E. Baburaj

Orcid: 0000-0003-1765-1443

According to our database1, E. Baburaj authored at least 25 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Admission control policy and key agreement based on anonymous identity in cloud computing.
J. Cloud Comput., December, 2023

An efficient DDoS attack detection and categorization using adolescent identity search-based weighted SVM model.
Peer Peer Netw. Appl., March, 2023

2022
Log File Template Detection as a Multi-Objective Optimization Problem.
Int. J. Swarm Intell. Res., 2022

2021
Clustering and classification with inertia weight and elitism-based particle swarm optimization.
Pattern Anal. Appl., 2021

2020
Energy Efficient Routing Technique for Wireless Sensor Networks Using Ant-Colony Optimization.
Wirel. Pers. Commun., 2020

Fuzzy enabled congestion control by cross layer protocol utilizing OABC in WSN: combining MAC, routing, non-similar clustering and efficient data delivery.
Wirel. Networks, 2020

Data analytics for relative ranking of factors to optimise blood bank supply chain.
Int. J. Math. Oper. Res., 2020

2019
Protected Cloud Storage in IoT Using Two Level Learning in Assist with Dual Offbeat Shielding Design.
Wirel. Pers. Commun., 2019

2018
FABC-MACRD: Fuzzy and Artificial Bee Colony Based Implementation of MAC, Clustering, Routing and Data Delivery by Cross-Layer Approach in WSN.
Wirel. Pers. Commun., 2018

An Optimal Trust Aware Cluster Based Routing Protocol Using Fuzzy Based Trust Inference Model and Improved Evolutionary Particle Swarm Optimization in WBANs.
Wirel. Pers. Commun., 2018

QR code based image steganography via variable step size firefly algorithm and lifting wavelet transform.
Proceedings of the 2nd International Conference on Machine Learning and Soft Computing, 2018

2017
Sequential Pattern Mining for Intrusion Detection System with Feature Selection on Big Data.
KSII Trans. Internet Inf. Syst., 2017

Efficient approach to maximise WSN lifetime using weighted optimum storage-node placement, efficient and energetic wireless recharging, efficient rule-based node rotation and critical-state-data-passing methods.
IET Networks, 2017

Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks.
Comput. Electr. Eng., 2017

2015
Energy-Aware Load Balanced Scheduler for Cloud Computing to Improve Quality of Service.
J. Softw., 2015

2014
Low Complexity Constraints for Energy and Performance Management of Heterogeneous Multicore Processors using Dynamic Optimization.
J. Comput. Sci., 2014

Genetic algorithms based data hiding scheme for digital images with LSBMR.
Int. J. Inf. Comput. Secur., 2014

Performance Evaluation of Parallel Genetic and Particle Swarm Optimization Algorithms within the Multicore Architecture.
Int. J. Comput. Intell. Appl., 2014

2013
Constraint Informative Rules for Genetic Algorithm-based Web Page Recommendation System.
J. Comput. Sci., 2013

2012
Investigation on Context-Aware Service Discovery in Pervasive Computing Environments.
Proceedings of the Intelligent Informatics, 2012

2011
Research on Power Optimization Techniques for Multi Core Architectures.
Proceedings of the Advances in Computing and Communications, 2011

2009
Exploring optimised route selection strategy in tree- and mesh-based multicast routing in MANETs.
Int. J. Comput. Appl. Technol., 2009

2008
An Intelligent Multicast Ad-hoc On demand Distance Vector Protocol for MANETs.
J. Networks, 2008

An Enhanced tree based MAODV Protocol for MANETs using Genetic Algorithm.
J. Convergence Inf. Technol., 2008

An Intelligent on Demand Multicast Routing Protocol for MANETs.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008


  Loading...