R. Saranya

Orcid: 0000-0003-0967-5373

According to our database1, R. Saranya authored at least 13 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Assessing the Impact of Collaborative Learning Practices on Competency Development in Entrepreneurship Program: A Study of Higher Education Students in Delhi NCR Region of India.
J. Inf. Knowl. Manag., October, 2023

A Benchmark Study by using various Machine Learning Models for Predicting Covid-19 trends.
CoRR, 2023

Enhancing Supply Chain Efficiency and Security: A Proof of Concept for IoT Device Integration With Blockchain.
IEEE Access, 2023

Advanced Prediction of Cardiovascular Disease Symptoms with Enhanced Deep Learning Algorithm using Design Thinking Phenomenon.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

2022
Fuzzy Graph Cellular Automaton and Its Applications in Parking Recommendations.
New Math. Nat. Comput., 2022

2021
Codes from incidence matrices of some regular graphs.
Discret. Math. Algorithms Appl., 2021

Codes from incidence matrices of some Bouwer graphs.
Discret. Math. Algorithms Appl., 2021

2020
Application of the graph cellular automaton in generating languages.
Math. Comput. Simul., 2020

2019
A decision-making framework under probabilistic linguistic term set for multi-criteria group decision-making problem.
J. Intell. Fuzzy Syst., 2019

Integrated quantum flow and hidden Markov chain approach for resisting DDoS attack and C-Worm.
Clust. Comput., 2019

2016
Generating Adaptive Partially Ordered Sequential Rules.
Proceedings of the International Conference on Informatics and Analytics, 2016

2013
Hybrid Artificial Bee Colony Algorithm and Simulated Annealing Algorithm for Combined Economic and Emission Dispatch Including Valve Point Effect.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2013

2010
Securing Our Bluetooth Mobiles From Intruder Attack Using Enhanced Authentication Scheme And Plausible Exchange Algorithm
CoRR, 2010


  Loading...