K. L. Shunmuganathan

Orcid: 0000-0002-6113-9693

According to our database1, K. L. Shunmuganathan authored at least 17 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Predicting user preferences on changing trends and innovations using SVM based sentiment analysis.
Clust. Comput., 2019

2017
A Peer to Peer Architecture for Optimized Energy Efficient Routing in Visual Sensor Networks.
Wirel. Pers. Commun., 2017

2016
Role of Agent Technology in Web Usage Mining: Homomorphic Encryption Based Recommendation for E-commerce Applications.
Wirel. Pers. Commun., 2016

Feature selection based on genetic algorithm and hybrid model for sentiment polarity classification.
Int. J. Data Min. Model. Manag., 2016

2015
Feature Reduction Based on Genetic Algorithm and Hybrid Model for Opinion Mining.
Sci. Program., 2015

Delivering QOS with security of encrypted tracer and checker model in MANET.
Int. J. Adv. Intell. Paradigms, 2015

2014
An Agent based Framework for Sentiment Classification of Online Reviews using Ontology.
J. Comput. Sci., 2014

2013
Mobile Agent-Based Memory Tracer Using Host-Based Intrusion Detection System for Safeguarding Critical Memory.
Inf. Secur. J. A Glob. Perspect., 2013

Smart Spotting of Pulmonary TB Cavities Using CT Images.
Comput. Math. Methods Medicine, 2013

2012
Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate.
Inf. Secur. J. A Glob. Perspect., 2012

Time based agent garbage collection algorithm for multicore architectures.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

2011
Efficient Resource Sharing Architecture for Multistandard Communication System.
VLSI Design, 2011

Multi-Agent-Based Anomaly Intrusion Detection.
Inf. Secur. J. A Glob. Perspect., 2011

2010
Detecting Security threats in the Router using Computational Intelligence
CoRR, 2010

Mining The Data From Distributed Database Using An Improved Mining Algorithm
CoRR, 2010

A reversible high embedding capacity data hiding technique for hiding secret data in images
CoRR, 2010

2008
Agent Based Bioinformatics integration Using RETSINA.
Int. Arab J. Inf. Technol., 2008


  Loading...