Follow
mala chelliah
Title
Cited by
Cited by
Year
Comparative study of image forgery and copy-move techniques
M Sridevi, C Mala, S Sanyam
Advances in Computer Science, Engineering & Applications: Proceedings of the …, 2012
562012
Multilevel threshold selection for image segmentation using soft computing techniques
C Mala, M Sridevi
Soft Computing 20, 1793-1810, 2016
422016
Copy–move image forgery detection in a parallel environment
M Sridevi, C Mala, S Sandeep, N Meghanathan
Proceedings of Im age and Signal Processing, Cisp 9, 2012
372012
A survey on monochrome image segmentation methods
M Sridevi, C Mala
Procedia Technology 6, 548-555, 2012
372012
An experimental study and analysis of different image segmentation techniques
SU Mageswari, M Sridevi, C Mala
Procedia engineering 64, 36-45, 2013
312013
Analysis of ECC for application specific WSN security
B Nair, C Mala
2015 IEEE International Conference on Computational Intelligence and …, 2015
192015
A novel deep learning model for detection of denial of service attacks in HTTP traffic over internet
V Punitha, C Mala, N Rajagopalan
International Journal of Ad Hoc and Ubiquitous Computing 33 (4), 240-256, 2020
172020
Modified power save model for better energy efficiency and reduced packet latency
N Rajagopalan, C Mala
American Journal of Engineering and Applied Sciences 5 (3), 237-242, 2012
152012
A collaborative framework for traffic information in vehicular adhoc network applications
S Manipriya, C Mala, S Mathew
Journal of Internet Services and Information Security (JISIS) 10 (3), 93-109, 2020
132020
Traffic classification for efficient load balancing in server cluster using deep learning technique
V Punitha, C Mala
The Journal of Supercomputing 77 (8), 8038-8062, 2021
122021
Significance of Real-Time Systems in Intelligent Transportation Systems
M Sankaranarayanan, C Mala, S Mathew
Handling priority inversion in time-constrained distributed databases, 61-85, 2020
122020
Genetic algorithm based efficient RSU distribution to estimate travel time for vehicular users
M Sankaranarayanan, C Mala, S Mathew
2015 Second International Conference on Soft Computing and Machine …, 2015
122015
Performance analysis of spatial color information for object detection using background subtraction
S Manipriya, C Mala, S Mathew
IERI Procedia 10, 63-69, 2014
122014
Simulation and performance analysis of various IEEE 802.11 backoff algorithms
B Nithya, C Mala, V KumarB
Procedia Technology 6, 840-847, 2012
122012
Self-organizing neural networks for image segmentation based on multiphase active contour
M Sridevi, C Mala
Neural Computing and Applications 31, 865-876, 2019
112019
A novel cross layer approach to enhance QoS performance in multihop adhoc networks
B Nithya, C Mala, E Sivasankar
2014 17th International Conference on Network-Based Information Systems, 229-236, 2014
102014
A novel genetic algorithm approach to mobility prediction in wireless networks
C Mala, M Loganathan, NP Gopalan, B Sivaselvan
Contemporary Computing: Second International Conference, IC3 2009, Noida …, 2009
102009
A non-collaborative approach for modeling ontologies for a generic IoT lab architecture
S Umaa Mageswari, C Mala, A Santhanavijayan, G Deepak
Journal of Information and Optimization Sciences 41 (2), 395-402, 2020
92020
A study of dimensionality reduction techniques with machine learning methods for credit risk prediction
E Sivasankar, C Selvi, C Mala
Computational Intelligence in Data Mining: Proceedings of the International …, 2017
82017
Improved Group Key Agreement for Emergency Cognitive Radio Mobile Ad hoc Networks.
N Renugadevi, C Mala
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (3), 73-86, 2015
82015
The system can't perform the operation now. Try again later.
Articles 1–20