1 |
Addapalli V N Krishna |
Cost Effective and Energy Efficient Drip Irrigation System for IoT Enabled Smart Agriculture |
Lecture Notes in Networks and Systems / / / 199 - 210 |
2367-3370 |
|
2024 |
2 |
Aruna S K |
Integrating machine learning techniques for Air Quality Index forecasting and insights from pollutant-meteorological dynamics in sustainable urban environments |
Earth Science Informatics / / / 1 - 16 |
1865-0473 |
|
2024 |
3 |
Babu Kumar S |
Artificial Intelligence and Academia: Navigating Challenges and Future Horizons |
Library Progress International / 44 / 3 / 9537 - 9542 |
2320-317X |
|
2024 |
4 |
Babu Kumar S |
Automated lung cancer T-Stage detection and classification using improved U-Net model |
International Journal of Electrical and Computer Engineering / 14 / 6 / 6817 - 6826 |
2088-8708 |
|
2024 |
5 |
Babu Kumar S |
Artificial Intelligence and Academia: Navigating Challenges and Future Horizons |
Library Progress International / 44 / 3 / 9537 - 9542 |
0970-1052 |
|
2024 |
6 |
Boppuru Rudra Prathap |
Detection of twitter hate tweets leading to crime using multiseries BERT model |
Journal Of Information & Optimization Sciences / 45 / 4 / 885 - 896 |
2169-0103 |
|
2024 |
7 |
Boppuru Rudra Prathap |
Detecting Deepfake Voices Using a Novel Method for Authenticity Verification in Voice-Based Communication |
Lecture Notes in Networks and Systems / / / 397 - 405 |
2367-3370 |
|
2024 |
8 |
Boppuru Rudra Prathap |
From Text to Action: NLP Techniques for Washing Machine Manual Processing |
Procedia Computer Science / 235 / / 1903 - 1919 |
1877-0509 |
|
2024 |
9 |
Debarka Mukhopadhyay |
A review on quantum utility for secure authentication protocol towards cryptographic standard in quantum dot cellular automata |
Journal of Discrete Mathematical Sciences & Cryptography / 27 / 4 / 1415 - 1423 |
2169-0065 |
|
2024 |
10 |
Debarka Mukhopadhyay |
Time Efficient Hash Key Generation For Blockchain Enabled Framework |
IEEE Access / 12 / / 155867 - 155884 |
2169-3536 |
|
2024 |
11 |
Diana Jeba Jingle I |
DTDO: Driving Training Development Optimization enabled deep learning approach for brain tumour classification using MRI |
Network: Computation in Neural Systems / / / 1 - 42 |
0954-898X |
|
2024 |
12 |
Divya Vetriveeran |
Problem-Based Learning for Critical Reflections on
Skill-based Courses Using DEAL Model |
Journal of Engineering Education Transformations / 38 / 1 / 16 - 22 |
2394-1707 |
|
2024 |
13 |
Ganesh Kumar R |
Unveiling the Landscape: A Comparative Study of U-Net Models for Geographical Features Segmentation |
Lecture Notes in Networks and Systems / / / 325 - 333 |
2367-3370 |
|
2024 |
14 |
Ganesh Kumar R |
Enhancing food crop classification in agriculture through dipper throat optimization and deep learning with remote sensing |
e-Prime - Advances in Electrical Engineering, Electronics and Energy / 9 / / 1 - 12 |
2772-6711 |
|
2024 |
15 |
Gurudas V R |
Detection and analysis of android malwares using hybrid dual Path bi-LSTM Kepler dynamic graph convolutional network. |
International Journal Of Machine Learning And Cybernetics / 2024 / / - |
1868-8071 |
|
2024 |
16 |
Jayapandian N |
Cancer Prognosis by Using Machine Learning and Data Science: A Systematic Review |
Lecture Notes in Networks and Systems / 551 / 1 / 1 - 12 |
2367-3370 |
|
2024 |
17 |
Jayapandian N |
Face Detection-Based Border Security System Using Haar-Cascade and LBPH Algorithm |
Networks and Systems / 551 / 1 / 1 - 11 |
2367-3370 |
|
2024 |
18 |
Jayapandian N |
Research on secure workload execution scheme in heterogeneous cloud environment |
Indonesian Journal of Electrical Engineering and Computer Science / 29 / 2 / 1047 - 1054 |
2502-4760 |
|
2024 |
19 |
Jenefa J |
Advancements in Sybil Attack Detection: A Comprehensive Survey of Machine Learning-Based Approaches in Wireless Sensor Networks |
Lecture Notes in Networks and Systems / / / - |
2367-3389 |
|
2024 |
20 |
Jenefa J |
Theoretical Framework for Blockchain Secured Predictive Maintenance Learning Model Using Digital Twin |
Lecture Notes in Networks and Systems / / / 55 - 66 |
2367-3389 |
|
2024 |
21 |
Jeno Lovesum S P |
Review on lightweight cryptography techniques and steganography techniques for IoT environment |
International Journal of System Assurance Engineering and Management / 15 / / 4210 - 4228 |
0975-6809 |
|
2024 |
22 |
Jyothi Mandala |
An optimized method for mulberry silkworm, Bombyx mori (Bombycidae:Lepidoptera) sex classification using TLBPSGA-RFEXGBoost |
Biology Open / 13 / 7 / - |
2046-6390 |
|
2024 |
23 |
Jyothi Thomas |
Nondestructive and cost-effective silkworm, Bombyx mori (Lepidoptera: Bombycidae) cocoon sex classification using machine learning |
International Journal of Tropical Insect Science / 44 / 3 / 1125 - 1137 |
1742-7584 |
|
2024 |
24 |
Jyothi Thomas |
CeLaTis: A Large Scale Multimodal Dataset with Deep Region Network to Diagnose Cervical Cancer |
Lecture Notes in Networks and Systems / 1046 / / 154 - 163 |
2367-3370 |
|
2024 |
25 |
Jyothi Thomas |
Comparative Performance Analysis of Deep Learning Models in Cervical Cancer Detection |
Lecture Notes in Networks and Systems / 1046 / / 185 - 194 |
2367-3370 |
|
2024 |
26 |
Jyothi Thomas |
Early-Stage Cervical Cancer Detection via Ensemble Learning and Image Feature Integration |
Lecture Notes in Networks and Systems / / / 112 - 122 |
2367-3370 |
|
2024 |
27 |
Jyothi Thomas |
Attention Based Meta-Module to Integrate Cervigrams with Clinical Data for Cervical Cancer Identification |
Lecture Notes in Networks and Systems / 1046 / / 286 - 295 |
2367-3370 |
|
2024 |
28 |
Jyothi Thomas |
An optimized method for mulberry silkworm, Bombyx mori (Bombycidae:Lepidoptera) sex classification using TLBPSGA-RFEXGBoost |
Biology Open / 13 / 7 / - |
2046-6390 |
|
2024 |
29 |
Manohar M |
Aspect based sentiment analysis using a novel ensemble deep
network |
IAES International Journal of Artificial Intelligence / 13 / 2 / 1668 - 1678 |
2089-4872 |
|
2024 |
30 |
Manohar M |
Aspect based sentiment analysis using fine-tuned BERT model with deep context features |
IAES International Journal of Artificial Intelligence / 13 / 2 / 1250 - 1261 |
2252-8938 |
|
2024 |
31 |
Manu Elappila |
Cost Effective and Energy Efficient Drip Irrigation System for IoT Enabled Smart Agriculture |
Lecture Notes in Networks and Systems / / / 199 - 210 |
2367-3370 |
|
2024 |
32 |
Mary Anita E A |
UAV Security Analysis Framework |
Lecture Notes in Networks and Systems / / / 379 - 391 |
2367-3389 |
|
2024 |
33 |
Mary Anita E A |
Analysis of the UAV Flight Logs in Order to Identify Information Security Incidents |
Lecture Notes in Networks and Systems / / / 415 - 426 |
2367-3389 |
|
2024 |
34 |
Mary Anita E A |
Certificate Generation and Validation Using Blockchain |
Lecture Notes in Networks and Systems, / 865 / / 275 - 282 |
2367-3389 |
|
2024 |
35 |
Mary Anita E A |
Analysis of Routing Protocols in MANET Networks |
Lecture Notes in Networks and Systems / / / 141 - 151 |
2367-3389 |
|
2024 |
36 |
Mary Anita E A |
Theoretical Framework for Blockchain Secured Predictive Maintenance Learning Model Using Digital Twin |
Lecture Notes in Networks and Systems / / / 55 - 66 |
2367-3389 |
|
2024 |
37 |
Mary Anita E A |
Advancements in Sybil Attack Detection: A Comprehensive Survey of Machine Learning-Based Approaches in Wireless Sensor Networks |
Lecture Notes in Networks and Systems / / / - |
2367-3389 |
|
2024 |
38 |
Michael Moses T |
Multitask EfficientNet affective computing for student engagement detection |
Multimedia Tools and Applications / / / - |
1380-7501 |
|
2024 |
39 |
Natarajan K |
Cloud databases: A resilient and robust framework to dissolve vendor lock-in |
Software Impacts / 21 / / - |
2665-9638 |
|
2024 |
40 |
Raghavendra S |
Detection and identification of un-uniformed shape text from blurred video frames |
IAES International Journal of Artificial Intelligence / 13 / 4 / 4795 - 4805 |
2252-8938 |
|
2024 |
41 |
Raghavendra S |
Design and Stress Analysis of the Frame for an Electric Bike |
Smart Innovation, Systems and Technologies / 409 / / 207 - 215 |
2190-3018 |
|
2024 |
42 |
Raju G |
Addressing the complexities of postoperative brain MRI cavity segmentation?a comprehensive review |
Bulletin of Electrical Engineering and Informatics / 13 / 5 / 3463 - 3469 |
2089-3191 |
|
2024 |
43 |
Raju G |
Exploring the Adaptability of Attention
U-Net for Post-operative Brain Tumor
Segmentation in MRI Scans |
Smart Innovation, Systems and Technologies / 395 / / 333 - 340 |
2190-3018 |
|
2024 |
44 |
Raju G |
Advanced Machine Learning Techniques for Detecting Irregularities in Skin Lesion Borders: Enhancing Early Skin Cancer Detection |
International Journal on Artificial Intelligence Tools / 2450024 / / 1 - 30 |
0218-2130 |
|
2024 |
45 |
Raju G |
Machine Learning-Based Classification of Autism Spectrum Disorder across Age Groups |
Engineering Proceedings / 62 / / - |
2673-4591 |
|
2024 |
46 |
Sandeep Kumar |
Analysis of the UAV Flight Logs in Order to Identify Information Security Incidents |
Lecture Notes in Networks and Systems / / / 415 - 426 |
2367-3389 |
|
2024 |
47 |
Santhrupth B C |
Artificial Intelligence and Academia: Navigating Challenges and Future Horizons |
Library Progress International / 44 / 3 / 9537 - 9542 |
0970-1052 |
|
2024 |
48 |
Santhrupth B C |
Enhancing Sugarcane Leaf Disease Diagnosis with USEM: A Hybrid Approach Using U-Net and Stacked Ensemble Learning |
Frontiers in Health Informatics / 13 / 3 / 4190 - 4204 |
2676-7104 |
|
2024 |
49 |
Santhrupth B C |
Artificial Intelligence and Academia: Navigating Challenges and Future Horizons |
Library Progress International / 44 / 3 / 9537 - 9542 |
2320-317X |
|
2024 |
50 |
Sathish P K |
Addressing the complexities of postoperative brain MRI cavity segmentation?a comprehensive review |
Bulletin of Electrical Engineering and Informatics / 13 / 5 / 3463 - 3469 |
2089-3191 |
|
2024 |
51 |
Sathish P K |
Exploring the Adaptability of Attention
U-Net for Post-operative Brain Tumor
Segmentation in MRI Scans |
Smart Innovation, Systems and Technologies / 395 / / 333 - 340 |
2190-3018 |
|
2024 |
52 |
Shamanth N |
Cost Effective and Energy Efficient Drip Irrigation System for IoT Enabled Smart Agriculture |
Lecture Notes in Networks and Systems / / / 199 - 210 |
2367-3370 |
|
2024 |
53 |
Sujatha A K |
Emoji Sentiment Analysis of User Reviews on Online Applications Using Supervised Machine Learning |
Lecture Notes in Networks and Systems / 922 / 1 / 257 - 267 |
2367-3370 |
|
2024 |
54 |
Vandana Reddy |
From Text to Action: NLP Techniques for Washing Machine Manual Processing |
Procedia Computer Science / 235 / / 1903 - 1919 |
1877-0509 |
|
2024 |
55 |
Vandana Reddy |
Cost Effective and Energy Efficient Drip Irrigation System for IoT Enabled Smart Agriculture |
Lecture Notes in Networks and Systems / / / 199 - 210 |
2367-3370 |
|
2024 |
56 |
Vinodha D |
Advancements in Sybil Attack Detection: A Comprehensive Survey of Machine Learning-Based Approaches in Wireless Sensor Networks |
Lecture Notes in Networks and Systems / / / - |
2367-3389 |
|
2024 |
57 |
Vinodha D |
Theoretical Framework for Blockchain Secured Predictive Maintenance Learning Model Using Digital Twin |
Lecture Notes in Networks and Systems / / / 55 - 66 |
2367-3389 |
|
2024 |
58 |
Addapalli V N Krishna |
A novel image compression method using wavelet coefficients and Huffman coding |
Journal of Engineering research / 11 / 3 / 1 - 10 |
2307-1877 |
|
2023 |
59 |
Addapalli V N Krishna |
Security Analysis for a Revocable Multi-Authority ABE- Attribute-Based Mechanism |
SSRG International Journal of Electronics and Communication Engineering (IJECE) / 11 / 3 / 24 - 30 |
2348-8549 |
|
2023 |
60 |
Addapalli V N Krishna |
Security Analysis for a Revocable Multi-Authority ABE- Attribute-Based Mechanism
|
SSRG International Journal of Electronics and Communication Engineering / 11 / 3 / - 2430 |
2348-8549 |
|
2023 |
61 |
Ajit Danti |
Transfer Learning-Based Osteoporosis Classification Using Simple Radiographs |
International Journal of Online and Biomedical Engineering (iJOE). / 19 / 8 / 66 - 87 |
2626-8493 |
|
2023 |
62 |
Ajit Danti |
A Hybrid Approach For Landmark Detection Of 3d Faces For Forensic Investigation |
Journal of Theoretical and Applied Information Technology / 101 / 19 / 5904 - 5915 |
1817-3195 |
|
2023 |
63 |
Ajit Danti |
Deep Learning Based Model for Computing Percentage of Fake in User Reviews Using Topic Modelling Techniques |
e-Prime - Advances in Electrical Engineering, Electronics and Energy / 8 / C / 1 - 9 |
2772-6711 |
|
2023 |
64 |
Ajit Danti |
An Objective Evaluation of Harris Corner and FAST Feature Extraction Techniques for 3D Reconstruction of Face in Forensic Investigation |
International Journal of Intelligent Systems and Applications in Engineering / 11 / 4 / 535 - 545 |
2147-6799 |
|
2023 |
65 |
Ajit Danti |
Grey Wolf Optimization Guided Non-Local Means Denoising for Localizing and Extracting Bone Regions from X-Ray Images |
Biomedical and Pharmacology Journal / 16 / 2 / 935 - 946 |
09746242 |
|
2023 |
66 |
Alok Kumar Pani |
An efficient load balancing in cloud computing using hybrid Harris hawks optimization and cuckoo search algorithm |
International Journal of Advanced Technology and Engineering Exploration / 10 / 105 / 1050 - 1062 |
2394-7454 |
|
2023 |
67 |
Ancy Nidhin P R |
Security Analysis for a Revocable Multi-Authority ABE- Attribute-Based Mechanism
|
SSRG International Journal of Electronics and Communication Engineering / 11 / 3 / - 2430 |
2348-8549 |
|
2023 |
68 |
Aruna S K |
Enhancing Sustainable Urban Energy Management through Short-Term Wind Power Forecasting Using LSTM Neural Network |
Sustainability / 15 / 18 / - |
2071-1050 |
|
2023 |
69 |
Aruna S K |
An Advanced and Ideal Method
for Tumor Detection and Classification
from MRI Image Using Gamma
Distribution and Support Vector Machine |
Smart Innovation, Systems and Technologies / / / 439 - 447 |
2190-3026 |
|
2023 |
70 |
Asha M S |
Deep Learning for Early Detection of Tomato Leaf Diseases: A ResNet-18 Approach for Sustainable Agriculture |
International Journal of Advanced Computer Science and Applications, / 15, / 1, 2024 / 876 - 883 |
2156-5570 |
|
2023 |
71 |
Balamurugan M |
Stock market prediction employing ensemble methods: the Nifty50 index |
International Journal of Artificial Intelligence (IJ-AI). / 13 / 2 / 2049 - 2059 |
2089-4872 |
|
2023 |
72 |
Bejoy B J |
Optimized deep maxout for breast cancer detection: consideration of pre-treatment and in-treatment aspect |
Multimedia Tools And Applications / / / - |
1380-7501 |
|
2023 |
73 |
Boppuru Rudra Prathap |
Machine Learning and Artificial Intelligence Techniques for Detecting Driver Drowsiness |
Journal of Automation, Mobile Robotics and Intelligent Systems / 6 / 2 / 64 - 73 |
1897-8649 |
|
2023 |
74 |
Boppuru Rudra Prathap |
Human behavior analysis on political retweets using machine learning algorithms |
Measurement: Sensors / 27 / / 1 - 5 |
2665-9174 |
|
2023 |
75 |
Boppuru Rudra Prathap |
Spatio-temporal Crime Analysis and Forecasting on Twitter Data Using Machine Learning Algorithms |
SN Computer Science / 4 / / 1 - 22 |
2662-995X |
|
2023 |
76 |
Boppuru Rudra Prathap |
Comprehensive study of the relationship between multiverse and big data |
Measurement: Sensors / 27 / / 1 - 5 |
2665-9174 |
|
2023 |
77 |
Boppuru Rudra Prathap |
AI-Based Yolo V4 Intelligent Traffic Light Control System |
Journal of Automation, Mobile Robotics and Intelligent Systems / 16 / 4 / 53 - 61 |
1897-8649 |
|
2023 |
78 |
Boppuru Rudra Prathap |
Secure approach to sharing digitized medical data in a cloud environment |
Data Science and Management / 7 / 2 / 108 - 118 |
2666-7649 |
|
2023 |
79 |
Cherukuri Ravindranath Chowdary |
Whispered Speech Emotion Recognition with Gender Detection using BiLSTM and DCNN |
Journal of Information Systems and Telecommunication / 12 / 2 / 152 - 161 |
2322-1437 |
|
2023 |
80 |
Cherukuri Ravindranath Chowdary |
Machine Learning and Artificial Intelligence Techniques for Detecting Driver Drowsiness |
Journal of Automation, Mobile Robotics and Intelligent Systems / 6 / 2 / 64 - 73 |
1897-8649 |
|
2023 |
81 |
Cherukuri Ravindranath Chowdary |
Realization of Humanoid Doctor and Real-Time Diagnostics of Disease Using Internet of Things, Edge Impulse Platform, and ChatGPT |
Annals of Biomedical Engineering / 51 / 8 / 1 - 3 |
1573-9686, 0090-6964 |
|
2023 |
82 |
Cherukuri Ravindranath Chowdary |
AI-Based Yolo V4 Intelligent Traffic Light Control System |
Journal of Automation, Mobile Robotics and Intelligent Systems / 16 / 4 / 53 - 61 |
1897-8649 |
|
2023 |
83 |
Chinthakunta Manjunath |
Stock market prediction employing ensemble methods: the Nifty50 index |
International Journal of Artificial Intelligence (IJ-AI). / 13 / 2 / 2049 - 2059 |
2089-4872 |
|
2023 |
84 |
Chinthakunta Manjunath |
Detection of Forest Fire using Modified LSTM based Feature Extraction with Waterwheel Plant
Optimisation Algorithm
based VAE-GAN mode |
International Journal of Safety and Security Engineering / 14 / 2 / 329 - 340 |
2116-7125 |
|
2023 |
85 |
Daniel D |
Automated and Interpretable Fake News Detection With Explainable Artificial Intelligence |
Journal of Applied Security Research / / / - |
1936-1610 |
|
2023 |
86 |
Daniel D |
Comparison of Machine Learning-Based Intrusion Detection Systems Using UNSW-NB15 Dataset |
Lecture Notes in Networks and Systems / 844 / 0 / 311 - 324 |
2367-3389 |
|
2023 |
87 |
Debarka Mukhopadhyay |
A Model for Detecting Type 2 Diabetes Using Mixed Single-Cell RNA Sequencing with Optimized Data |
S N Computer Science / 4 / / 1 - 13 |
2661-8907 |
|
2023 |
88 |
Debarka Mukhopadhyay |
A comprehensive survey on machine learning techniques to mobilize multi-camera network for smart surveillance |
Innovations in Systems and Software Engineering / / / 1 - 20 |
1614-5054 |
|
2023 |
89 |
Debarka Mukhopadhyay |
An Investigation of Complex Interactions Between Genetically Determined Protein Expression and the Metabolic Phenotype of Human Islet Cells Using Deep Learning |
S N Computer Science / 4 / 767 / 1 - 9 |
2661-8907 |
|
2023 |
90 |
Diana Jeba Jingle I |
Autism spectrum disorder detection using brain MRI image enabled deep learning with hybrid sewing training optimization |
SIGNAL IMAGE AND VIDEO PROCESSING / 17 / 8 / 4001 - 4008 |
1863-1703 |
|
2023 |
91 |
Divya Vetriveeran |
HQA Bot: Hybrid AI Recommender Based Question Answering Chatbot |
International Journal of Intelligent Systems and Applications in Engineering / 11 / 4 / 227 - 233 |
2147-6799 |
|
2023 |
92 |
Divya Vetriveeran |
Blockchain-Based Service Oriented Privacy-Preserving Data Sharing over Distributed Data Streams in Asynchronous Environment |
International Journal of Intelligent Systems and Applications in Engineering / 11 / 4 / 591 - 602 |
2147-6799 |
|
2023 |
93 |
Divya Vetriveeran |
An Advanced and Ideal Method
for Tumor Detection and Classification
from MRI Image Using Gamma
Distribution and Support Vector Machine |
Smart Innovation, Systems and Technologies / / / 439 - 447 |
2190-3026 |
|
2023 |
94 |
Divya Vetriveeran |
Comparison of Machine Learning-Based Intrusion Detection Systems Using UNSW-NB15 Dataset |
Lecture Notes in Networks and Systems / 844 / 0 / 311 - 324 |
2367-3389 |
|
2023 |
95 |
Divya Vetriveeran |
Smart Air Pollution Monitoring System Using Arduino Based on Wireless Sensor Networks |
Lecture Notes in Networks and Systems / 840 / 0 / 497 - 504 |
2367-3389 |
|
2023 |
96 |
Divya Vetriveeran |
Secure Identity Based Authentication for Emergency Communications |
Lecture Notes in Networks and Systems / 840 / 0 / 129 - 140 |
2367-3389 |
|
2023 |
97 |
Ganesh Kumar R |
Detecting Fake Information Dissemination using Leveraging Machine Learning and DRIMUX with B-LSTM |
International Journal of Intelligent Systems and Applications in Engineering / 12 / 5S / 91 - 100 |
2147-67992 |
|
2023 |
98 |
Gnana Prakasi O S |
A novel two-tier feature selection model for Alzheimer?s disease prediction |
Indonesian Journal of Electrical Engineering and Computer Science / 33 / 1 / 227 - 235 |
2502-4752 |
|
2023 |
99 |
Gokulapriya R |
Comparison of Machine Learning-Based Intrusion Detection Systems Using UNSW-NB15 Dataset |
Lecture Notes in Networks and Systems / 844 / 0 / 311 - 324 |
2367-3389 |
|
2023 |
100 |
Jayapandian N |
Natural Disaster Prediction by Using Image Based Deep Learning and Machine Learning |
Lecture Notes in Networks and Systems / / / 56 - 66 |
2367-3389 |
|
2023 |
101 |
Jayapandian N |
Visiting Indian Hospitals Before, During and After COVID |
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems / 30 / 1 / 111 - 123 |
0218-4885 |
|
2023 |
102 |
Jayapandian N |
Social Network User Profiling With Multilayer Semantic Modeling Using Ego Network |
International Journal of Information Technology and Web Engineering / 17 / 1 / 1 - 17 |
1554-1045 |
|
2023 |
103 |
Jenefa J |
Secure IBS Scheme for Vehicular Ad Hoc Networks |
Smart Innovation, Systems and Technologies / 313 / / - |
2190-3018 |
|
2023 |
104 |
Jenefa J |
A Hybrid Approach Against Black Hole Attackers Using Dynamic Threshold Value and Node Credibility |
IEEE Access / 11 / / 91595 - 91603 |
2169-3536 |
|
2023 |
105 |
Jenefa J |
Smart Phone-based Fundus Imaging for Diabetic Retinopathy Detection |
EAI Endorsed Transactions on Pervasive Health and Technology / / / - |
2411-7145 |
|
2023 |
106 |
Jenefa J |
Secure Identity Based Authentication for Emergency Communications |
Lecture Notes in Networks and Systems / 840 / 0 / 129 - 140 |
2367-3389 |
|
2023 |
107 |
Jenefa J |
Comparison of Machine Learning-Based Intrusion Detection Systems Using UNSW-NB15 Dataset |
Lecture Notes in Networks and Systems / 844 / 0 / 311 - 324 |
2367-3389 |
|
2023 |
108 |
Jenefa J |
Smart Air Pollution Monitoring System Using Arduino Based on Wireless Sensor Networks |
Lecture Notes in Networks and Systems / 840 / 0 / 497 - 504 |
2367-3389 |
|
2023 |
109 |
Jeno Lovesum S P |
An Enhanced Approximation Algorithm Using Red Black Tree and HashMap for Virtual Machine Placement Problem |
SN COmputer science / 5 / 153 / 1 - 8 |
2662-995X, 2661-8907 |
|
2023 |
110 |
Julian Benadit P |
Automatic Diagnosis of Autism Spectrum Disorder Detection Using a Hybrid Feature Selection Model with Graph Convolution Network |
SN Computer Science / 5 / 126 / 1 - 14 |
2661-8907 |
|
2023 |
111 |
Julian Benadit P |
A Thorough Review of Deep Learning in Autism Spectrum Disorder Detection: From Data to Diagnosis |
Recent Advances in Computer Science and Communications / 17 / 8 / 73 - 91 |
2666-2566 |
|
2023 |
112 |
Jyothi Mandala |
SCSLnO-SqueezeNet: Sine Cosine-Sea Lion Optimization enabled SqueezeNet for intrusion detection in IoT |
Network: Computation in Neural Systems / 34 / 4 / 343 - 373 |
0954-898X, 1361-6536 |
|
2023 |
113 |
Jyothi Mandala |
RF-ShCNN: A combination of two deep models for tumor detection in brain using MRI |
Biomedical Signal Processing and Control / 88 / / 105656 - |
1746-8094 |
|
2023 |
114 |
Jyothi Mandala |
Optimization Based Rice Leaf Disease classification in Federated Learning |
Multimedia Tools and Applications / / / - |
1380-7501 |
|
2023 |
115 |
Jyothi Thomas |
A Review of Deep Learning Methods in Automatic Facial Micro-expression Recognition |
Lecture Notes on Data Engineering and Communications Technologies / 163 / / 1 - 16 |
2367-4512 |
|
2023 |
116 |
Jyothi Thomas |
An Efficient Deep Learning Framework FPR Detecting and Classifying Depression Using Electroencephalogram Signals |
Lecture Notes in Networks and Systems / 647 / / 1179 - 1188 |
2367-3389 |
|
2023 |
117 |
Jyothi Thomas |
TelsNet: temporal lesion network embedding in a
transformer model to detect cervical cancer through colposcope images |
International Journal of Advances in Intelligent Informatics / 9 / 3 / 502 - 523 |
2442-6571 |
|
2023 |
118 |
Jyothi Thomas |
Media's influence on suicide: Building a safer online world for all |
Asian Journal of Psychiatry / 91 / 103868 / - |
1876-2018 |
|
2023 |
119 |
Jyothi Thomas |
Nondestructive and cost-effective silkworm, Bombyx mori (Lepidoptera: Bombycidae) cocoon sex classification using machine learning |
International Journal of Tropical Insect Science / / / 1 - 13 |
1742-7584 |
|
2023 |
120 |
Jyothi Thomas |
A Lesion Feature Engineering Technique
Based on Gaussian Mixture Model to
Detect Cervical Cancer
|
Lecture Notes in Networks and Systems / 868 / / 67 - 73 |
2367-3389 |
|
2023 |
121 |
Jyothi Thomas |
Multimodal Early Fusion Strategy Based on Deep Learning Methods for Cervical Cancer Identification |
Lecture Notes in Networks and Systems / 865 / / 109 - 118 |
2367-3370 |
|
2023 |
122 |
Jyothi Thomas |
EGMM: removal of specular reflection with cervical region segmentation using enhanced Gaussian mixture model in cervix images |
Multimedia Tools and Applications / / / - |
1380-7501 |
|
2023 |
123 |
Jyothi Thomas |
CMT-CNN: colposcopic multimodal temporal hybrid deep learning model to detect cervical intraepithelial neoplasia |
International Journal of Advances in Intelligent Informatics / 10 / 2 / 317 - 332 |
2442-6571 |
|
2023 |
124 |
Karthikeyan H |
Classification of HHO-based Machine Learning
Techniques for Clone Attack Detection in WSN
|
International Journal of Computer Network and Information Security / 15 / 6 / 1 - 15 |
2074-9104 |
|
2023 |
125 |
Kukatlapalli Pradeep Kumar |
Machine Learning and Artificial Intelligence Techniques for Detecting Driver Drowsiness |
Journal of Automation, Mobile Robotics and Intelligent Systems / 6 / 2 / 64 - 73 |
1897-8649 |
|
2023 |
126 |
Kukatlapalli Pradeep Kumar |
Human behavior analysis on political retweets using machine learning algorithms |
Measurement: Sensors / 27 / / 1 - 5 |
2665-9174 |
|
2023 |
127 |
Kukatlapalli Pradeep Kumar |
Structural health monitoring using AI and ML based multimodal sensors data |
Measurement: Sensors / / / - |
2665-9174 |
|
2023 |
128 |
Kukatlapalli Pradeep Kumar |
Comprehensive study of the relationship between multiverse and big data |
Measurement: Sensors / 27 / / 1 - 5 |
2665-9174 |
|
2023 |
129 |
Kukatlapalli Pradeep Kumar |
AI-Based Yolo V4 Intelligent Traffic Light Control System |
Journal of Automation, Mobile Robotics and Intelligent Systems / 16 / 4 / 53 - 61 |
1897-8649 |
|
2023 |
130 |
Kukatlapalli Pradeep Kumar |
Secure approach to sharing digitized medical data in a cloud environment |
Data Science and Management / 7 / 2 / 108 - 118 |
2666-7649 |
|
2023 |
131 |
Lalitha K |
Efficient Brain Tumor Identification Based on Optimal Support Scaling Vector Feature Selection (OSSCV) Using Stochastic Spin-Glass Model Classification |
International Journal of Intelligent Systems and Applications in Engineering / 12 / 11s / 177 - 187 |
2147-6799 |
|
2023 |
132 |
Manjunatha Swamy C |
NLP - Powered Sentiment Analysis on the Twitter |
Saudi Journal of Engineering and Technology / 9 / 1 / 1 - 11 |
2415-6264 |
|
2023 |
133 |
Manjunatha Swamy C |
Investigations of Naive Bayes, Random Forest and
Decision Tree Algorithm for building aeroponics
system. |
International Journal on Recent and Innovation Trends in Computing and Communication / 11 / 9 / 2730 - 2737 |
2321-8169 |
|
2023 |
134 |
Manohar M |
Sensitive crop leaf disease prediction based on computer vision
techniques with handcrafted features |
International Journal of Systems Assurance Engineering and Management / 14 / / 1 - 32 |
0975-6809 |
|
2023 |
135 |
Manohar M |
Plant Leaf Disease Classification Using Optimal Tuned Hybrid LSTM-CNN Model |
SN Computer Science / 710 / 4 / 1 - 17 |
2662-995X |
|
2023 |
136 |
Manohar M |
Prediction of DDoS attacks in agriculture 4.0 with the help of prairie dog optimization algorithm with IDSNet |
Scientific Reports / 13 / / 1 - 13 |
2045-2322 |
|
2023 |
137 |
Manohar M |
Classification of HHO-based Machine Learning
Techniques for Clone Attack Detection in WSN
|
International Journal of Computer Network and Information Security / 15 / 6 / 1 - 15 |
2074-9104 |
|
2023 |
138 |
Manohar M |
An Intrusion Detection Model Based on Hybridization of S-ROA in Deep Learning Model for MANET |
Iranian Journal of Science and Technology - Transactions of Electrical Engineering / 48 / 1 / 1 - 12 |
2228-6179 |
|
2023 |
139 |
Manohar M |
An efficient load balancing in cloud computing using hybrid Harris hawks optimization and cuckoo search algorithm |
International Journal of Advanced Technology and Engineering Exploration / 10 / 105 / 1050 - 1062 |
2394-7454 |
|
2023 |
140 |
Manohar M |
Detection of Forest Fire using Modified LSTM based Feature Extraction with Waterwheel Plant
Optimisation Algorithm
based VAE-GAN mode |
International Journal of Safety and Security Engineering / 14 / 2 / 329 - 340 |
2116-7125 |
|
2023 |
141 |
Manu Elappila |
Implementation of survivability aware protocols in WSN for IoT applications using Contiki-OS and hardware testbed evaluation |
Microprocessors and Microsystems / 104 / / - |
0141-9331 |
|
2023 |
142 |
Manu Elappila |
Augmented Reality based Navigation for Indoor Environment using Unity Platform |
Lecture Notes in Networks and Systems / / / 199 - 207 |
2367-3370 |
|
2023 |
143 |
Mary Anita E A |
A comprehensive review of AI based intrusion detection system |
Measurement:Sensors / / / - |
2665-9174 |
|
2023 |
144 |
Mary Anita E A |
Artificial Neural Network with Firefly Algorithm-Based Collaborative Spectrum Sensing in Cognitive Radio Networks |
KSII Transactions on Internet and Information Systemsthis link is disabled, 2023, 17(7), pp. / 17 / 7 / 1951 - 1975 |
1976-7277 |
|
2023 |
145 |
Mary Anita E A |
Towards developing an automated technique for glaucomatous image classification and diagnosis (AT-GICD) using neural networks |
International Journal of Information Technology / 15 / / 3727 - 3739 |
2511-2112 |
|
2023 |
146 |
Mary Anita E A |
Improved reptile search algorithm with sequential assignment routing based false packet forwarding scheme for source location privacy protection on wireless sensor networks |
Journal of Intelligent and Fuzzy Systems / 46 / 1 / 1801 - 1812 |
1875-8967 |
|
2023 |
147 |
Mary Anita E A |
Enhancing IoT Security Through Deep Learning-Based Intrusion Detection
|
Communications in Computer and Information Science / 1823 / / 95 - 105 |
1865-0929 |
|
2023 |
148 |
Mary Anita E A |
Enhanced Horse Optimization Algorithm Based Intelligent Query Optimization in Crowdsourcing Systems |
Communications in Computer and Information Science / / / - |
1865-0929 |
|
2023 |
149 |
Mary Anita E A |
Secure IBS Scheme for Vehicular Ad Hoc Networks |
Smart Innovation, Systems and Technologies / 313 / / - |
2190-3018 |
|
2023 |
150 |
Mary Anita E A |
Integrity assured multi-functional multi-application secure data aggregation in
wireless sensor networks (IAMFMA-SDA) |
Journal of Intelligent and Fuzzy Systems / 45 / / 1453 - 1472 |
1064-1246 |
|
2023 |
151 |
Mary Anita E A |
A Hybrid Approach Against Black Hole Attackers Using Dynamic Threshold Value and Node Credibility |
IEEE Access / 11 / / 91595 - 91603 |
2169-3536 |
|
2023 |
152 |
Mary Anita E A |
Secure Identity Based Authentication for Emergency Communications |
Lecture Notes in Networks and Systems / 840 / 0 / 129 - 140 |
2367-3389 |
|
2023 |
153 |
Michael Moses T |
Secure approach to sharing digitized medical data in a cloud environment |
Data Science and Management / 7 / 2 / 108 - 118 |
2666-7649 |
|
2023 |
154 |
Natarajan K |
Performance analysis of semantic veracity enhance (SVE) classifier for fake news detection and demystifying the online user behaviour in social media using sentiment analysis |
Social Network Analysis and Mining / / / - |
1869-5450 |
|
2023 |
155 |
Raghavendra S |
Operational pattern forecast improvement with outlier detection in metro rail transport system |
Springer Nature / / / - |
1380-7501 |
|
2023 |
156 |
Raghavendra S |
Analysis and prediction of seed quality using machine learning |
International Journal of Electrical and Computer Engineering / 13 / 5 / 5770 - 5781 |
2088-8708 |
|
2023 |
157 |
Raghavendra S |
Reinforcement learning strategies using Monte-Carlo to solve the blackjack problem |
International Journal of Electrical and Computer Engineering / 14 / 1 / 904 - 910 |
2088-8708 |
|
2023 |
158 |
Raghavendra S |
A Modified XG Boost Classifier Model for Detection of Seizures and Non-Seizures |
WSEAS Transactions on Biology and Biomedicine / 19 / 3 / 14 - 21 |
1109-9518 |
|
2023 |
159 |
Raju G |
Medical ultrasound image segmentation using Multi-Residual U-Net architecture |
Multimedia Tools and Applications / Online first / / - |
1380-7501 |
|
2023 |
160 |
Raju G |
Post-Operative Brain MRI Resection Cavity Segmentation
Model and Follow-Up Treatment Assistance |
International Journal of Online and Biomedical Engineering / 20 / 5 / 133 - 149 |
2626-8493 |
|
2023 |
161 |
Raju G |
Advancing Brain Tumor Segmentation in MRI Scans:
Hybrid Attention-Residual UNET with Transformer Blocks |
International journal of online and biomedical engineering / 20 / 6 / 103 - 115 |
2626-8493 |
|
2023 |
162 |
Raju G |
Enhanced Postoperative Brain MRI Segmentation with Automated Skull Removal and Resection Cavity Analysis |
Journal of Computer Science / 20 / 5 / 585 - 593 |
1552-6607 |
|
2023 |
163 |
Rakoth Kandan Sambandam |
Applications of Classification and Recommendation Techniques to Analyze Soil Data and Water Using IOT |
Smart Innovation, Systems and Technologies / / / 215 - 223 |
2190-3026 |
|
2023 |
164 |
Rakoth Kandan Sambandam |
An Advanced and Ideal Method
for Tumor Detection and Classification
from MRI Image Using Gamma
Distribution and Support Vector Machine |
Smart Innovation, Systems and Technologies / / / 439 - 447 |
2190-3026 |
|
2023 |
165 |
Rakoth Kandan Sambandam |
Review on Image Processing-Based Building Damage Assessment Techniques |
Lecture Notes in Networks and Systems / 726 / 0 / 863 - 883 |
2367-3389 |
|
2023 |
166 |
Rakoth Kandan Sambandam |
Comparison of Machine Learning-Based Intrusion Detection Systems Using UNSW-NB15 Dataset |
Lecture Notes in Networks and Systems / 844 / 0 / 311 - 324 |
2367-3389 |
|
2023 |
167 |
Rakoth Kandan Sambandam |
Smart Air Pollution Monitoring System Using Arduino Based on Wireless Sensor Networks |
Lecture Notes in Networks and Systems / 840 / 0 / 497 - 504 |
2367-3389 |
|
2023 |
168 |
Rakoth Kandan Sambandam |
Secure Identity Based Authentication for Emergency Communications |
Lecture Notes in Networks and Systems / 840 / 0 / 129 - 140 |
2367-3389 |
|
2023 |
169 |
Rekha V |
Fake News Detection Using TF-IDF Weighted with Word2Vec: An Ensemble Approach |
Intelligent Systems And Applications In Engineering / 11 / 3 / 1065 - 1076 | |
2147-6799 |
|
2023 |
170 |
Rekha V |
An efficient adaptive reconfigurable routing protocol for optimized data packet distribution in network on chips |
International Journal of Electrical and Computer Engineering (IJECE) / 14 / 1 / 305 - 314 |
2088-8708 |
|
2023 |
171 |
Rekha V |
Enhancing Fake News Detection On Social Media Through Advanced Machine Learning And User Profile Analysis
|
Journal of Theoretical and Applied Information Technology / 101 / 1 / 274 - 286 |
1992-8645 |
|
2023 |
172 |
Samiksha Shukla |
New Paradigm of Marketing-Financial Integration Modelling for Business Performance: An IMC Model |
Lecture Notes in Electrical Engineering / 1115 / 1 / 155 - 172 |
2190-3018 |
|
2023 |
173 |
Sandeep Kumar |
A hybrid crypto-compression model for secure brain MRI image transmission |
Multimedia Tools and Applications / / / 1 - 21 |
1573-7721 |
|
2023 |
174 |
Sandeep Kumar |
HMOSHSSA: A Novel Framework for Solving Simultaneous Clustering and Feature Selection Problems |
Multimedia Tools and Applications / / / - |
1573-7721 |
|
2023 |
175 |
Sandeep Kumar |
Computational Intelligence for Solving Contemporary Problems |
Recent Advances in Computer Science and Communications / 17 / 1 / 5 - 6 |
2666-2566 |
|
2023 |
176 |
Sandeep Kumar |
Energy efficient multi-criterion binary grey wolf optimizer based clustering for heterogeneous wireless sensor networks |
Soft Computing / 28 / / 3251 - 3265 |
1433-7479 |
|
2023 |
177 |
Sandeep Kumar |
Heart Disease Prediction?A Computational Machine Learning Model Perspective |
Smart Innovation, Systems and Technologies / 351 / 1 / 281 - 293 |
2190-3018 |
|
2023 |
178 |
Sandeep Kumar |
Text Mining-A Comparative Review of Twitter Sentiments Analysis |
Recent Advances in Computer Science and Communications / 17 / 1 / 21 - 37 |
2666-2558 |
|
2023 |
179 |
Santhrupth B C |
Intelligent Disease Detection in Sugarcane Plants: A Comparative Analysis of Machine Learning Models for Classification and Diagnosis |
International Journal of Intelligent Systems and Applications in Engineering / 12 / 8s / 299 - 306 |
2147-6799 |
|
2023 |
180 |
Santhrupth B C |
Intelligent Disease Detection in Sugarcane Plants: A Comparative Analysis of Machine Learning Models for Classification and Diagnosis |
International Journal of Intelligent Systems and Applications in Engineering / 12 / 8s / 299 - 306 |
2147-6799 |
|
2023 |
181 |
Sathish P K |
Post-Operative Brain MRI Resection Cavity Segmentation
Model and Follow-Up Treatment Assistance |
International Journal of Online and Biomedical Engineering / 20 / 5 / 133 - 149 |
2626-8493 |
|
2023 |
182 |
Sathish P K |
Advancing Brain Tumor Segmentation in MRI Scans:
Hybrid Attention-Residual UNET with Transformer Blocks |
International journal of online and biomedical engineering / 20 / 6 / 103 - 115 |
2626-8493 |
|
2023 |
183 |
Sathish P K |
Enhanced Postoperative Brain MRI Segmentation with Automated Skull Removal and Resection Cavity Analysis |
Journal of Computer Science / 20 / 5 / 585 - 593 |
1552-6607 |
|
2023 |
184 |
Shamanth N |
Energy-Efficient Long-Range Sectored Antenna for Directional Sensor Network Applications |
IETE Journal of Research / / / 1 - 11 |
0377-2063 |
|
2023 |
185 |
Shamanth N |
Augmented Reality based Navigation for Indoor Environment using Unity Platform |
Lecture Notes in Networks and Systems / / / 199 - 207 |
2367-3370 |
|
2023 |
186 |
Sharon Roji Priya C |
Classification of HHO-based Machine Learning
Techniques for Clone Attack Detection in WSN
|
International Journal of Computer Network and Information Security / 15 / 6 / 1 - 15 |
2074-9104 |
|
2023 |
187 |
Shiju George |
Adolescent identity search algorithm with optimized video-based activity classification using hierarchical auto-associative polynomial convolutional neural network |
International Journal of Ad Hoc and Ubiquitous Computing / 45 / 4 / 254 - 265 |
1743-8225 |
|
2023 |
188 |
Sujatha A K |
Heart Disease Prediction?A Computational Machine Learning Model Perspective |
Smart Innovation, Systems and Technologies / 351 / 1 / 281 - 293 |
2190-3018 |
|
2023 |
189 |
Sujatha A K |
Drought Prediction-A Comparative Analysis of Supervised Machine Learning Techniques |
Smart Innovation, Systems and Technologies / 351 / 1 / 295 - 307 |
2190-3018 |
|
2023 |
190 |
Sujatha A K |
Text Mining-A Comparative Review of Twitter Sentiments Analysis |
Recent Advances in Computer Science and Communications / 17 / 1 / 21 - 37 |
2666-2558 |
|
2023 |
191 |
Vigneshwaran T |
A comprehensive Survey on Deep Learning Techniques for Digital Video Forensics |
Journal of Information and Knowledge Management / / / - |
0219-6492 |
|
2023 |
192 |
Vinodha D |
Integrity assured multi-functional multi-application secure data aggregation in
wireless sensor networks (IAMFMA-SDA) |
Journal of Intelligent and Fuzzy Systems / 45 / / 1453 - 1472 |
1064-1246 |
|
2023 |
193 |
Vinodha D |
Secure Identity Based Authentication for Emergency Communications |
Lecture Notes in Networks and Systems / 840 / 0 / 129 - 140 |
2367-3389 |
|
2023 |
194 |
Vinodha D |
Investigations of Naive Bayes, Random Forest and
Decision Tree Algorithm for building aeroponics
system. |
International Journal on Recent and Innovation Trends in Computing and Communication / 11 / 9 / 2730 - 2737 |
2321-8169 |
|
2023 |
195 |
Addapalli V N Krishna |
Impulse noise recuperation from grayscale and medical images using supervised curve fitting linear regression
and mean filter? |
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) / 28 / 2 / 777 - 786 |
2502-4752 |
|
2022 |
196 |
Addapalli V N Krishna |
Securing Grayscale Image Using Improved Arnold Transform and ElGamal Encryption |
Journal of Electronic Imaging / 31 / 6 / 063012-1 - 063012-14 |
1017-9909 |
|
2022 |
197 |
Addapalli V N Krishna |
Revocable and Secure Multi-Authority Attribute-Encryption Scheme |
International Journal ofINTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING / 11 / 6 / 52 - 58 |
2147-67992 |
|
2022 |
198 |
Ajit Danti |
Multi-layer Stacking-based Emotion Recognition using Data Fusion Strategy |
International Journal of Advanced Computer Science and Applications(IJACSA) / 13 / 6 / 433 - 442 |
2156-5570 |
|
2022 |
199 |
Ajit Danti |
Relevance of Psychophysiological and Emotional Features for the Analysis of Human Behavior ? A Survey |
ECS Transactions / 107 / 1 / 607 - 626 |
1938-5862 |
|
2022 |
200 |
Ajit Danti |
Classification of Psychological Disorders by Feature Ranking and Fusion using Gradient Boosting Classification of Psychological Disorders |
) International Journal of Advanced Computer Science and Applications / 14 / 2 / 287 - 294 |
2156-5570, 2158-107X |
|
2022 |
201 |
Alok Kumar Pani |
Gaussian Mutation-Spider Monkey Optimization (GM-SMO) Model for Remote Sensing Scene Classification |
Remote Sensing / 14 / 24 / 1 - 20 |
2072-4292 |
|
2022 |
202 |
Alok Kumar Pani |
Normalized Attention Neural Network with Adaptive Feature Recalibration for Detecting the Unusual Activities Using Video Surveillance Camera |
International Journal of Safety and Security Engineering / 13 / 1 / 51 - 58 |
2041-904X |
|
2022 |
203 |
Ancy Nidhin P R |
Revocable and Secure Multi-Authority Attribute-Encryption Scheme |
International Journal ofINTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING / 11 / 6 / 52 - 58 |
2147-67992 |
|
2022 |
204 |
Anoop G L |
Classification of Rice Blast, Brown Spot, Leaf Blight and Hispa Paddy Leaf Diseases in Transformed YUV Color Space |
NeuroQuantology / 20 / 13 / 4172 - 4182 |
1303-5150 |
|
2022 |
205 |
Aruna S K |
Machine Learning Based Time Series Analysis for COVID-19 Cases in India |
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) / 2022 / / 1932 - 1937 |
2575-7288 |
|
2022 |
206 |
Aruna S K |
Improved Henon Chaotic Map-based Progressive Block-based visual cryptography strategy for securing sensitive data in a cloud EHR system |
International Journal of Intelligent Networks / 3 / / 109 - 112 |
2666-6030 |
|
2022 |
207 |
Aruna S K |
Identification of Dry Bean Varieties Based on Multiple Attributes Using CatBoost Machine Learning Algorithm |
Scientific Programming / 2023 / / 1 - 21 |
1058-9244 |
|
2022 |
208 |
Aruna S K |
Security Issues in Intrusion Detection - Review |
Mathematical Statistician and Engineering Applications / 71 / 3s2 / 47 - 58 |
2094-0343 |
|
2022 |
209 |
Balachandran K |
EPCA Enhanced Principal Component Analysis for Medical Data Dimensionality Reduction |
SN Computer Science / 4 / 3 / 1 - 14 |
2661-8907 |
|
2022 |
210 |
Balachandran K |
Optimal Shortest Path Routing over Wireless Sensor Networks Using Constrained Genetic Firefly Optimization Algorithm |
Lecture Notes in Networks and Systems / 608 / 1 / 643 - 654 |
2367-3370 |
|
2022 |
211 |
Balamurugan M |
A multi-preference integrated algorithm for deep learning based recommender framework |
Concurrency and Computation Practice & Experience / / / - |
1532-0634 |
|
2022 |
212 |
Balamurugan M |
Enhanced Security for Large-Scale 6G Cloud Computing: A Novel Approach to Identity based Encryption Key Generation |
Journal of Machine and Computing / 3 / 2 / 080 - 091 |
2789-1801 |
|
2022 |
213 |
Balamurugan M |
Analysis of Nifty 50 index stock market trends using hybrid machine learning model in quantum finance
|
International Journal of Electrical and Computer Engineering / 13 / 3 / 3549 - 3560 |
2088-8708 |
|
2022 |
214 |
Bejoy B J |
Network Based Detection of IoT Attack Using AIS-IDS Model |
Wireless Personal Communications / / / - |
0929-6212 |
|
2022 |
215 |
Bejoy B J |
A generic cyber immune framework for anomaly detection using artificial immune systems |
Applied Soft Computing / 130 / 2022,109680 / - |
1568-4946 |
|
2022 |
216 |
Bejoy B J |
IEEHR: Improved Energy Efficient Honeycomb Based Routing in MANET for Improving Network Performance and Longevity |
Wireless Personal Communications / / / - |
0929-6212 |
|
2022 |
217 |
Boppuru Rudra Prathap |
An Improved and Efficient YOLOv4 Method for Object Detection in Video Streaming |
Lecture Notes in Networks and Systems / 462 / / 305 - 316 |
2367-3389, 2367-3389 |
|
2022 |
218 |
Boppuru Rudra Prathap |
A Statistical Analysis and Comparison of the spread of Swine Flu and COVID-19 in India |
Malaysian Journal of Medicine and Health Sciences / 18 / 6 / 92 - 99 |
2636-9346 |
|
2022 |
219 |
Boppuru Rudra Prathap |
Geo-spatial crime density attribution using optimized machine learning algorithms |
International Journal of Information Technology (Singapore) / / / - |
2511-2104 |
|
2022 |
220 |
Boppuru Rudra Prathap |
Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT |
Security and Communication Networks / / / - |
1939-0114 |
|
2022 |
221 |
Chinthakunta Manjunath |
Analysis of Nifty 50 index stock market trends using hybrid machine learning model in quantum finance
|
International Journal of Electrical and Computer Engineering / 13 / 3 / 3549 - 3560 |
2088-8708 |
|
2022 |
222 |
Chinthakunta Manjunath |
Twitter sentiment analysis on online food services based on elephant
herd optimization with hybrid deep learning technique |
Cluster Computing / / / - |
1386-7857 |
|
2022 |
223 |
Chinthakunta Manjunath |
Normalized Attention Neural Network with Adaptive Feature Recalibration for Detecting the Unusual Activities Using Video Surveillance Camera |
International Journal of Safety and Security Engineering / 13 / 1 / 51 - 58 |
2041-904X |
|
2022 |
224 |
Debarka Mukhopadhyay |
Smart Mobile Device to Trace Moving Rogue Objects in Smart City Utilizing Dynamic Source Dynamic Destination Tracking Algorithm |
IETE Journal of Research / / / 1 - 8 |
0377-2063 |
|
2022 |
225 |
Diana Jeba Jingle I |
A Privatized Approach in Enhanced Spam Filtering Techniques using TSAS over Cloud Networks |
International Journal of Intelligent Enterprise / 9 / 3 / 332 - 343 |
1745-3232 |
|
2022 |
226 |
Diana Jeba Jingle I |
Design of Grover's Algorithm over 2, 3 and 4-Qubit Systems in Quantum Programming Studio |
International Journal of Electronics and Telecommunications / 68 / 1 / 77 - 82 |
2300-1933, 2081-8491 |
|
2022 |
227 |
Diana Jeba Jingle I |
IoT enabled lung cancer detection and routing algorithm using CBSOA-based ShCNN |
International Journal of Adaptive Control and Signal Processing / 37 / 1 / 224 - 243 |
0890-6327 |
|
2022 |
228 |
Diana Jeba Jingle I |
FACVO-DNFN: Deep learning-based feature fusion and Distributed Denial of Service attack detection in cloud computing |
Knowledge-Based Systems / 261 / / 110 - 132 |
0950-7051 |
|
2022 |
229 |
Diana Jeba Jingle I |
Design of Low power 4-bit Flash ADC Using Multiplexer Based Encoder in 90nm CMOS Process |
International Journal Of Electronics And Telecommunications / 68 / 3 / 565 - 570 |
2081-8491 |
|
2022 |
230 |
Divya Vetriveeran |
Smart Precision Irrigation Techniques Using
Wireless Underground Sensors in Wireless
Sensors |
IEEE Xplore / / / 2072 - 2077 |
2575-7288 |
|
2022 |
231 |
Divya Vetriveeran |
3D CNN-Based Classification of Severity in COVID-19 Using CT Images |
Lecture Notes in Networks and Systems / / / 301 - 312 |
2367-3389 |
|
2022 |
232 |
Ganesh Kumar R |
Certain Investigation of Medical Image analysis using Object Recognition and Semantic Segmentation |
Journal of Pharmaceutical Negative Results / 13 / 9 / 4484 - 4492 |
2229-7723 |
|
2022 |
233 |
Ganesh Kumar R |
Adaptive hybrid bird swarm optimization based efficient transmission in WSN |
Journal of Pharmaceutical Negative Results / 14 / 2 / 480 - 484 |
2229-7723 |
|
2022 |
234 |
Ganesh Kumar R |
Banking Cloud with Blockchain Security and Error Recovery Process |
NeuroQuantology / 20` / 10 / 11355 - 11364 |
1303-5150 |
|
2022 |
235 |
Ganesh Kumar R |
IOT-BASED cyber security identification model through machine learning technique |
Measurement: Sensors / 27 / / 1 - 8 |
2665-9174 |
|
2022 |
236 |
Ganesh Kumar R |
Performance Analysis of User Behavior Pattern Mining Using Web Log Database for User Identification |
Soft Computing: Theories and Applications / 627 / / 347 - 356 |
2367-3370 |
|
2022 |
237 |
Gokulapriya R |
Performance Analysis of User Behavior Pattern Mining Using Web Log Database for User Identification |
Soft Computing: Theories and Applications / 627 / / 347 - 356 |
2367-3370 |
|
2022 |
238 |
Jayapandian N |
An Intelligent Web Caching System for Improving the Performance of a Web-Based Information Retrieval System |
International Journal on Semantic Web and Information Systems / 16 / 4 / 26 - 45 |
1552-6283 |
|
2022 |
239 |
Jayapandian N |
Improving Routing Data Security in Wireless Sensor Network Using Clustering Range Indicators Essentials in SMDSRNGs Method |
Wireless Personal Communications / 125 / 3 / 1 - 12 |
1572-834X |
|
2022 |
240 |
Jayapandian N |
Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm |
Wireless Personal Communications / 120 / 1 / 2428 - 2447 |
1572-834X |
|
2022 |
241 |
Jayapandian N |
The Future Warfare with Multidomain Applications of Artificial Intelligence: Research Perspective |
Networks and Systems / 351 / / 329 - 341 |
2367-3370 |
|
2022 |
242 |
Jayapandian N |
Energy-Efficient Cluster in Wireless Sensor Network Using Life Time Delay Clustering Algorithms |
Computer Systems Science and Engineering / 43 / 1 / 77 - 86 |
0267-6192 |
|
2022 |
243 |
Jayapandian N |
Artificial Intelligence Technological Revolution in Education and Space for Next Generation |
Lecture Notes in Networks and Systems / 461 / 1 / 371 - 382 |
2367-3370 |
|
2022 |
244 |
Jayapandian N |
COVID-19 Pandemic: Review on Emerging Technology Involvement with Cloud Computing |
Lecture Notes in Networks and Systems / 461 / 1 / 223 - 233 |
2367-3370 |
|
2022 |
245 |
Jeno Lovesum S P |
A Study on Experimental Analysis of Best Fit Machine Learning Approach for Smart Agriculture |
SN Computer science / / / - |
2661-8907 |
|
2022 |
246 |
Jeno Lovesum S P |
Smart Steering Wheel for Improving Driver?s Safety Using Internet of Things |
SN Computer science / / / - |
2661-8907 |
|
2022 |
247 |
Julian Benadit P |
A Crowdsourcing Approach to Develop Machine Learning Models to Quantify
Radiographic Joint Damage in Rheumatoid Arthritis |
JAMA Network Open / 5 / 8 / 1 - 13 |
2574-3805 |
|
2022 |
248 |
Julian Benadit P |
Multi-atlas Graph Convolutional Networks and Convolutional Recurrent Neural Networks-Based Ensemble Learning for Classification of Autism Spectrum Disorders |
SN Computer Science volume / 4 / 213 / 1 - 9 |
2661-8907 |
|
2022 |
249 |
Julian Benadit P |
Phishing attack detection using Machine Learning |
Measurement: Sensors / 24 / / - |
2665-9174 |
|
2022 |
250 |
Jyothi Mandala |
Ar-HGSO: Autoregressive-Henry Gas Sailfish Optimization enabled deep learning model for diabetic retinopathy detection and severity level classification |
Biomedical Signal Processing and Control / 77 / / - |
1746-8094 |
|
2022 |
251 |
Jyothi Mandala |
BSLnO: Multi-agent based distributed intrusion detection system using Bat Sea Lion Optimization-based hybrid deep learning approach |
International Journal of Adaptive Control and Signal Processing / 36 / 8 / 1909 - 1930 |
0890-6327 |
|
2022 |
252 |
Jyothi Thomas |
Non-destructive silkworm pupa gender classification with X-ray images using ensemble learning |
Artificial Intelligence in Agriculture / 6 / / 100 - 110 |
2589-7217 |
|
2022 |
253 |
Jyothi Thomas |
A Machine Learning Model to Predict Suicidal Tendencies in Students |
Asian Journal of Psychiatry / 79 / 103363 / - |
1876-2018 |
|
2022 |
254 |
Jyothi Thomas |
Gender Identification of Silkworm Pupa and Automated Cocoon Cutting Machine for Benefiting the Sericulture Grainages in Karnataka |
Lecture Notes in Networks and Systems / / / 372 - 381 |
2367-3370 |
|
2022 |
255 |
Jyothi Thomas |
A Review of Deep Learning Methods in Cervical Cancer Detection |
Lecture Notes in Networks and Systems / / / 624 - 633 |
2367-3370 |
|
2022 |
256 |
Kanmani P |
An Intelligent Web Caching System for Improving the Performance of a Web-Based Information Retrieval System |
International Journal on Semantic Web and Information Systems / 16 / 4 / 26 - 45 |
1552-6283 |
|
2022 |
257 |
Karthikeyan H |
A Malicious Botnet Traffic Detection Using Machine
Learning |
Journal Of Pharmaceutical Negative Results / 13 / 4 / 968 - 977 |
2229-7723 |
|
2022 |
258 |
Kukatlapalli Pradeep Kumar |
Secure Authenticated Communication Via Digital Signature And Clear List In VANETs |
ECS Transactions / 107 / 1 / 20065 - 20071 |
1938-5862 |
|
2022 |
259 |
Kukatlapalli Pradeep Kumar |
A Statistical Analysis and Comparison of the spread of Swine Flu and COVID-19 in India |
Malaysian Journal of Medicine and Health Sciences / 18 / 6 / 92 - 99 |
2636-9346 |
|
2022 |
260 |
Manikandakumar M |
Weed Classification Using Particle Swarm Optimization and Deep Learning
Models |
Computer Systems Science and Engineering / 44 / 1 / 913 - 927 |
0267-6192 |
|
2022 |
261 |
Manikandakumar M |
From Observation to Active Learning: A Collaborative Learning Approach for Object Oriented Programming Course |
Journal of Engineering Education Transformations / 36 / 4 / 150 - 160 |
2349-2473 |
|
2022 |
262 |
Manjunatha Swamy C |
Evaluation of Information Extraction Architecture
in Big data Analytics |
Journal of Emerging Technologies and Innovative Research / 10 / 4 / 677 - 686 |
2349-5162 |
|
2022 |
263 |
Manohar M |
Enhanced radial basis function neural network for tomato plant disease leaf image segmentation |
Ecological Informatics (ScienceDirect Q1 Journal) / 70 / / 1 - 19 |
1574-9541 |
|
2022 |
264 |
Manohar M |
Dirichlet Feature Embedding with Adaptive Long
Short-Term Memory Model for Intrusion Detection
System |
Journal of System and Management Sciences / 12 / 4 / 398 - 412 |
1816-6075 |
|
2022 |
265 |
Manohar M |
Balancing module in evolutionary optimization and Deep Reinforcement Learning for multi-path selection in Software Defined
Networks |
Physical Communication / 56 / / 1 - 10 |
1874-4907 |
|
2022 |
266 |
Manohar M |
Twitter sentiment analysis on online food services based on elephant
herd optimization with hybrid deep learning technique |
Cluster Computing / / / - |
1386-7857 |
|
2022 |
267 |
Manohar M |
Classification of a New-Born Infant?s Jaundice Symptoms Using a Binary Spring Search
Algorithm with Machine Learning |
Revue d'Intelligence Artificielle / 37 / 2 / 257 - 265 |
0992-499X |
|
2022 |
268 |
Manu Elappila |
Dynamic Channel Allocation in Wireless Personal Area Networks for Industrial IoT Applications |
Advances in Cognitive Science and Communications / / / - |
2195-3996 |
|
2022 |
269 |
Mary Anita E A |
A Neuro Fuzzy with Improved GA for Collaborative Spectrum Sensing in CRN |
Intelligent Automation and Soft Computing / 34 / 2 / 1093 - 1108 |
1079-8587, 2326-005X |
|
2022 |
270 |
Mary Anita E A |
IM-EDRD from Retinal Fundus Images Using Multi-Level Classification Techniques |
Intelligent Automation and Soft Computing / 35 / 1 / 567 - 580 |
1079-8587, 2326-005X |
|
2022 |
271 |
Mary Anita E A |
Energy Efficient Evolutionary Algorithm based
Clustering with Route Selection Protocol for IoT Assisted Wireless Sensor Networks |
International Journal of Computer Networks and Applications (IJCNA) / 9 / 3 / 328 - 339 |
2395-0455 |
|
2022 |
272 |
Mary Anita E A |
Improved Security of the Data Communication in VANET Environment Using ASCII-ECC Algorithm |
Wireless Personal Communication / 128 / 2 / 759 - 776 |
0929-6212 |
|
2022 |
273 |
Mary Anita E A |
Blocking intrusion logic using optimized multi-head convolution in wireless sensor network
|
Journal of Intelligent and Fuzzy Systems / / / 6897 - 6909 |
1875-8967 |
|
2022 |
274 |
Mary Anita E A |
An Efficient Fuzzy Logic Cluster Formation Protocol for Data Aggregation and Data Reporting in Cluster-Based Mobile Crowdsourcing |
Lecture Notes in Networks and Systems / / / 427 - 446 |
2367-3370 |
|
2022 |
275 |
Mausumi Goswami |
Intelligent approach to automate a system for simulation of nanomaterials |
AIP Conference Proceedings / 2690 / 1 / 1 - 020035 |
0094-243X, 1551-7616 |
|
2022 |
276 |
Mithun B N |
Applying Encryption and Decryption Algorithm for Data Security in Cloud |
International Journal of Engineering and Modern Technology / 8 / 2 / 16 - 23 |
2504-8848, 2695-2149 |
|
2022 |
277 |
Natarajan K |
Flexible and cost-effective cryptographic
encryption algorithm for securing unencrypted
database files at rest and in transit |
MethodsX / / / - |
2215-0161 |
|
2022 |
278 |
Natarajan K |
Assimilating sense into disaster recovery databases and judgement framing proceedings for the fastest recovery |
International Journal of Electrical and Computer Engineering / 13 / 4 / 4234 - 4245 |
2088-8708 |
|
2022 |
279 |
Natarajan K |
Assimilating sense into disaster recovery databases and judgement framing proceedings for the fastest recovery |
International Journal of Electrical and Computer Engineering (IJECE) / 13 / 4 / 4234 - 4245 |
2088-8708 |
|
2022 |
280 |
Naveen J |
A multi-preference integrated algorithm for deep learning based recommender framework |
Concurrency and Computation Practice & Experience / / / - |
1532-0634 |
|
2022 |
281 |
Raghavendra S |
Facial emotion recognition using convolutional neural networks |
Materials Today: Proceedings / / / - |
2214-7853 |
|
2022 |
282 |
Raghavendra S |
Customized mask region based convolutional neural networks for un-uniformed shape text detection and text recognition |
International Journal of Electrical and Computer Engineering / 13 / 1 / 413 - 424 |
2088-8708 |
|
2022 |
283 |
Rajkumar Rajavel |
Cloud-enabled Diabetic Retinopathy Prediction System using optimized deep Belief Network Classifier |
Journal of Ambient Intelligence and Humanized Computing / / / - |
1868-5145 |
|
2022 |
284 |
Rajkumar Rajavel |
Cognitive Fuzzy-based Behavioral Learning System for Augmenting the Automated Multi-issue Negotiation in the E-commerce Applications
|
Journal of Internet Technology / 23 / 6 / 1335 - 1342 |
1607-9264 |
|
2022 |
285 |
Raju G |
A generic cyber immune framework for anomaly detection using artificial immune systems |
Applied Soft Computing / 130 / 2022,109680 / - |
1568-4946 |
|
2022 |
286 |
Raju G |
An improved frequent pattern tree: the child structured frequent pattern tree CSFP-tree |
Pattern Analysis and Applications / / / - |
1433-755X |
|
2022 |
287 |
Raju G |
Person Identification by Models Trained Using Left and Right Ear Images Independently |
Advances in Computer Science Research / / / 281 - 288 |
2352-538X |
|
2022 |
288 |
Raju G |
A Novel Fuzzy-Based Thresholding Approach for
Blood Vessel Segmentation from Fundus Image |
Journal of Advances in Information Technology / 14 / 2 / 185 - 192 |
1798-2340 |
|
2022 |
289 |
Raju G |
Ear Recognition Using Rank Level Fusion of Classifiers Outputs |
Online and Biomedical Engineering / 19 / 3 / 127 - 141 |
2626-8493 |
|
2022 |
290 |
Rakoth Kandan Sambandam |
Smart Precision Irrigation Techniques Using
Wireless Underground Sensors in Wireless
Sensors |
IEEE Xplore / / / 2072 - 2077 |
2575-7288 |
|
2022 |
291 |
Rakoth Kandan Sambandam |
Security Issues in Intrusion Detection - Review |
Mathematical Statistician and Engineering Applications / 71 / 3s2 / 47 - 58 |
2094-0343 |
|
2022 |
292 |
Rakoth Kandan Sambandam |
3D CNN-Based Classification of Severity in COVID-19 Using CT Images |
Lecture Notes in Networks and Systems / / / 301 - 312 |
2367-3389 |
|
2022 |
293 |
Rathi Devi T |
A Enhanced Novel Methodology for Checking Driver Eligibility and Vehicle Security Using Image Processing |
International Journal of INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING / 11 / 2 / 1032 - 1044 |
2147-67992 |
|
2022 |
294 |
Rekha V |
Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter |
International Journal of Power Electronics and Drive Systems (IJPEDS) / 13 / 4 / 2086 - 2097 |
2088-8694 |
|
2022 |
295 |
Rekha V |
Machine Learning Based Time Series Analysis for COVID-19 Cases in India |
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) / 2022 / / 1932 - 1937 |
2575-7288 |
|
2022 |
296 |
Samiksha Shukla |
Malicious URL Detection Using Machine Learning Techniques |
Intelligent Sustainable Systems / 458 / / 657 - 669 |
2367-3370 |
|
2022 |
297 |
Sandeep Kumar |
Special Issue: Computational Intelligence |
Journal of Computational Biology / 29 / 6 / 495 - 496 |
1066-5277 |
|
2022 |
298 |
Sandeep Kumar |
Sigmoidal Particle Swarm Optimization for Twitter Sentiment Analysis |
Computers, Materials & Continua / 74 / 1 / 897 - 914 |
1546-2226 |
|
2022 |
299 |
Sandeep Kumar |
Multiway Relay Based Framework for Network Coding in Multi-Hop WSNs |
Computers, Materials & Continua / 74 / 1 / 1199 - 1216 |
1546-2226 |
|
2022 |
300 |
Sandeep Kumar |
An Anomaly Detection Framework for Twitter Data |
Applied Sciences / 12 / 21 / 1 - 16 |
2076-3417 |
|
2022 |
301 |
Sandeep Kumar |
Memetic Spider Monkey Optimization for Spam Review Detection Problem |
Big Data / 11 / 02 / 137 - 149 |
2167-6461 |
|
2022 |
302 |
Santanu Roy |
SVD-CLAHE boosting and balanced loss function for Covid-19 detection from an imbalanced Chest X-Ray dataset |
Computers in Biology and Medicine / / / - |
0010-4825 |
|
2022 |
303 |
Santhrupth B C |
Sugarcane Leaf Disease Detection and Classification:
Current State and Future Directions |
International Journal of All Research Education and Scientific Methods (IJARESM) / / / - |
2455-6211 |
|
2022 |
304 |
Sathish Kumar R |
Cloud-enabled Diabetic Retinopathy Prediction System using optimized deep Belief Network Classifier |
Journal of Ambient Intelligence and Humanized Computing / / / - |
1868-5145 |
|
2022 |
305 |
Shamanth N |
Dynamic Channel Allocation in Wireless Personal Area Networks for Industrial IoT Applications |
Advances in Cognitive Science and Communications / / / - |
2195-3996 |
|
2022 |
306 |
Shruti Jalapur |
Identifying Fake Products Using Hyperledger Fabric Blockchain |
Journal of Data Acquisition and Processing / 38 / / 675 - 692 |
1004-9037 |
|
2022 |
307 |
Sujatha A K |
EPCA Enhanced Principal Component Analysis for Medical Data Dimensionality Reduction |
SN Computer Science / 4 / 3 / 1 - 14 |
2661-8907 |
|
2022 |
308 |
Sujatha A K |
Optimal Shortest Path Routing over Wireless Sensor Networks Using Constrained Genetic Firefly Optimization Algorithm |
Lecture Notes in Networks and Systems / 608 / 1 / 643 - 654 |
2367-3370 |
|
2022 |
309 |
Sundara Pandiyan S |
Phishing attack detection using Machine Learning |
Measurement: Sensors / 24 / / - |
2665-9174 |
|
2022 |
310 |
Sundara Pandiyan S |
An energy efficient approach of deep learning based soft sensor for air quality management. |
Measurement: Sensors / 24 / / - |
2665-9174 |
|
2022 |
311 |
Vandana Reddy |
Gender Identification of Silkworm Pupa and Automated Cocoon Cutting Machine for Benefiting the Sericulture Grainages in Karnataka |
Lecture Notes in Networks and Systems / / / 372 - 381 |
2367-3370 |
|
2022 |
312 |
Vandana Reddy |
Optimal Shortest Path Routing over Wireless Sensor Networks Using Constrained Genetic Firefly Optimization Algorithm |
Lecture Notes in Networks and Systems / 608 / 1 / 643 - 654 |
2367-3370 |
|
2022 |
313 |
Vigneshwaran T |
Convolution Neural Network for Weed Detection |
Lecture Notes in Networks and Systems / / / 965 - 979 |
2367-3389 |
|
2022 |
314 |
Addapalli V N Krishna |
Encryption Then Steganography Framework On High Capacity Data Hiding In Grayscale Images |
J. Math. Comput. Science / 11 / 4 / 4960 - 4980 |
1927-5307 |
|
2021 |
315 |
Addapalli V N Krishna |
Intrusion Detection System Using Deep Learning Methodologies
|
J. Math. Comput. Science / 11 / 5 / 5278 - 5295 |
AYUSH CHOUBEY, |
|
2021 |
316 |
Addapalli V N Krishna |
An efficient Non linear Access Policy Based on Quadratic Residue for Ciphertext Policy Attribute Based Encryption |
Journal of Theoretical and Applied Information Technology / 99 / 21 / 5050 - 5057 |
1992-8645 |
|
2021 |
317 |
Addapalli V N Krishna |
Selfi segmentation in Video using N frame ensemble |
IEEE Access / 9 / 1 / 163348 - 163362 |
2169-3536 |
|
2021 |
318 |
Addapalli V N Krishna |
An Efficient Access Policy with Multi linear Secret haring scheme in Cipher text policy Attribute based encryption |
Journal of Theoretical and Applied Information Technology / 100 / 5 / 1404 - 1411 |
1817-3195 |
|
2021 |
319 |
Addapalli V N Krishna |
An Efficient Nonlinear Access Policy Based On Quadratic Residue For Ciphertext Policy Attribute Based Encryption |
Journal of Theoretical and Applied Information Technology / 99 / 21 / 5050 - 5057 |
1992-8645 |
|
2021 |
320 |
Addapalli V N Krishna |
An Efficient Access Policy With Multi-Linear Secret-Sharing Scheme In Ciphertext-Policy Attribute-Based Encryption |
Journal of Theoretical and Applied Information Technology / 100 / 5 / 1404 - 1411 |
1992-8645 |
|
2021 |
321 |
Ajit Danti |
Fake News Detection Using Linguistic Inquiry With Syllable Pattern Of Words Based On CNN Approach |
GIS SCIENCE JOURNAL / 9 / 4 / 914 - 925 |
1869-9391 |
|
2021 |
322 |
Alok Kumar Pani |
Road Traffic Prediction and Optimal Alternate Path Selection Using HBI-LSTM and HV-ABC |
Indian Journal of Science and Technology / 15 / 15 / 689 - 699 |
0974-5645 |
|
2021 |
323 |
Alok Kumar Pani |
An Approach for Recognizing Multinational License Plate using Generalized Character Sequence Detection |
Journal of Emerging Technologies and Innovative Research / 9 / 5 / 211 - 218 |
2349-5162 |
|
2021 |
324 |
Alok Kumar Pani |
Road Traffic Prediction and Optimal
Alternate Path Selection Using
HBI-LSTM and HV-ABC
|
Indian Journal of Science and Technology / 15 / 15 / 689 - 699 |
0974-5645 |
|
2021 |
325 |
Ancy Nidhin P R |
An Efficient Nonlinear Access Policy Based On Quadratic Residue For Ciphertext Policy Attribute Based Encryption |
Journal of Theoretical and Applied Information Technology / 99 / 21 / 5050 - 5057 |
1992-8645 |
|
2021 |
326 |
Ancy Nidhin P R |
An Efficient Access Policy With Multi-Linear Secret-Sharing Scheme In Ciphertext-Policy Attribute-Based Encryption |
Journal of Theoretical and Applied Information Technology / 100 / 5 / 1404 - 1411 |
1992-8645 |
|
2021 |
327 |
Aruna S K |
Development and evaluation of the bootstrap resampling technique based statistical prediction model for Covid-19 real time data : A data driven
approach |
Journal of Interdisciplinary Mathematics / Not Available / Not Available / - |
0972-0502 |
|
2021 |
328 |
Aruna S K |
Implementation of a Heart Disease Risk Prediction Model Using Machine Learning |
Computational and Mathematical Methods in Medicine / / / 1 - 14 |
1748-670X |
|
2021 |
329 |
Balachandran K |
Root cause analysis of COVID-19 cases by enhanced text mining process |
International Journal of Electrical and Computer Engineering (IJECE) / 12 / 2 / 1807 - 1817 |
2088-8708 |
|
2021 |
330 |
Balachandran K |
eHED2SDG: A Framework Towards Sustainable Professionalism & Attaining SDG through Online Holistic Education in Indian Higher Education |
ECS Transactions / 106 / / - |
1938-5862, 1938-6737 |
|
2021 |
331 |
Balachandran K |
Selfi segmentation in Video using N frame ensemble |
IEEE Access / 9 / 1 / 163348 - 163362 |
2169-3536 |
|
2021 |
332 |
Balachandran K |
An Efficient Access Policy with Multi linear Secret haring scheme in Cipher text policy Attribute based encryption |
Journal of Theoretical and Applied Information Technology / 100 / 5 / 1404 - 1411 |
1817-3195 |
|
2021 |
333 |
Balamurugan M |
Deep Learning for Stock Market Index Price Movement Forecasting Using Improved Technical Analysis |
International Journal of Intelligent Engineering and Systems (IJIES) / / / - |
2185-3118 |
|
2021 |
334 |
Balamurugan M |
An Efficient Access Policy with Multi linear Secret haring scheme in Cipher text policy Attribute based encryption |
Journal of Theoretical and Applied Information Technology / 100 / 5 / 1404 - 1411 |
1817-3195 |
|
2021 |
335 |
Balamurugan M |
An Efficient Access Policy With Multi-Linear Secret-Sharing Scheme In Ciphertext-Policy Attribute-Based Encryption |
Journal of Theoretical and Applied Information Technology / 100 / 5 / 1404 - 1411 |
1992-8645 |
|
2021 |
336 |
Boppuru Rudra Prathap |
Authentication of symmetric cryptosystem using anti-aging controller-based true random number generator |
Applied Nanoscience (Switzerland) / / / - |
2190-5509 |
|
2021 |
337 |
Boppuru Rudra Prathap |
Wireless Sensor Data Acquisition and Control Monitoring Model for Internet of Things Applications |
Scientific Programming / / / - |
1058-9244 |
|
2021 |
338 |
Boppuru Rudra Prathap |
Wireless Communication for Robotic Process Automation Using Machine Learning Technique |
Wireless Communications and Mobile Computing / / / - |
1530-8669 |
|
2021 |
339 |
Boppuru Rudra Prathap |
Machine Learning Techniques for Detecting and Forecasting Disorders in Children Using Pupillometry Data |
Journal of Algebraic Statistics / 13 / 1 / 612 - 620 |
1309-3452 |
|
2021 |
340 |
Boppuru Rudra Prathap |
Blockchain Enabled Model for Minimizing Post Harvest Losses |
ECS Transaction / 106 / / - |
1938-5862,1938-6737 |
|
2021 |
341 |
Chinthakunta Manjunath |
Deep Learning for Stock Market Index Price Movement Forecasting Using Improved Technical Analysis |
International Journal of Intelligent Engineering and Systems (IJIES) / / / - |
2185-3118 |
|
2021 |
342 |
Daniel D |
An enhanced network intrusion detection system for malicious crawler detection and security event correlations in ubiquitous banking infrastructure |
International Journal of Pervasive Computing and Communications / ahead-of-print / ahead-of-print / AOP - AOP |
1742-7371 |
|
2021 |
343 |
Daniel D |
Enhanced Energy Efficient Routing for Wireless Sensor Network Using Extended Power Efficient Gathering in Sensor Information Systems (E-PEGASIS) Protocol |
Procedia of Computer Science / 194 / / 89 - 101 |
1877-0509 |
|
2021 |
344 |
Daniel D |
AI-based Power Screening Solution for SARS-CoV2 Infection: A
Sociodemographic Survey and COVID-19 Cough Detector |
Procedia of Computer Science / 194 / / 255 - 271 |
1877-0509 |
|
2021 |
345 |
Deepa Yogish |
Deep Learning Based Challenge Response Liveliness Matching For Presentation Attack Detection In Face Recognition Biometric Authentication Systems |
Indian Journal of Computer Science and Engineering (IJCSE) / / / 709 - 720 |
0976-5166 |
|
2021 |
346 |
Deepa Yogish |
Credence Aware Data Aggregation for Wireless Sensor Networks |
Journal of Computer Science / 18 / 4 / - |
1549-3636 |
|
2021 |
347 |
Deepa Yogish |
Smart question answering system using vectorization approach and statistical scoring method |
Materials Today: Proceedings, Elsevier / / / 3719 - 3725 |
2214-7853 |
|
2021 |
348 |
Deepa Yogish |
Sentiment Analysis on Voice data using Deep Learning |
International Journal of Novel Research and Development (www.ijnrd.org / 7 / 4 / 778 - 782 |
2456-4184 |
|
2021 |
349 |
Deepa Yogish |
Public Alerting System for Disastrous Events |
International Journal for Modern Trends in Science and Technology / 8 / 4 / 389 - 394 |
2455-3778 |
|
2021 |
350 |
Diana Jeba Jingle I |
A Collaborative Defense Protocol against Collaborative Attacks in Wireless Mesh Networks |
International Journal of Enterprise Network Management / 12 / 3 / 199 - 220 |
1748-1260 |
|
2021 |
351 |
Ganesh Kumar R |
Optimising QoS with load balancing in cloud computing applying dual fuzzy technique |
International Journal of Intelligent Enterprise / 8 / 4 / 323 - 341 |
1745-3240 |
|
2021 |
352 |
Ganesh Kumar R |
Automated Brain Imaging Diagnosis and Classification Model using Rat Swarm Optimization with Deep Learning based Capsule Network |
International Journal of Image and Graphics / / / - |
0219-4678, 1793-6756 |
|
2021 |
353 |
Gnana Prakasi O S |
Chest Diseases Prediction from X-ray Images using CNN Models: A Study |
International Journal of Advanced Computer Science and Applications / 12 / 10 / 236 - 243 |
2156-5570 |
|
2021 |
354 |
Gnana Prakasi O S |
PoseNet based Model for Estimation of
Karate Poses |
Journal of Innovative Image Processing / 4 / 1 / 16 - 25 |
2582-4252 |
|
2021 |
355 |
Jayapandian N |
Securing cloud data against Cyber-Attacks Using Hybrid Aes With Mht Algorithm |
International Journal of Computing / 19 / 4 / 561 - 568 |
1727-6209 |
|
2021 |
356 |
Jayapandian N |
Hybrid shuffled frog leaping and improved biogeography-based optimization algorithm for energy stability and network lifetime maximization in wireless sensor networks |
International Journal of Communication Systems / 34 / 4 / 1 - 16 |
1099-1131 |
|
2021 |
357 |
Jayapandian N |
Security Threats and Privacy Issues in Cloud Data |
Lecture Notes on Data Engineering and Communications Technologies / 58 / / 309 - 316 |
2367-4512 |
|
2021 |
358 |
Jayapandian N |
Enhancing the confidentiality of text embedding using image steganography in spatial domain |
AIP Proceedings / 2387 / 1 / 140013 - 140018 |
0094-243X |
|
2021 |
359 |
Jayapandian N |
Assessment of composite materials on encrypted secret message in image steganography using RSA algorithm |
Materials Today: Proceedings / 81 / 2 / 848 - 852 |
2214-7853 |
|
2021 |
360 |
Jayapandian N |
Usage Data for Predicting User Trends and Behavioral Analysis in E-Commerce Applications |
International Journal of Information Systems in the Service Sector (IJISSS) / 13 / 4 / 40 - 61 |
1935-5688 |
|
2021 |
361 |
Jenefa J |
Secure Authentication Schemes for Vehicular Adhoc Networks: A Survey |
Wireless Personal Communications / / / - |
0929-6212 |
|
2021 |
362 |
Jenefa J |
Identity-based message authentication scheme using proxy vehicles for vehicular ad hoc networks |
Wireless Networks The Journal of Mobile Communication, Computation and Information / 27 / / 3093 - 3108 |
1022-0038 |
|
2021 |
363 |
Jenefa J |
A self-cooperative trust scheme against black hole attacks in vehicular ad hoc networks |
International Journal of Wireless and Mobile Computing / 21 / 1 / 59 - 65 |
1741-1084, 1741-1092 |
|
2021 |
364 |
Jeno Lovesum S P |
Privacy Enforced Access Control Model for Secured Data Handling in Cloud-Based Pervasive Health Care System |
SN computer science / 1 / 239 / 1 - 7 |
2662-995X |
|
2021 |
365 |
Julian Benadit P |
An Improved Web Caching System With Locally Normalized User Intervals |
IEEE ACCESS / 9 / / 112490 - 112501 |
2169-3536 |
|
2021 |
366 |
Jyothi Mandala |
An Integrated Reinforcement DQNN Algorithm to Detect Crime Anomaly Objects in Smart Cities. |
International Journal of Advanced Computer Science and Applications / / / 348 - 352 |
2158-107X, 2156-5570 |
|
2021 |
367 |
Jyothi Mandala |
BSLnO: Multi-agent based distributed intrusion detection system using Bat Sea Lion Optimization-based hybrid deep learning approach |
International Journal of Adaptive Control and Signal Processing / / / - |
0890-6327, 1099-1115 |
|
2021 |
368 |
Jyothi Mandala |
Comprehensive Review on Video Watermarking Security Threats, Challenges, and Its Applications |
ECS Transactions / 107 / 1 / 13833 - 13838 |
1938-6737 |
|
2021 |
369 |
Jyothi Thomas |
A Review on Existing Methods and Classification Algorithms Used for Sex Determination of Silkworm in Sericulture |
Advances in Intelligent Systems and Computing / 1351 / / 567 - 579 |
2194-5357 |
|
2021 |
370 |
Jyothi Thomas |
A Survey on Arrhythmia Disease Detection Using Deep Learning Methods |
Lecture Notes in Networks and Systems / 419 / / 55 - 64 |
2367-3370 |
|
2021 |
371 |
Jyothi Thomas |
Leaf Disease Identification in Rice Plants Using CNN Model |
Lecture Notes on Data Engineering and Communicati ons Technologies / / / - |
2367-4512 |
|
2021 |
372 |
Kanmani P |
Chest Diseases Prediction from X-ray Images using CNN Models: A Study |
International Journal of Advanced Computer Science and Applications / 12 / 10 / 236 - 243 |
2156-5570 |
|
2021 |
373 |
Karthikeyan H |
Cloud-assisted Parkinson disease identification system for remote patient monitoring and diagnosis in the smart healthcare applications |
Concurrency Computation Practice and Experience / / / - |
1532-0634 |
|
2021 |
374 |
Karthikeyan H |
EFS- CC: Ensemble Feature Selection-using Correlation and Cross-Validation Score to Predict Heart Disease in the Healthcare Industry |
Dynamic systems and Applications / 30 / 8 / 1346 - 1361 |
1056-2176 |
|
2021 |
375 |
Karthikeyan H |
Usage Data for Predicting User Trends and Behavioral Analysis in E-Commerce Applications |
International Journal of Information Systems in the Service Sector (IJISSS) / 13 / 4 / 40 - 61 |
1935-5688 |
|
2021 |
376 |
Kukatlapalli Pradeep Kumar |
Evaluate and Design the Mini Hexagon-Shaped Monopole Antenna Controller to Minimize Losses in the Unit |
Journal of Nuclear Energy Science & Power Generation Technology / 10 / 9 / 1 - 6 |
2325-9809 |
|
2021 |
377 |
Kukatlapalli Pradeep Kumar |
Digital Forensics Investigation for Attacks on Artificial Intelligence |
ECS Transactions / 106 / / - |
1938-5862,1938-6737 |
|
2021 |
378 |
Kukatlapalli Pradeep Kumar |
Secure Authenticated Communication Via Digital Signature and Clear List in Vanets |
ECS Transactions / 106 / / - |
1938-5862,1938-6737 |
|
2021 |
379 |
Kukatlapalli Pradeep Kumar |
Blockchain Enabled Model for Minimizing Post Harvest Losses |
ECS Transaction / 106 / / - |
1938-5862,1938-6737 |
|
2021 |
380 |
Kukatlapalli Pradeep Kumar |
Wireless Sensor Data Acquisition and Control Monitoring Model for Internet of Things Applications |
Scientific Programming / / / - |
1058-9244 |
|
2021 |
381 |
Manohar M |
Road Traffic Prediction and Optimal
Alternate Path Selection Using
HBI-LSTM and HV-ABC
|
Indian Journal of Science and Technology / 15 / 15 / 689 - 699 |
0974-5645 |
|
2021 |
382 |
Manohar M |
Road Traffic Prediction and Optimal Alternate Path Selection Using HBI-LSTM and HV-ABC |
Indian Journal of Science and Technology / 15 / 15 / 689 - 699 |
0974-5645 |
|
2021 |
383 |
Mary Anita E A |
Identity-based message authentication scheme using proxy vehicles for vehicular ad hoc networks |
Wireless Networks The Journal of Mobile Communication, Computation and Information / 27 / / 3093 - 3108 |
1022-0038 |
|
2021 |
384 |
Mary Anita E A |
Discrete Integrity Assuring Slice-Based Secured Data Aggregation
Scheme for Wireless Sensor Network (DIA-SSDAS) |
Wireless Communications and Mobile Computing / 2021 / / 1 - 17 |
1530-8677, 1530-8669 |
|
2021 |
385 |
Mary Anita E A |
A self-cooperative trust scheme against black hole attacks in vehicular ad hoc networks |
International Journal of Wireless and Mobile Computing / 21 / 1 / 59 - 65 |
1741-1084, 1741-1092 |
|
2021 |
386 |
Mary Anita E A |
Secure Authentication Schemes for Vehicular Adhoc Networks: A Survey |
Wireless Personal Communications / / / - |
0929-6212 |
|
2021 |
387 |
Mary Anita E A |
Discrete Integrity Assuring Slice-Based Secured Data Aggregation Scheme for Wireless Sensor Network (DIA-SSDAS) |
Wireless Communications and Mobile Computing / 2021 / 2021 / 1 - 17 |
1530-8669 |
|
2021 |
388 |
Mary Jasmine E |
The role of hyperparameters in predicting rainfall using n-hidden-layered networks |
Natural Hazards / III / I / 489 - 505 |
1573-0840 |
|
2021 |
389 |
Mausumi Goswami |
A Fuzzy Based Approach for Empirical Analysis of Unstructured Data |
Journal of Computational and Theoretical Nanoscience / 17 / 9-10 / 4375 - 4379 |
1546-1955, 1546-1963 |
|
2021 |
390 |
Mausumi Goswami |
A Comparative Analysis of Opinions and Sentiments on Clean India Campaign and Sustainability Goals of 2030 |
AIP Conference Proceedings / / / - |
0094-243X, 1551-7616 |
|
2021 |
391 |
Mausumi Goswami |
A Comparative Study of the Impact of Thermal Indices on Indian Coral Ecosystem |
AIP Conference Proceedings / / / - |
0094-243X, 1551-7616 |
|
2021 |
392 |
Mausumi Goswami |
Exploring Sustainable and Affordable Cancer Care using Artificial Intelligence |
ECS Transactions / 106 / / - |
1938-5862, 1938-6737 |
|
2021 |
393 |
Mausumi Goswami |
eHED2SDG: A Framework Towards Sustainable Professionalism & Attaining SDG through Online Holistic Education in Indian Higher Education |
ECS Transactions / 106 / / - |
1938-5862, 1938-6737 |
|
2021 |
394 |
Mausumi Goswami |
Towards Sustainable Living through Sentiment Analysis during Covid19 |
ECS Transactions / 106 / / - |
1938-5862,1938-6737 |
|
2021 |
395 |
Mausumi Goswami |
Sustainability & Comparative Impact Analysis of Coral Reef Bleaching in Indian Context |
ECS Transactions / 106 / / - |
1938-5862,1938-6737 |
|
2021 |
396 |
Natarajan K |
Malevolent Application of Bots-Detecting and Forecasting the Prospect of Bots Triggering Misinformation Spread Using the Machine Learning Approach |
International journal of special education / 37 / 3 / 13209 - 13224 |
0827-3383 |
|
2021 |
397 |
Naveen J |
FO-DPSO Algorithm for Segmentation and Detection of Diabetic Mellitus for Ulcers |
International Journal of Image and Graphics / / / - |
1793-6756 |
|
2021 |
398 |
Naveen J |
Energy-Aware Multilevel Clustering Scheme for Underwater Wireless Sensor Networks |
IEEE ACCESS / 10 / / 55868 - 55875 |
2169-3536 |
|
2021 |
399 |
Naveen J |
Fake News Detection Using Linguistic Inquiry With Syllable Pattern Of Words Based On CNN Approach |
GIS SCIENCE JOURNAL / 9 / 4 / 914 - 925 |
1869-9391 |
|
2021 |
400 |
Raghavendra S |
Passenger Flow Prediction From Afc Data Using Station Memorizing Lstm For Metro Rail Systems |
Neural Network World / 31 / 3 / 173 - 189 |
1210-0552 |
|
2021 |
401 |
Raghavendra S |
A Credit Scoring Heterogeneous Ensemble Model Using Stacking and Voting |
Indian Journal of Science and Technology / 15 / 7 / 300 - 308 |
0974-6846 |
|
2021 |
402 |
Rajkumar Rajavel |
Cost-enabled QoS aware task scheduling in the cloud management system |
Journal of Intelligent & Fuzzy Systems / 41 / 5 / 5607 - 5615 |
1875-8967 |
|
2021 |
403 |
Rajkumar Rajavel |
Cloud service negotiation framework for real-time E-commerce application using game theory decision system |
Journal of Intelligent & Fuzzy Systems / 41 / 5 / 5617 - 5628 |
1875-8967 |
|
2021 |
404 |
Raju G |
A Novel Threshold based Method for Vessel Intensity Detection and Extraction from Retinal Images |
International Journal of Advanced Computer Science and Applications / 12 / 6 / 546 - 554 |
2156-5570 |
|
2021 |
405 |
Raju G |
A new framework for contour tracing using Euclidean distance mapping |
Int. J. Computational Vision and Robotics / 11 / 5 / 542 - 553 |
1752-9131 |
|
2021 |
406 |
Raju G |
SR-Mine: Adaptive Transaction Compression Method for Frequent Itemsets Mining |
Arabian Journal for Science and Engineering / Online first / / - |
2193-567X, 2191-4281 |
|
2021 |
407 |
Raju G |
A Fusion Based Approach for Blood Vessel Segmentation
from Fundus Images by Separating Brighter Optic Disc |
Pattern Recognition and Image Analysis / 31 / 4 / 811 - 820 |
1054-6618 |
|
2021 |
408 |
Raju G |
A novel optimised method for speckle reduction in
medical ultrasound images |
International Journal of Automation and Control / 16 / 2 / 137 - 161 |
1740-7516 |
|
2021 |
409 |
Ramanujam E |
Xenobots: A Remarkable Combination of an Artificial
Intelligence-Based Biological Living Robot |
International Journal of Sociotechnology and Knowledge Development / 14 / 1 / 1 - 11 |
1941-6253 |
|
2021 |
410 |
Ramesh Vatambeti |
An Adaptive Cluster based Vehicular Routing Protocol
for Secure Communication |
Wireless Personal Communications / / / - |
0929-6212 |
|
2021 |
411 |
Ramesh Vatambeti |
An IoT-based agriculture maintenance using pervasive computing with machine learning technique |
International Journal of Intelligent Computing and Cybernetics / / / - |
1756-378X |
|
2021 |
412 |
Ramesh Vatambeti |
An Efficient Routing Strategy for Energy Management
in Wireless Sensor Network Using Hybrid Routing Protocols |
Wireless Personal Communication / / / - |
1572-834X, 0929-6212 |
|
2021 |
413 |
Ramesh Vatambeti |
Enhancing the energy efficiency for prolonging the
network life time in multi-conditional multi-sensor
based wireless sensor network |
Journal of Control and Decision / / / - |
2330-7706 |
|
2021 |
414 |
Ramesh Vatambeti |
Bitcoin Price Prediction Using Machine Learning and Artificial Neural Network Model |
Indian journal of science & technology / 14 / 27 / 2300 - 2308 |
0974-5645 |
|
2021 |
415 |
Ravi Kumar Y B |
Statistical Features Learning to Predict Crop Yield in Regional Areas |
International Journal of Electrical and Computer Engineering / 12 / / - |
2088-8708 |
|
2021 |
416 |
Rekha V |
Fake News Detection Using Linguistic Inquiry With Syllable Pattern Of Words Based On CNN Approach |
GIS SCIENCE JOURNAL / 9 / 4 / 914 - 925 |
1869-9391 |
|
2021 |
417 |
Sandeep Kumar |
Analysis and predictions of spread, recovery, and death caused by COVID-19 in India |
Big Data Mining and Analytics / 4 / 2 / 65 - 75 |
2096-0654 |
|
2021 |
418 |
Sandeep Kumar |
Early Identification and Detection of Driver Drowsiness by Hybrid Machine Learning |
IEEE Access / 9 / / 162805 - 162819 |
2169-3536 |
|
2021 |
419 |
Sandeep Kumar |
Improved Feature Selection Method for the Identification of Soil Images Using Oscillating Spider Monkey Optimization |
IEEE Access / 9 / / 167128 - 167139 |
2169-3536 |
|
2021 |
420 |
Sandeep Kumar |
Epidemic Prediction using Machine Learning and Deep Learning Models on COVID-19 Data |
Journal of Experimental & Theoretical Artificial Intelligence / / / - |
1362-3079 |
|
2021 |
421 |
Sandeep Kumar |
Semantic Analysis and Topic Modelling of Web-Scrapped COVID-19 Tweet Corpora through Data Mining Methodologies |
Healthcare / 10 / 5 / 1 - 30 |
2227-9032 |
|
2021 |
422 |
Sandeep Kumar |
Plant Identification Using Fitness-Based Position Update in Whale Optimization Algorithm |
Computers, Materials & Continua / 71 / 3 / 47194736 - |
1546-2226 |
|
2021 |
423 |
Sandeep Kumar |
Performance Analysis of Machine Learning Algorithms for Classifying Hand Motion-Based EEG Brain Signals |
Computer Systems Science and Engineering / 43 / 3 / 1095 - 1107 |
0267-6192 |
|
2021 |
424 |
Santhrupth B C |
Securing Cloud Storage by Ciphertext using Characterized Encryption |
GIS SCIENCE JOURNAL / 8 / 7 / 2308 - 2318 |
1869-9391 |
|
2021 |
425 |
Sathish Kumar R |
IoT based Tracking Application to monitor goods carrying vehicle for Public Distribution System in India |
International Journal of Enterprise Network Management / 12 / 3 / 275 - 296 |
1748-1260 |
|
2021 |
426 |
Sathish Kumar R |
Forest Optimization Algorithm Implementation using Sphere Mathematical Function |
International Journal of Engineering and Advanced Technology (IJEAT) / 10 / 5 / 104 - 110 |
2249-8958 |
|
2021 |
427 |
Sathish Kumar R |
Bitcoin Price Prediction Using Machine Learning and Artificial Neural Network Model |
Indian journal of science & technology / 14 / 27 / 2300 - 2308 |
0974-5645 |
|
2021 |
428 |
Sathish Kumar R |
Cost-enabled QoS aware task scheduling in the cloud management system |
Journal of Intelligent & Fuzzy Systems / 41 / 5 / 5607 - 5615 |
1875-8967 |
|
2021 |
429 |
Sathish Kumar R |
Cloud service negotiation framework for real-time E-commerce application using game theory decision system |
Journal of Intelligent & Fuzzy Systems / 41 / 5 / 5617 - 5628 |
1875-8967 |
|
2021 |
430 |
Sujatha A K |
Optimized Stacking Ensemble (OSE) for Credit Card Fraud Detection using Synthetic Minority Oversampling Model |
Indian Journal of Science and Technology / 14 / 32 / 2607 - 2615 |
0974-5645, 0974-6846 |
|
2021 |
431 |
Sujatha A K |
An Enhanced Ensemble of Long Short-Term Memory and Vector AutoRegression for Energy Consumption Forecasting |
Indian Journal of Science and Technology / 14 / 43 / 3227 - 3236 |
0974-5645, 0974-6846 |
|
2021 |
432 |
Sujatha A K |
Root cause analysis of COVID-19 cases by enhanced text mining process |
International Journal of Electrical and Computer Engineering (IJECE) / 12 / 2 / 1807 - 1817 |
2088-8708 |
|
2021 |
433 |
Venkatachalam K |
Cross-Layer Hidden Markov Analysis for Intrusion Detection |
https://www.techscience.com/journal/cmc / 70 / 2 / - |
1546-2226 |
|
2021 |
434 |
Venkatachalam K |
Improved Dragonfly Optimizer for Intrusion Detection Using Deep Clustering CNN-PSO Classifier |
Computers, Materials & Continua / 70 / 3 / 5949 - 5965 |
1546-2226 |
|
2021 |
435 |
Venkatachalam K |
Covid-19 CT Lung Image Segmentation Using Adaptive Donkey and Smuggler Optimization Algorithm |
Computers, Materials & Continua / 71 / 1 / 1133 - 1152 |
1546-2226 |
|
2021 |
436 |
Venkatachalam K |
Brain Image Classification Using Time Frequency Extraction with Histogram Intensity Similarity |
Computer Systems Science and Engineering / 41 / 2 / 445 - 460 |
0267-6192 |
|
2021 |
437 |
Venkatachalam K |
Machine Learning Technique to Detect Radiations in the Brain |
Computer Systems Science and Engineering / 42 / 1 / 149 - 163 |
0267-6192 |
|
2021 |
438 |
Vinodha D |
Discrete Integrity Assuring Slice-Based Secured Data Aggregation Scheme for Wireless Sensor Network (DIA-SSDAS) |
Wireless Communications and Mobile Computing / 2021 / 2021 / 1 - 17 |
1530-8669 |
|
2021 |
439 |
Xavier C |
On Statistical Tools in Finding Equitable Antimagic Labeling of Complete Graphs |
Lecture Notes in Networks and Systems / 190 / / 985 - 995 |
2367-3370 |
|
2021 |
440 |
Addapalli V N Krishna |
A Study on the effect of canny edge detection on Downscaled images |
Pattern Recognition and Image Analysis / 30 / 3 / 372 - 381 |
1054-6618 |
|
2020 |
441 |
Addapalli V N Krishna |
Survey on Attribute-based Encryption in Cloud Computing |
International Journal of Network Security / 22 / 5 / 863 - 868 |
1816-353X |
|
2020 |
442 |
Addapalli V N Krishna |
Portrait Segmentation Using Ensemble of Heterogeneous Deep-Learning Models |
Entropy / 23 / 197 / 1 - 20 |
1099-4300 |
|
2020 |
443 |
Addapalli V N Krishna |
Analyzing the Total Household data of different states in India based on Census and evaluating their relative performance using Machine Learning |
Solid State Technology / 63 / I4 / 1469 - 1474 |
0038-111X |
|
2020 |
444 |
Addapalli V N Krishna |
Crime Analysis and Forecasting on Spatio Temporal News Feed Data?An Indian Context |
Studies in Bigdata / 90 / / 307 - 327 |
2197-6503 |
|
2020 |
445 |
Alok Kumar Pani |
An efficient algorithmic technique for feature selection in IoT based intrusion detection system |
Indian Journal of Science and Technology / 14 / 1 / 76 - 85 |
0974-5645 |
|
2020 |
446 |
Alok Kumar Pani |
A Big Data Analysis Using Fuzzy Deep Convolution Network Based Model for
Heart Disease Classification |
International Journal of Intelligent Engineering and Systems / 14 / 2 / 147 - 156 |
2185-3118 |
|
2020 |
447 |
Anoop G L |
Rice Crop Yield Prediction Using Multi-Level Machine Learning Techniques |
Journal of Computational and Theoretical Nanoscience / / / - |
1546-1955 |
|
2020 |
448 |
Aruna S K |
Performance Analysis of Deterministic Finite Automata and Turing Machine Using JFLAP Tool |
Journal of Circuits, Systems and Computers / / / - |
0218-1266 |
|
2020 |
449 |
Balachandran K |
A Two-Stepped Feature Engineering Process for Topic Modeling Using
Batchwise LDA with Stochastic Variational Inference Model |
International Journal of Intelligent Engineering and Systems / 13 / 4 / 333 - 345 |
2185-3118 |
|
2020 |
450 |
Balachandran K |
Identification of misconceptions about corona outbreak using trigrams and weighted TF-IDF model |
Journal of Advanced Research in Dynamical and Control Systems / 12 / 05-Special Issue / 524 - 533 |
1943-023X |
|
2020 |
451 |
Balachandran K |
Survey on Attribute-based Encryption in Cloud Computing |
International Journal of Network Security / 22 / 5 / 863 - 868 |
1816-353X |
|
2020 |
452 |
Balachandran K |
EMONET: A Cross Database Progressive Deep Network for Facial Expression Recognition |
International Journal of Intelligent Engineering and Systems / 13 / 6 / 31 - 41 |
2185-3118 |
|
2020 |
453 |
Balachandran K |
Engagement Detection through Facial Emotional Recognition Using a Shallow
Residual Convolutional Neural Networks |
International Journal of Intelligent Engineering and Systems / 14 / 2 / 236 - 247 |
2185-310X |
|
2020 |
454 |
Balachandran K |
Multimodal emotional analysis through hierarchical video summarization and face tracking |
Multimedia Tools and Applications / / / - |
1573-7721 |
|
2020 |
455 |
Balachandran K |
Crime Analysis and Forecasting on Spatio Temporal News Feed Data?An Indian Context |
Studies in Bigdata / 90 / / 307 - 327 |
2197-6503 |
|
2020 |
456 |
Balamurugan M |
Skin lesion classification using decision trees and random forest algorithms |
Journal of Ambient Intelligence and Humanized Computing / / / 1 - 13 |
1868-5137, 1868-5145 |
|
2020 |
457 |
Balamurugan M |
Survey on Attribute-based Encryption in Cloud Computing |
International Journal of Network Security / 22 / 5 / 863 - 868 |
1816-353X |
|
2020 |
458 |
Bejoy B J |
Enhanced AIS Based Intrusion Detection System Using Natural Killer Cells |
Journal of Cyber Security and Mobility / 9 / 4 / 515 - 534 |
2245-1439 |
|
2020 |
459 |
Bejoy B J |
Automatic Classification of ISAR Images |
Design Engineering (Toronto) / 2021(4) / 4 / 298 - 314 |
0011-9342 |
|
2020 |
460 |
Bijeesh T V |
A hybrid level set based approach for surface water delineation using landsat-8 multispectral images |
Engineering Letters / 29 / 2 / 624 - 633 |
1816-0948, 1816-093X |
|
2020 |
461 |
Bijeesh T V |
Surface water detection and delineation using remote sensing images: a review of methods and algorithms |
Sustainable Water Resources Management / 6 / 4 / 1 - 23 |
2363-5037 |
|
2020 |
462 |
Bindu Madavi K P |
Cloud Computing Performance Analysis Strategy to Enhance the QoS for Imminent IT Sector |
Journal of Advanced Research in Dynamical & Control Systems / 12 / 7 / 372 - 379 |
1943-023X |
|
2020 |
463 |
Boppuru Rudra Prathap |
Spatio-Temporal Crime Analysis Using KDE and ARIMA Models in the Indian Context. |
International Journal of Digital Crime and Forensics (IJDCF) / 12 / 4 / 1 - 19 |
1941-6210 |
|
2020 |
464 |
Boppuru Rudra Prathap |
An effective face recognition system based on Cloud-based IoT with a deep learning model |
Microprocessors and Microsystems / 81 / / 1 - 8 |
0141-9331 |
|
2020 |
465 |
Boppuru Rudra Prathap |
Fixed Angle Video Frame Diminution Technique for Vehicle Speed Detection. |
Annals of the Romanian Society for Cell Biology / 25 / 1 / 3204 - 3210 |
1583-6258 |
|
2020 |
466 |
Boppuru Rudra Prathap |
Crime Analysis and Forecasting on Spatio Temporal News Feed Data?An Indian Context |
Studies in Bigdata / 90 / / 307 - 327 |
2197-6503 |
|
2020 |
467 |
Boppuru Rudra Prathap |
Symbiotic view of provenance in cyber infrastructure and information security
|
Turkish Journal of Computer and Mathematics Education / 12 / 2 / 3261 - 3267 |
1309-4653 |
|
2020 |
468 |
Cherukuri Ravindranath Chowdary |
Design of New Access Control Approach for Provenance Based on Digital Consortium Decision Making via Secret Sharing |
Journal of Computational and Theoretical Nanoscience / 17 / 10 / 4172 - 4178 |
1546-1963 |
|
2020 |
469 |
Cherukuri Ravindranath Chowdary |
Disaster recovery and risk management over private networks using data provenance: Cyber security perspective |
Indian Journal Of Science & Technology / 14 / 8 / 725 - 737 |
0974-6846, 0974-5645 |
|
2020 |
470 |
Cherukuri Ravindranath Chowdary |
Reflecto a smart mirror structure with a contextual association of internet of
Things
|
Information Technology in Industry / 9 / 2 / 984 - 988 |
2203-1731 |
|
2020 |
471 |
Cherukuri Ravindranath Chowdary |
Symbiotic view of provenance in cyber infrastructure and information security
|
Turkish Journal of Computer and Mathematics Education / 12 / 2 / 3261 - 3267 |
1309-4653 |
|
2020 |
472 |
Daniel D |
Collaborative intrusion detection system in cognitive smart city network (CSC-Net) |
International Journal of Knowledge and Systems Science, / 12 / 1 / 60 - 73 |
1947-8208 |
|
2020 |
473 |
Daniel D |
Augmented intelligent water drops optimisation model for virtual machine placement in cloud environment |
IET Networks / 9 / 5 / 215 - 222 |
2047-4962 |
|
2020 |
474 |
Deepa Yogish |
Ranking Top Similar Documents for User Query based on Normalized Vector Cosine Similarity Model |
Journal of Computational and Theoretical Nanoscience / / / - |
1546-1955 |
|
2020 |
475 |
Deepa Yogish |
Analysis of Vector Space Method in Information Retrieval for Smart Answering System |
Journal of Computational and Theoretical Nanoscience / / / - |
1546-1955 |
|
2020 |
476 |
Diana Jeba Jingle I |
Design of Grover?S Quantum Searching Algorithm Over 2, 3 And 4-Qubit Systems Using Quantum Programming Studio |
Journal of Huazhong University of Science and Technology / 50 / 3 / 1 - 10 |
1671-4512 |
|
2020 |
477 |
Diana Jeba Jingle I |
An analysis of Lexicons in programming models using Feature selection in Genetic Algorithm |
Journal of Huazhong University of Science and Technology / 50 / 3 / 1 - 6 |
1671-4512 |
|
2020 |
478 |
Diana Jeba Jingle I |
Design techniques in carry select adder using parallel prefix adder for improved switching energy |
Przegląd Elektrotechniczny / 97 / 5 / 152 - 155 |
2449-9544 |
|
2020 |
479 |
Divya Vetriveeran |
Fault tolerant resource allocation in fog environment using game theory-based reinforcement learning |
Concurrency and Computation: Practice and Experience / / / - |
1532-0634 |
|
2020 |
480 |
Divya Vetriveeran |
Docker based Intelligent Fall Detection using Edge-Fog Cloud Infrastructure |
IEEE Internet of Things / 8 / 10 / 8133 - 8144 |
2327-4662 |
|
2020 |
481 |
Ganesh Kumar R |
Analyzing the Total Household data of different states in India based on Census and evaluating their relative performance using Machine Learning |
Solid State Technology / 63 / I4 / 1469 - 1474 |
0038-111X |
|
2020 |
482 |
Ganesh Kumar R |
Mutual Information Pre-processing Based Broken-stick Linear Regression Technique for Web User Behaviour Pattern Mining |
International Journal of Intelligent Engineering and Systems / 14 / 1 / 244 - 256 |
2185-3118 |
|
2020 |
483 |
Ganesh Kumar R |
Normal discriminant deep convolution neural classifcation based web behavioral pattern mining for user identifcation |
Journal of Ambient Intelligence and Humanized Computing / NA / NA / 01 - 13 |
1868-5137, 1868-5145 |
|
2020 |
484 |
Gnana Prakasi O S |
Automated Test Bed and Real Time Port Analysis for Reconfigurable Input Output Boards |
International Journal of Computer Integrated Manufacturing / 33 / / 1156 - 1166 |
0951-192X |
|
2020 |
485 |
Gnana Prakasi O S |
Random Forest and SVM Analysis for Credit
Card fraud Detection |
Mukt Shabd Journal / 9 / 7 / 950 - 952 |
2347-3150 |
|
2020 |
486 |
Gnana Prakasi O S |
A Review on Flood Prediction Algorithms and A Deep Neural Network Model for Estimation of Flood Occurrence |
International Research Journal of Multidisciplinary Technovation / 2 / 5 / 8 - 14 |
2582-1040 |
|
2020 |
487 |
Gnana Prakasi O S |
Markov based Genetic Algorithm (M-GA): To Mine Frequent Sub Components from Molecular Structures |
International Journal on Emerging Technologies / 11 / 2 / 516 - 523 |
2249-3255 |
|
2020 |
488 |
Gnana Prakasi O S |
Survey on Attribute-based Encryption in Cloud Computing |
International Journal of Network Security / 22 / 5 / 863 - 868 |
1816-353X |
|
2020 |
489 |
Gnana Prakasi O S |
Analyzing and Optimizing the Usability of Website Access |
International Journal of Web Portals / 12 / 2 / 22 - 40 |
1938-0194 |
|
2020 |
490 |
Gnana Prakasi O S |
Automated testbed and real-time port analysis for reconfigurable input?output boards |
International Journal of Computer Integrated Manufacturing / 33 / / 1156 - 1166 |
0951-192X |
|
2020 |
491 |
Gnana Prakasi O S |
A Review on Flood Prediction Algorithms and A Deep Neural Network Model for Estimation of Flood Occurrence |
International Research Journal of Multidisciplinary Technovation / 2 / 5 / 8 - 14 |
2582-1040 |
|
2020 |
492 |
Gokulapriya R |
Normal discriminant deep convolution neural classifcation based web behavioral pattern mining for user identifcation |
Journal of Ambient Intelligence and Humanized Computing / NA / NA / 01 - 13 |
1868-5137, 1868-5145 |
|
2020 |
493 |
Gokulapriya R |
Mutual Information Pre-processing Based Broken-stick Linear Regression Technique for Web User Behaviour Pattern Mining |
International Journal of Intelligent Engineering and Systems / 14 / 1 / 244 - 256 |
2185-3118 |
|
2020 |
494 |
Gurudas V R |
Early Detection Of Breast Cancer using Convolution Neural Network. |
International Journal of Creative Research Thoughts / 8 / 7 / 3219 - 3222 |
2320-2882 |
|
2020 |
495 |
Jayapandian N |
Markov based Genetic Algorithm (M-GA): To Mine Frequent Sub Components from Molecular Structures |
International Journal on Emerging Technologies / 11 / 2 / 516 - 523 |
2249-3255 |
|
2020 |
496 |
Jayapandian N |
Analyzing and Optimizing the Usability of Website Access |
International Journal of Web Portals / 12 / 2 / 22 - 40 |
1938-0194 |
|
2020 |
497 |
Jayapandian N |
Augmented intelligent water drops optimisation model for virtual machine placement in cloud environment |
IET Networks / 9 / 5 / 215 - 222 |
2047-4962 |
|
2020 |
498 |
Julian Benadit P |
Enhancements To Content Caching Using Weighted Greedy
Caching Algorithm In Information Centric Networking |
Procedia Computer Science / 171 / 2020 / 2435 - 2444 |
1877-0509 |
|
2020 |
499 |
Jyothi Mandala |
An Exploration of Sentiment Analysis using Twitter Dataset |
PSYCHOLOGY AND EDUCATION / / / - |
0033-3077 |
|
2020 |
500 |
Kanmani P |
Automated testbed and real-time port analysis for reconfigurable input?output boards |
International Journal of Computer Integrated Manufacturing / 33 / / 1156 - 1166 |
0951-192X |
|
2020 |
501 |
Kanmani P |
A Review on Flood Prediction Algorithms and A Deep Neural Network Model for Estimation of Flood Occurrence |
International Research Journal of Multidisciplinary Technovation / 2 / 5 / 8 - 14 |
2582-1040 |
|
2020 |
502 |
Kanmani P |
Plant Leaf Disease Detection and Classification using Optimized CNN Model |
International Journal of Recent Technology and Engineering / 9 / 6 / 233 - 238 |
2277-3878 |
|
2020 |
503 |
Kanmani P |
Markov based Genetic Algorithm (M-GA): To Mine Frequent Sub Components from Molecular Structures |
International Journal on Emerging Technologies / 11 / 2 / 516 - 523 |
2249-3255 |
|
2020 |
504 |
Kanmani P |
Analyzing and Optimizing the Usability of Website Access |
International Journal of Web Portals / 12 / 2 / 22 - 40 |
1938-0194 |
|
2020 |
505 |
Kanmani P |
Automated Test Bed and Real Time Port Analysis for Reconfigurable Input Output Boards |
International Journal of Computer Integrated Manufacturing / 33 / / 1156 - 1166 |
0951-192X |
|
2020 |
506 |
Kanmani P |
Random Forest and SVM Analysis for Credit
Card fraud Detection |
Mukt Shabd Journal / 9 / 7 / 950 - 952 |
2347-3150 |
|
2020 |
507 |
Kanmani P |
A Review on Flood Prediction Algorithms and A Deep Neural Network Model for Estimation of Flood Occurrence |
International Research Journal of Multidisciplinary Technovation / 2 / 5 / 8 - 14 |
2582-1040 |
|
2020 |
508 |
Kanmani P |
Automated testbed and real-time port analysis for reconfigurable input?output boards |
International Journal of Computer Integrated Manufacturing / 33 / / 1156 - 1166 |
0951-192X |
|
2020 |
509 |
Karthikeyan H |
IoT-based Smart HealthCare Video Surveillance System using Edge Computing |
Journal of Ambient Intelligence and Humanized Computing / / / - |
1868-5137, 1868-5145 |
|
2020 |
510 |
Karthikeyan H |
IoT-based smart healthcare video surveillance system using edge computing |
Journal of Ambient Intelligence and Humanized Computing / 13 / / 3195 - 3207 |
1868-5145 |
|
2020 |
511 |
Kukatlapalli Pradeep Kumar |
Design of New Access Control Approach for Provenance Based on Digital Consortium Decision Making via Secret Sharing |
Journal of Computational and Theoretical Nanoscience / 17 / 10 / 4172 - 4178 |
1546-1963 |
|
2020 |
512 |
Kukatlapalli Pradeep Kumar |
Disaster recovery and risk management over private networks using data provenance: Cyber security perspective |
Indian Journal Of Science & Technology / 14 / 8 / 725 - 737 |
0974-6846, 0974-5645 |
|
2020 |
513 |
Kukatlapalli Pradeep Kumar |
Reflecto a smart mirror structure with a contextual association of internet of
Things
|
Information Technology in Industry / 9 / 2 / 984 - 988 |
2203-1731 |
|
2020 |
514 |
Kukatlapalli Pradeep Kumar |
Symbiotic view of provenance in cyber infrastructure and information security
|
Turkish Journal of Computer and Mathematics Education / 12 / 2 / 3261 - 3267 |
1309-4653 |
|
2020 |
515 |
Kukatlapalli Pradeep Kumar |
Fixed Angle Video Frame Diminution Technique for Vehicle Speed Detection |
Annals of the Romanian Society for Cell Biology / 25 / 2 / 3204 - 3210 |
1583-6258 |
|
2020 |
516 |
Manjunatha Swamy C |
Customer Segmentation Analysis |
International Journal of Scientific Research in Science, Engineering and Technology / 9 / 3 / 27 - 30 |
2582-8185 |
|
2020 |
517 |
Manohar M |
A Big Data Analysis Using Fuzzy Deep Convolution Network Based Model for
Heart Disease Classification |
International Journal of Intelligent Engineering and Systems / 14 / 2 / 147 - 156 |
2185-3118 |
|
2020 |
518 |
Manohar M |
A Big Data Analysis Using Fuzzy Deep Convolution Network Based Model for
Heart Disease Classification |
The International Journal of Intelligent Engineering and Systems / 14 / 2 / 147 - 156 |
2185-3118 |
|
2020 |
519 |
Manohar M |
An efficient algorithmic technique for feature selection in IoT based intrusion detection system |
Indian Journal of Science and Technology / 14 / 1 / 76 - 85 |
0974-5645 |
|
2020 |
520 |
Mary Anita E A |
Smart Affect Recognition System for Real-Time Biometric Surveillance Using Hybrid Features and Multilayered Binary Structured Support Vector Machine |
The Computer Journal / / / - |
0010-4620 |
|
2020 |
521 |
Mary Anita E A |
A novel multi functional multi parameter
concealed cluster based data aggregation
scheme for wireless sensor networks
(NMFMP-CDA) |
Wireless Networks The Journal of Mobile Communication, Computation and Information / / / - |
1022-0038 |
|
2020 |
522 |
Mary Anita E A |
An efficient privacy-preserving model based on OMFTSA for query optimization in crowdsourcing |
Concurrency Computation Practice and Experience / 2021 / / 1 - 17 |
1532-0626, 1532-0634 |
|
2020 |
523 |
Mary Anita E A |
Optimal Cryptography Scheme and Efficient Neutrosophic C-Means Clustering for Anomaly Detection in Cloud Environment
|
Journal of Circuits, Systems and Computers / 30 / 5 / - |
1793-6454 |
|
2020 |
524 |
Mary Anita E A |
Predictive analytic framework for efficient healthcare system
|
Journal of Advanced Research in Dynamical and Control Systems / 12 / 6 / 263 - 272 |
1943023X |
|
2020 |
525 |
Mary Anita E A |
A novel multi functional multi parameter concealed cluster based data aggregation scheme for wireless sensor networks (NMFMP-CDA) |
Wireless Networks / 27 / Feb 2021 / 1111 - 1128 |
1022-0038 |
|
2020 |
526 |
Mausumi Goswami |
An Empirical Analysis of Preprocessing Tasks for Unstructured Data
|
Journal of Computational and Theoretical Nanoscience / 17 / 9-10 / 4380 - 4384 |
1546-1955, 1546-1963 |
|
2020 |
527 |
Mausumi Goswami |
Performance Analysis and Evaluation of Feature Selection Techniques to Find Coherence Using Cosine Similarity |
Journal of Computational and Theoretical Nanoscience / 17 / 9-10 / 4106 - 4110 |
1546-1955, 1546-1963 |
|
2020 |
528 |
Mausumi Goswami |
A Comparative Analysis and Critical Review of Summarization Techniques |
Journal of Computational and Theoretical Nanoscience / 17 / 9-10 / 4167 - 4171 |
1546-1955, 1546-1963 |
|
2020 |
529 |
Merin Thomas |
Sentimental Analysis of transliterated text in Malayalam using RNN-LSTM |
Journal of Ambient Intelligence and Humanized Computing / / / - |
1868-5137 |
|
2020 |
530 |
Michael Moses T |
EMONET: A Cross Database Progressive Deep Network for Facial Expression Recognition |
International Journal of Intelligent Engineering and Systems / 13 / 6 / 31 - 41 |
2185-3118 |
|
2020 |
531 |
Michael Moses T |
Engagement Detection through Facial Emotional Recognition Using a Shallow
Residual Convolutional Neural Networks |
International Journal of Intelligent Engineering and Systems / 14 / 2 / 236 - 247 |
2185-310X |
|
2020 |
532 |
Michael Moses T |
Multimodal emotional analysis through hierarchical video summarization and face tracking |
Multimedia Tools and Applications / / / - |
1573-7721 |
|
2020 |
533 |
Michael Moses T |
Engagement Detection through Facial Emotional Recognition Using a Shallow Residual Convolutional Neural Networks |
International Journal of Intelligent Engineering and Systems / 14 / 2 / 236 - 247 |
2185-310X |
|
2020 |
534 |
Michael Moses T |
Reflecto a smart mirror structure with a contextual association of internet of
Things
|
Information Technology in Industry / 9 / 2 / 984 - 988 |
2203-1731 |
|
2020 |
535 |
Mithun B N |
Comparison of Hadoop Scheduling Algorithms based on their Resource usage |
International Journal of Advances in Electronics and Computer Science / 8 / 2 / 5 - 9 |
2394-2835 |
|
2020 |
536 |
Muneeswari G |
Leaf Classifying Model in Crop Identification using Machine Learning
Algorithm |
International Research Journal of Engineering and Technology / 11 / 12 / 519 - 522 |
2395-0056 |
|
2020 |
537 |
Natarajan K |
Cryptanalysis Using Genetic Algorithm |
International Research Journal of Advanced Engineering and Science / 5 / 2 / 128 - 131 |
2455-9024 |
|
2020 |
538 |
Praveen Kulkarni |
Video Based Sub-Categorized Facial Emotion Detection Using LBP and Edge Computing |
Revue d'Intelligence Artificielle / / / - |
0992-499X |
|
2020 |
539 |
Praveen Naik |
Pain track analysis during gestation using machine learning techniques |
International Journal of Electrical and Computer Engineering (IJECE) / 11 / 3 / 2128 - 2133 |
2088-8708 |
|
2020 |
540 |
Praveen Naik |
Insights on Cost Estimation Methods and Its Uses in
Software Project Design |
Journal of Computational and Theoretical Nanoscience / 17 / / 1 - 5 |
1546-1955 |
|
2020 |
541 |
Raghavendra S |
Evaluation of Data Mining Techniques using Feature Selection Methods for Pima Indian Diabetes Dataset |
Solid State Technology / 63 / 6 / 9897 - 9911 |
0038-111X |
|
2020 |
542 |
Raghavendra S |
Electricity requirement prediction using time series and Facebook's PROPHET |
Indian Journal of Science and Technology / 13 / 47 / 4631 - 4645 |
0974-6846 |
|
2020 |
543 |
Raghavendra S |
Eye blink detection using CNN to detect drowsiness level in drivers for road safety |
Indonesian Journal of Electrical Engineering and Computer Science / 22 / 1 / - |
2502-4752 |
|
2020 |
544 |
Rajkumar Rajavel |
Agent-based automated dynamic SLA negotiation framework in the cloud using the stochastic optimization approach
|
Applied Soft Computing / 101 / / 1 - 20 |
1568-4946 |
|
2020 |
545 |
Rajkumar Rajavel |
IoT-based smart healthcare video surveillance system using edge computing |
Journal of Ambient Intelligence and Humanized Computing / 13 / / 3195 - 3207 |
1868-5145 |
|
2020 |
546 |
Raju G |
Directional Vector-Based Skin Lesion Segmentation |
A Novel Approach to Skin Segmentation |
International Journal of Image and Graphics / 20 / 3 / 2050021-1 - 2050021-14 |
0219-4678 |
|
2020 |
547 |
Raju G |
An Empirical Study And Evaluation On Automatic Ear Detection |
International Journal of Computing / 19 / 4 / 575 - 582 |
1727-6209 |
|
2020 |
548 |
Raju G |
Automatic Skin Lesion Segmentation?A Novel Approach
of Lesion Filling through Pixel Path |
Pattern Recognition and Image Analysis / 30 / 4 / 815 - 826 |
1555-6212 |
|
2020 |
549 |
Raju G |
Statistical features from frame aggregation
and differences for human gait recognition |
Multimedia Tools and Applications / online first / / - |
1380-7501, 1573-7721 |
|
2020 |
550 |
Raju G |
Parallelization of Frequent Itemset Mining
Methods with FP-tree: An Experiment with
PrePost+ Algorithm |
The International Arab Journal of Information Technology / 8 / 2 / 208 - 213 |
1683-3198 |
|
2020 |
551 |
Ramesh Vatambeti |
A novel hybrid Optimized vehicle routes to enhance the vehicular ad hoc
network communication |
Materials Today: Proceedings / / / - |
2214-7853 |
|
2020 |
552 |
Ramesh Vatambeti |
A novel african buffalo based greedy routing
Technique for infrastructure and cluster
Based communication in vehicular ad-hoc
Network
|
Journal of Theoretical and Applied Information Technology / 99 / 5 / 1232 - 1243 |
1992-8645 |
|
2020 |
553 |
Ramesh Vatambeti |
Secured Personal Health Records using Pattern Based Verification and 2-Way Polynomial Protocol in Cloud Infrastructure |
International Journal of Ad Hoc and Ubiquitous Computing / / / - |
1743-8225 |
|
2020 |
554 |
Ramesh Vatambeti |
An efficient clustering approach for optimized path selection
and route maintenance in mobile ad hoc networks |
Journal of Ambient Intelligence and Humanized Computing / / / - |
1868-5137 |
|
2020 |
555 |
Ramesh Vatambeti |
A Novel Georouting Potency based Optimum Spider Monkey
Approach for Avoiding Congestion in Energy Efficient Mobile
Ad‑hoc Network |
Wireless Personal Communications / / / - |
0929-6212 |
|
2020 |
556 |
Rekha V |
Design of fuzzy logic controlled hybrid
model for the control of voltage and
frequency in microgrid |
Indian Journal of Science and Technology / 13 / 35 / 3612 - 3629 |
0974-5645 |
|
2020 |