Energy aware swarm optimization with intercluster search for wireless sensor network S Thilagavathi, B Gnanasambandan Geetha The Scientific World Journal 2015 (1), 395256, 2015 | 39 | 2015 |
Asymmetric Key Blum-Goldwasser Cryptography for Cloud Services Communication Security R Senthilkumar, BG Geetha Journal of Internet Technology 21 (4), 929-939, 2020 | 25 | 2020 |
An efficient city energy management system with secure routing communication using WSN M Kavitha, BG Geetha Cluster Computing 22, 13131-13142, 2019 | 23 | 2019 |
Reducing efforts on software project management using software package reusability R Kamalraj, BG Geetha, G Singaravel 2009 IEEE International Advance Computing Conference, 1624-1627, 2009 | 16 | 2009 |
An e-learning system based on secure data storage services in cloud computing R Gopinath, BG Geetha International Journal of Information Technology and Web Engineering (IJITWE …, 2013 | 14 | 2013 |
MICROWAVE ASSISTED SYNTHESIS, QSAR AND MOLECULAR DOCKING STUDIES OF 2, 4-THIAZOLIDINEDIONE DERIVATIVES. B Geetha, G Swarnalatha, GV Reddy Rasayan Journal of Chemistry 12 (3), 2019 | 11 | 2019 |
Avoiding fuel theft in multifleet vehicles using vehicular adhoc network P Senthilraja, BG Geetha Cluster Computing 22 (Suppl 5), 11175-11181, 2019 | 8 | 2019 |
Improved video streaming using MSVC and nonoverlapping zone routing multipath propagation over MANET s SM Badhusha, BG Geetha, P Prabhu, R Vasanthi International Journal of Communication Systems 31 (10), e3578, 2018 | 8 | 2018 |
Detection of fuel theft in heavy vehicle PS Raja, BG Geetha, S Raja International Journal of Advanced Engineering Technology E-ISSN, 0976-3945, 2016 | 8 | 2016 |
Automatic test data generation using genetic algorithm and program dependence graph MR Rajkumari, BG Geetha Journal of Computer Applications 3 (4), 1-6, 2010 | 7 | 2010 |
A tool for testing of inheritance related bugs in object oriented software BG Geetha, V Palanisamy, K Duraiswamy, G Singaravel J. Comput. Sci 4, 59-65, 2008 | 7 | 2008 |
Software engineering C Subramanian, S Dutt, C Seetharaman, BG Geetha Pearson Education India, 2015 | 6 | 2015 |
Adaptive discriminating detection for DDoS attacks from flash crowds using flow correlation coefficient with collective feedback NV Poorrnima, K ChandraPrabha, BG Geetha Proceedings of international conference on global innovations in computing …, 2014 | 6 | 2014 |
Raspberry pi based RFID smart card refuelling system KN Chandana, MV Chirag, PKK Burugupalli, AK SV, J Akarsh Perspectives in Communication, Embedded-systems and Signal-processing-PiCES …, 2018 | 5 | 2018 |
High Utility Itemset Mining With Influential Cross Selling Items From Transactional Database V Kavitha, BG Geetha Int J AdvEngg Tech/Vol. VII/Issue II/April-June 820, 826, 2016 | 5 | 2016 |
Signature verification and bloom hashing technique for efficient cloud data storage R Senthil Kumar, BG Geetha Wireless Personal Communications 103 (4), 3079-3097, 2018 | 4 | 2018 |
Review on high utility itemset mining algorithms V Kavitha, BG Geetha 2016 World Conference on Futuristic Trends in Research and Innovation for …, 2016 | 4 | 2016 |
An Advanced Deep Learning Approach for Primary Osteoporosis Prediction Using Radiographs with Clinical Covariates R Umamaheswari, D Lakshmi, VS Pandi, B Geetha, S Sumithra, ... 2023 7th International Conference on Electronics, Communication and …, 2023 | 3 | 2023 |
Wireless network confidence level improvement via fusion adaptive resonance theory K Chandraprabha, BG Geetha Cluster Computing 22 (Suppl 5), 12251-12261, 2019 | 3 | 2019 |
Self-Adaptive Approaches to Probability Distribution of Data Analytics in Cloud Computing Resource Services for Infrastructure Hybrids Models S Prabhu, N Sengottaiyan, BG Geetha Appl. Math 13 (S1), 437-446, 2019 | 3 | 2019 |