V. Vasudevan

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
Quality of Service aware secure data transmission model for Internet of Things assisted wireless sensor networks.
Trans. Emerg. Telecommun. Technol., January, 2023

2022
Correction to: Opposition Based Joint Grey Wolf‑Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication.
Wirel. Pers. Commun., 2022

Opposition Based Joint Grey Wolf-Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication.
Wirel. Pers. Commun., 2022

An effective parameter tuned deep belief network for detecting anomalous behavior in sensor-based cyber-physical systems.
Theor. Comput. Sci., 2022

An improved privacy aware secure multi-cloud model with proliferate ElGamal encryption for big data storage.
Int. J. Inf. Comput. Secur., 2022

Wireless edge device intelligent task offloading in mobile edge computing using hyper-heuristics.
EURASIP J. Adv. Signal Process., 2022

Gene data classification using Map Reduce based linear SVM.
Concurr. Comput. Pract. Exp., 2022

2021
Light Weight Cryptography based Medical Data and Image Encryption Scheme.
Webology, 2021

Minimizing Overloads of Critical Tasks Using Machine Learning in CPS by Extending Resources.
Webology, 2021

A deep genetic algorithm for human activity recognition leveraging fog computing frameworks.
J. Vis. Commun. Image Represent., 2021

e-NL BEENISH: extended-network lifetime balanced energy efficient network integrated super heterogeneous protocol for a wireless sensor network.
Int. J. Comput. Aided Eng. Technol., 2021

2020
Optimization of makespan and resource utilization in the fog computing environment through task scheduling algorithm.
Int. J. Wavelets Multiresolution Inf. Process., 2020

2019
Achieving energy efficient wireless sensor network by choosing effective cluster head.
Clust. Comput., 2019

A fully homomorphic-elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data.
Clust. Comput., 2019

A Cognizant agent system for optimizing cloud service searching strategy.
Clust. Comput., 2019

2016
A Bi-level Security Mechanism for Efficient Protection on Graphs in Online Social Network.
Proceedings of the Theoretical Computer Science and Discrete Mathematics, 2016

An Optimization Algorithm for Task Scheduling in Cloud Computing Based on Multi-Purpose Cuckoo Seek Algorithm.
Proceedings of the Theoretical Computer Science and Discrete Mathematics, 2016

2015
Static Batch Mode Heuristic Algorithm for Mapping Independent Tasks in Computational Grid.
J. Comput. Sci., 2015

2014
Statistical static timing analysis using a skew-normal canonical delay model.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

2013
Dynamic souple Wireless Grid Applications for HORDE of jobs by sensible Centrality Scheduling with Redite.
J. Comput. Sci., 2013

2012
Recognition of the Face Images with Occlusion and Expression.
Int. J. Pattern Recognit. Artif. Intell., 2012

2009
ACO based Distributed Intrusion Detection System.
J. Digit. Content Technol. its Appl., 2009

Secure Key Management with optimal resource allocation using multiple edge sharing multicast trees.
J. Convergence Inf. Technol., 2009

An Intelligent Distributed Intrusion Detection System using Genetic Algorithm.
J. Convergence Inf. Technol., 2009

Black Hole Attack on Multicast Routing Protocols.
J. Convergence Inf. Technol., 2009

Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure.
Inf. Secur. J. A Glob. Perspect., 2009

Exploring optimised route selection strategy in tree- and mesh-based multicast routing in MANETs.
Int. J. Comput. Appl. Technol., 2009

Performance Evaluation of Mesh based Multicast Reactive Routing Protocol under Black Hole Attack
CoRR, 2009

Analysis of the various key management algorithms and new proposal in the secure multicast communications
CoRR, 2009

2008
An Intelligent Multicast Ad-hoc On demand Distance Vector Protocol for MANETs.
J. Networks, 2008

An agent based TCP/IP for Wireless Networks.
J. Digit. Content Technol. its Appl., 2008

Improving TCP/IP Performance in Wireless Networks with a UTSAF agent.
J. Convergence Inf. Technol., 2008

An Enhanced tree based MAODV Protocol for MANETs using Genetic Algorithm.
J. Convergence Inf. Technol., 2008

An Evolutionary Hybrid Scheduling Algorithm for Computational Grids.
J. Adv. Comput. Intell. Intell. Informatics, 2008

A Niched Pareto GA Approach for Scheduling Scientific Workflows in Wireless Grids.
J. Comput. Inf. Technol., 2008

Threshold Accepting Scheduling Algorithm for Scientific Workflows in Wireless Grids.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Improving the Performance of TCP/IP over Wireless Networks with a RETSINA Agent.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

An Intelligent on Demand Multicast Routing Protocol for MANETs.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

2007
Scheduling of scientific workflows using Discrete PSO Algorithm for Grids.
J. Convergence Inf. Technol., 2007

2004
Characterizing spatial correlation in indoor channels.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004


  Loading...