Year : 2021
Fusion of mel and gammatone frequency cepstral coefficients for speech emotion recognition using deep C-RNN
Cite this Research Publication : Kumaran U., S. Rammohan, R., Nagarajan, S. Murugan, and Prathik, A., “Fusion of mel and gammatone frequency cepstral coefficients for speech emotion recognition using deep C-RNN”, International Journal of Speech Technology, vol. 24, no. 2, pp. 303 - 314, 2021.
Publisher : International Journal of Speech Technology
Year : 2018
A Secure and Privacy Preserving Approach to Protect User Data Across Cloud Based Online Social Networks
Cite this Research Publication :
Kumaran U. and Neelu Khare, “A Secure and Privacy Preserving Approach to Protect User Data Across Cloud Based Online Social Networks”, International Journal of Grid and High Performance Computing, ESCI journal (Accepted), 2018.
Publisher : International Journal of Grid and High Performance Computing, ESCI journal (Accepted) .
Year : 2018
PPHE – Automatic Detection of Sensitive Attribute in Privacy Preserved Hadoop Environment using Data Mining Techniques
Cite this Research Publication :
Kumaran U. and Neelu Khare, “PPHE – Automatic Detection of Sensitive Attribute in Privacy Preserved Hadoop Environment using Data Mining Techniques”, International Journal of Computer Aided Engineering and Technology, (Accepted), 2018.
Publisher : International Journal of Computer Aided Engineering and Technology, (Accepted)
Year : 2018
An Efficient and Secure Content Contribution and Retrieval Content in Online Social Networks Using Level by Level Security Optimization & Content Visualization Algorithm
Cite this Research Publication :
Kumaran U. and Neelu Khare, “An Efficient and Secure Content Contribution and Retrieval Content in Online Social Networks Using Level by Level Security Optimization & Content Visualization Algorithm”, Indonesian Journal of Electrical Engineering and Computer Science, vol. 10, no. 2, pp. 807-816, 2018.
Publisher : Indonesian Journal of Electrical Engineering and Computer Science .
Year : 2018
An Efficient and Secure Content Contribution and Retrieval Content in Online Social Networks Using Level by Level Security Optimization & Content Visualization Algorithm
Cite this Research Publication :
Kumaran U. and Neelu Khare, “An Efficient and Secure Content Contribution and Retrieval Content in Online Social Networks Using Level by Level Security Optimization & Content Visualization Algorithm”, Indonesian Journal of Electrical Engineering and Computer Science, vol. 10, no. 2, pp. 807-816, 2018.
Publisher : Indonesian Journal of Electrical Engineering and Computer Science,
Year : 2017
Scheming of flexible group sourcing in medication using big data analytics
Cite this Research Publication :
D. .K.Uma and Kumaran U., “Scheming of flexible group sourcing in medication using big data analytics”, Journal of Advanced Research in Dynamical and Control Systems, pp. 1477-1484, 2017.
Publisher : Journal of Advanced Research in Dynamical and Control Systems.
Year : 2017
Comparison Analysis of Brain tumor segmentation techniques
Cite this Research Publication :
K. .suhasini, .K.Uma, D., and Kumaran U., “Comparison Analysis of Brain tumor segmentation techniques”, Journal of Advanced Research in Dynamical and Control Systems, pp. 1068-1077, 2017.
Publisher : Journal of Advanced Research in Dynamical and Control Systems
Year : 2017
Feature Selection for Privacy Preserving in Data Mining with Linear Regression Using Genetic Algorithm
Cite this Research Publication :
Kumaran U. and Neelu Khare, “Feature Selection for Privacy Preserving in Data Mining with Linear Regression Using Genetic Algorithm”, Journal of Advanced Research in Dynamical and Control Systems, vol. 9, no. 02, pp. 1059-1067, 2017.
Publisher : Journal of Advanced Research in Dynamical and Control Systems
Year : 2017
A Credential Data Privacy Preserving in Web Environment Using Secure Data Contribution Retrieval Algorithm
Cite this Research Publication :
Kumaran U. and Neelu Khare, “A Credential Data Privacy Preserving in Web Environment Using Secure Data Contribution Retrieval Algorithm”, International Journal of Intelligent Engineering and Systems, vol. 10, no. 3, pp. 363-370, 2017.
Publisher : International Journal of Intelligent Engineering and Systems
Year : 2016
privacy preserving in Datamining Technical
Cite this Research Publication : Kumaran U., Neelu Khare, and A Suraj, S., “privacy preserving in Datamining Technical”, Research journal of pharmacy and technology, vol. 9, no. 11, 2016.
Publisher : Research journal of pharmacy and technology
Year : 2016
A Review on Privacy Preserving Data Mining using Secure Multiparty Computation
Cite this Research Publication :
Kumaran U. and Neelu Khare, “A Review on Privacy Preserving Data Mining using Secure Multiparty Computation”, Indian Journal of Science and Technology, vol. 9, no. 48, 2016.
Publisher : Indian Journal of Science and Technology
Year : 2016
Privacy Preserving in Data Mining Technical: A Review
Cite this Research Publication :
Kumaran U., Neelu Khare, and Sai Suraj A., “Privacy Preserving in Data Mining Technical: A Review”, Research Journal of Pharmacy and Technology, vol. 9, no. 11, pp. 2023-2026 , 2016.
Publisher : Research Journal of Pharmacy and Technology
Year : 2016
Knowledge Acquisition and Privacy Preserving in Cloud using Simultaneous Diagonalization Algorithm
Cite this Research Publication :
Neelu Khare, Kumaran U., and M. Mohan Vamsi, “Knowledge Acquisition and Privacy Preserving in Cloud using Simultaneous Diagonalization Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 6, no. 9, 2016.
Publisher : International Journal of Advanced Research in Computer Science and Software Engineering
Year : 2016
An Empirical Study of Security in Text Mining
Cite this Research Publication :
Kumaran U. and Neelu Khare, “An Empirical Study of Security in Text Mining”, International Journal of Control Theory and Applications, vol. 9, no. 6, pp. 2737-2743, 2016.
Publisher : International Journal of Control Theory and Applications
Year : 2014
An Optimal Approach for Mining Rare Causal Associations to Detect ADR Signal Pairs
Cite this Research Publication :
Vikash Kumar Saw and Kumaran U., “An Optimal Approach for Mining Rare Causal Associations to Detect ADR Signal Pairs”, International Journal of Scientific and Research Publications, vol. 4, no. 5, 2014.
Publisher : International Journal of Scientific and Research Publications
Year : 2008
Semantic Ideation Learning for Agent-Based E-Brainstorming
Cite this Research Publication :
S. - T. Yuan, Chen, Y. - C., and Kumaran U., “Semantic Ideation Learning for Agent-Based E-Brainstorming”, IEEE Transactions on Knowledge and Data Engineering, vol. 20, pp. 261-275, 2008.
Publisher : IEEE Transactions on Knowledge and Data Engineering, IEEE