V. Vijayalakshmi

According to our database1, V. Vijayalakshmi authored at least 23 papers between 1993 and 2020.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
USCDRP: unequal secure cluster-based distributed routing protocol for wireless sensor networks.
J. Supercomput., 2020

2019
A review on acute/sub-acute ischemic stroke lesion segmentation and registration challenges.
Multim. Tools Appl., 2019

A morphological review of enterprise social media literature.
J. Organ. Comput. Electron. Commer., 2019

Hybrid key management scheme for heterogeneous wireless sensor networks.
Int. J. Knowl. Eng. Soft Data Paradigms, 2019

Automatic segmentation of sub-acute ischemic stroke lesion by using DTCWT and DBN with parameter fine tuning.
Evol. Intell., 2019

Multiplicity of triangles in complete graphs with K3-holes.
AKCE Int. J. Graphs Comb., 2019

2018
Increased level of security using DNA steganography.
Int. J. Adv. Intell. Paradigms, 2018

2017
Multiplicity of Stars in Complete Graphs and Complete r-partite Graphs.
Ars Comb., 2017

2016
An energy efficient routing protocol using hybrid evolutionary algorithm in wireless sensor networks.
Int. J. Knowl. Eng. Soft Data Paradigms, 2016

Secure and efficient multibiometric fusion-based cryptosystem using blind separation encryption algorithm.
Int. J. Biom., 2016

Star Chromatic Index of Subcubic Graphs.
Electron. Notes Discret. Math., 2016

Game Chromatic Number of Direct Product of Some Families of Graphs.
Electron. Notes Discret. Math., 2016

2015
Cycle Partition of Two-Connected and Two-Edge Connected Graphs.
Math. Comput. Sci., 2015

On multiplicity of quadrilaterals.
AKCE Int. J. Graphs Comb., 2015

Game chromatic number of lexicographic product graphs.
AKCE Int. J. Graphs Comb., 2015

2010
Efficient Encryption of Intra and Inter Frames in MPEG Video.
Proceedings of the Recent Trends in Network Security and Applications, 2010

2008
Secure Time Synchronization against Malicious Attacks for Wireless Sensor Networks.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

2007
On Multiplicity of triangles in 2-edge colouring of graphs.
Ars Comb., 2007

2002
Non-isomorphic Minimal Colorings of K_{4n+3}.
Ars Comb., 2002

2000
Multiplicity of triangles in 2-edge coloring of a family of graphs.
Ars Comb., 2000

1999
Multiplicity of triangles in cocktail party graphs.
Discret. Math., 1999

1996
Transient analysis of an (<i>S</i>-1, <i>S</i>) inventory model-a numerical approach.
Int. J. Comput. Math., 1996

1993
Transient solution of state dependent queues - A continued fraction approach.
Neural Parallel Sci. Comput., 1993


  Loading...