Elijah Blessing Rajsingh

Orcid: 0000-0003-3424-812X

Affiliations:
  • Karunya University, Department of Computer Science and Technology, Coimbatore, India


According to our database1, Elijah Blessing Rajsingh authored at least 39 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multivariate Forecasting of Network Traffic in SDN-Based Ubiquitous Healthcare System.
IEEE Open J. Commun. Soc., 2024

2023
A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption.
Inf. Comput., October, 2023

Modelling a P-System inspired multi-objective centralized heterogeneous wireless outdoor illumination.
J. Ambient Intell. Humaniz. Comput., March, 2023

2022
Long-term traffic flow prediction using multivariate SSA forecasting in SDN based networks.
Pervasive Mob. Comput., 2022

Centrality Based Congestion Detection Using Reinforcement Learning Approach for Traffic Engineering in Hybrid SDN.
J. Netw. Syst. Manag., 2022

Investigative prototyping a tissue P system for solving distributed task assignment problem in heterogeneous wireless sensor network.
J. King Saud Univ. Comput. Inf. Sci., 2022

2021
A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography.
J. King Saud Univ. Comput. Inf. Sci., 2021

2020
Support vector machine-based proactive fault-tolerant scheduling for grid computing environment.
Int. J. Adv. Intell. Paradigms, 2020

An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries.
Inf. Comput., 2020

2019
Payload fragmentation framework for high-performance computing in cloud environment.
J. Supercomput., 2019

Trust aware fault tolerant prediction model for wireless sensor network based measurements in Smart Grid environment.
Sustain. Comput. Informatics Syst., 2019

An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks.
J. Inf. Secur. Appl., 2019

A novel patient friendly IT enabled framework for selection of desired healthcare provider.
Int. J. Medical Eng. Informatics, 2019

Trust aware nature inspired optimised routing in clustered wireless sensor networks.
Int. J. Bio Inspired Comput., 2019

Special Section on Big Data and Cloud Technologies.
Comput. Electr. Eng., 2019

2018
Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks.
Comput. Electr. Eng., 2018

2017
Analysis of hierarchical identity based encryption schemes and its applicability to computing environments.
J. Inf. Secur. Appl., 2017

Mobile entities in wireless sensor networks: comparative study and performance analysis.
Int. J. Inf. Commun. Technol., 2017

Phishing URL detection-based feature selection to classifiers.
Int. J. Electron. Secur. Digit. Forensics, 2017

2016
A novel medical image compression using Ripplet transform.
J. Real Time Image Process., 2016

EDIS: an effective method for detection and isolation of sinkhole attacks in mobile ad hoc networks.
Int. J. Wirel. Mob. Comput., 2016

Intelligent phishing url detection using association rule mining.
Hum. centric Comput. Inf. Sci., 2016

Retinal Fundus Image Analysis for Diagnosis of Glaucoma: A Comprehensive Survey.
IEEE Access, 2016

2015
A novel image compression method for medical images using geometrical regularity of image structure.
Signal Image Video Process., 2015

Projection-Based Medical Image Compression for Telemedicine Applications.
J. Digit. Imaging, 2015

An empirical study on optic disc segmentation using an active contour model.
Biomed. Signal Process. Control., 2015

2014
An autonomous moving heuristic for mobile sink based on feasible sojourn regions to maximise network lifetime in wireless sensor networks.
Int. J. Inf. Technol. Commun. Convergence, 2014

Enhancing security of electronic health records through grid-based user authentication scheme.
Int. J. Inf. Commun. Technol., 2014

Magnetic Field Model (MFM) in Soft Computing and parallelization techniques for Self Organizing Networks (SON) in Telecommunications.
Int. J. Energy Optim. Eng., 2014

ColShield : an effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks.
Hum. centric Comput. Inf. Sci., 2014

2013
An efficient service selection framework for pervasive environments.
Int. J. Wirel. Mob. Comput., 2013

Smart card based time efficient authentication scheme for global grid computing.
Hum. centric Comput. Inf. Sci., 2013

2012
A novel fault tolerant service selection framework for pervasive computing.
Hum. centric Comput. Inf. Sci., 2012

Ontology Based Resource Allocation (OBRA) for Adaptive Intelligent Grid Environment.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2012

2010
Stability analysis of analytical hierarchy process clustering protocol in mobile ad hoc networks.
Int. J. Commun. Networks Distributed Syst., 2010

2009
Relative Weight Based Clustering in Mobile Ad Hoc Networks.
Proceedings of the UKSim'11, 2009

2006
Reputation Based Localized Access Control for Mobile Ad-Hoc Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

2004
Design of Secure Multicast Models for Mobile Services.
Proceedings of the SOFSEM 2004: Theory and Practice of Computer Science, 2004

2003
Evaluation and Analysis of Computational Complexity for Secure Multicast Models.
Proceedings of the Computational Science and Its Applications, 2003


  Loading...