关注
mala chelliah
标题
引用次数
引用次数
年份
Comparative study of image forgery and copy-move techniques
M Sridevi, C Mala, S Sanyam
Advances in Computer Science, Engineering & Applications: Proceedings of the …, 2012
572012
Multilevel threshold selection for image segmentation using soft computing techniques
C Mala, M Sridevi
Soft Computing 20, 1793-1810, 2016
442016
A survey on monochrome image segmentation methods
M Sridevi, C Mala
Procedia Technology 6, 548-555, 2012
402012
Copy–move image forgery detection in a parallel environment
M Sridevi, C Mala, S Sandeep
Proceedings of Im age and Signal Processing, Cisp 9, 2012
372012
An experimental study and analysis of different image segmentation techniques
SU Mageswari, M Sridevi, C Mala
Procedia engineering 64, 36-45, 2013
332013
A novel deep learning model for detection of denial of service attacks in HTTP traffic over internet
V Punitha, C Mala, N Rajagopalan
International Journal of Ad Hoc and Ubiquitous Computing 33 (4), 240-256, 2020
212020
Analysis of ECC for application specific WSN security
B Nair, C Mala
2015 IEEE International Conference on Computational Intelligence and …, 2015
192015
Modified power save model for better energy efficiency and reduced packet latency
N Rajagopalan, C Mala
American Journal of Engineering and Applied Sciences 5 (3), 237-242, 2012
152012
Performance analysis of spatial color information for object detection using background subtraction
S Manipriya, C Mala, S Mathew
IERI Procedia 10, 63-69, 2014
142014
Genetic algorithm based efficient RSU distribution to estimate travel time for vehicular users
M Sankaranarayanan, C Mala, S Mathew
2015 Second International Conference on Soft Computing and Machine …, 2015
132015
Traffic classification for efficient load balancing in server cluster using deep learning technique
V Punitha, C Mala
The Journal of Supercomputing 77 (8), 8038-8062, 2021
122021
A collaborative framework for traffic information in vehicular adhoc network applications
S Manipriya, C Mala, S Mathew
Journal of Internet Services and Information Security (JISIS) 10 (3), 93-109, 2020
122020
Significance of Real-Time Systems in Intelligent Transportation Systems
M Sankaranarayanan, C Mala, S Mathew
Handling priority inversion in time-constrained distributed databases, 61-85, 2020
122020
Simulation and performance analysis of various IEEE 802.11 backoff algorithms
B Nithya, C Mala, V KumarB
Procedia Technology 6, 840-847, 2012
122012
Self-organizing neural networks for image segmentation based on multiphase active contour
M Sridevi, C Mala
Neural Computing and Applications 31, 865-876, 2019
112019
A novel cross layer approach to enhance QoS performance in multihop adhoc networks
B Nithya, C Mala, E Sivasankar
2014 17th International Conference on Network-Based Information Systems, 229-236, 2014
112014
A novel genetic algorithm approach to mobility prediction in wireless networks
C Mala, M Loganathan, NP Gopalan, B Sivaselvan
Contemporary Computing: Second International Conference, IC3 2009, Noida …, 2009
102009
A non-collaborative approach for modeling ontologies for a generic IoT lab architecture
S Umaa Mageswari, C Mala, A Santhanavijayan, G Deepak
Journal of Information and Optimization Sciences 41 (2), 395-402, 2020
92020
Improved Group Key Agreement for Emergency Cognitive Radio Mobile Ad hoc Networks.
N Renugadevi, C Mala
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (3), 73-86, 2015
92015
Ternary tree based group key agreement for cognitive radio MANETs
N Renugadevi, C Mala
International Journal of Computer Network and Information Security 6 (10), 24, 2014
92014
系统目前无法执行此操作,请稍后再试。
文章 1–20