K. Duraiswamy

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2020
Multi-document-based text summarisation through deep learning algorithm.
Int. J. Bus. Intell. Data Min., 2020

2017
A dynamic thresholding technique in spatially co-located objects mining from vehicle moving data.
Int. J. Bus. Intell. Data Min., 2017

2015
Correlated gain ratio based fuzzy weighted association rule mining classifier for diagnosis health care data.
J. Intell. Fuzzy Syst., 2015

2014
An Approach for Text Summarization using Deep Learning Algorithm.
J. Comput. Sci., 2014

Secure QoS-Based Routing using Hierarchical Key Ranking Model in MANET.
J. Circuits Syst. Comput., 2014

Application of digital image processing in the determination of mass of the diamonds.
Comput. Syst. Sci. Eng., 2014

2013
A Hybrid Approach for Node Co-Operation based Clustering in Mobile Ad Hoc Networks.
J. Comput. Sci., 2013

Efficient Approach to Discover interval-based Sequential Patterns.
J. Comput. Sci., 2013

A proficient Traceback Approach using Provincial Locality Aspects to Eliminate Denial of Service Attacks.
J. Comput. Sci., 2013

Performance Improvement in Cloud Computing using Resource Clustering.
J. Comput. Sci., 2013

Flooding Attack Aware Secure AODV.
J. Comput. Sci., 2013

Template matching algorithm for exudates detection from retinal fundus images.
Int. J. Comput. Appl. Technol., 2013

2012
Identifying Overlying Group of People through Clustering.
Int. J. Inf. Technol. Web Eng., 2012

2011
An Adaptive Thresholding-Based Color Reduction Algorithm and its Applications.
Int. J. Image Graph., 2011

A New Approach to Discover Periodic Frequent Patterns.
Comput. Inf. Sci., 2011

2010
A novel SVM-based handwritten Tamil character recognition system.
Pattern Anal. Appl., 2010

Improved Packet Forwarding Approach in Vehicular Ad Hoc Networks Using RDGR Algorithm
CoRR, 2010

Similarity Data Item Set Approach: An Encoded Temporal Data Base Technique
CoRR, 2010

Secured Cryptographic Key Generation From Multimodal Biometrics Feature Level Fusion Of Fingerprint And Iris
CoRR, 2010

Efficient Packet Forwarding Approach in Vehicular Ad Hoc Networks Using EBGR Algorithm
CoRR, 2010

Optimization of Multiple Vehicle Routing Problems using Approximation Algorithms
CoRR, 2010

Survey of attacks on AODV and MAODV.
Proceedings of the ICWET '10 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 26, 2010

Analysis and Prediction of Blocking Probability in a Banyan Based ATM Switch.
Proceedings of the Information and Communication Technologies - International Conference, 2010

2009
Ant Based Adaptive Multicast Routing Protocol (AAMRP) for Mobile Ad Hoc Networks
CoRR, 2009

Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform
CoRR, 2009

An Application of Bayesian classification to Interval Encoded Temporal mining with prioritized items
CoRR, 2009

Mobile Agents - A Solution for Network Monitoring.
Proceedings of the ARTCom 2009, 2009

2008
Sensitive Items in Privacy Preserving - Association Rule Mining.
J. Inf. Knowl. Manag., 2008

Web Access Pattern Algorithms in Education Domain.
Comput. Inf. Sci., 2008

A New Approach to Sensitive Rule Hiding.
Comput. Inf. Sci., 2008

Similarity Matrix Based Session Clustering by Sequence Alignment Using Dynamic Programming.
Comput. Inf. Sci., 2008

Identification of Sensitive Items in Privacy Preserving - Association Rule Mining.
Comput. Inf. Sci., 2008

An Ordered Differences Statistic for Uniformly Distributed Impulse Noise Pixels Detection.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

Unequal Error Protection Using Maximum A-Posteriori Probability (MAP) Algorithm, Soft Output Viterbi (SOVA) Algorithm and Modified SOVA.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

2007
A genetic-based hybrid intelligent controller for looper tension in steel rolling mills.
Int. J. Model. Identif. Control., 2007

A New Data Hiding Scheme with Quality Control for Binary Images Using Block Parity.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...