Elijah Blessing Rajsingh
Orcid: 0000-0003-3424-812XAffiliations:
- Karunya University, Department of Computer Science and Technology, Coimbatore, India
According to our database1,
Elijah Blessing Rajsingh
authored at least 41 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Enhanced multivariate singular spectrum analysis-based network traffic forecasting for real time industrial IoT applications.
IET Networks, July, 2024
Multivariate Forecasting of Network Traffic in SDN-Based Ubiquitous Healthcare System.
IEEE Open J. Commun. Soc., 2024
2023
A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption.
Inf. Comput., October, 2023
Modelling a P-System inspired multi-objective centralized heterogeneous wireless outdoor illumination.
J. Ambient Intell. Humaniz. Comput., March, 2023
2022
Long-term traffic flow prediction using multivariate SSA forecasting in SDN based networks.
Pervasive Mob. Comput., 2022
Centrality Based Congestion Detection Using Reinforcement Learning Approach for Traffic Engineering in Hybrid SDN.
J. Netw. Syst. Manag., 2022
Investigative prototyping a tissue P system for solving distributed task assignment problem in heterogeneous wireless sensor network.
J. King Saud Univ. Comput. Inf. Sci., 2022
2021
A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography.
J. King Saud Univ. Comput. Inf. Sci., 2021
2020
Support vector machine-based proactive fault-tolerant scheduling for grid computing environment.
Int. J. Adv. Intell. Paradigms, 2020
An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries.
Inf. Comput., 2020
Performance Analysis of Feature Detection and Description (FDD) Methods on Accident Images.
Proceedings of the Machine Learning, Image Processing, Network Security and Data Sciences, 2020
2019
J. Supercomput., 2019
Trust aware fault tolerant prediction model for wireless sensor network based measurements in Smart Grid environment.
Sustain. Comput. Informatics Syst., 2019
An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks.
J. Inf. Secur. Appl., 2019
A novel patient friendly IT enabled framework for selection of desired healthcare provider.
Int. J. Medical Eng. Informatics, 2019
Int. J. Bio Inspired Comput., 2019
2018
Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks.
Comput. Electr. Eng., 2018
2017
Analysis of hierarchical identity based encryption schemes and its applicability to computing environments.
J. Inf. Secur. Appl., 2017
Mobile entities in wireless sensor networks: comparative study and performance analysis.
Int. J. Inf. Commun. Technol., 2017
Int. J. Electron. Secur. Digit. Forensics, 2017
2016
J. Real Time Image Process., 2016
EDIS: an effective method for detection and isolation of sinkhole attacks in mobile ad hoc networks.
Int. J. Wirel. Mob. Comput., 2016
Hum. centric Comput. Inf. Sci., 2016
IEEE Access, 2016
2015
A novel image compression method for medical images using geometrical regularity of image structure.
Signal Image Video Process., 2015
J. Digit. Imaging, 2015
Biomed. Signal Process. Control., 2015
2014
An autonomous moving heuristic for mobile sink based on feasible sojourn regions to maximise network lifetime in wireless sensor networks.
Int. J. Inf. Technol. Commun. Convergence, 2014
Enhancing security of electronic health records through grid-based user authentication scheme.
Int. J. Inf. Commun. Technol., 2014
Magnetic Field Model (MFM) in Soft Computing and parallelization techniques for Self Organizing Networks (SON) in Telecommunications.
Int. J. Energy Optim. Eng., 2014
ColShield : an effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks.
Hum. centric Comput. Inf. Sci., 2014
2013
Int. J. Wirel. Mob. Comput., 2013
Hum. centric Comput. Inf. Sci., 2013
2012
Hum. centric Comput. Inf. Sci., 2012
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2012
2010
Stability analysis of analytical hierarchy process clustering protocol in mobile ad hoc networks.
Int. J. Commun. Networks Distributed Syst., 2010
2009
Proceedings of the UKSim'11, 2009
2006
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006
2004
Proceedings of the SOFSEM 2004: Theory and Practice of Computer Science, 2004
2003
Proceedings of the Computational Science and Its Applications, 2003