R. Anitha

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Dark web data classification using deep neural network.
Int. J. Electron. Secur. Digit. Forensics, 2024

CEVAB: NIR-VIS face recognition using convolutional encoder-based visual attention block.
Int. J. Data Anal. Tech. Strateg., 2024

2023
CTS-IIoT: Computation of Time Series Data During Index Based De-duplication of Industrial IoT (IIoT) Data in Cloud Environment.
Wirel. Pers. Commun., March, 2023

Adaptive DBN Using Hybrid Bayesian Lichtenberg Optimization for Intelligent Task Allocation.
Neural Process. Lett., 2023

2022
Low Latency Fog-Centric Deduplication Approach to Reduce IoT Healthcare Data Redundancy.
Wirel. Pers. Commun., 2022

EDSAC-An Efficient Dempster Shafer Algorithm for Classification to Estimate the Service, Security and Privacy Risks with the Service Providers.
Wirel. Pers. Commun., 2022

FEBSRA: Fuzzy Trust Based Energy Aware Balanced Secure Routing Algorithm for Secured Communications in WSNs.
Wirel. Pers. Commun., 2022

Bilingual Corpus-based Hybrid POS Tagger for Low Resource Tamil Language: A Statistical approach.
J. Intell. Fuzzy Syst., 2022

TDOPS: Time series based deduplication and optimal data placement strategy for IIoT in cloud environment.
J. Intell. Fuzzy Syst., 2022

A Deep-DrpXML and IAG-GWO based CHST fostered blockchain technology for secured dynamic optimal routing for wireless sensor networks.
J. Intell. Fuzzy Syst., 2022

LDuAP: lightweight dual auditing protocol to verify data integrity in cloud storage servers.
J. Ambient Intell. Humaniz. Comput., 2022

An efficient virtual machine allocation using single stage weapon target assignment model in cloud software-defined network environment.
Int. J. Commun. Syst., 2022

Trusted cloud broker for estimating the reputation of cloud providers in federated cloud environment.
Concurr. Comput. Pract. Exp., 2022

2021
Risk analysis of cloud service providers by analyzing the frequency of occurrence of problems using E-Eclat algorithm.
Wirel. Networks, 2021

MRI Image Segmentation Using Bat Optimization Algorithm with Fuzzy C Means (BOA-FCM) Clustering.
J. Medical Imaging Health Informatics, 2021

Lightweight fog-centric auditing scheme to verify integrity of IoT healthcare data in the cloud environment.
Concurr. Comput. Pract. Exp., 2021

2020
Forgery document detection in information management system using cognitive techniques.
J. Intell. Fuzzy Syst., 2020

2019
A data locality based scheduler to enhance MapReduce performance in heterogeneous environments.
Future Gener. Comput. Syst., 2019

2018
Optimal Control of Roll Axis of Aircraft Using PID Controller.
Proceedings of the Soft Computing for Problem Solving, 2018

2014
Application of digital image processing in the determination of mass of the diamonds.
Comput. Syst. Sci. Eng., 2014

2012
An Improved Scalable Key Pre-distribution for Distributed Sensor Networks Using Finite Projective Planes.
Ad Hoc Sens. Wirel. Networks, 2012

2010
Application of Vertex Subset Degree Preserving Spanning Trees in Sensor Networks.
Discret. Math. Algorithms Appl., 2010

Speaker verification using combinational features and adaptive neuro-fuzzy inference systems.
Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia, 2010

2006
Compensation Based Grid Scheduling.
Proceedings of the 9th International Conference in Information Technology, 2006

1998
Markovian bulk service queue with delayed vacations.
Comput. Oper. Res., 1998


  Loading...