A survey on content based image retrieval F Rajam, S Valli Life science journal 10 (2), 2475-2487, 2013 | 81 | 2013 |
An algorithm for multi-sensor image fusion using maximum a posteriori and nonsubsampled contourlet transform DAS Valli Computers and Electrical Engineering, pp 1-14, 2017 | 42* | 2017 |
Impact of Sybil and Wormhole Attacks in Location Based Geographic Multicast Routing Protocol for Wireless Sensor Networks S Ramachandran, V Shanmugan Journal of Computer Science 7 (7), 973-979, 2011 | 22 | 2011 |
Ontology Based Query Expansion Using Word Sense Disambiguation M Barathi, S Valli Arxiv preprint arXiv:1003.1460, 2010 | 22 | 2010 |
A survey on text information extraction from born-digital and scene text images SP Faustina Joan, S Valli Proceedings of the National Academy of Sciences, India Section A: Physical …, 2019 | 21 | 2019 |
Region-based image retrieval using the semantic cluster matrix and adaptive learning I Felci Rajam, S Valli International Journal of Computational Science and Engineering 7 (3), 239-252, 2012 | 21 | 2012 |
Multi-objective heuristics algorithm for dynamic resource scheduling in the cloud computing environment KL Devi, S Valli The Journal of Supercomputing 77 (8), 8252-8280, 2021 | 20 | 2021 |
SRBIR: Semantic Region Based Image Retrieval by Extracting the Dominant Region and Semantic Learning IF Rajam, S Valli Journal of Computer Science 7 (3), 400-408, 2011 | 20 | 2011 |
An enhanced text detection technique for the visually impaired to read text SPF Joan, S Valli Information Systems Frontiers 19, 1039-1056, 2017 | 19 | 2017 |
A two way authentication using bilinear mapping function for wireless sensor networks VS Shyamala Ramachandran Computers & Electrical Engineering 59, 242-249, 2017 | 16 | 2017 |
Content-Based Image Retrieval Using a Quick SVM-Binary Decision Tree–QSVMBDT I Felci Rajam, S Valli Advances in Digital Image Processing and Information Technology, 11-22, 2011 | 16 | 2011 |
An enhanced approach to map domain-specific words in cross-domain sentiment analysis A Geethapriya, S Valli Information Systems Frontiers, 1-15, 2021 | 15 | 2021 |
Effective feature set construction for SVM-based hot method prediction and optimisation S Johnson, V Shanmugam International Journal of Computational Science and Engineering 6 (3), 192-205, 2011 | 15 | 2011 |
Time series-based workload prediction using the statistical hybrid model for the cloud environment KL Devi, S Valli Computing 105 (2), 353-374, 2023 | 13 | 2023 |
Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks R Shyamala, S Valli Advances in Computing and Information Technology, 349-359, 2012 | 10 | 2012 |
PERFORMANCE COMPARISON OF ROUTING ATTACKS IN MANET AND WSN S Ramachandran, V Shanmugam | 10* | |
Hot method prediction using support vector machines S Johnson, S Valli Ubiquitous Computing and Communication Journal 3 (4), 75-81, 2008 | 7 | 2008 |
An enhanced one way function tree rekey protocol based on chinese remainder theorem B Varthini, S Valli Computer and Information Sciences-ISCIS 2005, 33-43, 2005 | 7 | 2005 |
Context Disambiguation Based Semantic Web Search for Effective Information Retrieval M Barathi, S Valli Journal of Computer Science 7 (4), 548-553, 0 | 7* | |
Algorithms for the Detection of Defects in GUI Applications BU Maheswari, S Valli Journal of Computer Science 7, 0 | 7* | |