Back close
Publications
Efficient data transmission using trusted third party in smart home environments

Authors : Niharika Panda, Supriya, M.

Publisher : Springer

Publications
Blackhole Attack Prediction in Wireless Sensor Networks using Support Vector Machine

Authors : Niharika Panda, Supriya, M.

Publisher : Springer

Publications
Blackhole Attack Impact Analysis on Low Power Lossy Networks

Authors : Niharika Panda, Supriya, M.

Publisher : IEEE

Publications
Hybrid Algorithm for Clustering Gene Expression Data

Authors : Susmi, S. J., Nehemiah, H. K., Kannan, A., Saranya, G.

Publications
Applying Game Theory to Restructure PL/SQL Code

Authors : Vimala, S., Nehemiah, H. K., Bhuvaneswaran, R. S., Saranya, G., Kannan, A.

Publications
Model Level Code Smell Detection Using EGAPSO Based on Similarity Measures

Authors : Saranya, G, Khanna Nehemiah, H, Kannan, A

Publications
Prioritizing Code Smell Correction Task Using SPEA Algorithm

Authors : Saranya, G, Khanna Nehemiah, H, Kannan, A

Publications
Hybrid Particle Swarm Optimization with Mutation for Code Smell Detection

Authors : Saranya, G, Khanna Nehemiah, H, Kannan, A,

Admissions Apply Now