Follow
Dr.J.INDUMATHI
Title
Cited by
Cited by
Year
Block chain based internet of medical things for uninterrupted, ubiquitous, user-friendly, unflappable, unblemished, unlimited health care services (bc iomt u 6 hcs)
J Indumathi, A Shankar, MR Ghalib, J Gitanjali, Q Hua, Z Wen, X Qi
IEEE Access 8, 216856-216872, 2020
1122020
Climate change projections for Tamil Nadu, India: deriving high-resolution climate data by a downscaling approach using PRECIS
PK Bal, A Ramachandran, R Geetha, B Bhaskaran, P Thirumurugan, ...
Theoretical and applied climatology 123, 523-535, 2016
522016
Earlier Detection Of Alzheimer Disease Using N-Fold Cross Validation Approach
DJI R. Sampath
Journal of Medical Systems 42, 0
32*
A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud
J Indumathi, A S.P
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 0
29*
Secure Privacy Conserving Provable Data Possession (SPC‑PDP) framework
MM Indumathi.J
Information Systems and e-Business Management, 1-17, 2019
16*2019
A pristine clean cabalistic foruity strategize based approach for incremental data stream privacy preserving data mining
J Gitanjali, J Indumathi, NCSN Iyengar
2010 IEEE 2nd International Advance Computing Conference (IACC), 410-415, 2010
152010
A novel framework for optimised privacy preserving data mining using the innovative desultory technique
J Indumathi, GV Uma
International Journal of Computer Applications in Technology 35 (2-4), 194-203, 2009
152009
Smart security system using IoT and mobile assistance
J Indumathi, N Asha, J Gitanjali
Emerging Research in Data Engineering Systems and Computer Communications …, 2020
142020
Customized privacy preservation using unknowns to stymie unearthing of association rules
J Indumathi, GV Uma
Journal of Computer Science 3 (12), 874-881, 2007
142007
Principal component analysis on face recognition using artificial firefirefly swarm optimization algorithm
N Asha, ASS Fiaz, J Jayashree, J Vijayashree, J Indumathi
Advances in Engineering Software 174, 103296, 2022
132022
A comparative study of SPKI/SDSI and K-SPKI/SDSI systems
V Vasudevan, N Sivaraman, S SenthilKumar, R Muthuraj, J Indumathi, ...
Information Technology Journal 6 (8), 1208-1216, 2007
122007
Using privacy preserving techniques to accomplish a secure accord
J Indumathi, GV Uma
International Journal of Computer Science and Network Security 7 (8), 258-266, 2007
122007
A design of movie script generation based on natural language processing by optimized ensemble deep learning with heuristic algorithm
R Dharaniya, J Indumathi, V Kaliraj
Data & Knowledge Engineering 146, 102150, 2023
112023
An optimized intellectual agent based secure decision system for health care
MD Murugesan K., Indumathi J.
International journal of engineering science & technology 2 (5), 3662-3675, 2010
11*2010
A new flustering approach for privacy preserving data fishing in tele-health care systems
J Indumathi, GV Uma
International Journal of Healthcare Technology and Management 9 (5-6), 495-516, 2008
112008
An aggrandized framework for genetic privacy preserving pattern analysis using cryptography and contravening—conscious knowledge management systems
J Indumathi, GV Uma
Int J Mol Med Adv Sci 4 (1), 33-40, 2008
102008
An Agent Based Burgeoning Framework for Privacy Preserving Information Harvesting Systems’
UGV Gitanjali J., Shaik Nusrath Banu, Geetha Mary A., Indumathi J.
International Journal of Computer Science and Network Security 7 (11), 268-276, 2007
10*2007
A panglossian solitary-skim sanitization for privacy preserving data archaeology
J Gitanjali, SN Banu, J Indumathi, GV Uma
Int J Electr Power Eng 2 (3), 154-165, 2008
92008
Characterization of future climate extremes over Tamil Nadu, India, using high-resolution regional climate model simulation
R Geetha, A Ramachandran, J Indumathi, K Palanivelu, GV Uma, PK Bal, ...
Theoretical and Applied Climatology, 1-13, 2019
82019
A generic scaffold housing the innovative modus operandi for selection of the superlative anonymisation technique for optimized privacy preserving data mining
J Indumathi
Data mining applications in engineering and medicine 335, 133-156, 2012
72012
The system can't perform the operation now. Try again later.
Articles 1–20