C. Jayakumar

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2023
Greedy regression and differential convex-based deep learning for audio event classification.
J. Intell. Fuzzy Syst., December, 2023

Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing.
Multim. Tools Appl., November, 2023

Genetics Based Compact Fuzzy System for Visual Sensor Network.
Comput. Syst. Sci. Eng., 2023

2022
Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in cloud environment.
Simul. Model. Pract. Theory, 2022

Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud.
Quantum Inf. Process., 2022

Security enhanced optimal trajectory selection for mobile sink using reinforcement learning.
J. Intell. Fuzzy Syst., 2022

2020
Kernellized support vector regressive machine based variational mode decomposition for time frequency analysis of Mirnov coil.
Microprocess. Microsystems, 2020

2019
Sequence Statistical Code Based Data Compression Algorithm for Wireless Sensor Network.
Wirel. Pers. Commun., 2019

Pivot variable location-based clustering algorithm for reducing dead nodes in wireless sensor networks.
Neural Comput. Appl., 2019

2018
Inclusive Elliptical Curve Cryptography (IECC) for Wireless Sensor Network Efficient Operations.
Wirel. Pers. Commun., 2018

2017
Unique identity and localization based replica node detection in hierarchical wireless sensor networks.
Comput. Electr. Eng., 2017

2016
Trust Based Energy Efficient Clustering Protocol in Wireless Sensor Networks for Military Applications.
Proceedings of the Advances in Computing and Data Sciences, 2016

2015
Implementation of Trust and Reputation Management for Free-Roaming Mobile Agent Security.
IEEE Syst. J., 2015

Recurrent Ant Colony Optimization for Optimal Path Convergence in Mobile Ad Hoc Networks.
KSII Trans. Internet Inf. Syst., 2015

2014
Secure Communication Protocol for Protecting Computation Result of Free Roaming Mobile Agent.
J. Comput. Sci., 2014

2013
Preservation of the Privacy for Multiple Custodian Systems with Rule Sharing.
J. Comput. Sci., 2013

Analysis on Optimization of Energy Consumption in Mobile Ad Hoc Networks.
Proceedings of the Intelligent Computing, 2013

2012
An efficient and secure key agreement scheme using physiological signals in body area networks.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Multi-modal biometric approach to enable high security in mobile adhoc network.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

A Unified Framework for Pervasive Healthcare Medical Computing Based on SOA.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012


  Loading...