Follow
R Leela Velusamy
R Leela Velusamy
Associate Professor National Institute of Technology Tiruchirappalli Tamil Nadu 620015
No verified email - Homepage
Title
Cited by
Cited by
Year
A cooperative routing for MANET based on distributed trust and energy management
U Venkanna, JK Agarwal, RL Velusamy
Wireless Personal Communications 81 (3), 961-979, 2015
482015
Multi-constraint QoS Unicast Routing Using Genetic Algorithm (MURUGA)
R Leela, S Selvakumar
Applied Soft Computing Journal 11, 1753-1761, 2011
462011
Identification of influential nodes from social networks based on Enhanced Degree Centrality Measure
A Srinivas, RL Velusamy
2015 IEEE international advance computing conference (IACC), 1179-1184, 2015
372015
Black hole attack and their counter measure based on trust management in manet: A survey
U Venkanna, RL Velusamy
3rd International Conference on Advances in Recent Technologies in …, 2011
332011
Prototype of home monitoring device using Internet of Things and river formation dynamics-based multi-hop routing protocol (RFDHM)
K Guravaiah, RL Velusamy
IEEE Transactions on Consumer Electronics 65 (3), 329-338, 2019
292019
Energy efficient clustering algorithm using RFD based multi-hop communication in wireless sensor networks
K Guravaiah, R Leela Velusamy
Wireless Personal Communications 95 (4), 3557-3584, 2017
252017
A review on distributed cluster based routing approaches in mobile wireless sensor networks
J Sumathi, RL Velusamy
Journal of Ambient Intelligence and Humanized Computing 12 (1), 835-849, 2021
212021
RFDMRP: River formation dynamics based multi-hop routing protocol for data collection in wireless sensor networks
K Guravaiah, RL Velusamy
Procedia Computer Science 54, 31-36, 2015
192015
TEA-CBRP: Distributed cluster head election in MANET by using AHP
U Venkanna, R Leela Velusamy
Peer-to-Peer Networking and Applications 9 (1), 159-170, 2016
182016
Vehicle monitoring using internet of things
K Guravaiah, RG Thivyavignesh, RL Velusamy
Proceedings of the 1st International Conference on Internet of Things and …, 2017
132017
BEACH: Balanced Energy and Adaptive Cluster Head Selection Algorithm for Wireless Sensor Networks.
K Guravaiah, RL Velusamy
Adhoc & Sensor Wireless Networks 42, 2018
122018
Authentication of Digital Documents Using Secret Key Biometric Watermarking
V Anita, RL Velusamy
International Journal of Communication Network Security 1 (4), 5-11, 2012
122012
A cluster-based routing strategy using gravitational search algorithm for wsn
A Kavitha, K Guravaiah, RL Velusamy
Journal of Computing Science and Engineering 14 (1), 26-39, 2020
92020
Optimized local route repair and congestion control in Mobile Ad hoc Network
P Ranjan, RL Velusamy
2015 International Conference on Computing and Communications Technologies …, 2015
92015
A statistical approach for detection of denial of service attacks in computer networks
NGB Amma, S Selvakumar, RL Velusamy
IEEE Transactions on Network and Service Management 17 (4), 2511-2522, 2020
82020
Kernel approach for similarity measure in latent fingerprint recognition
S Kumar, RL Velusamy
2016 International Conference on Emerging Trends in Electrical Electronics …, 2016
82016
Latent fingerprint preprocessing: Orientation field correction using region wise dictionary
S Kumar, RL Velusamy
2015 International Conference on Advances in Computing, Communications and …, 2015
82015
TextSpamDetector: textual content based deep learning framework for social spam detection using conjoint attention mechanism
E Elakkiya, S Selvakumar, R Leela Velusamy
Journal of Ambient Intelligence and Humanized Computing 12 (10), 9287-9302, 2021
72021
Entropy based mitigation of Distributed-Denial-of-Service (DDoS) attack on control plane in software-defined-network (SDN)
SK Yadav, P Suguna, RL Velusamy
2019 10th International Conference on Computing, Communication and …, 2019
72019
R-SALSA: A spam filtering technique for social networking sites
M Agrawal, RL Velusamy
2016 IEEE Students' Conference on Electrical, Electronics and Computer …, 2016
72016
The system can't perform the operation now. Try again later.
Articles 1–20