N. Ch. Sriman Narayana Iyengar
Orcid: 0000-0001-8543-1392
  According to our database1,
  N. Ch. Sriman Narayana Iyengar
  authored at least 34 papers
  between 2006 and 2020.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2020
<i>JADETraderPal</i> - JADE mobile agent embedded with flexible negotiation strategies for dynamic e-commerce environments.
    
  
    J. King Saud Univ. Comput. Inf. Sci., 2020
    
  
  2019
Avian Based Intelligent Algorithm to Provide Zero Tolerance Load Balancer for Cloud Based Computing Platforms.
    
  
    Int. J. Grid High Perform. Comput., 2019
    
  
  2018
A mathematical model with flexible negotiation strategies for agent based negotiations in dynamic e-commerce environments.
    
  
    J. King Saud Univ. Comput. Inf. Sci., 2018
    
  
  2017
Privacy preservation in fuzzy association rules using rough set on intuitionistic fuzzy approximation spaces and DSR.
    
  
    Int. J. Auton. Adapt. Commun. Syst., 2017
    
  
Optimal feature selection using a modified differential evolution algorithm and its effectiveness for prediction of heart disease.
    
  
    Comput. Biol. Medicine, 2017
    
  
  2016
A Hybrid Model for Rice Disease Diagnosis Using Entropy Based Neuro Genetic Algorithm.
    
  
    Int. J. Agric. Environ. Inf. Syst., 2016
    
  
  2015
Coefficient of Restitution based Cross Layer Interference Aware Routing Protocol in Wireless Mesh Networks.
    
  
    Int. J. Commun. Networks Inf. Secur., 2015
    
  
Semantic indexing of hybrid frequent pattern-based clustering of documents with missing semantic information.
    
  
    Int. J. Comput. Intell. Stud., 2015
    
  
    CoRR, 2015
    
  
  2014
    Int. J. Rough Sets Data Anal., 2014
    
  
A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment.
    
  
    Int. J. Grid Util. Comput., 2014
    
  
An Efficient Interference Aware Partially Overlapping Channel Assignment and Routing in Wireless Mesh Networks.
    
  
    Int. J. Commun. Networks Inf. Secur., 2014
    
  
A Fuzzy Logic Based Defense Mechanism against Distributed Denial of Services Attack in Cloud Environment.
    
  
    Int. J. Commun. Networks Inf. Secur., 2014
    
  
Secure and synchronised mobile JXTA cloud ecosystem for sharing patient's healthcare information and medical reports.
    
  
    Int. J. Comput. Heal., 2014
    
  
  2013
    Int. J. Commun. Networks Inf. Secur., 2013
    
  
    Int. J. Commun. Networks Distributed Syst., 2013
    
  
Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP.
    
  
    Int. J. Commun. Networks Distributed Syst., 2013
    
  
Interactive Query Expansion Using Concept-Based Directions Finder Based on Wikipedia.
    
  
    Int. Arab J. Inf. Technol., 2013
    
  
Interference Aware Channel Assignmnet Using Edge Coloring in Multi-Channel Multi-Radio Wireless Mesh Networks
    
  
    CoRR, 2013
    
  
    Proceedings of the Intelligent Computing, 2013
    
  
Algebraic properties and measures of uncertainty in rough set on two universal sets based on multi-granulation.
    
  
    Proceedings of the 6th ACM India Computing Convention, 2013
    
  
  2012
An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks.
    
  
    Int. J. Netw. Secur., 2012
    
  
Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment.
    
  
    Int. J. Commun. Networks Inf. Secur., 2012
    
  
    Int. J. Bioinform. Res. Appl., 2012
    
  
  2010
Frame based Intelligent Tutoring System with weighted attributes and adaptive hypermedia.
    
  
    Int. J. Electron. Bus., 2010
    
  
    CoRR, 2010
    
  
    Proceedings of the Advances in Information Technology - 4th International Conference, 2010
    
  
  2009
Methods of Increasing Spatial Resolution of Digital Images with Minimum Detail Loss and its Applications.
    
  
    Proceedings of the Fifth International Conference on Image and Graphics, 2009
    
  
  2008
An efficient Hash Table-Based Node Identification Method for bandwidth reservation in hybrid cellular and ad-hoc networks.
    
  
    Comput. Commun., 2008
    
  
Design of Sequencing Medium Access Control to Improve the Performance of Wireless Networks.
    
  
    J. Comput. Inf. Technol., 2008
    
  
  2007
    Int. J. Electron. Bus., 2007
    
  
  2006
    Proceedings of the 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 2006
    
  
    Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006