P. Mohan Kumar

According to our database1, P. Mohan Kumar authored at least 19 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Gaussian Adapted Markov Model with Overhauled Fluctuation Analysis-Based Big Data Streaming Model in Cloud.
Big Data, 2024

2023
An Ophthalmic Evaluation of Central Serous Chorioretinopathy.
Comput. Syst. Sci. Eng., 2023

2022
Decentralized and Privacy Sensitive Data De-Duplication Framework for Convenient Big Data Management in Cloud Backup Systems.
Symmetry, 2022

ShChain_3D-ResNet: Sharding Blockchain with 3D-Residual Network (3D-ResNet) Deep Learning Model for Classifying DDoS Attack in Software Defined Network.
Symmetry, 2022

Fusion-based advanced encryption algorithm for enhancing the security of Big Data in Cloud.
Concurr. Eng. Res. Appl., 2022

2021
Latent dactyloscopy pairing: presentation attained through feedback from EPITOME.
Int. J. Bio Inspired Comput., 2021

Evolutionary Fuzzy-based gravitational search algorithm for query optimization in crowdsourcing system to minimize cost and latency.
Comput. Intell., 2021

2020
Optimal processing of nearest-neighbor user queries in crowdsourcing based on the whale optimization algorithm.
Soft Comput., 2020

Survey on DDoS defense mechanisms.
Concurr. Comput. Pract. Exp., 2020

TeaMiD: a comprehensive database of simple sequence repeat markers of tea.
Database J. Biol. Databases Curation, 2020

2019
Medical Diagnosis of Cerebral Palsy Rehabilitation Using Eye Images in Machine Learning Techniques.
J. Medical Syst., 2019

2017
Challenges on Mobility Models Suitable to Vanet.
J. Softw., 2017

2016
Screening the covert key using honey encryption to rule out the brute force attack of AES - a survey.
Secur. Commun. Networks, 2016

An image steganographic algorithm on smart mechanism of embedding secret data in images.
Int. J. Electron. Secur. Digit. Forensics, 2016

2013
Mobile Agent-Based Memory Tracer Using Host-Based Intrusion Detection System for Safeguarding Critical Memory.
Inf. Secur. J. A Glob. Perspect., 2013

Smart Spotting of Pulmonary TB Cavities Using CT Images.
Comput. Math. Methods Medicine, 2013

2012
Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate.
Inf. Secur. J. A Glob. Perspect., 2012

2010
A reversible high embedding capacity data hiding technique for hiding secret data in images
CoRR, 2010

2007
Oscillation of difference systems of the neutral type.
Comput. Math. Appl., 2007


  Loading...