V. Vijayalakshmi

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures.
Wirel. Networks, May, 2024

Soil salinity prediction based on hybrid classifier: study on Bellary and Chamarajanagar district in Karnataka.
Multim. Tools Appl., May, 2024

Security-Based Hook Curve Master Node Key Authentication (HC-MNKA) Using Shuffle Standard Padding Encryption Crypto Policy (S<sup>2</sup>PES).
SN Comput. Sci., January, 2024

2023
Reinforcement learning-based multi-objective energy-efficient task scheduling in fog-cloud industrial IoT-based systems.
Soft Comput., December, 2023

Computational Modeling of Thermodynamical Pulsatile Flow with Uncertain Pressure in Hydrocephalus.
Symmetry, February, 2023

2022
Revisiting Knowledge Management System Use: Unravelling Interventions that Nurture Knowledge Seeking.
Int. J. Knowl. Manag., 2022

2020
USCDRP: unequal secure cluster-based distributed routing protocol for wireless sensor networks.
J. Supercomput., 2020

2019
A morphological review of enterprise social media literature.
J. Organ. Comput. Electron. Commer., 2019

Hybrid key management scheme for heterogeneous wireless sensor networks.
Int. J. Knowl. Eng. Soft Data Paradigms, 2019

Automatic segmentation of sub-acute ischemic stroke lesion by using DTCWT and DBN with parameter fine tuning.
Evol. Intell., 2019

2018
Increased level of security using DNA steganography.
Int. J. Adv. Intell. Paradigms, 2018

2016
An energy efficient routing protocol using hybrid evolutionary algorithm in wireless sensor networks.
Int. J. Knowl. Eng. Soft Data Paradigms, 2016

Secure and efficient multibiometric fusion-based cryptosystem using blind separation encryption algorithm.
Int. J. Biom., 2016

2010
Efficient Encryption of Intra and Inter Frames in MPEG Video.
Proceedings of the Recent Trends in Network Security and Applications, 2010

2008
Secure Time Synchronization against Malicious Attacks for Wireless Sensor Networks.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

2007
On Multiplicity of triangles in 2-edge colouring of graphs.
Ars Comb., 2007

2002
Non-isomorphic Minimal Colorings of K_{4n+3}.
Ars Comb., 2002

2000
Multiplicity of triangles in 2-edge coloring of a family of graphs.
Ars Comb., 2000

1999
Multiplicity of triangles in cocktail party graphs.
Discret. Math., 1999

1996
Transient analysis of an (<i>S</i>-1, <i>S</i>) inventory model-a numerical approach.
Int. J. Comput. Math., 1996

1993
Transient solution of state dependent queues - A continued fraction approach.
Neural Parallel Sci. Comput., 1993


  Loading...