Time efficient secure DNA based access control model for cloud computing environment S Namasudra, P Roy, P Vijayakumar, S Audithan, B Balusamy Future Generation Computer Systems 73, 90-105, 2017 | 86 | 2017 |
Document text extraction from document images using haar discrete wavelet transform S Audithan, RM Chandrasekaran European journal of scientific research 36 (4), 502-512, 2009 | 64 | 2009 |
Fuzzy-logic based learning style prediction in e-learning using web interface information LJ Deborah, R Sathiyaseelan, S Audithan, P Vijayakumar Sadhana 40, 379-394, 2015 | 49 | 2015 |
Wavelet and curvelet analysis for the classification of microcalcifiaction using mammogram images BK Bala, S Audithan Second International Conference on Current Trends in Engineering and …, 2014 | 22 | 2014 |
Frequency Domain Approaches For Breast Cancer Diagnosis BK Bala, S Audithan, G Kannan, K Raja Australian Journal of Basic and Applied Sciences 10 (2), 93-96, 2016 | 15 | 2016 |
Angle and context free grammar based precarious node detection and secure data transmission in MANETs A Veerasamy, SR Madane, K Sivakumar, A Sivaraman The Scientific World Journal 2016, 2016 | 13 | 2016 |
Energy efficinet cluster head selection and data convening in wireless sensor networks E Thenmozhi, S Audithan Indian Journal of Science and Technology, 2016 | 12 | 2016 |
Feature based object recognition using discrete wavelet transform S Elakkiya, S Audithan Second International Conference on Current Trends In Engineering and …, 2014 | 10 | 2014 |
Texture classification by shearlet band signatures C Vivek, S Audithan Asian Journal of Scientific Research 7 (1), 94, 2014 | 10 | 2014 |
Trust based cluster and secure routing scheme for wireless sensor network E Thenmozhi, S Audithan Second International Conference on Current Trends In Engineering and …, 2014 | 9 | 2014 |
Analysis of different types of entropy measures for breast cancer diagnosis using ensemble classification. M Devi, S Audithan Biomedical Research (0970-938X) 28 (7), 2017 | 8 | 2017 |
Anonymous authentication for secure mobile agent based internet business S Audithan, TS Murunya, P Vijayakumar Circuits and Systems 7 (8), 1421-1429, 2016 | 7 | 2016 |
An enhanced adaptive re-clustering protocol in wireless sensor network T Karthikeyan, S Audithan Second International Conference on Current Trends In Engineering and …, 2014 | 7 | 2014 |
An improved entity recognition approach to cyber-social knowledge provision of intellectual property using a CRF-LSTM model Y Wang, P Vijayakumar, BB Gupta, W Alhalabi, A Sivaraman Pattern Recognition Letters 163, 145-151, 2022 | 6 | 2022 |
ROBUST ANALYSIS OF THE ROCK TEXTURE IMAGE BASED ON THE BOOSTING CLASSIFIER WITH GABOR WAVELET FEATURES. C Vivek, S Audithan Journal of Theoretical & Applied Information Technology 69 (3), 2014 | 6 | 2014 |
Trust based cluster head selection algorithm for wireless sensor network L Ramalingam, S Audithan Second International Conference on Current Trends In Engineering and …, 2014 | 6 | 2014 |
Mobile agent based secure internet business using access key hierarchy management scheme TS Murunya, S Audithan, P Vijayakumar Journal of Information and Optimization Sciences 38 (2), 233-258, 2017 | 5 | 2017 |
Comparison of Different Transforms For Earlier detection of Breast Cancer by Using Mammogram Images B Kiran Bala, S Audithan International Journal of Applied Engineering Research 13 (8), 6411-6413, 2018 | 4 | 2018 |
BREAST CANCER DETECTION USING ENSEMBLE CLASSIFICATION AND EXTENDED WEIGHTED VOTING METHOD. MC Devi, S Audithan International Journal of Advanced Research in Computer Science 8 (9), 2017 | 4 | 2017 |
An Efficient Authentication Scheme for Mobile Cloud Computing Services. S Audithan, V Vijayasaro, P Vijayakumar, V Vijayakumar Journal of Information Science & Engineering 33 (3), 2017 | 4 | 2017 |