Follow
purusothaman T
purusothaman T
Professor and Head, Department of ECE, Government College of Technology,Coimbatore
Verified email at gct.ac.in - Homepage
Title
Cited by
Cited by
Year
A fast algorithm for mining high utility itemsets
S Shankar, N Babu, T Purusothaman, S Jayanthi
2009 IEEE International Advance Computing Conference, 1459-1464, 2009
692009
Performance analysis of clustering algorithms in brain tumor detection of MR images
PT Selvy, V Palanisamy, T Purusothaman
European Journal of Scientific Research 62 (3), 321-330, 2011
672011
Utility sentient frequent itemset mining and association rule mining: a literature survey and comparative study
S Shankar, T Purusothaman
International Journal of Soft Computing Applications 4 (1), 81-95, 2009
592009
Classification of substitution ciphers using neural networks
G Sivagurunathan, V Rajendran, T Purusothaman
IJCSNS International Journal of Computer Science and Network Security 10 (3 …, 2010
212010
Efficient star topology based multicast key management algorithm
K Saravanan, T Purusothaman
Journal of Computer Science 8 (6), 951, 2012
192012
Novel algorithm for mining high utility itemsets
S Shankar, T Purusothaman, S Jayanthi
2008 International Conference on Computing, Communication and Networking, 1-6, 2008
192008
Fault-tolerant adaptive mobile agent system using dynamic role based access control
P Marikkannu, JJA Jovin, T Purusothaman
International Journal of Computer Applications 20 (2), 1-6, 2011
182011
GLS with secure routing in ad-hoc networks
V Sumathy, P Narayanasmy, K Baskaran, T Purusothaman
TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region 3 …, 2003
172003
Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol.
SG Oliver, T Purusothaman
Computer Systems Science & Engineering 41 (2), 2022
162022
A new scalable and reliable cost effective key agreement protocol for secure group communication
SJ Begum, DT Purusothaman
Journal of Computer Science 7 (3), 328, 2011
162011
An efficient routing protocol design for distributed wireless sensor networks
P Manikandan, DT Purusothaman
International Journal of Computer Applications, 0975-8887, 2010
152010
IPSD: New coverage preserving and connectivity maintenance scheme for improving lifetime of wireless sensor networks
A Balamurugan, T Purusothaman
WSEAS Transactions on Communications 11 (1), 26-36, 2012
122012
Reduction of key search space of vigenere cipher using particle swarm optimization
G Sivagurunathan, T Purusothaman
Journal of computer science 7 (11), 1633, 2011
122011
Performance Evaluation of Exponential TCP/IP Congestion Control Algorithm
M Kalpana, T Purusothaman
IJCSNS 9 (3), 312, 2009
112009
Cryptanalysis of simple block ciphers using extensive heuristic attacks
G Selvi, T Purusothaman
European Journal of Scientific Research 78 (2), 198-221, 2012
102012
Fast multimodal biometric approach using dynamic fingerprint authentication and enhanced iris features
AJ Basha, V Palanisamy, T Purusothaman
2010 IEEE International Conference on Computational Intelligence and …, 2010
102010
An enhanced mobile agent security protocol
P Marikkannu, JJA Jovin, T Purusothaman
European Journal of Scientific Research 51 (3), 321-331, 2011
82011
Comparison of data centric routing protocols with random way point mobility model in mobile sensor networks
KE Kannammal, T Purusothaman
European Journal of Scientific Research 65 (4), 546-552, 2011
82011
A generic interface for resource aggregation in grid of grids
D Surendran, T Purusothaman, RA Balachandar
International Journal of Information Technology, Communications and …, 2011
82011
A secure simple authenticated key exchange algorithm based authentication for social network
P Venkateswari, T Purusothaman
Journal of Computer Science 7 (8), 1152, 2011
72011
The system can't perform the operation now. Try again later.
Articles 1–20