N. Ch. Sriman Narayana Iyengar

Orcid: 0000-0001-8543-1392

According to our database1, N. Ch. Sriman Narayana Iyengar authored at least 34 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
<i>JADETraderPal</i> - JADE mobile agent embedded with flexible negotiation strategies for dynamic e-commerce environments.
J. King Saud Univ. Comput. Inf. Sci., 2020

2019
Avian Based Intelligent Algorithm to Provide Zero Tolerance Load Balancer for Cloud Based Computing Platforms.
Int. J. Grid High Perform. Comput., 2019

2018
A mathematical model with flexible negotiation strategies for agent based negotiations in dynamic e-commerce environments.
J. King Saud Univ. Comput. Inf. Sci., 2018

2017
Privacy preservation in fuzzy association rules using rough set on intuitionistic fuzzy approximation spaces and DSR.
Int. J. Auton. Adapt. Commun. Syst., 2017

Optimal feature selection using a modified differential evolution algorithm and its effectiveness for prediction of heart disease.
Comput. Biol. Medicine, 2017

2016
A Hybrid Model for Rice Disease Diagnosis Using Entropy Based Neuro Genetic Algorithm.
Int. J. Agric. Environ. Inf. Syst., 2016

2015
Coefficient of Restitution based Cross Layer Interference Aware Routing Protocol in Wireless Mesh Networks.
Int. J. Commun. Networks Inf. Secur., 2015

Semantic indexing of hybrid frequent pattern-based clustering of documents with missing semantic information.
Int. J. Comput. Intell. Stud., 2015

QoS Guaranteed Intelligent Routing Using Hybrid PSO-GA in Wireless Mesh Networks.
CoRR, 2015

2014
Algebraic Properties of Rough Set on Two Universal Sets based on Multigranulation.
Int. J. Rough Sets Data Anal., 2014

A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment.
Int. J. Grid Util. Comput., 2014

An Efficient Interference Aware Partially Overlapping Channel Assignment and Routing in Wireless Mesh Networks.
Int. J. Commun. Networks Inf. Secur., 2014

A Fuzzy Logic Based Defense Mechanism against Distributed Denial of Services Attack in Cloud Environment.
Int. J. Commun. Networks Inf. Secur., 2014

Secure and synchronised mobile JXTA cloud ecosystem for sharing patient's healthcare information and medical reports.
Int. J. Comput. Heal., 2014

2013
An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment.
Int. J. Commun. Networks Inf. Secur., 2013

Improved concept-based query expansion using Wikipedia.
Int. J. Commun. Networks Distributed Syst., 2013

Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP.
Int. J. Commun. Networks Distributed Syst., 2013

Interactive Query Expansion Using Concept-Based Directions Finder Based on Wikipedia.
Int. Arab J. Inf. Technol., 2013

Interference Aware Channel Assignmnet Using Edge Coloring in Multi-Channel Multi-Radio Wireless Mesh Networks
CoRR, 2013

Concept Based Clustering of Documents with Missing Semantic Information.
Proceedings of the Intelligent Computing, 2013

Algebraic properties and measures of uncertainty in rough set on two universal sets based on multi-granulation.
Proceedings of the 6th ACM India Computing Convention, 2013

2012
An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks.
Int. J. Netw. Secur., 2012

Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment.
Int. J. Commun. Networks Inf. Secur., 2012

An intelligent knowledge mining model for kidney cancer using rough set theory.
Int. J. Bioinform. Res. Appl., 2012

2010
Frame based Intelligent Tutoring System with weighted attributes and adaptive hypermedia.
Int. J. Electron. Bus., 2010

An Efficient and Secure Routing Protocol for Mobile Ad-Hoc Networks
CoRR, 2010

Agent Based Trust Management Model Based on Weight Value Model for Online Auctions
CoRR, 2010

Secure Medical Diagnosis Using Rule Based Mining.
Proceedings of the Advances in Information Technology - 4th International Conference, 2010

2009
Methods of Increasing Spatial Resolution of Digital Images with Minimum Detail Loss and its Applications.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

2008
An efficient Hash Table-Based Node Identification Method for bandwidth reservation in hybrid cellular and ad-hoc networks.
Comput. Commun., 2008

Design of Sequencing Medium Access Control to Improve the Performance of Wireless Networks.
J. Comput. Inf. Technol., 2008

2007
Design and performance analysis of agent-based architecture for session management.
Int. J. Electron. Bus., 2007

2006
LSCrawler: A Framework for an Enhanced Focused Web Crawler Based on Link Semantics.
Proceedings of the 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 2006

Secure Mobile Agent System for E-Business Applications.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006


  Loading...