Frame Diminution Technique for Vehicle Speed Detection. |
Annals of the Romanian Society for Cell Biology / 25 / 1 / 3204 - 3210 |
1583-6258 |
|
2020 |
279 |
Boppuru Rudra Prathap |
Crime Analysis and Forecasting on Spatio Temporal News Feed Data?An Indian Context |
Studies in Bigdata / 90 / / 307 - 327 |
2197-6503 |
|
2020 |
280 |
Boppuru Rudra Prathap |
Symbiotic view of provenance in cyber infrastructure and information security
|
Turkish Journal of Computer and Mathematics Education / 12 / 2 / 3261 - 3267 |
1309-4653 |
|
2020 |
281 |
Cherukuri Ravindranath Chowdary |
Design of New Access Control Approach for Provenance Based on Digital Consortium Decision Making via Secret Sharing |
Journal of Computational and Theoretical Nanoscience / 17 / 10 / 4172 - 4178 |
1546-1963 |
|
2020 |
282 |
Cherukuri Ravindranath Chowdary |
Disaster recovery and risk management over private networks using data provenance: Cyber security perspective |
Indian Journal Of Science & Technology / 14 / 8 / 725 - 737 |
0974-6846, 0974-5645 |
|
2020 |
283 |
Cherukuri Ravindranath Chowdary |
Reflecto a smart mirror structure with a contextual association of internet of
Things
|
Information Technology in Industry / 9 / 2 / 984 - 988 |
2203-1731 |
|
2020 |
284 |
Cherukuri Ravindranath Chowdary |
Symbiotic view of provenance in cyber infrastructure and information security
|
Turkish Journal of Computer and Mathematics Education / 12 / 2 / 3261 - 3267 |
1309-4653 |
|
2020 |
285 |
Daniel D |
Collaborative intrusion detection system in cognitive smart city network (CSC-Net) |
International Journal of Knowledge and Systems Science, / 12 / 1 / 60 - 73 |
1947-8208 |
|
2020 |
286 |
Daniel D |
Augmented intelligent water drops optimisation model for virtual machine placement in cloud environment |
IET Networks / 9 / 5 / 215 - 222 |
2047-4962 |
|
2020 |
287 |
Diana Jeba Jingle I |
Design of Grover?S Quantum Searching Algorithm Over 2, 3 And 4-Qubit Systems Using Quantum Programming Studio |
Journal of Huazhong University of Science and Technology / 50 / 3 / 1 - 10 |
1671-4512 |
|
2020 |
288 |
Diana Jeba Jingle I |
An analysis of Lexicons in programming models using Feature selection in Genetic Algorithm |
Journal of Huazhong University of Science and Technology / 50 / 3 / 1 - 6 |
1671-4512 |
|
2020 |
289 |
Diana Jeba Jingle I |
Design techniques in carry select adder using parallel prefix adder for improved switching energy |
Przegląd Elektrotechniczny / 97 / 5 / 152 - 155 |
2449-9544 |
|
2020 |
290 |
Divya Vetriveeran |
Fault tolerant resource allocation in fog environment using game theory-based reinforcement learning |
Concurrency and Computation: Practice and Experience / / / - |
1532-0634 |
|
2020 |
291 |
Divya Vetriveeran |
Docker based Intelligent Fall Detection using Edge-Fog Cloud Infrastructure |
IEEE Internet of Things / 8 / 10 / 8133 - 8144 |
2327-4662 |
|
2020 |
292 |
Ganesh Kumar R |
Analyzing the Total Household data of different states in India based on Census and evaluating their relative performance using Machine Learning |
Solid State Technology / 63 / I4 / 1469 - 1474 |
0038-111X |
|
2020 |
293 |
Ganesh Kumar R |
Mutual Information Pre-processing Based Broken-stick Linear Regression Technique for Web User Behaviour Pattern Mining |
International Journal of Intelligent Engineering and Systems / 14 / 1 / 244 - 256 |
2185-3118 |
|
2020 |
294 |
Ganesh Kumar R |
Normal discriminant deep convolution neural classifcation based web behavioral pattern mining for user identifcation |
Journal of Ambient Intelligence and Humanized Computing / NA / NA / 01 - 13 |
1868-5137, 1868-5145 |
|
2020 |
295 |
Gnana Prakasi O S |
Random Forest and SVM Analysis for Credit
Card fraud Detection |
Mukt Shabd Journal / 9 / 7 / 950 - 952 |
2347-3150 |
|
2020 |
296 |
Gnana Prakasi O S |
A Review on Flood Prediction Algorithms and A Deep Neural Network Model for Estimation of Flood Occurrence |
International Research Journal of Multidisciplinary Technovation / 2 / 5 / 8 - 14 |
2582-1040 |
|
2020 |
297 |
Gnana Prakasi O S |
Markov based Genetic Algorithm (M-GA): To Mine Frequent Sub Components from Molecular Structures |
International Journal on Emerging Technologies / 11 / 2 / 516 - 523 |
2249-3255 |
|
2020 |
298 |
Gnana Prakasi O S |
Survey on Attribute-based Encryption in Cloud Computing |
International Journal of Network Security / 22 / 5 / 863 - 868 |
1816-353X |
|
2020 |
299 |
Gnana Prakasi O S |
Analyzing and Optimizing the Usability of Website Access |
International Journal of Web Portals / 12 / 2 / 22 - 40 |
1938-0194 |
|
2020 |
300 |
Gnana Prakasi O S |
Automated testbed and real-time port analysis for reconfigurable input?output boards |
International Journal of Computer Integrated Manufacturing / 33 / / 1156 - 1166 |
0951-192X |
|
2020 |
301 |
Gokulapriya R |
Normal discriminant deep convolution neural classifcation based web behavioral pattern mining for user identifcation |
Journal of Ambient Intelligence and Humanized Computing / NA / NA / 01 - 13 |
1868-5137, 1868-5145 |
|
2020 |
302 |
Gokulapriya R |
Mutual Information Pre-processing Based Broken-stick Linear Regression Technique for Web User Behaviour Pattern Mining |
International Journal of Intelligent Engineering and Systems / 14 / 1 / 244 - 256 |
2185-3118 |
|
2020 |
303 |
Gurudas V R |
Early Detection Of Breast Cancer using Convolution Neural Network. |
International Journal of Creative Research Thoughts / 8 / 7 / 3219 - 3222 |
2320-2882 |
|
2020 |
304 |
Jayapandian N |
Markov based Genetic Algorithm (M-GA): To Mine Frequent Sub Components from Molecular Structures |
International Journal on Emerging Technologies / 11 / 2 / 516 - 523 |
2249-3255 |
|
2020 |
305 |
Jayapandian N |
Analyzing and Optimizing the Usability of Website Access |
International Journal of Web Portals / 12 / 2 / 22 - 40 |
1938-0194 |
|
2020 |
306 |
Jayapandian N |
Augmented intelligent water drops optimisation model for virtual machine placement in cloud environment |
IET Networks / 9 / 5 / 215 - 222 |
2047-4962 |
|
2020 |
307 |
Julian Benadit P |
Enhancements To Content Caching Using Weighted Greedy
Caching Algorithm In Information Centric Networking |
Procedia Computer Science / 171 / 2020 / 2435 - 2444 |
1877-0509 |
|
2020 |
308 |
Jyothi Mandala |
An Exploration of Sentiment Analysis using Twitter Dataset |
PSYCHOLOGY AND EDUCATION / / / - |
0033-3077 |
|
2020 |
309 |
Kanmani P |
Automated testbed and real-time port analysis for reconfigurable input?output boards |
International Journal of Computer Integrated Manufacturing / 33 / / 1156 - 1166 |
0951-192X |
|
2020 |
310 |
Kanmani P |
Markov based Genetic Algorithm (M-GA): To Mine Frequent Sub Components from Molecular Structures |
International Journal on Emerging Technologies / 11 / 2 / 516 - 523 |
2249-3255 |
|
2020 |
311 |
Kanmani P |
Analyzing and Optimizing the Usability of Website Access |
International Journal of Web Portals / 12 / 2 / 22 - 40 |
1938-0194 |
|
2020 |
312 |
Kanmani P |
Random Forest and SVM Analysis for Credit
Card fraud Detection |
Mukt Shabd Journal / 9 / 7 / 950 - 952 |
2347-3150 |
|
2020 |
313 |
Kanmani P |
A Review on Flood Prediction Algorithms and A Deep Neural Network Model for Estimation of Flood Occurrence |
International Research Journal of Multidisciplinary Technovation / 2 / 5 / 8 - 14 |
2582-1040 |
|
2020 |
314 |
Karthikeyan H |
IoT-based Smart HealthCare Video Surveillance System using Edge Computing |
Journal of Ambient Intelligence and Humanized Computing / / / - |
1868-5137, 1868-5145 |
|
2020 |
315 |
Kukatlapalli Pradeep Kumar |
Design of New Access Control Approach for Provenance Based on Digital Consortium Decision Making via Secret Sharing |
Journal of Computational and Theoretical Nanoscience / 17 / 10 / 4172 - 4178 |
1546-1963 |
|
2020 |
316 |
Kukatlapalli Pradeep Kumar |
Disaster recovery and risk management over private networks using data provenance: Cyber security perspective |
Indian Journal Of Science & Technology / 14 / 8 / 725 - 737 |
0974-6846, 0974-5645 |
|
2020 |
317 |
Kukatlapalli Pradeep Kumar |
Reflecto a smart mirror structure with a contextual association of internet of
Things
|
Information Technology in Industry / 9 / 2 / 984 - 988 |
2203-1731 |
|
2020 |
318 |
Kukatlapalli Pradeep Kumar |
Symbiotic view of provenance in cyber infrastructure and information security
|
Turkish Journal of Computer and Mathematics Education / 12 / 2 / 3261 - 3267 |
1309-4653 |
|
2020 |
319 |
Kukatlapalli Pradeep Kumar |
Fixed Angle Video Frame Diminution Technique for Vehicle Speed Detection |
Annals of the Romanian Society for Cell Biology / 25 / 2 / 3204 - 3210 |
1583-6258 |
|
2020 |
320 |
Manohar M |
A Big Data Analysis Using Fuzzy Deep Convolution Network Based Model for
Heart Disease Classification |
International Journal of Intelligent Engineering and Systems / 14 / 2 / 147 - 156 |
2185-3118 |
|
2020 |
321 |
Manohar M |
A Big Data Analysis Using Fuzzy Deep Convolution Network Based Model for
Heart Disease Classification |
The International Journal of Intelligent Engineering and Systems / 14 / 2 / 147 - 156 |
2185-3118 |
|
2020 |
322 |
Manohar M |
An efficient algorithmic technique for feature selection in IoT based intrusion detection system |
Indian Journal of Science and Technology / 14 / 1 / 76 - 85 |
0974-5645 |
|
2020 |
323 |
Mary Anita E A |
Smart Affect Recognition System for Real-Time Biometric Surveillance Using Hybrid Features and Multilayered Binary Structured Support Vector Machine |
The Computer Journal / / / - |
0010-4620 |
|
2020 |
324 |
Mary Anita E A |
A novel multi functional multi parameter
concealed cluster based data aggregation
scheme for wireless sensor networks
(NMFMP-CDA) |
Wireless Networks The Journal of Mobile Communication, Computation and Information / / / - |
1022-0038 |
|
2020 |
325 |
Mary Anita E A |
An efficient privacy-preserving model based on OMFTSA for query optimization in crowdsourcing |
Concurrency Computation Practice and Experience / 2021 / / 1 - 17 |
1532-0626, 1532-0634 |
|
2020 |
326 |
Mausumi Goswami |
An Empirical Analysis of Preprocessing Tasks for Unstructured Data
|
Journal of Computational and Theoretical Nanoscience / 17 / 9-10 / 4380 - 4384 |
1546-1955, 1546-1963 |
|
2020 |
327 |
Mausumi Goswami |
Performance Analysis and Evaluation of Feature Selection Techniques to Find Coherence Using Cosine Similarity |
Journal of Computational and Theoretical Nanoscience / 17 / 9-10 / 4106 - 4110 |
1546-1955, 1546-1963 |
|
2020 |
328 |
Mausumi Goswami |
A Comparative Analysis and Critical Review of Summarization Techniques |
Journal of Computational and Theoretical Nanoscience / 17 / 9-10 / 4167 - 4171 |
1546-1955, 1546-1963 |
|
2020 |
329 |
Merin Thomas |
Sentimental Analysis of transliterated text in Malayalam using RNN-LSTM |
Journal of Ambient Intelligence and Humanized Computing / / / - |
1868-5137 |
|
2020 |
330 |
Michael Moses T |
EMONET: A Cross Database Progressive Deep Network for Facial Expression Recognition |
International Journal of Intelligent Engineering and Systems / 13 / 6 / 31 - 41 |
2185-3118 |
|
2020 |
331 |
Michael Moses T |
Engagement Detection through Facial Emotional Recognition Using a Shallow
Residual Convolutional Neural Networks |
International Journal of Intelligent Engineering and Systems / 14 / 2 / 236 - 247 |
2185-310X |
|
2020 |
332 |
Michael Moses T |
Multimodal emotional analysis through hierarchical video summarization and face tracking |
Multimedia Tools and Applications / / / - |
1573-7721 |
|
2020 |
333 |
Michael Moses T |
Reflecto a smart mirror structure with a contextual association of internet of
Things
|
Information Technology in Industry / 9 / 2 / 984 - 988 |
2203-1731 |
|
2020 |
334 |
Mithun B N |
Comparison of Hadoop Scheduling Algorithms based on their Resource usage |
International Journal of Advances in Electronics and Computer Science / 8 / 2 / 5 - 9 |
2394-2835 |
|
2020 |
335 |
Muneeswari G |
Leaf Classifying Model in Crop Identification using Machine Learning
Algorithm |
International Research Journal of Engineering and Technology / 11 / 12 / 519 - 522 |
2395-0056 |
|
2020 |
336 |
Natarajan K |
Cryptanalysis Using Genetic Algorithm |
International Research Journal of Advanced Engineering and Science / 5 / 2 / 128 - 131 |
2455-9024 |
|
2020 |
337 |
Praveen Kulkarni |
Video Based Sub-Categorized Facial Emotion Detection Using LBP and Edge Computing |
Revue d'Intelligence Artificielle / / / - |
0992-499X |
|
2020 |
338 |
Praveen Naik |
Pain track analysis during gestation using machine learning techniques |
International Journal of Electrical and Computer Engineering (IJECE) / 11 / 3 / 2128 - 2133 |
2088-8708 |
|
2020 |
339 |
Praveen Naik |
Insights on Cost Estimation Methods and Its Uses in
Software Project Design |
Journal of Computational and Theoretical Nanoscience / 17 / / 1 - 5 |
1546-1955 |
|
2020 |
340 |
Raghavendra S |
Evaluation of Data Mining Techniques using Feature Selection Methods for Pima Indian Diabetes Dataset |
Solid State Technology / 63 / 6 / 9897 - 9911 |
0038-111X |
|
2020 |
341 |
Raghavendra S |
Electricity requirement prediction using time series and Facebook's PROPHET |
Indian Journal of Science and Technology / 13 / 47 / 4631 - 4645 |
0974-6846 |
|
2020 |
342 |
Raghavendra S |
Eye blink detection using CNN to detect drowsiness level in drivers for road safety |
Indonesian Journal of Electrical Engineering and Computer Science / 22 / 1 / - |
2502-4752 |
|
2020 |
343 |
Raju G |
Directional Vector-Based Skin Lesion Segmentation |
A Novel Approach to Skin Segmentation |
International Journal of Image and Graphics / 20 / 3 / 2050021-1 - 2050021-14 |
0219-4678 |
|
2020 |
344 |
Raju G |
An Empirical Study And Evaluation On Automatic Ear Detection |
International Journal of Computing / 19 / 4 / 575 - 582 |
1727-6209 |
|
2020 |
345 |
Raju G |
Automatic Skin Lesion Segmentation?A Novel Approach
of Lesion Filling through Pixel Path |
Pattern Recognition and Image Analysis / 30 / 4 / 815 - 826 |
1555-6212 |
|
2020 |
346 |
Raju G |
Statistical features from frame aggregation
and differences for human gait recognition |
Multimedia Tools and Applications / online first / / - |
1380-7501, 1573-7721 |
|
2020 |
347 |
Raju G |
Parallelization of Frequent Itemset Mining
Methods with FP-tree: An Experiment with
PrePost+ Algorithm |
The International Arab Journal of Information Technology / 8 / 2 / 208 - 213 |
1683-3198 |
|
2020 |
348 |
Ramesh Vatambeti |
A novel hybrid Optimized vehicle routes to enhance the vehicular ad hoc
network communication |
Materials Today: Proceedings / / / - |
2214-7853 |
|
2020 |
349 |
Ramesh Vatambeti |
A novel african buffalo based greedy routing
Technique for infrastructure and cluster
Based communication in vehicular ad-hoc
Network
|
Journal of Theoretical and Applied Information Technology / 99 / 5 / 1232 - 1243 |
1992-8645 |
|
2020 |
350 |
Ramesh Vatambeti |
Secured Personal Health Records using Pattern Based Verification and 2-Way Polynomial Protocol in Cloud Infrastructure |
International Journal of Ad Hoc and Ubiquitous Computing / / / - |
1743-8225 |
|
2020 |
351 |
Ramesh Vatambeti |
An efficient clustering approach for optimized path selection
and route maintenance in mobile ad hoc networks |
Journal of Ambient Intelligence and Humanized Computing / / / - |
1868-5137 |
|
2020 |
352 |
Ramesh Vatambeti |
A Novel Georouting Potency based Optimum Spider Monkey
Approach for Avoiding Congestion in Energy Efficient Mobile
Ad‑hoc Network |
Wireless Personal Communications / / / - |
0929-6212 |
|
2020 |
353 |
Rekha V |
Design of fuzzy logic controlled hybrid
model for the control of voltage and
frequency in microgrid |
Indian Journal of Science and Technology / 13 / 35 / 3612 - 3629 |
0974-5645 |
|
2020 |
354 |
Rekha V |
A comprehensive review of parallel concatenation of LDPC code techniques |
Indian Journal of Science and Technology / 14 / 5 / 432 - 444 |
0974-5645 |
|
2020 |
355 |
Rekha V |
Electricity requirement prediction using time series and Facebook's PROPHET |
Indian Journal of Science and Technology / 13 / 47 / 4631 - 4645 |
0974-6846 |
|
2020 |
356 |
Rekha V |
Eye blink detection using CNN to detect drowsiness level in drivers for road safety |
Indonesian Journal of Electrical Engineering and Computer Science / 22 / 1 / - |
2502-4752 |
|
2020 |
357 |
Samiksha Shukla |
Physical Fitness Recommender Framework for Thyroid Patients using Restricted
Boltzmann Machines |
International Journal of Intelligent Engineering and Systems / 13 / 5 / 247 - 256 |
2185-3118 |
|
2020 |
358 |
Sandeep Kumar |
Evolution of wireless sensor network design from technology centric to user centric: An architectural perspective |
International Journal of Distributed Sensor Networks / 16 / 8 / 01 - 24 |
1550- 1477 |
|
2020 |
359 |
Sandeep Kumar |
Descriptive analysis of COVID-19 patients in the context of India |
Journal of Interdisciplinary Mathematics / / / - |
0972-0529 |
|
2020 |
360 |
Sandeep Kumar |
Prediction of COVID-19 corona virus pandemic based on time series data using support vector machine |
Journal of Discrete Mathematical Sciences and Cryptography / 23 / 8 / 1583 - 1597 |
0972-0529 |
|
2020 |
361 |
Sandeep Kumar |
bSSA: Binary Salp Swarm Algorithm With Hybrid Data Transformation for Feature Selection |
IEEE Access / 9 / / 14867 - 14882 |
2169-3536 |
|
2020 |
362 |
Sandeep Kumar |
Spider Monkey Crow Optimization Algorithm With Deep Learning for Sentiment Classification and Information Retrieval |
IEEE Access / 9 / / 24249 - 24262 |
2169-3536 |
|
2020 |
363 |
Sandeep Kumar |
Performance investigation of PID controller in trajectory control of two-link robotic manipulator in medical robots |
Journal of Interdisciplinary Mathematics / 24 / 2 / 467 - 478 |
0972-0502 |
|
2020 |
364 |
Sandeep Kumar |
Predicting of Open Source Software Component Reusability Level Using Object-Oriented Metrics by Taguchi Approach |
International Journal of Software Engineering and Knowledge Engineering / 31 / 2 / 147 - 166 |
0218-1940 |
|
2020 |
365 |
Sandeep Kumar |
Hybrid AODV: An Efficient Routing Protocol for Manet Using MFR and Firefly Optimization Technique |
Journal of Interconnection Networks / 21 / 1 / - |
0219-2659 |
|
2020 |
366 |
Sathish Kumar R |
Effective storage of goods in a warehouse using farm optimisation algorithm |
International Journal of Cloud Computing / 9 / 2/3 / 207 - 215 |
2043-9997, 2043-9989 |
|
2020 |
367 |
Sathish Kumar R |
Optimal arrangement of ration items into container using modified forest optimization algorithm |
Indian Journal of Computer Science and Engineering / 11 / 4 / 334 - 346 |
0976-5166 |
|
2020 |
368 |
Sathish Kumar R |
Smart Frame Work for Container Loading Using Forest Optimization Algorithm |
Sambodhi Journal / 43 / 3 / 230 - 236 |
2249-6661 |
|
2020 |
369 |
Sathish Kumar R |
Monitoring In-House Patients During Pandemic
using Internet of Things |
International Journal of Recent Technology and Engineering / 10 / 1 / 178 - 183 |
2277-3878 |
|
2020 |
370 |
Sathish Kumar R |
IoT-based Smart HealthCare Video Surveillance System using Edge Computing |
Journal of Ambient Intelligence and Humanized Computing / / / - |
1868-5137, 1868-5145 |
|
2020 |
371 |
Siddhartha Bhattacharyya |
Border Collie Optimization |
IEEE Access / 8 / / 109177 - 109197 |
2169-3536 |
|
2020 |
372 |
Siddhartha Bhattacharyya |
Colonoscopy contrast-enhanced by intuitionistic fuzzy soft sets for polyp cancer localization |
Applied Soft Computing / 95 / / 1 - 20 |
1568-4946 |
|
2020 |
373 |
Siddhartha Bhattacharyya |
Sentiment Analysis of COVID-19 tweets by Deep Learning Classifiers?A study to show how popularity is affecting accuracy in social media |
Applied Soft Computing / 97 / / 1 - 14 |
1568-4946 |
|
2020 |
374 |
Siddhartha Bhattacharyya |
Multi-stage fuzzy swarm intelligence for automatic hepatic lesion segmentation from CT scans |
Applied Soft Computing / 96 / / 1 - 17 |
1568-4946 |
|
2020 |
375 |
Sujatha A K |
A Two-Stepped Feature Engineering Process for Topic Modeling Using
Batchwise LDA with Stochastic Variational Inference Model |
International Journal of Intelligent Engineering and Systems / 13 / 4 / 333 - 345 |
2185-3118 |
|
2020 |
376 |
Sujatha A K |
Identification of misconceptions about corona outbreak using trigrams and weighted TF-IDF model |
Journal of Advanced Research in Dynamical and Control Systems / 12 / 05-Special Issue / 524 - 533 |
1943-023X |
|
2020 |
377 |
Vandana Reddy |
Revised Beaconing Glowworm Swarm Optimization Ant Colony Optimization (RB-GSOACO) algorithm to localize nodes and optimize the energy consumed by nodes in WSN |
Concurrency Computation: Practice and Experience / / / - |
1532-0626, 1532-0634 |
|
2020 |
378 |
Vandana Reddy |
Redefined Vector Based Glowworm Swarm Optimization (R-VBGSO) to improve the node lifetime in WSN |
Journal of Green Engineering / 10 / 11 / 11047 - 11061 |
1904-4720 |
|
2020 |
379 |
Vandana Reddy |
Pain track analysis during gestation using machine learning techniques |
International Journal of Electrical and Computer Engineering (IJECE) / 11 / 3 / 2128 - 2133 |
2088-8708 |
|
2020 |
380 |
Vinai George Biju |
Analysis of Differentially Expressed Genes in Prunus persica for the Treatment of Hypoxia Using Generalized Linear Models |
Journal of Computational and Theoretical Nanoscience / 17 / 9 / 4183 - 4189 |
1546-1955 |
|
2020 |
381 |
Vinai George Biju |
Laplacian Likelihood based Generalized Additive Model for RNA-Seq Analysis of Oral Squamous Cell Carcinoma |
International Journal of Cognitive Informatics and Natural Intelligence / 15 / 4 / - |
1557-3958 |
|
2020 |
382 |
Vinai George Biju |
Gaussian SVM to model Bond Energy Interaction of Cisplatin with Collagen alpha-1(VII) for Oral Squamous Cancer |
Seybold Report / 15 / 7 / 1631 - 1642 |
1533-9211 |
|
2020 |
383 |
Vinai George Biju |
A multilevel analysis of hiv1-miR-H1 miRNA using KPCA, K-means, Random Forest and online target tools |
International Journal of Bioinformatics Research and Applications / 17 / / 111 - 134 |
1744-5493 |
|
2020 |
384 |
Xavier C |
Parallel Algorithm to find integer k where a given well-distributed graph is k metric dimensional |
Advances in Intelligent Systems and Computing / 1333 / 1333 / 145 - 154 |
2194-5357 |
|
2020 |
385 |
Xavier C |
On Statistical Tools to find the Equitable Antimagic Labelling of Complete Graphs |
Lecture Notes in Networks and Systems / 978 / / - |
2367-3370 |
|
2020 |
386 |
Xavier C |
Algorithms for the metric dimension of a simple graph |
Lecture Notes in Networks and Systems / 132 / NA / 91 - 105 |
2367-3370 |
|
2020 |
387 |
Addapalli V N Krishna |
A Machine Learning Model for Population Analysis among Different States in India which Influences the Socio, Demographic and Economic Needs of Society
|
International Journal of Engineering and Advanced Technology (IJEAT) / 9 / 1 / 123 - 126 |
2249-8958 |
|
2019 |
388 |
Addapalli V N Krishna |
A Secured and Scalable Battle-Field Surveillance using WSN Multicasting
|
International Journal of Engineering and Advanced Technology / 9 / 2 / 2445 - 2449 |
2249-8958 |
|
2019 |
389 |
Addapalli V N Krishna |
Statistical Tests For Key Strength Identification In Cryptography |
International Journal Of Scientific & Technology Research / 9 / 2 / 4243 - 4245 |
2277-8616 |
|
2019 |
390 |
Addapalli V N Krishna |
A New Algorithm With Its Randomness And Effectiveness Against Statistical Tests In Data Encryption |
International Journal of Scientific & Technology Research / 9 / 2 / 6185 - 6187 |
2277-8616 |
|
2019 |
391 |
Addapalli V N Krishna |
An Energy Efficient Node Scheduling based Congestion Control Scheme for WSN Multicasting |
EAI Endorsed Transactions on Energy Web / 7 / 30 / 1 - 6 |
2032-944X |
|
2019 |
392 |
Addapalli V N Krishna |
A Study On Prediction Of Health Care Data Using Machine Learning |
International Journal Of Scientific & Technology Research / 9 / 4 / 616 - 620 |
2277-8616 |
|
2019 |
393 |
Addapalli V N Krishna |
A Study On Prediction Of Health Care Data Using
Machine Learning |
International Journal of Scientific & Technology Research / 9 / 04 / 616 - 620 |
2277-8616 |
|
2019 |
394 |
Ajit Danti |
3D Face Reconstruction Techniques: Passive Methods |
International Journal of Recent Technology and Engineering / 8 / 2 / 4354 - 4364 |
2277-3878 |
|
2019 |
395 |
Ajit Danti |
Image Stenography based Cryptography |
International Journal of Scientific and Engineering Research (IJSER) / 11 / 3 / 1256 - 1260 |
2229-5518 |
|
2019 |
396 |
Ajit Danti |
Human Behavior Prediction based on Opinions using Machine Learning Techniques |
International Journal of Recent Technology and Engineering (IJRTE) / 8 / 6 / 3117 - 3120 |
2277-3878 |
|
2019 |
397 |
Alok Kumar Pani |
Resource Allocation Using Democratic Grey Wolf Optimization in Cloud Computing Environment
|
International Journal of Intelligent Engineering and Systems / 12 / 4 / 358 - 366 |
2185-3118 |
|
2019 |
398 |
Alok Kumar Pani |
A Prediction Technique for Heart Disease Based on Long Short Term Memory Recurrent Neural Network |
International Journal of Intelligent Engineering and Systems / 13 / 2 / 31 - 39 |
2185-310X |
|
2019 |
399 |
Aruna S K |
Designing a Dynamic Topology (DHT) for Cluster Head Selection in Mobile Adhoc Network |
Mobile Networks and Applications / / / - |
1572-8153 |
|
2019 |
400 |
Aruna S K |
A Unique Adventure - Unity Based 3D Game |
Journal of Advanced Research in Dynamical and Control Systems / 11 / Special issue 02 / 1953 - 1959 |
1943-023X |
|
2019 |
401 |
Aruna S K |
Computerized grading of brain tumors supplemented by artificial intelligence |
Soft Computing A Fusion of Foundations, Methodologies and Applications / / / - |
1432-7643 |
|
2019 |
402 |
Aruna S K |
An Advanced Variable Temperature Refrigerator for Preservation And Management Of Food Items |
Journal of Advanced Research in Dynamical and Control Systems / 11 / Special issue 02 / 1960 - 1966 |
1943-023X |
|
2019 |
403 |
Balachandran K |
Lung Cancer Diagnosis from Ct Images Based on Pre-Processing and Ensemble Learning |
International Journal of Recent Technology and Engineering (IJRTE) / 8 / 4 / 10294 - 10297 |
2277-3878 |
|
2019 |
404 |
Balachandran K |
Self-Supervised Learning Based Anomaly Detection in Online Social Media |
International Journal of Intelligent Engineering and Systems / 13 / 3 / 446 - 456 |
2185-3118 |
|
2019 |
405 |
Balachandran K |
A Study On Prediction Of Health Care Data Using
Machine Learning |
International Journal of Scientific & Technology Research / 9 / 04 / 616 - 620 |
2277-8616 |
|
2019 |
406 |
Balachandran K |
A Study On Prediction Of Health Care Data Using Machine Learning |
International Journal Of Scientific & Technology Research / 9 / 4 / 616 - 620 |
2277-8616 |
|
2019 |
407 |
Balamurugan M |
A Study On Prediction Of Health Care Data Using
Machine Learning |
International Journal of Scientific & Technology Research / 9 / 04 / 616 - 620 |
2277-8616 |
|
2019 |
408 |
Balamurugan M |
A Machine Learning Model for Population Analysis among Different States in India which Influences the Socio, Demographic and Economic Needs of Society
|
International Journal of Engineering and Advanced Technology (IJEAT) / 9 / 1 / 123 - 126 |
2249-8958 |
|
2019 |
409 |
Balamurugan M |
A Study On Prediction Of Health Care Data Using Machine Learning |
International Journal Of Scientific & Technology Research / 9 / 4 / 616 - 620 |
2277-8616 |
|
2019 |
410 |
Bijeesh T V |
Evaluation of Machine Learning Algorithms for Surface Water Delineation Using Landsat 8 Images |
Journal of Advanced Research in Dynamical Control Systems / 12 / 3 / 207 - 216 |
1943-023X |
|
2019 |
411 |
Boppuru Rudra Prathap |
Geo-Spatial Crime Analysis Using Newsfeed Data in Indian Context |
International Journal of Web-Based Learning and Teaching Technologies(IJWLTT) / 14 / 4 / 49 - 64 |
1548-1093 |
|
2019 |
412 |
Boppuru Rudra Prathap |
Geospatial Crime Analysis to Determine Crime Density Using Kernel Density Estimation for the Indian Context |
Journal of Computational and Theoretical Nanoscience / 17 / 1 / 74 - 86 |
1546-1955 |
|
2019 |
413 |
Boppuru Rudra Prathap |
Hand Kinesics in Indian Sign Language using
NLP Techniques with SVM Based Polarity |
International Journal of Engineering and Advanced Technology / 9 / 4 / 2044 - 2051 |
2249-8958 |
|
2019 |
414 |
Cherukuri Ravindranath Chowdary |
Secure provenance-based communication using visual encryption |
International Journal of Innovative Computing and Applications / 10 / 3 / 194 - 206 |
1751-648X, 1751-6498 |
|
2019 |
415 |
Debasish Mukherjee |
Hardware Efficient Architecture for 2D DCT and IDCT using Taylor-series Expansion of Trigonometric Functions |
IEEE Transactions on Circuits and Systems for Video Technology / NA / NA / 1 - 1 |
Print ISSN:1051-8215 Online ISSN: 1558-2205 |
|
2019 |
416 |
Diana Jeba Jingle I |
EShield: An Effective Detection and Mitigation of Flooding in DDoS Attacks over Large Scale Networks |
International Journal of Engineering and Advanced Technology (IJEAT) / 8 / 5 / 1557 - 1562 |
2249-8958 |
|
2019 |
417 |
Diana Jeba Jingle I |
Automatic Wireless Water Management System(AWWMS) for Smart Vineyard Irrigation using IoT Technology |
International Journal of Oceans and Oceanography / 13 / 1 / 211 - 218 |
0973-2667 |
|
2019 |
418 |
Diana Jeba Jingle I |
Distributed Denial-Of-Service Detection And Mitigation Using Software-Defined Network And Internet Of Things |
Journal of Advanced Research in Dynamical and Control Systems / 11 / Special Issue-08 / 2778 - 2787 |
1943-023X |
|
2019 |
419 |
Divya Vetriveeran |
Aligning large biomedical ontologies for semantic interoperability using graph partitioning |
International Journal of Biomedical Engineering and Technology / 31 / 2 / 137 - 160 |
1752-6418, 1752-6426 |
|
2019 |
420 |
Ganesh Kumar R |
Research Aligned Analysis on Web Access
Behavioral Pattern Mining for User
Identification |
International Journal of Engineering and Advanced Technology / 8 / 6 / 5062 - 5067 |
2249-8958 |
|
2019 |
421 |
Gokulapriya R |
Research Aligned Analysis on Web Access
Behavioral Pattern Mining for User
Identification |
International Journal of Engineering and Advanced Technology / 8 / 6 / 5062 - 5067 |
2249-8958 |
|
2019 |
422 |
Gurudas V R |
Review on Neural Networks Based Techniques for Detection of Breast Cancer Cells. |
Test Engineering and Management / 82 / Jan Feb 2020 / 184 - 191 |
0193-4120 |
|
2019 |
423 |
Jayapandian N |
Distributed Denial-Of-Service Detection And Mitigation Using Software-Defined Network And Internet Of Things |
Journal of Advanced Research in Dynamical and Control Systems / 11 / Special Issue-08 / 2778 - 2787 |
1943-023X |
|
2019 |
424 |
Jayapandian N |
Community Based Open Source Geographical Classical Data Analysis |
International Journal of Recent Technology and Engineering (IJRTE) / 8 / 1 / 413 - 418 |
2277-3878 |
|
2019 |
425 |
Julian Benadit P |
An improved Sub Word Model based Continuous Robust Automatic Speech Recognition System for Tamil Language |
Test Engineering and Management / 82 / / 15785 - 15793 |
0193-4120 |
|
2019 |
426 |
Julian Benadit P |
Smart Metering System with Google Assistant |
International Research Journal of Multidisciplinary Technovation / 2 / 3 / 7 - 13 |
2582-1040 |
|
2019 |
427 |
Jyothi Mandala |
PSV-GWO: Particle Swarm Velocity Aided
GWO for Privacy Preservation of Data |
Journal of Cyber Security and Mobility / 8 / 4 / 439 - 466 |
2245-4578 |
|
2019 |
428 |
Jyothi Thomas |
Light Tracking Bot Endorsing Futuristic Underground Trnsportation |
Lecture Notes on Data Engineering and Communications Technologies / / / - |
2367-4512, 2367-4520 |
|
2019 |
429 |
Kukatlapalli Pradeep Kumar |
Secure provenance-based communication using visual encryption |
International Journal of Innovative Computing and Applications / 10 / 3 / 194 - 206 |
1751-648X, 1751-6498 |
|
2019 |
430 |
Kukatlapalli Pradeep Kumar |
Smart Metering System with Google Assistant |
International Research Journal of Multidisciplinary Technovation / 2 / 3 / 7 - 13 |
2582-1040 |
|
2019 |
431 |
Mahesh D S |
Adaptive uplink scheduling model for WiMAX network using
evolutionary computing model |
Indonesian Journal of Electrical Engineering and Computer Science / 14 / 2019 / 1345 - 1355 |
2502-4752 |
|
2019 |
432 |
Mahesh D S |
Optimized Uplink Scheduling Model through Novel Feedback Architecture for Wimax Network |
International Journal of Innovative Technology and Exploring Engineering (IJITEE) / 9 / 1 / 1353 - 1359 |
2278-3075 |
|
2019 |
433 |
Manohar M |
A Prediction Technique for Heart Disease Based on Long Short Term Memory Recurrent Neural Network |
International Journal of Intelligent Engineering and Systems / 13 / 2 / 31 - 39 |
2185-310X |
|
2019 |
434 |
Manohar M |
Novel Methods for Crop Prediction based on
Influencing Parameters in Indian Regions using
Data Mining |
International Journal of Engineering and Advanced Technology / 9 / 9 / 3391 - 3398 |
2249-8958 |
|
2019 |
435 |
Manu Elappila |
Survivability Aware Channel Allocation in WSN for IoT applications |
Pervasive and Mobile Computing / 61 / / 101107 - |
1574-1192 |
|
2019 |
436 |
Mausumi Goswami |
A Comparative Study On The Significance Of Computer Oriented Numerical Analysis In Solving Problems Using Differentiation And Integration |
Journal of Emerging Technologies and Innovative Research / 5 / 9 / 206 - 211 |
2349-5162 |
|
2019 |
437 |
Mausumi Goswami |
An Empirical Analysis of Similarity Measures for Unstructured Data |
COMPUSOFT, An international journal of advanced computer technology, 8(8), August-2019 (Volume-VIII, / 8 / 8 / 3302 - 3306 |
2320-0790 |
|
2019 |
438 |
Mausumi Goswami |
Design of an IoT Based Autonomous Vehicle with Fuzzy Logic Controller |
Journal of Emerging Technologies and Innovative Research / 6 / 5 / 529 - 533 |
2349-5162 |
|
2019 |
439 |
Melbin J Reena |
Secured Storage of Big Data in Cloud |
International Journal of Recent Technology and Engineering / 8 / 2S3 / 6 - 10 |
2277-3878 |
|
2019 |
440 |
Melbin J Reena |
Preprocessing Big Data for Efficient Storage and Research |
International Journal of Recent Technology and Engineering / 8 / 2S3 / 11 - 16 |
2277-3878 |
|
2019 |
441 |
Merin Thomas |
Identification of language in a cross linguistic environment |
Indonesian Journal of Electrical Engineering and Computer Science / 18 / 1 / 544 - 545 |
2502-4752 |
|
2019 |
442 |
Merin Thomas |
An Advanced Variable Temperature Refrigerator for Preservation And Management Of Food Items |
Journal of Advanced Research in Dynamical and Control Systems / 11 / Special issue 02 / 1960 - 1966 |
1943-023X |
|
2019 |
443 |
Michael Moses T |
An improved Sub Word Model based Continuous Robust Automatic Speech Recognition System for Tamil Language |
Test Engineering and Management / 82 / / 15785 - 15793 |
0193-4120 |
|
2019 |
444 |
Muneeswari G |
Process Scheduling in Heterogeneous Multicore System using Agent based Graph Coloring Algorithm |
International Journal of Recent Technology and Engineering / 8 / 3 / 8449 - 8452 |
2277-3878 |
|
2019 |
445 |
Natarajan K |
Foreground Algorithms for detection and extraction of an object in multimedia |
International journal of electrical and computer engineering(IJECE) / 10 / 2 / 1849 - 1858 |
2088-8708 |
|
2019 |
446 |
Praveen Kulkarni |
Analysis on techniques used to recognize and identifying the Human emotions |
International Journal of Electrical and Computer Engineering / 10 / 3 / 3307 - 3314 |
2088-8708 |
|
2019 |
447 |
Praveen Naik |
Novel Optimized and Intellectual Model for Efficient Cost Estimation in Web-Components Designing |
Journal of Web Engineering / 18 / 4 / 5074 - 5083 |
1540-9589 |
|
2019 |
448 |
Raghavendra S |
Evaluating The Performance of Machine
Learning using Feature Selection Methods on
Dengue Dataset |
International Journal of Engineering and Advanced Technology (IJEAT) / 8 / 5 / 2679 - 2685 |
2249-8958 |
|
2019 |
449 |
Raghavendra S |
Big data Performance Evaluation of Map-Reduce
Pig and Hive |
International Journal of Engineering and Advanced Technology (IJEAT) / 8 / 6 / 2982 - 2985 |
2249-8958 |
|
2019 |
450 |
Raghavendra S |
Performance evaluation of random forest with feature selection
methods in prediction of diabetes |
International Journal of Electrical and Computer Engineering (IJECE) / 10 / 1 / 353 - 359 |
2088-8708 |
|
2019 |
451 |
Raghavendra S |
Performance evaluation of Map-reduce jar pig hive and spark with machine learning using big data |
International Journal of Electrical and Computer Engineering (IJECE) / 10 / 4 / 3811 - 3818 |
2088-8708 |
|
2019 |
452 |
Raju G |
A Novel Equalization scheme for the selective enhancement of optical disk and cup regions and background suppression in fundus imagery |
TELKOMNIKA / 17 / 4 / 1715 - 1722 |
1693-6930 |
|
2019 |
453 |
Raju G |
Cuda Implementation of Nonlocal Means Algorithm for GPU Processors |
Indian Journal of Computer Science and Engineering (IJCSE) / 11 / 1 / 66 - 75 |
0976-5166 |
|
2019 |
454 |
Raju G |
Automatic 2D Ear Detection: A Survey |
International Journal Of Scientific & Technology Research / 8 / 11 / 3643 - 3647 |
2277-8616 |
|
2019 |
455 |
Rekha V |
Performance Analysis of Different Classifier for Remote Sensing Application |
International Journal of Engineering and Advanced Technology (IJEAT) / 9 / 1 / 7153 - 7158 |
2249-8958 |
|
2019 |
456 |
Rekha V |
Foreground algorithms for detection and extraction of an object in multimedia |
International Journal of Electrical and Computer Engineering (IJECE) / 10 / 2 / 1849 - 1858 |
2088-8708 |
|
2019 |
457 |
Rekha V |
Foreground Algorithms for detection and extraction of an object in multimedia |
International journal of electrical and computer engineering(IJECE) / 10 / 2 / 1849 - 1858 |
2088-8708 |
|
2019 |
458 |
Samiksha Shukla |
Framework For Proactive Visualization Of Text Based Narrative Using NLP |
International Journal of Scientific and Technology Research / 9 / 2 / 239 - 248 |
2277-8616 |
|
2019 |
459 |
Samiksha Shukla |
Design of Personalized Diet and Physical Activities Recommendation Framework for Hypothyroid Patients |
International Journal of Recent Technology and Engineering / 8 / 3 / 5441 - 5445 |
2277-3878 |
|
2019 |
460 |
Sandeep Kumar |
Proficient QoS Based Target Coverage Problem in Wireless Sensor Networks |
IEEE Access / 8 / / 74315 - 74325 |
2169-3536 |
|
2019 |
461 |
Sandeep Kumar |
A systematic literature review and comparative study of different software quality models |
of Discrete Mathematical Sciences & Cryptography / 23 / 2 / 585 - 593 |
0972-0529 |
|
2019 |
462 |
Sandeep Kumar |
Target K-coverage problem in wireless sensor networks |
Journal of Discrete Mathematical Sciences & Cryptography / 23 / 2 / 651 - 659 |
0972-0529 |
|
2019 |
463 |
Sandeep Kumar |
Multi-level image thresholding based on Kapur and Tsallis entropy and firefly algorithm |
Journal of Interdisciplinary Mathematics / 23 / 2 / 563 - 571 |
0972-0502 |
|
2019 |
464 |
Sandeep Kumar |
Peregrine preying pattern based differential evolution for robot path planning |
Journal of Interdisciplinary Mathematics / 23 / 2 / 555 - 562 |
0972-0502 |
|
2019 |
465 |
Sandeep Kumar |
Modified local link failure recovery multicast routing protocol for MANET |
Journal of Information & Optimization Sciences / 41 / 2 / 669 - 677 |
0252-2667 |
|
2019 |
466 |
Sandeep Kumar |
Modified differential evolution algorithm for solving minimum spanning tree |
Journal of Information & Optimization Sciences / 41 / 2 / 633 - 639 |
0252-2667 |
|
2019 |
467 |
Sandeep Kumar |
Revisiting agile software development process based on latest software industry trends |
Journal of Information & Optimization Sciences / 41 / 2 / 533 - 541 |
0252-2667 |
|
2019 |
468 |
Sandeep Kumar |
Development of Hybrid Ad Hoc on Demand Distance Vector Routing Protocol in Mobile Ad hoc Network |
International Journal on Emerging Technologies / 11 / 2 / 135 - 139 |
0975-8364 |
|
2019 |
469 |
Sandeep Kumar |
Hyperbolic Spider Monkey Optimization Algorithm |
Recent Advances in Computer Science and Communications, Formerly: Recent Patents on Computer Science / 13 / 1 / 35 - 42 |
1874-4796 |
|
2019 |
470 |
Sandeep Kumar |
DWT-DCT Based copyright Protection In Ycbcr Color Space |
International Journal of Innovative Technology and Exploring Engineering / 8 / 10 / 675 - 679 |
2278-3075 |
|
2019 |
471 |
Sandeep Kumar |
Archimedean spiral based artificial bee colony algorithm |
Journal of Statistics and Management Systems / 22 / 7 / 1301 - 1313 |
0972-0510 |
|
2019 |
472 |
Shamanth N |
Multiple token-based neighbor discovery for directional sensor networks |
ETRI Journal / 42 / 3 / 351 - 365 |
2233-7326 |
|
2019 |
473 |
Shamanth N |
Hybrid area exploration?based mobility-assisted localization with sectored antenna in wireless sensor networks |
International Journal of Communication Systems / 33 / 4 / 1 - 24 |
1099-1131 |
|
2019 |
474 |
Siddhartha Bhattacharyya |
A Survey of Sentiment Analysis from Social Media Data |
IEEE Transactions on Computational Social Systems / / / 1 - 15 |
2329-924X |
|
2019 |
475 |
Siddhartha Bhattacharyya |
Lightweight Spectral-Spatial Squeeze-and-Excitation Residual Bag-of-Features Learning for Hyperspectral Classication |
IEEE Transactions on Geoscience and Remote Sensing / / / 1 - 14 |
0196-2892 |
|
2019 |
476 |
Siddhartha Bhattacharyya |
Novel quantum inspired approaches for automatic clustering of gray level images using Particle Swarm Optimization, Spider Monkey Optimization and Ageist Spider Monkey Optimization algorithms |
Applied Soft Computing / 88 / / 1 - 29 |
1568-4946 |
|
2019 |
477 |
Siddhartha Bhattacharyya |
A Quantum-Inspired Self-Supervised Network model for automatic segmentation of brain MR images |
Applied Soft Computing / 93 / / 1 - 21 |
1568-4946 |
|
2019 |
478 |
Sujatha A K |
Self-Supervised Learning Based Anomaly Detection in Online Social Media |
International Journal of Intelligent Engineering and Systems / 13 / 3 / 446 - 456 |
2185-3118 |
|
2019 |
479 |
Sundara Pandiyan S |
An improved Sub Word Model based Continuous Robust Automatic Speech Recognition System for Tamil Language |
Test Engineering and Management / 82 / / 15785 - 15793 |
0193-4120 |
|
2019 |
480 |
Sundara Pandiyan S |
A Study of Language Models in Automatic Speech Recognition System |
Test Engineering and Management / 82 / / 16635 - 16640 |
0193-4120 |
|
2019 |
481 |
Vandana Reddy |
Energy efficient data transmission in WSN thru compressive slender penetrative etiquette |
Journal of Ambient Intelligence and Humanized Computing / 11 / 3 / 1345 - 1359 |
1868-5137 |
|
2019 |
482 |
Vandana Reddy |
Highly Efficient Particle Swarm Optimization for Energy Efficiency in Wireless Sensor Network WSN using Energy Capping and Predictive Energy Allocation (EC-PEA) |
International Journal of Biomedical Engineering and Technology / / / - |
1752-6418 |
|
2019 |
483 |
Addapalli V N Krishna |
A New Cipher with Double Encryption |
JNNCE Journal of Engineering & Management (JJEM) / 2 / 1 / 1 - 7 |
|
|
2018 |
484 |
Addapalli V N Krishna |
A Big data Security mechanism based on fully Homomorphic encryption using Cubic spline curve public key cryptography |
Journal of Information & Optimization sciences / 39 / 6 / 1387 - 1399 |
02522667 |
|
2018 |
485 |
Addapalli V N Krishna |
A Modified Needham Schroeder protocol with Matrix based Private Key Crypto Systems |
International Journal Of Research And Analytical Reviews (IJRAR) / 5 / 4 / 853 - 856 |
2348-1269, 2349-5138 |
|
2018 |
486 |
Addapalli V N Krishna |
Performance Evaluation of Diesel engine by feature selection of Exhaust using Machine Learning Algorithm |
International Journal of Engineering Science Invention (IJESI) / 7 / 12 / 24 - 28 |
2319- 6734, 2319-6726 |
|
2018 |
487 |
Addapalli V N Krishna |
Performance Evaluation of Diesel Engine using Genetic Algorithm
|
International Journal of Engineering and Advanced Technology (IJEAT) / 8 / 2 / 155 - 158 |
2249-8958 |
|
2018 |
488 |
Addapalli V N Krishna |
Predictive analysis using resilient and traditional backpropaga-tion algorithm |
International Journal of Engineering & Technology / 7 / 4 / 4411 - 4414 |
2227-524X |
|
2018 |
489 |
Addapalli V N Krishna |
A Novel Congestion-Aware Approach for ECC based Secured WSN Multicasting |
Journal of Adv Research in Dynamical & Control Systems / 10 / 10 / 83 - 91 |
1943-023X |
|
2018 |
490 |
Addapalli V N Krishna |
A Random Oriented Identity Based Encryption Process |
International Journal Of Advanced Studies Of Scientific Research / 1 / / 18 - 20 |
2460-4010 |
|
2018 |
491 |
Ajit Danti |
Feature Based Sentimental Analysis on Mobile Web Domain |
IOSR Journal of Engineering (IOSR-JEN) / 6 / 8 / 1 - 7 |
2278-8719 |
|
2018 |
492 |
Ajit Danti |
Classification of compressed and uncompressed text documents |
Journal of Future Generation Computer Systems(FGCS / 88 / 1 / 614 - 623 |
0167-739X |
|
2018 |
493 |
Ajit Danti |
Online Fake Review Identification based on Decision Rules |
International Journal of Advanced Trends in Computer Science and Engineering / 8 / 2 / 140 - 143 |
2278-3091 |
|
2018 |
494 |
Alok Kumar Pani |
An Improved Approach for Monitoring and Controlling of Flyovers and Bridges Using Internet of Things |
International Journal of Computer Sciences and Engineering / 7 / 1 / 577 - 582 |
2347-2693 |
|
2018 |
495 |
Alok Kumar Pani |
An Innovative Approach for Risk Identification and Management in Software Projects |
International Journal of Computer Sciences and Engineering / 7 / 2 / 647 - 654 |
2347-2693 |
|
2018 |
496 |
Alok Kumar Pani |
Data Analysis on Live Social Media Data |
Journal of Emerging Technologies and Innovative Research / 6 / 2 / 114 - 120 |
2349-5162 |
|
2018 |
497 |
Arul V |
Privacy Preservation Of Micro Data Publishing Using Fragmentation |
ICTACT Journal On Soft Computing / 9 / 3 / 1945 - 1949 |
2229-6956 |
|
2018 |
498 |
Balamurugan M |
Analyzing Student's Academic Performance Using Multilayer Perceptron Model |
International Journal of Recent Technology & Engineering / 7 / 5S3 / 156 - 160 |
2277-3878 |
|
2018 |
499 |
Balamurugan M |
An Efficient Scheme for Water Leakage Detection Using Support Vector Machines (SVM) ? Zig |
International Journal of Recent Technology & Engineering / 7 / 6S4 / 39 - 46 |
2277-3878 |
|
2018 |
500 |
Boppuru Rudra Prathap |
An Overview of Heuristic Based Crime Prediction and Analysis Using Social Media Data |
Journal of Emerging Technologies and Innovative Research / 5 / 12 / 582 - 590 |
2349-5162 |
|
2018 |
501 |
Boppuru Rudra Prathap |
Operating Systems for Mobiles until late 2018: A Comparative Survey and Overview |
International Journal of Computer Sciences and Engineering / 6 / 12 / 576 - 581 |
2347-2693 |
|
2018 |
502 |
Boppuru Rudra Prathap |
A Pragmatic Study on Heuristic Algorithms for Prediction and Analysis of Crime Using Social Media Data |
Journal of Advanced Research in Dynamical and Control Systems / 11 / 2 / 30 - 36 |
1943-023X |
|
2018 |
503 |
Cherukuri Ravindranath Chowdary |
Application of Visual Encryption and its Inferences in Data Provenance |
International Journal of Computer Sciences and Engineering / 7 / 5 / 1088 - 1094 |
2347-2693 |
|
2018 |
504 |
Daniel D |
Enhanced Resource Allocation In Wireless Networks Using Virtualization |
International Journal of Pure and Applied Mathematics / 119 / 12 / 1459 - 1470 |
1311-8080, 1314-3395 |
|
2018 |
505 |
Daniel D |
A Novel Method Of Obstacle And Slew Aware 3-D Gated Clock Tree Synthesis |
International Journal of Pure and Applied Mathematics / 119 / 12 / 1451 - 1457 |
1311-8080, 1314-3395 |
|
2018 |
506 |
Daniel D |
User Request Scheduling for Multimedia Resource using improved fuzzy logic with Hybrid Lyapunov based algorithm in Hybrid Cloud |
International Journal of Recent Technology and Engineering (IJRTE) / 7 / 6 / 1432 - 1436 |
2277-3878 |
|
2018 |
507 |
Debarka Mukhopadhyay |
A QCA design and energy analysis of binary semaphore with a comprehensive case study |
Innovations in Systems and Software Engineering, A NASA Journal / 15 / / 343 - 354 |
1614-5046 |
|
2018 |
508 |
Diana Jeba Jingle I |
A Novel optimal Email Feature Selection Protocol (OEFS) for Detecting Spam Emails |
International Journal of Computer Sciences and Engineering / 7 / 16 / 34 - 39 |
2347-2693 |
|
2018 |
509 |
Ganesh Kumar R |
Workflow Scheduling Using Heuristic Scheduling in Hadoop |
Journal of Information and Communication Convergence Engineering (JICCE) / 16 / 4 / 264 - 270 |
2234-8255 |
|
2018 |
510 |
Ganesh Kumar R |
Behavioral Pattern Mining for User Identity and Access Control
A Cluster based Ensemble Model |
International Journal of Engineering and Technology (UAE) / 7 / 3.50 / 438 - 444 |
2227-524X |
|
2018 |
511 |
Gnana Prakasi O S |
Decision Tree Based Routing Protocol (DTRP) for Reliable Path in MANET |
Wireless Personal Communication / 109 / 1 / 257 - 270 |
1572-834X |
|
2018 |
512 |
Gokulapriya R |
Behavioral Pattern Mining for User Identity and Access Control
A Cluster based Ensemble Model |
International Journal of Engineering and Technology (UAE) / 7 / 3.50 / 438 - 444 |
2227-524X |
|
2018 |
513 |
Jayapandian N |
Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space |
Brazilian Archives of Biology and Technology / 61 / 1516-8913 / 1 - 13 |
1678-4324 |
|
2018 |
514 |
Jenefa J |
An Enhanced Secure Authentication Scheme for Vehicular Ad Hoc Networks Without Pairings |
Wireless Personal Communications / 106 / / 535 - 554 |
0929-6212 |
|
2018 |
515 |
Jenefa J |
Detection and prevention of black hole attacks in vehicular ad hoc networks |
International Journal of Innovative Technology and Exploring Engineering / 8 / 7 / 1253 - 1257 |
2278-3075 |
|
2018 |
516 |
Julian Benadit P |
Enhancements To Greedy Web Proxy Caching Algorithms Using Data Mining Method And Weight Assignment Policy |
International Journal of Innovative Computing, Information and Control / 14 / 4 / 1311 - 1326 |
1349-4198 |
|
2018 |
517 |
Julian Benadit P |
Enhancing Greedy Web Proxy caching using Weighted Random Indexing based Data Mining Classifier. |
Egyptian Informatics Journal / 0 / / 0 - 0 |
1110-8665 |
|
2018 |
518 |
Jyothi Mandala |
Privacy preservation of data using crow search with adaptive awareness probability |
Journal of Information Security and Applications / 44 / / 157 - 169 |
2214-2126 |
|
2018 |
519 |
Jyothi Thomas |
Advanced Detection Of Lanes Using RANSAC |
IJRAT, International Journal of Research in Advent Technology. / 8 / Special issue / 84 - 88 |
2321-9637 |
|
2018 |
520 |
Kukatlapalli Pradeep Kumar |
A Pragmatic Study and Statistical Analysis on the aspects of Synthetic Biology |
International Journal of Research and Analytical Reviews / 6 / 1 / 310 - 316 |
2348-1269, 2349-5138 |
|
2018 |
521 |
Kukatlapalli Pradeep Kumar |
Provenance centered Communication using Visual Cryptography: Software Design Perspective |
Journal of Advanced Research in Dynamical and Control Systems / 10 / 10 / 2619 - 2629 |
1943-023X |
|
2018 |
522 |
Kukatlapalli Pradeep Kumar |
A Distinctive Approach on Safe Driving through Interactive and Behavioral Analysis |
International Journal of Computer Sciences and Engineering / 7 / 2 / 710 - 714 |
2347-2693 |
|
2018 |
523 |
Kukatlapalli Pradeep Kumar |
Application of Visual Encryption and its Inferences in Data Provenance |
International Journal of Computer Sciences and Engineering / 7 / 5 / 1088 - 1094 |
2347-2693 |
|
2018 |
524 |
Kukatlapalli Pradeep Kumar |
A Statistical Analysis On The Aspects Of Pattern Recognition |
Global Journal Of Engineering Science And Researches / 6 / 5 / 259 - 265 |
2348-8034 |
|
2018 |
525 |
Manohar M |
Data Analysis on Live Social Media Data |
Journal of Emerging Technologies and Innovative Research / 6 / 2 / 114 - 120 |
2349-5162 |
|
2018 |
526 |
Manohar M |
An Improved Approach for Monitoring and Controlling of Flyovers and Bridges Using Internet of Things |
International Journal of Computer Sciences and Engineering / 7 / 1 / 577 - 582 |
2347-2693 |
|
2018 |
527 |
Mary Anita E A |
An Enhanced Secure Authentication Scheme for Vehicular Ad Hoc Networks Without Pairings |
Wireless Personal Communications / 106 / / 535 - 554 |
0929-6212 |
|
2018 |
528 |
Mary Anita E A |
Detection and prevention of black hole attacks in vehicular ad hoc networks |
International Journal of Innovative Technology and Exploring Engineering / 8 / 7 / 1253 - 1257 |
2278-3075 |
|
2018 |
529 |
Mausumi Goswami |
An approach for classification based on Naive Bayes Classifier |
International journal of computer and mathematical sciences (IJCMS) / 6 / 10 / 215 - 218 |
2347-8527 |
|
2018 |
530 |
Mausumi Goswami |
A Comparative Analysis of Similarity Measures to find Coherent Documents |
International Journal of Management Technology and Engineering / 8 / 11 / 786 - 797 |
2249-7455 |
|
2018 |
531 |
Mausumi Goswami |
Significance Computer Oriented Numerical Analysis in Solving Problems using Interpolation and Approximation techniques and related applications |
International Journal of Research in Electronics AND Computer Engineering (IJRECE) / 6 / 3 / 1862 - 1866 |
2348-2281 |
|
2018 |
532 |
Merin Thomas |
Sentimental analysis using recurrent neural network |
international journal for engineering and Technology UAE / 7 / 27 / 88 - 92 |
2227-524X |
|
2018 |
533 |
Merin Thomas |
City Visualization Using Procedural Generation |
International Journal of Management Technology and Engineering / 9 / 3 / - |
2249-7455 |
|
2018 |
534 |
Merin Thomas |
Survey on Advanced Autonomous Vehicles |
International Journal of Management Technology and Engineering / ix / 2249-7455 / 5124 - 5155 |
2249-7455 |
|
2018 |
535 |
Natarajan K |
An Innovative Approach for Risk Identification and Management in Software Projects |
International Journal of Computer Sciences and Engineering / 7 / 2 / 647 - 654 |
2347-2693 |
|
2018 |
536 |
Naveen J |
MELDCA-Modified Energy-efficient and Load Distributed Clustering Algorithm for Dense Wireless Sensor Networks |
Journal of Advanced Research in Dynamic and Control System / 11 / 01 / 28 - 38 |
1943-023X |
|
2018 |
537 |
Praveen Kulkarni |
Analysis On Different Techniques Used For Sentimental Analysis |
International Journal of Research in Advent Technology / 7 / 2 / 656 - 659 |
2321-9637 |
|
2018 |
538 |
Praveen Naik |
Insights on Algorithmic and Non-algorithmic Cost Estimation Approaches Used by Current Software Industries across India |
International Journal of Scientific Research in Computer Science, Engineering and Information Techno / 4 / 6 / 89 - 91 |
2456-3307 |
|
2018 |
539 |
Praveen Naik |
A Novel Approach to Compute Software Cost Estimates Using Adaptive Machine Learning Approach |
Journal of Advanced Research in Dynamical and Control Systems / 10 / 05-Special / 1128 - 1133 |
1943-023X |
|
2018 |
540 |
Raghavendra S |
Evaluating The Performance Of Neural Network Using Feature Selection Methods On PIMA Indian Diabetes Dataset |
Journal of Emerging Technologies and Innovative Research / 5 / 12 / 268 - 273 |
2349-5162 |
|
2018 |
541 |
Raghavendra S |
Performance Evaluation of Machine Learning Techniques in Diabetes Prediction |
International Journal of Engineering and Advanced Technology / 8 / 3 / 363 - 369 |
2249-8958 |
|
2018 |
542 |
Raghavendra S |
Performance Evaluation of Machine Learning Techniques for the
Classification of BUPA Liver Disorder |
International Journal of Computer Sciences and Engineering / 7 / 2 / 864 - 869 |
2347-2693 |
|
2018 |
543 |
Raghavendra S |
Big data Processing Comparison using Pig and Hive |
International Journal of Computer Sciences and Engineering / 7 / 3 / 173 - 178 |
2347-2693 |
|
2018 |
544 |
Raghavendra S |
Big data Processing Comparison with Map-Reduce and PIG |
International Journal of Research in Advent Technology / 7 / 3 / 1122 - 1125 |
2321-9637 |
|
2018 |
545 |
Raju G |
An objective function based technique for devignetting fundus imagery
using MST |
Informatics in Medicine Unlocked / article in press / article in press / - |
2352-9148 |
|
2018 |
546 |
Raju G |
A Review on Texture Descriptors in 2D Ear Recognition |
International Journal of Computer Sciences and Engineering / 6 / 7 / 8 - 12 |
2347-2693 |
|
2018 |
547 |
Raju G |
An overlap-based human gait cycle detection |
International Journal of Biometrics / 11 / 2 / 148 - 159 |
1755-8301 |
|
2018 |
548 |
Rekha V |
An enhanced security alert system for smart home using IOT |
Indonesian Journal of Electrical Engineering and Computer Science / 13 / 1 / 27 - 34 |
2502-4752 |
|
2018 |
549 |
Rekha V |
Priority-based bandwidth allocation and load balancing for multipath IP networks
|
International Journal of Networking and Virtual Organisations / 20 / 1 / 53 - 72 |
1741-5225 |
|
2018 |
550 |
Sandeep Kumar |
Plant Leaf Disease Identification using Exponential Spider Monkey Optimization |
Sustainable Computing: Informatics and Systems / 28 / / 1 - 25 |
2210-5379 |
|
2018 |
551 |
Sandeep Kumar |
Evidence of Ostwald ripening in opinion driven dynamics of mutually competitive social networks |
Physica A: Statistical Mechanics and its Applications / 522 / / 182 - 194 |
0378-4371 |
|
2018 |
552 |
Sandeep Kumar |
FDTD approach to photonic based angular waveguide for wide range of sensing application |
Optik - International Journal for Light and Electron Optics / 176 / / 56 - 59 |
0030-4026 |
|
2018 |
553 |
Sandeep Kumar |
Improved Gbest Artificial Bee Colony Algorithm for the constraints optimization problems |
Evolutionary Intelligence / / / - |
1864-5909 |
|
2018 |
554 |
Sandeep Kumar |
Automated Soil Prediction using Bag-of-Features and Chaotic Spider Monkey Optimization |
Evolutionary Intelligence / / / - |
1864-5909 |
|
2018 |
555 |
Sandeep Kumar |
Twitter Sentiments based Suggestive Framework to Predict Trends |
Journal of Statistics and Management Systems / 21 / 4 / 685 - 693 |
0972-0510 |
|
2018 |
556 |
Sundara Pandiyan S |
Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm |
Journal of Medical Systems / 209 / 208 / - |
1573-689X |
|
2018 |
557 |
Sundara Pandiyan S |
Potential Flow Simulation through Lagrangian
Interpolation Meshless Method Coding |
Journal of Applied Fluid Mechanics / 11 / Special Issue / 129 - 134 |
1735-3645 |
|
2018 |
558 |
Surendra H |
Hiding sensitive itemsets without side effects |
Applied Intelligence / / / 1 - 15 |
1573-7497 |
|
2018 |
559 |
Surendra H |
Distortion-Based Privacy-Preserved Association Rules Mining Without Side Effects Using Closed Itemsets |
Advances in Intelligent Systems and Computing / 2 / / 591 - 601 |
2194-5357 |
|
2018 |
560 |
Surendra H |
Hiding Sensitive Itemsets at Multiple Support Thresholds without Side Effects |
International Journal of Computer Sciences and Engineering / 7 / 2 / 115 - 120 |
2347-2693 |
|
2018 |
561 |
Surendra H |
Preserving Privacy of Sensitive Itemsets using Controlled Perturbation of Closed Itemsets |
International Journal of Applied Engineering Research / 14 / 5 / 1177 - 1185 |
0973-4562 |
|
2018 |
562 |
Vandana Reddy |
Integration of internet of things with wireless sensor network |
International Journal of Electrical and Computer Engineering (IJECE) / 9 / 1 / 439 - 444 |
2088-8708 |
|
2018 |
563 |
Vandana Reddy |
A review on energy optimization techniques used in WSN |
ARPN Journal of Engineering and Applied Sciences / 13 / 14 / 4351 - 4359 |
1819-6608 |
|
2018 |
564 |
Vinai George Biju |
Assessment of microsatellite instability for screening bladder cancer in high‑risk population |
Journal of Cancer Research and Therapeutics / 14 / 5 / 916 - 920 |
0973-1482 |
|
2018 |
565 |
Vinai George Biju |
Accumulation of lead (Pb II) metal ions by Bacillus toyonensis SCE1 species, innate to industrial-area ground water and nanoparticle synthesis |
Applied Nano science / 9 / 1 / 49 - 66 |
2190-5509 |
|
2018 |
566 |
Addapalli V N Krishna |
A Hybrid Digital Signature Scheme on
Dependable and Secure Data |
International Journal of Electronics and Information Engineering / 6 / 2 / 87 - 93 |
2313-1527 |
|
2017 |
567 |
Addapalli V N Krishna |
Introducing Quantum Cryptography based Secured Encryption and Decryption algorithms |
International Journal of Security and Its Applications / 11 / 7 / 17 - 24 |
1738-9976 |
|
2017 |
568 |
Addapalli V N Krishna |
Provably Secure Quantum Key distribution by applying Quantum gate |
International journal of Network Security / 20 / 1 / 88 - 94 |
1816-353X |
|
2017 |
569 |
Addapalli V N Krishna |
Significance of Key Distribution Using Quantum Cryptography |
International Journal of Innovative Computing, Information and Control / 13 / 5 / 1 - 7 |
1349-4198 |
|
2017 |
570 |
Addapalli V N Krishna |
A Hybrid Digital Signature Scheme on Dependable and Secure Data |
International Journal of Electronics and Information Engineering / 6 / 2 / 87 - 93 |
2313-1535 |
|
2017 |
571 |
Ajit Danti |
Human Age and Gender Prediction Based on Neural Networks and Three Sigma Control Limits |
Applied Artificial Intelligence An International Journal / 32 / 3 / 281 - 292 |
1087-6545 |
|
2017 |
572 |
Ajit Danti |
Blood Regions Segmentation For Automatic Blood Group Identification |
International Journal Of Computer Engineering And Applications / 12 / 1 / 16 - 31 |
2321-3469 |
|
2017 |
573 |
Ajit Danti |
Prediction Of Death Based On Target Class Variance And Dimensionality Reduction |
International Journal Of Computer Engineering And Applications / 12 / 1 / 68 - 83 |
2321-3469 |
|
2017 |