Comparative study of image forgery and copy-move techniques M Sridevi, C Mala, S Sanyam Advances in Computer Science, Engineering & Applications: Proceedings of the …, 2012 | 57 | 2012 |
Multilevel threshold selection for image segmentation using soft computing techniques C Mala, M Sridevi Soft Computing 20, 1793-1810, 2016 | 44 | 2016 |
A survey on monochrome image segmentation methods M Sridevi, C Mala Procedia Technology 6, 548-555, 2012 | 40 | 2012 |
Copy–move image forgery detection in a parallel environment M Sridevi, C Mala, S Sandeep Proceedings of Im age and Signal Processing, Cisp 9, 2012 | 37 | 2012 |
An experimental study and analysis of different image segmentation techniques SU Mageswari, M Sridevi, C Mala Procedia engineering 64, 36-45, 2013 | 33 | 2013 |
A novel deep learning model for detection of denial of service attacks in HTTP traffic over internet V Punitha, C Mala, N Rajagopalan International Journal of Ad Hoc and Ubiquitous Computing 33 (4), 240-256, 2020 | 21 | 2020 |
Analysis of ECC for application specific WSN security B Nair, C Mala 2015 IEEE International Conference on Computational Intelligence and …, 2015 | 19 | 2015 |
Modified power save model for better energy efficiency and reduced packet latency N Rajagopalan, C Mala American Journal of Engineering and Applied Sciences 5 (3), 237-242, 2012 | 15 | 2012 |
Performance analysis of spatial color information for object detection using background subtraction S Manipriya, C Mala, S Mathew IERI Procedia 10, 63-69, 2014 | 14 | 2014 |
Genetic algorithm based efficient RSU distribution to estimate travel time for vehicular users M Sankaranarayanan, C Mala, S Mathew 2015 Second International Conference on Soft Computing and Machine …, 2015 | 13 | 2015 |
Traffic classification for efficient load balancing in server cluster using deep learning technique V Punitha, C Mala The Journal of Supercomputing 77 (8), 8038-8062, 2021 | 12 | 2021 |
A collaborative framework for traffic information in vehicular adhoc network applications S Manipriya, C Mala, S Mathew Journal of Internet Services and Information Security (JISIS) 10 (3), 93-109, 2020 | 12 | 2020 |
Significance of Real-Time Systems in Intelligent Transportation Systems M Sankaranarayanan, C Mala, S Mathew Handling priority inversion in time-constrained distributed databases, 61-85, 2020 | 12 | 2020 |
Simulation and performance analysis of various IEEE 802.11 backoff algorithms B Nithya, C Mala, V KumarB Procedia Technology 6, 840-847, 2012 | 12 | 2012 |
Self-organizing neural networks for image segmentation based on multiphase active contour M Sridevi, C Mala Neural Computing and Applications 31, 865-876, 2019 | 11 | 2019 |
A novel cross layer approach to enhance QoS performance in multihop adhoc networks B Nithya, C Mala, E Sivasankar 2014 17th International Conference on Network-Based Information Systems, 229-236, 2014 | 11 | 2014 |
A novel genetic algorithm approach to mobility prediction in wireless networks C Mala, M Loganathan, NP Gopalan, B Sivaselvan Contemporary Computing: Second International Conference, IC3 2009, Noida …, 2009 | 10 | 2009 |
A non-collaborative approach for modeling ontologies for a generic IoT lab architecture S Umaa Mageswari, C Mala, A Santhanavijayan, G Deepak Journal of Information and Optimization Sciences 41 (2), 395-402, 2020 | 9 | 2020 |
Improved Group Key Agreement for Emergency Cognitive Radio Mobile Ad hoc Networks. N Renugadevi, C Mala J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (3), 73-86, 2015 | 9 | 2015 |
Ternary tree based group key agreement for cognitive radio MANETs N Renugadevi, C Mala International Journal of Computer Network and Information Security 6 (10), 24, 2014 | 9 | 2014 |