K. R. Venugopal

According to our database1, K. R. Venugopal authored at least 113 papers between 1998 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Resource allocation in the cloud for video-on-demand applications using multiple cloud service providers.
Cluster Computing, 2019

2018
Split keyword fuzzy and synonym search over encrypted cloud data.
Multimedia Tools Appl., 2018

Cost and fault-tolerant aware resource management for scientific workflows using hybrid instances on clouds.
Multimedia Tools Appl., 2018

Hard exudate based severity assessment of diabetic macular edema from retinal fundus images.
IJMEI, 2018

Implementation of Fingerprint Based Biometric System Using Optimized 5/3 DWT Architecture and Modified CORDIC Based FFT.
CSSP, 2018

A novel sentiment aware dictionary for multi-domain sentiment classification.
Computers & Electrical Engineering, 2018

Consumer insight mining: Aspect based Twitter opinion mining of mobile phone reviews.
Appl. Soft Comput., 2018

Experimental Evaluation of BATMAN and BATMAN-Adv Routing Protocols in a Mobile Testbed.
Proceedings of the TENCON 2018, 2018

DRDLC: Discovering Relevant Documents Using Latent Dirichlet Allocation and Cosine Similarity.
Proceedings of the VII International Conference on Network, Communication and Computing, 2018

2017
Aspect term extraction for sentiment analysis in large movie reviews using Gini Index feature selection method and SVM classifier.
World Wide Web, 2017

ACSIR: ANOVA Cosine Similarity Image Recommendation in vertical search.
IJMIR, 2017

LR3: link reliable reactive routing protocol for wireless sensor networks.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

RMSC: Robust modeling of subspace clustering for high dimensional data.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2016
An Efficient Reconfigurable Architecture for Fingerprint Recognition.
VLSI Design, 2016

Query Recommendation based on Query Relevance Graph.
Trans. MLDM, 2016

RSSMSO Rapid Similarity Search on Metric Space Object Stored in Cloud Environment.
IJOCI, 2016

Image recommendation based on keyword relevance using absorbing Markov chain and image features.
IJMIR, 2016

IR_URFS_VF: image recommendation with user relevance feedback session and visual features in vertical image search.
IJMIR, 2016

Webpage recommendation with web navigation prediction framework.
I. J. Knowledge and Web Intelligence, 2016

Detection of fraudulent and malicious websites by analysing user reviews for online shopping websites.
I. J. Knowledge and Web Intelligence, 2016

Reputation System: Evaluating Reputation among All Good Sellers.
Proceedings of the 7th Workshop on Computational Approaches to Subjectivity, 2016

PCAD: Power control attack detection in wireless sensor networks.
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016

2015
WNPWR: Web navigation prediction framework for webpage recommendation.
Proceedings of the 2nd IEEE International Conference on Recent Trends in Information Systems, 2015

HOMS: Hindi opinion mining system.
Proceedings of the 2nd IEEE International Conference on Recent Trends in Information Systems, 2015

PCVOS: Principal component variances based off-line signature verification.
Proceedings of the 2nd IEEE International Conference on Recent Trends in Information Systems, 2015

Query Click and Text Similarity Graph for Query Suggestions.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2015

2014
Automatic discovery and ranking of synonyms for search keywords in the web.
IJWS, 2014

Web caching and prefetching with cyclic model analysis of web object sequences.
I. J. Knowledge and Web Intelligence, 2014

EDOCR: Energy Density On-demand Cluster Routing in Wireless Sensor Networks.
CoRR, 2014

Improved Bully Election Algorithm for Distributed Systems.
CoRR, 2014

Two-Hop Routing with Traffic-Differentiation for QoS Guarantee in Wireless Sensor Networks.
CoRR, 2014

Link-Reliability Based Two-Hop Routing for Wireless Sensor Networks.
CoRR, 2014

Cancer Prognosis Prediction Using Balanced Stratified Sampling.
CoRR, 2014

QoS group based optimal retransmission medium access protocol for wireless sensor networks.
CoRR, 2014

Two Stage Prediction Process with Gradient Descent Methods Aligning with the Data Privacy Preservation.
CoRR, 2014

Mathematical Model of Semantic Look - An Efficient Context Driven Search Engine.
CoRR, 2014

FPGA Based Efficient Multiplier for Image Processing Applications Using Recursive Error Free Mitchell Log Multiplier and KOM Architecture.
CoRR, 2014

Chain Routing for Convergecast Small Scale Wireless Sensor Networks.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

EESOR: Energy Efficient Selective Opportunistic Routing in Wireless Sensor Networks.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

2013
Authentication using Finger Knuckle Prints.
Signal, Image and Video Processing, 2013

Mobile node authentication using key distribution scheme in wireless sensor networks.
IJAHUC, 2013

Bidirectional Growth based Mining and Cyclic Behaviour Analysis of Web Sequential Patterns
CoRR, 2013

Similarity based Dynamic Web Data Extraction and Integration System from Search Engine Result Pages for Web Content Mining
CoRR, 2013

DRSP : Dimension Reduction For Similarity Matching And Pruning Of Time Series Data Streams.
CoRR, 2013

Forecasting Stock Time-Series using Data Approximation and Pattern Sequence Similarity.
CoRR, 2013

Multiple Domain Secure Routing for Wireless Sensor Networks.
CoRR, 2013

Link-reliability based two-hop routing for QoS guarantee in Wireless Sensor Networks.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Traffic-Differentiated Two-Hop Routing for QoS in Wireless Sensor Networks.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2012
Effects of Information Filters: A Phenomenon on the Web.
IJIRR, 2012

Ranking Search Engine Result Pages based on Trustworthiness of Websites
CoRR, 2012

2011
Heartbeat biometrics for human authentication.
Signal, Image and Video Processing, 2011

GRM: a reliable and fault tolerant data replication middleware for grid environment.
Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011

Statistical Analysis for Human Authentication Using ECG Waves.
Proceedings of the Information Intelligence, Systems, Technology and Management, 2011

Steganalysis of Perturbed Quantization Using HBCL Statistics and FR Index.
Proceedings of the Information Intelligence, Systems, Technology and Management, 2011

Multiple Mobile Synchronised Sinks (MMSS) for Energy Efficiency and Lifetime Maximization in Wireless Sensor Networks.
Proceedings of the ICEIS 2011, 2011

KCSR: Keymatches Constrained Secure Routing in Heterogeneous Wireless Sensor Networks.
Proceedings of the ICEIS 2011, 2011

Restricting the admission of selfish or malicious nodes into the network by using efficient security services in middleware for MANETs.
Proceedings of the 2011 International Conference on Communication, 2011

Human authentication using finger knuckle print.
Proceedings of the 4th Bangalore Annual Compute Conference, Compute 2011, 2011

Middleware Service Oriented Rescue and Crime Information System (RCIS) Using Heterogeneous Fixed Nodes in WSNs.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

Covariance Based Steganography Using DCT.
Proceedings of the Advances in Computing and Communications, 2011

An Efficient Protocol to Study the Effect of Flooding on Energy Consumption in MANETS.
Proceedings of the Advances in Computing and Communications, 2011

An Efficient Framework for Prediction in Healthcare Data Using Soft Computing Techniques.
Proceedings of the Advances in Computing and Communications, 2011

2010
Fingerprint Recognition Using Minutia Score Matching
CoRR, 2010

HUBFIRE - A Multi-class SVM based JPEG Steganalysis using HBCL Statistics and FR Index.
Proceedings of the SECRYPT 2010, 2010

JPEG Steganalysis Using HBCL Statistics and FR Index.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

Fingerprint Recognition Using Inter Ridge Variation.
Proceedings of the 3rd International Conference on Emerging Trends in Engineering and Technology, 2010

Preserving Energy Using Link Protocol in Wireless Networks.
Proceedings of the Communication and Networking, 2010

Human Authentication Based on ECG Waves Using Radon Transform.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens.
Proceedings of the Communication and Networking, 2010

JHUF-5 Steganalyzer: Huffman Based Steganalytic Features for Reliable Detection of YASS in JPEG Images.
Proceedings of the Signal Processing and Multimedia, 2010

2009
Soft Computing for Data Mining Applications
Studies in Computational Intelligence 190, Springer, ISBN: 978-3-642-00192-5, 2009

Soft Computing for XML Data Mining.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Dynamic Hierarchical Communication Paradigm for Wireless Sensor Networks: A Centralized, Energy Efficient Approach.
Wireless Sensor Network, 2009

Fingerprint Verification based on Gabor Filter Enhancement
CoRR, 2009

An Efficient Prediction Model for Diabetic Database Using Soft Computing Techniques.
Proceedings of the Rough Sets, 2009

Offline signature authentication using cross-validated graph matching.
Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, 2009

Iris feature extraction using directional filter bank for personal identification.
Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, 2009

Extracting hidden image using histogram, DFT and SVM.
Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, 2009

Advanced Biometric Identification on Face, Gender and Age Recognition.
Proceedings of the ARTCom 2009, 2009

2008
A soft computing approach for data mining based query processing using rough sets and genetic algorithms.
Int. J. Hybrid Intell. Syst., 2008

Proactive sliding -window strategy for merging sensor-enabled cars.
Proceedings of the 16th International Conference on Networks, 2008

An Efficient Storage Mechanism to Distribute Disk Load in a VoD Server.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

Robust image adaptive steganography using integer wavelets.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

2007
A self-adaptive migration model genetic algorithm for data mining applications.
Inf. Sci., 2007

Selective dissemination of XML documents based on genetically learned user model and Support Vector Machines.
Intell. Data Anal., 2007

Statistical Analysis and Compression of DNA using Weighted Probability Approach and Modified Run-Length Encoding.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007

Load Balancing in Fault Tolerant Video Server.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2007

Genetic Algorithm Based Steganography Using Wavelets.
Proceedings of the Information Systems Security, Third International Conference, 2007

Selective Querying and Other Proposals for a Less Congested Gnutella Network.
Proceedings of the Distributed Computing and Internet Technology, 2007

Data Mining based Query Processing using Rough Sets and Genetic Algorithms.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

Lesion detection using segmentation and classification of mammograms.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2007

2006
An efficient fuzzy based neuro - genetic algorithm for stock market prediction.
Int. J. Hybrid Intell. Syst., 2006

A neural network based CBIR system using STI features and relevance feedback.
Intell. Data Anal., 2006

Non-repetitive DNA Sequence Compression Using Memoization.
Proceedings of the Biological and Medical Data Analysis, 7th International Symposium, 2006

Classification of Mammograms Using Decision Trees.
Proceedings of the Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 2006

Energy Aware Topology Management in Ad Hoc Wireless Networks.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Indexing XML Documents Using Self Adaptive Genetic Algorithms for Better Retreival.
Proceedings of the Frontiers of WWW Research and Development, 2006

2005
Sagaxsearch: an Xml Information Retrieval Mechanism Using Self Adaptive Genetic Algorithms.
International Journal of Computational Intelligence and Applications, 2005

Dynamic Association Rule Mining using Genetic Algorithms.
Intell. Data Anal., 2005

Efficient Passive Clustering and Gateway Selection in MANETs.
Proceedings of the Distributed Computing, 2005

A Self-Adaptive Migration Model Genetic Algorithms for Data Mining Applications.
Proceedings of the 2nd Indian International Conference on Artificial Intelligence, 2005

An Efficient Fuzzy based Neuro - Genetic Algorithm for Stock Market Prediction.
Proceedings of the 2nd Indian International Conference on Artificial Intelligence, 2005

A Dynamic Migration Model for Self-adaptive Genetic Algorithms.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2005

Selective Dissemination of XML Documents Using GAs and SVM.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

GaXsearch: An XML Information Retrieval Mechanism Using Genetic Algorithms.
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005

2004
Mining Top - k Ranked Webpages Using Simulated Annealing and Genetic Algorithms.
Proceedings of the Applied Computing, Second Asian Applied Computing Conference, 2004

2003
Evolutionary Approach for Mining Association Rules on Dynamic Databases.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2003

Dynamic Subspace Clustering for Very Large High-Dimensional Databases.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2003

2001
A heuristic for placement of limited range wavelength converters in all-optical networks.
Computer Networks, 2001

2000
Converter placement in all-optical networks using genetic algorithms.
Computer Communications, 2000

1999
Impact of wavelength converters in wavelength routed all-optical networks.
Computer Communications, 1999

A Heuristic for Placement of Limited Range Wavelength Converters in All-Optical Networks.
Proceedings of the Proceedings IEEE INFOCOM '99, 1999

1998
Performance analysis of wavelength converters in WDM wavelength routed optical networks.
Proceedings of the 5th International Conference On High Performance Computing, 1998


  Loading...