Using machine learning algorithms to analyze crime data L McClendon, N Meghanathan Machine Learning and Applications: An International Journal (MLAIJ) 2 (1), 1-12, 2015 | 222 | 2015 |
Wireless sensor networks: Current status and future trends S Khan, ASK Pathan, NA Alrajeh CRC press, 2016 | 196 | 2016 |
Steganalysis algorithms for detecting the Hidden information in image, audio and Video cover media N Meghanathan, L Nayak at International Journal of Network Security & Its Application (IJNSA) 2 (1), 2010 | 112 | 2010 |
Tools and techniques for Network Forensics N Meghanathan, SR Allam, LA Moore Arxiv preprint arXiv:1004.0570, 2010 | 98 | 2010 |
A survey of contemporary real-time operating systems S Baskiyar, N Meghanathan INFORMATICA-LJUBLJANA- 29 (2), 233, 2005 | 90* | 2005 |
Assortativity Analysis of Real-World Network Graphs based on Centrality Metrics. N Meghanathan Comput. Inf. Sci. 9 (3), 7-25, 2016 | 85 | 2016 |
A location prediction based routing protocol and its extensions for multicast and multi-path routing in mobile ad hoc networks N Meghanathan Ad Hoc Networks, 2011 | 78 | 2011 |
Spectral radius as a measure of variation in node degree for complex network graphs N Meghanathan 2014 7th International Conference on u-and e-Service, Science and Technology …, 2014 | 71 | 2014 |
Survey and taxonomy of 55 Unicast routing protocols for mobile ad hoc networks N Meghanathan, A Farago University of Texas at Dallas, Richardson, TX, Technical Report UTDCS-40-04, 2004 | 71* | 2004 |
Impact of the Gauss-Markov mobility model on network connectivity, lifetime and hop count of routes for mobile ad hoc networks N Meghanathan Journal of networks 5 (5), 509, 2010 | 69 | 2010 |
Comparative study of hand gesture recognition system RZ Khan, NA Ibraheem, N Meghanathan Proc. of International Conference of Advanced Computer Science & Information …, 2012 | 68 | 2012 |
On the stability of paths, Steiner trees and connected dominating sets in mobile ad hoc networks N Meghanathan, A Farago Ad Hoc Networks 6 (5), 744-769, 2008 | 63 | 2008 |
Review of access control models for cloud computing N Meghanathan Computer Science & Information Science 3 (1), 77-85, 2013 | 62 | 2013 |
Correlation coefficient analysis of centrality metrics for complex network graphs N Meghanathan Intelligent Systems in Cybernetics and Automation Theory: Proceedings of the …, 2015 | 52 | 2015 |
Gas discharge visualization: an imaging and modeling tool for medical biometrics N Kostyuk, P Cole, N Meghanathan, RD Isokpehi, HHP Cohly International journal of biomedical imaging 2011 (1), 196460, 2011 | 52 | 2011 |
Virtual Machines and Networks-Installation, Performance Study, Advantages and Virtualization Options I Ali, N Meghanathan Arxiv preprint arXiv:1105.0061, 2011 | 49 | 2011 |
A survey on the communication protocols and security in cognitive radio networks N Meghanathan International Journal of Communication Networks and Information Security 5 …, 2013 | 44 | 2013 |
Seed-based approach for automated crack detection from pavement images Y Zhou, F Wang, N Meghanathan, Y Huang Transportation research record 2589 (1), 162-171, 2016 | 43 | 2016 |
Applications of Graph Theory Algorithms in Mobile Ad hoc Networks N Meghanathan Mobile Computing Techniques in Emerging Markets: Systems, Applications and …, 2012 | 43* | 2012 |
A computationally lightweight and localized centrality metric in lieu of betweenness centrality for complex network analysis N Meghanathan Vietnam Journal of Computer Science 4, 23-38, 2017 | 40 | 2017 |