Kandhasamy Premalatha
Orcid: 0000-0002-5340-0265
According to our database1,
Kandhasamy Premalatha
authored at least 41 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Discret. Math. Algorithms Appl., April, 2024
Impact of oxymoron features and deep learning techniques in the detection of sarcastic contents.
J. Intell. Fuzzy Syst., 2024
Differential privacy scheme using Laplace mechanism and statistical method computation in deep neural network for privacy preservation.
Eng. Appl. Artif. Intell., 2024
2023
No more privacy Concern: A privacy-chain based homomorphic encryption scheme and statistical method for privacy preservation of user's private and sensitive data.
Expert Syst. Appl., December, 2023
STIF: Intuitionistic fuzzy Gaussian membership function with statistical transformation weight of evidence and information value for private information preservation.
Distributed Parallel Databases, September, 2023
THFN: Emotional health recognition of elderly people using a Two-Step Hybrid feature fusion network along with Monte-Carlo dropout.
Biomed. Signal Process. Control., September, 2023
Mining high utility itemsets using Genetic Algorithm Based-Particle Swarm Optimization (GA-PSO).
J. Intell. Fuzzy Syst., 2023
Lung disease detection using Self-Attention Generative Adversarial Capsule network optimized with sun flower Optimization Algorithm.
Biomed. Signal Process. Control., 2023
2022
A comparative analysis of euphemistic sentences in news using feature weight scheme and intelligent techniques.
J. Intell. Fuzzy Syst., 2022
Int. J. Bus. Intell. Data Min., 2022
2021
Application of Class Based Association Rule Pruning to Generate Optimal Association Rules in Healthcare.
J. Medical Imaging Health Informatics, 2021
Impact of Nonlocal Interaction on Chimera States in Nonlocally Coupled Stuart-Landau Oscillators.
Complex Syst., 2021
Securing private information by data perturbation using statistical transformation with three dimensional shearing.
Appl. Soft Comput., 2021
2020
Privacy-preserving data publishing based on sanitized probability matrix using transactional graph for improving the security in medical environment.
J. Supercomput., 2020
Impact of fuzzy normalization on clustering microarray temporal datasets using cuckoo search.
Comput. Syst. Sci. Eng., 2020
Proceedings of the Complex Networks & Their Applications IX, 2020
2019
Optimal route path sustainability in military information system with reduced interference effect.
J. Supercomput., 2019
Int. J. Data Anal. Tech. Strateg., 2019
An effective feature selection for heart disease prediction with aid of hybrid kernel SVM.
Int. J. Bus. Intell. Data Min., 2019
Turkish J. Electr. Eng. Comput. Sci., 2019
Channel load based interference-aware scheduling in military communication environment.
Concurr. Comput. Pract. Exp., 2019
Multi path interference aware reliable route path establishment in mobile adhoc network environment.
Clust. Comput., 2019
2018
TrioCuckoo: A Multi Objective Cuckoo Search Algorithm for Triclustering Microarray Gene Expression Data.
J. Inf. Sci. Eng., 2018
A New Hybrid Cuckoo Search Algorithm for Biclustering of Microarray Gene-Expression Data.
Appl. Artif. Intell., 2018
2017
Int. Arab J. Inf. Technol., 2017
2016
Int. J. Inf. Commun. Technol., 2016
Int. J. Data Min. Bioinform., 2016
2015
UP-GNIV: an expeditious high utility pattern mining algorithm for itemsets with negative utility values.
Int. J. Inf. Technol. Manag., 2015
Cuckoo search optimisation for feature selection in cancer classification: a new approach.
Int. J. Data Min. Bioinform., 2015
Int. J. Bio Inspired Comput., 2015
Stellar-Mass Black Hole Optimization for Biclustering Microarray Gene Expression Data.
Appl. Artif. Intell., 2015
2014
J. Appl. Math., 2014
Personal identification using local Gaussian quadrature filter pair phase quantisation of hand vein images.
Int. J. Biom., 2014
Data Sci. J., 2014
Appl. Artif. Intell., 2014
2013
TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks.
IET Inf. Secur., 2013
EURASIP J. Wirel. Commun. Netw., 2013
2012
A comparative study of cuckoo search and bat algorithm for Bloom filter optimisation in spam filtering.
Int. J. Bio Inspired Comput., 2012
2009
Chi-Square Test for Anomaly Detection in XML Documents Using Negative Association Rules.
Comput. Inf. Sci., 2009
2008
Comput. Inf. Sci., 2008