Autoregressive-based outlier algorithm to detect money laundering activities S Kannan, K Somasundaram Journal of Money Laundering Control 20 (2), 190-202, 2017 | 22 | 2017 |
A review of outlier prediction techniques in data mining S Kannan, K Somasundaram Research Journal of Applied Sciences, Engineering and Technology 10 (9 …, 2015 | 9 | 2015 |
Selection of optimal mining algorithm for outlier detection-an efficient method to predict/detect money laundering crime in finance industry S Kannan, K Somasundaram Elysium Journal of Engineering Research and Management 1 (1), 30-42, 2014 | 9 | 2014 |
Onion Integrated aggregate node Behavior Analysis with onion Based Protocol S Amutha 2020 6th International Conference on Advanced Computing and Communication …, 2020 | 3 | 2020 |
Improvising Vehicle Health using E-BMA MAC Protocol in Wireless Sensor Networks SRKK Somasundaram Middle-East Journal of Scientific Research, 45-49, 2015 | 3* | 2015 |
Reducing The Event Stoppage For Traffic Watching System Mistreatment Wireless Reversible Device Networks SR Kannan, KT Sikamani, K Somasundaram 2020 6th International Conference on Advanced Computing and Communication …, 2020 | 2 | 2020 |
Vehicle Health Monitoring System in Wireless Sensor Networks using E-BMA Protocols KS S. Rajes Kannan Jour of Adv Research in Dynamical & Control Systems 9 (No 2), 55 - 59, 2017 | 2 | 2017 |
AUTOMOBILES SCRUTIZING SYSTEM BY E-BIT MAP ASSIST PROTOCOL IN WIRELESS SENSOR NETWORK SRKK Somasundaram International Journal of Applied Engineering Research 10, 6899 - 6904, 2015 | 2 | 2015 |
Railway Wagon Health Monitoring System Using E-BMA Protocol in Wireless Sensor Networks S Rajes Kannan, S Amutha Artificial Intelligence Techniques for Advanced Computing Applications …, 2021 | 1 | 2021 |
Multipath & Multi Packet Secured knowledge Transmission Victimization Energy state observance & Dynamic SR Kannan, S Amutha 2020 6th International Conference on Advanced Computing and Communication …, 2020 | 1 | 2020 |
A novel multivariate classification model using triangular boundary based outlier detection (TBOD) algorithm to discover suspicious transaction activity S Kannan, K Somasundaram Asian Journal of Research in Social Sciences and Humanities 6 (6), 1809-1823, 2016 | 1 | 2016 |
Automobiles Scrutizing System By E-Bit Map Assist Protocol In Wireless Sensor Network S Shibila | | |