Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm P Velmurugadass, S Dhanasekaran, SS Anand, V Vasudevan Materials Today: Proceedings 37, 2653-2659, 2021 | 153 | 2021 |
A hierarchical singular value decomposition algorithm for low rank matrices V Vasudevan, M Ramakrishna arXiv preprint arXiv:1710.02812, 2017 | 56 | 2017 |
Black hole attack prevention in multicast routing protocols for mobile ad hoc networks using certificate chaining EAM Anita, V Vasudevan International Journal of Computer Applications 1 (12), 21-2, 2010 | 50 | 2010 |
A deep genetic algorithm for human activity recognition leveraging fog computing frameworks RR Subramanian, V Vasudevan Journal of Visual Communication and Image Representation 77, 103132, 2021 | 47 | 2021 |
ACO based distributed intrusion detection system S Janakiraman, V Vasudevan, S Janakiraman International Journal of Digital Content Technology and its Applications 3 …, 2009 | 42 | 2009 |
A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data G Prabu Kanna, V Vasudevan Cluster Computing 22 (Suppl 4), 9561-9569, 2019 | 39 | 2019 |
Cluster analysis research design model, problems, issues, challenges, trends and tools V Ilango, R Subramanian, V Vasudevan International Journal on Computer Science and Engineering 3 (8), 3064, 2011 | 31 | 2011 |
Workflow scheduling in cloud computing environment using firefly algorithm R SundarRajan, V Vasudevan, S Mithya 2016 International Conference on Electrical, Electronics, and Optimization …, 2016 | 30 | 2016 |
A five step procedure for outlier analysis in data mining V Ilango, R Subramanian, V Vasudevan European Journal of Scientific Research 75 (3), 327-339, 2012 | 30 | 2012 |
Improving scheduling of scientific workflows using tabu search for computational grids S Benedict, V Vasudevan Information Technology Journal 7 (1), 91-97, 2008 | 30 | 2008 |
A skew-normal canonical model for statistical static timing analysis S Ramprasath, M Vijaykumar, V Vasudevan IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24 (6 …, 2015 | 26 | 2015 |
Enhancing the security of user data using the keyword encryption and hybrid cryptographic algorithm in cloud GP Kanna, V Vasudevan 2016 International Conference on Electrical, Electronics, and Optimization …, 2016 | 25 | 2016 |
An intelligent mesh based multicast routing algorithm for MANETs using particle swarm optimization E Baburaj, V Vasudevan International Journal of Computer Science and Network Security 8 (5), 214-218, 2008 | 25 | 2008 |
Optimization of makespan and resource utilization in the fog computing environment through task scheduling algorithm R Vijayalakshmi, V Vasudevan, S Kadry, R Lakshmana Kumar International Journal of Wavelets, Multiresolution and Information …, 2020 | 24 | 2020 |
An Intelligent Distributed Intrusion Detection System using Genetic Algorithm. S Janakiraman, V Vasudevan J. Convergence Inf. Technol. 4 (1), 70-76, 2009 | 20 | 2009 |
Static batch mode heuristic algorithm for mapping independent tasks in computational grid R Vijayalakshmi, V Vasudevan Journal of Computer Science 11 (1), 224, 2015 | 19 | 2015 |
A certificate-based scheme to defend against worm hole attacks in multicast routing protocols for MANETs EAM Anita, V Vasudevan, A Ashwini 2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING …, 2010 | 19 | 2010 |
Achieving energy efficient wireless sensor network by choosing effective cluster head VB Shalini, V Vasudevan Cluster Computing 22 (Suppl 4), 7761-7768, 2019 | 18 | 2019 |
An efficient face recognition system based on fusion of mpca and lpp J Shermina, V Vasudevan American Journal of Scientific Research ISSN, 6-19, 2010 | 18 | 2010 |
A built-in-self-test scheme for digital to analog converters KPS Rafeeque, V Vasudevan 17th International Conference on VLSI Design. Proceedings., 1027-1032, 2004 | 18 | 2004 |