Ilango Paramasivam

Orcid: 0000-0003-2609-0270

According to our database1, Ilango Paramasivam authored at least 13 papers between 2013 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Hybrid optimization algorithm for task scheduling and virtual machine allocation in cloud computing.
Evol. Intell., 2021

Design and analysis of behaviour based DDoS detection algorithm for data centres in cloud.
Evol. Intell., 2021

Feature reduction using SVM-RFE technique to detect autism spectrum disorder.
Evol. Intell., 2021

2018
The Impact of Wireless Sensor Network in the Field of Precision Agriculture: A Review.
Wirel. Pers. Commun., 2018

2017
PRIN: A Priority-Based Energy Efficient MAC Protocol for Wireless Sensor Networks Varying the Sample Inter-Arrival Time.
Wirel. Pers. Commun., 2017

An Optimized Replica Allocation Algorithm Amidst of Selfish Nodes in MANET.
Wirel. Pers. Commun., 2017

2016
User localisation using wireless signal strength - an application for pattern classification using fuzzy decision tree.
Int. J. Internet Protoc. Technol., 2016

An Improved Second Order Training Algorithm for Improving the Accuracy of Fuzzy Decision Trees.
Int. J. Fuzzy Syst. Appl., 2016

Big data analytics bring new insights and higher business value - an experiment carried out to divulge sales forecasting solutions.
Int. J. Adv. Intell. Paradigms, 2016

2015
Secure authentication and integrity techniques for randomized secured routing in WSN.
Wirel. Networks, 2015

2014
Instance driven clustering for the imputation of missing data in KDD.
Int. J. Commun. Networks Distributed Syst., 2014

Induction of fuzzy decision trees and its refinement using gradient projected-neuro-fuzzy decision tree.
Int. J. Adv. Intell. Paradigms, 2014

2013
Higher dimensional chaos for Audio encryption.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, 2013


  Loading...