default search action
Madhuviswanatham Vankadara
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Novy Jacob
, V. Madhu Viswanatham
:
Sentiment Analysis Using Improved Atom Search Optimizer With a Simulated Annealing and ReLU Based Gated Recurrent Unit. IEEE Access 12: 38944-38956 (2024) - [j15]P. Vasanthi
, V. Madhu Viswanatham
:
Federated Learning for Multimodal Sentiment Analysis: Advancing Global Models With an Enhanced LinkNet Architecture. IEEE Access 12: 175218-175239 (2024) - [j14]P. Vasanthi, Madhu Viswanatham V.:
Sentiment analysis of multi social media using machine and deep learning models: a review. Multim. Tools Appl. 83(42): 90033-90051 (2024) - [j13]G. Jagadeesh, M. Pounambal, K. ArivuSelvan, E. Sathiyamoorthy, J. Vellingiri, V. Madhu Viswanatham, Celestine Iwendi:
Federated recurrent-based adaptive battle royale algorithm for privacy-preserving data aggregation in industrial IoT: a signal, image, and video processing perspective. Signal Image Video Process. 18(5): 4395-4406 (2024) - 2022
- [j12]Jyothimon Chandran, V. Madhu Viswanatham
:
Dynamic node influence tracking based influence maximization on dynamic social networks. Microprocess. Microsystems 95: 104689 (2022) - [i2]Jyothimon Chandran, Madhuviswanatham Vankadara:
An effective and efficient label initialization method based on similarity for community detection in networks. CoRR abs/2201.06089 (2022) - 2021
- [j11]Jyothimon Chandran
, Madhu Viswanatham V.:
A Novel Triangle Count-Based Influence Maximization Method on Social Networks. Int. J. Knowl. Syst. Sci. 12(4): 92-108 (2021) - [j10]Parameswar Kanuparthi, Vaibhav Bejgam, V. Madhu Viswanatham:
A Novel Approach of Ensembling the Transfer Learning Methods for Rice Plant Disease Detection and Classification. Webology 18(2): 439-448 (2021) - [i1]Rajat Gupta, Madhu Viswanatham V., Manikandan K:
An Innovative Security Strategy using Reactive Web Application Honeypot. CoRR abs/2105.04773 (2021) - 2020
- [j9]Srinivas Koppu, V. Madhu Viswanatham:
An efficient image system-based grey wolf optimiser method for multimedia image security using reduced entropy-based 3D chaotic map. Int. J. Comput. Aided Eng. Technol. 13(3): 291-305 (2020) - [j8]Farooq Sunar Mahammad
, V. Madhu Viswanatham
:
Performance analysis of data compression algorithms for heterogeneous architecture through parallel approach. J. Supercomput. 76(4): 2275-2288 (2020)
2010 – 2019
- 2019
- [j7]Aditya Duneja, Thendral Puyalnithi, Madhu Viswanatham Vankadara
, Naveen K. Chilamkurti
:
Analysis of inter-concept dependencies in disease diagnostic cognitive maps using recurrent neural network and genetic algorithms in time series clinical data for targeted treatment. J. Ambient Intell. Humaniz. Comput. 10(10): 3915-3923 (2019) - 2018
- [j6]Srinivas Koppu, V. Madhu Viswanatham
:
Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm. Evol. Intell. 11(1-2): 53-71 (2018) - [j5]Thendral Puyalnithi, Madhuviswanatham Vankadara
:
A Unified Feature Selection Model for High Dimensional Clinical Data Using Mutated Binary Particle Swarm Optimization and Genetic Algorithm. Int. J. Heal. Inf. Syst. Informatics 13(4): 1-14 (2018) - [c2]Vankadara Saritha, P. Venkata Krishna
, I. Alagiri, V. Madhu Viswanatham
, Mohammad S. Obaidat:
Efficient Multipath Routing Protocol with Quality of Service for Mobile Ad Hoc Networks. ICC 2018: 1-6 - 2017
- [j4]Sanjiban Sekhar Roy, V. Madhu Viswanatham, P. Venkata Krishna:
An ensemble design approach based on bagging technique for filtering e-mail spam. Int. J. Auton. Adapt. Commun. Syst. 10(3): 247-260 (2017) - [j3]Sudha Senthilkumar, V. Madhu Viswanatham:
HB-PPAC: hierarchy-based privacy preserving access control technique in public cloud. Int. J. High Perform. Comput. Netw. 10(1/2): 13-22 (2017) - 2014
- [j2]Vankadara Saritha, V. Madhu Viswanatham
:
Approach for channel reservation and allocation to improve quality of service in vehicular communications. IET Networks 3(2): 150-159 (2014) - [j1]Vankadara Saritha, V. Madhu Viswanatham
:
An efficient cross layer based channel reservation method for vehicular networks. Int. J. Commun. Syst. 27(12): 4249-4264 (2014) - 2013
- [c1]Sanjiban Sekhar Roy, V. Madhu Viswanatham, P. Venkata Krishna
, N. Saraf, Anant Gupta, Rajesh Mishra:
Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System. QSHINE 2013: 479-484
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint