Time efficient secure DNA based access control model for cloud computing environment S Namasudra, P Roy, P Vijayakumar, S Audithan, B Balusamy Future Generation Computer Systems 73, 90-105, 2017 | 85 | 2017 |
Document text extraction from document images using haar discrete wavelet transform S Audithan, RM Chandrasekaran European journal of scientific research 36 (4), 502-512, 2009 | 64 | 2009 |
Fuzzy-logic based learning style prediction in e-learning using web interface information LJ Deborah, R Sathiyaseelan, S Audithan, P Vijayakumar Sadhana 40, 379-394, 2015 | 48 | 2015 |
Wavelet and curvelet analysis for the classification of microcalcifiaction using mammogram images BK Bala, S Audithan Second International Conference on Current Trends in Engineering and …, 2014 | 22 | 2014 |
Frequency Domain Approaches For Breast Cancer Diagnosis BK Bala, S Audithan, G Kannan, K Raja Australian Journal of Basic and Applied Sciences 10 (2), 93-96, 2016 | 15 | 2016 |
Angle and context free grammar based precarious node detection and secure data transmission in MANETs A Veerasamy, SR Madane, K Sivakumar, A Sivaraman The Scientific World Journal 2016, 2016 | 13 | 2016 |
Energy efficinet cluster head selection and data convening in wireless sensor networks E Thenmozhi, S Audithan Indian Journal of Science and Technology 9 (15), 1-6, 2016 | 11 | 2016 |
Feature based object recognition using discrete wavelet transform S Elakkiya, S Audithan Second International Conference on Current Trends In Engineering and …, 2014 | 10 | 2014 |
Trust based cluster and secure routing scheme for wireless sensor network E Thenmozhi, S Audithan Second International Conference on Current Trends In Engineering and …, 2014 | 9 | 2014 |
Texture classification by shearlet band signatures C Vivek, S Audithan Asian Journal of Scientific Research 7 (1), 94, 2014 | 9 | 2014 |
Analysis of different types of entropy measures for breast cancer diagnosis using ensemble classification. M Devi, S Audithan Biomedical Research (0970-938X) 28 (7), 2017 | 8 | 2017 |
Anonymous authentication for secure mobile agent based internet business S Audithan, TS Murunya, P Vijayakumar Circuits and Systems 7 (8), 1421-1429, 2016 | 7 | 2016 |
An enhanced adaptive re-clustering protocol in wireless sensor network T Karthikeyan, S Audithan Second International Conference on Current Trends In Engineering and …, 2014 | 7 | 2014 |
Trust based cluster head selection algorithm for wireless sensor network L Ramalingam, S Audithan Second International Conference on Current Trends In Engineering and …, 2014 | 6 | 2014 |
Mobile agent based secure internet business using access key hierarchy management scheme TS Murunya, S Audithan, P Vijayakumar Journal of Information and Optimization Sciences 38 (2), 233-258, 2017 | 5 | 2017 |
ROBUST ANALYSIS OF THE ROCK TEXTURE IMAGE BASED ON THE BOOSTING CLASSIFIER WITH GABOR WAVELET FEATURES. C Vivek, S Audithan Journal of Theoretical & Applied Information Technology 69 (3), 2014 | 5 | 2014 |
An Efficient Authentication Scheme for Mobile Cloud Computing Services. S Audithan, V Vijayasaro, P Vijayakumar, V Vijayakumar Journal of Information Science & Engineering 33 (3), 2017 | 4 | 2017 |
Enhanced expressivity using deontic logic and reuse measure of ontologies LJ Deborah, R Karthika, S Audithan, BK Bala Procedia Computer Science 54, 318-326, 2015 | 4 | 2015 |
Contourlets for facial expression analysis using one nearest neighbor classifier R Suresh, S Audithan Second International Conference on Current Trends In Engineering and …, 2014 | 4 | 2014 |
Analysis of QoS multicast protocols for MANETs K Shankar, S Audithan Second International Conference on Current Trends In Engineering and …, 2014 | 4 | 2014 |