关注
Yesodha K
Yesodha K
在 auist.net 的电子邮件经过验证
标题
引用次数
引用次数
年份
Product recommendation system using support vector machine
K Yesodha, R Anitha, T Mala, S Vindhya
Advanced Computational and Communication Paradigms: Proceedings of …, 2018
42018
Elliptic curve encryption-based energy-efficient secured ACO routing protocol for wireless sensor networks
K Yesodha, M Krishnamurthy, K Thangaramya, A Kannan
The Journal of Supercomputing, 1-34, 2024
2024
Intrusion detection system extended CNN and artificial bee colony optimization in wireless sensor networks
K Yesodha, M Krishnamurthy, M Selvi, A Kannan
Peer-to-Peer Networking and Applications, 1-26, 2024
2024
Trust Evaluation in Social Network Using Trusted Graph
M Jansi, AS Shri Vindhya, T Mala, K Yesodha
Ambient Communications and Computer Systems: RACCCS 2017, 183-191, 2018
2018
Multi‐lingual encryption technique using Unicode and Riemann zeta function and elliptic curve cryptography for secured routing in wireless sensor networks
K Yesodha, S Viswanathan, M Krishnamurthy, A Kannan
Concurrency and Computation: Practice and Experience, e8159, 0
系统目前无法执行此操作,请稍后再试。
文章 1–5