Follow
mala chelliah
Title
Cited by
Cited by
Year
Comparative study of image forgery and copy-move techniques
M Sridevi, C Mala, S Sanyam
Advances in Computer Science, Engineering & Applications, 715-723, 2012
512012
Multilevel threshold selection for image segmentation using soft computing techniques
C Mala, M Sridevi
Soft Computing 20 (5), 1793-1810, 2016
402016
Copy–move image forgery detection in a parallel environment
M Sridevi, C Mala, S Sandeep
Computer Science & Information Technology, CS&IT, 19-29, 2012
362012
A survey on monochrome image segmentation methods
M Sridevi, C Mala
Procedia Technology 6, 548-555, 2012
302012
An experimental study and analysis of different image segmentation techniques
SU Mageswari, M Sridevi, C Mala
Procedia engineering 64, 36-45, 2013
282013
Modified power save model for better energy efficiency and reduced packet latency
N Rajagopalan, C Mala
American Journal of Engineering and Applied Sciences 5 (3), 237-242, 2012
152012
Analysis of ECC for application specific WSN security
B Nair, C Mala
2015 IEEE International Conference on Computational Intelligence and …, 2015
132015
Simulation and performance analysis of various IEEE 802.11 backoff algorithms
B Nithya, C Mala, V KumarB
Procedia Technology 6, 840-847, 2012
122012
Genetic algorithm based efficient RSU distribution to estimate travel time for vehicular users
M Sankaranarayanan, C Mala, S Mathew
2015 Second International Conference on Soft Computing and Machine …, 2015
102015
Self-organizing neural networks for image segmentation based on multiphase active contour
M Sridevi, C Mala
Neural Computing and Applications 31 (2), 865-876, 2019
92019
A novel cross layer approach to enhance QoS performance in multihop adhoc networks
B Nithya, C Mala, E Sivasankar
2014 17th International Conference on Network-Based Information Systems, 229-236, 2014
92014
Performance analysis of spatial color information for object detection using background subtraction
S Manipriya, C Mala, S Mathew
IERI Procedia 10, 63-69, 2014
92014
A novel genetic algorithm approach to mobility prediction in wireless networks
C Mala, M Loganathan, NP Gopalan, B Sivaselvan
International Conference on Contemporary Computing, 49-57, 2009
92009
A novel deep learning model for detection of denial of service attacks in HTTP traffic over internet
V Punitha, C Mala, N Rajagopalan
International Journal of Ad Hoc and Ubiquitous Computing 33 (4), 240-256, 2020
82020
Significance of Real-Time Systems in Intelligent Transportation Systems
M Sankaranarayanan, C Mala, S Mathew
Handling priority inversion in time-constrained distributed databases, 61-85, 2020
82020
Improved Group Key Agreement for Emergency Cognitive Radio Mobile Ad hoc Networks.
N Renugadevi, C Mala
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (3), 73-86, 2015
82015
Ternary Tree Based Group Key Agreement for Cognitive Radio MANETs.
N Renugadevi, C Mala
International Journal of Computer Network & Information Security 6 (10), 2014
82014
Construction of an optimal multicast tree for group communication in a cellular network using genetic algorithm
C Mala, S Selvakumar
Computer communications 29 (16), 3306-3312, 2006
82006
A collaborative framework for traffic information in vehicular adhoc network applications
S Manipriya, C Mala, S Mathew
Journal of Internet Services and Information Security (JISIS) 10 (3), 93-109, 2020
72020
Congestion rate estimation for VANET infrastructure using fuzzy logic
M Sankaranarayanan, C Mala, S Mathew
Proceedings of the 2017 International Conference on Intelligent Systems …, 2017
62017
The system can't perform the operation now. Try again later.
Articles 1–20