default search action
K. Duraiswamy
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j23]G. PadmaPriya, K. Duraiswamy:
Multi-document-based text summarisation through deep learning algorithm. Int. J. Bus. Intell. Data Min. 16(4): 459-479 (2020) - 2017
- [j22]E. Baby Anitha, K. Duraiswamy:
A dynamic thresholding technique in spatially co-located objects mining from vehicle moving data. Int. J. Bus. Intell. Data Min. 12(1): 62-77 (2017) - 2015
- [j21]N. S. Nithya, K. Duraiswamy:
Correlated gain ratio based fuzzy weighted association rule mining classifier for diagnosis health care data. J. Intell. Fuzzy Syst. 29(4): 1453-1464 (2015) - 2014
- [j20]R. Anitha, K. Duraiswamy:
Application of digital image processing in the determination of mass of the diamonds. Comput. Syst. Sci. Eng. 29(5) (2014) - [j19]E. Mohanraj, K. Duraiswamy, K. Prasanth:
Secure QoS-Based Routing using Hierarchical Key Ranking Model in MANET. J. Circuits Syst. Comput. 23(9) (2014) - [j18]G. PadmaPriya, K. Duraiswamy:
An Approach for Text Summarization using Deep Learning Algorithm. J. Comput. Sci. 10(1): 1-9 (2014) - 2013
- [j17]R. Anitha, K. Duraiswamy:
Application of digital image processing in the determination of mass of the diamonds. Comput. Syst. Sci. Eng. 28(5) (2013) - [j16]M. Tamilarasi, K. Duraiswamy:
Template matching algorithm for exudates detection from retinal fundus images. Int. J. Comput. Appl. Technol. 48(2): 136-143 (2013) - [j15]S. Madhavi, K. Duraiswamy:
Flooding Attack Aware Secure AODV. J. Comput. Sci. 9(1): 105-113 (2013) - [j14]C. Sathiyakumar, K. Duraiswamy:
A Hybrid Approach for Node Co-Operation based Clustering in Mobile Ad Hoc Networks. J. Comput. Sci. 9(2): 147-154 (2013) - [j13]R. Sadasivam, K. Duraiswamy:
Efficient Approach to Discover interval-based Sequential Patterns. J. Comput. Sci. 9(2): 225-234 (2013) - [j12]S. Periyasamy, K. Duraiswamy:
A proficient Traceback Approach using Provincial Locality Aspects to Eliminate Denial of Service Attacks. J. Comput. Sci. 9(2): 271-276 (2013) - [j11]G. Malathy, R. M. Somasundaram, K. Duraiswamy:
Performance Improvement in Cloud Computing using Resource Clustering. J. Comput. Sci. 9(6): 671-677 (2013) - 2012
- [j10]P. Manimaran, K. Duraiswamy:
Identifying Overlying Group of People through Clustering. Int. J. Inf. Technol. Web Eng. 7(4): 50-60 (2012) - 2011
- [j9]K. Duraiswamy, B. Jayanthi:
A New Approach to Discover Periodic Frequent Patterns. Comput. Inf. Sci. 4(2): 75-80 (2011) - [j8]P. S. Periasamy, S. Athinarayanan, K. Duraiswamy:
An Adaptive Thresholding-Based Color Reduction Algorithm and its Applications. Int. J. Image Graph. 11(1): 83-101 (2011) - 2010
- [j7]N. Shanthi, K. Duraiswamy:
A novel SVM-based handwritten Tamil character recognition system. Pattern Anal. Appl. 13(2): 173-180 (2010) - 2008
- [j6]K. Duraiswamy, N. Maheswari:
Identification of Sensitive Items in Privacy Preserving - Association Rule Mining. Comput. Inf. Sci. 1(2): 85-89 (2008) - [j5]K. Duraiswamy, V. Valli Mayil:
Similarity Matrix Based Session Clustering by Sequence Alignment Using Dynamic Programming. Comput. Inf. Sci. 1(3): 66-72 (2008) - [j4]K. Duraiswamy, D. Manjula, N. Maheswari:
A New Approach to Sensitive Rule Hiding. Comput. Inf. Sci. 1(3): 107-111 (2008) - [j3]C. Gomathi, M. Moorthi, K. Duraiswamy:
Web Access Pattern Algorithms in Education Domain. Comput. Inf. Sci. 1(4): 183-186 (2008) - [j2]K. Duraiswamy, N. Maheswari:
Sensitive Items in Privacy Preserving - Association Rule Mining. J. Inf. Knowl. Manag. 7(1): 31-35 (2008) - 2007
- [j1]S. Thangavel, V. Palanisamy, K. Duraiswamy, S. Chenthur Pandian:
A genetic-based hybrid intelligent controller for looper tension in steel rolling mills. Int. J. Model. Identif. Control. 2(3): 219-228 (2007)
Conference and Workshop Papers
- 2010
- [c6]R. Pugazendi, K. Duraiswamy:
Analysis and Prediction of Blocking Probability in a Banyan Based ATM Switch. ICT 2010: 463-468 - [c5]S. Madhavi, K. Duraiswamy, B. Kalaavathi, S. Vijayaragavan:
Survey of attacks on AODV and MAODV. ICWET 2010: 320-324 - 2009
- [c4]R. Pugazendi, K. Duraiswamy:
Mobile Agents - A Solution for Network Monitoring. ARTCom 2009: 579-584 - 2008
- [c3]P. S. Periasamy, K. Duraiswamy, S. Athinarayanan:
An Ordered Differences Statistic for Uniformly Distributed Impulse Noise Pixels Detection. ICETET 2008: 73-76 - [c2]T. Gnanasekaran, R. Raja Ganapathi, S. Uma Maheswari, K. Duraiswamy, A. P. Kapilan:
Unequal Error Protection Using Maximum A-Posteriori Probability (MAP) Algorithm, Soft Output Viterbi (SOVA) Algorithm and Modified SOVA. ICETET 2008: 1298-1301 - 2007
- [c1]M. Venkatesan, P. Meenakshi Devi, K. Duraiswamy, K. Thiagarajah:
A New Data Hiding Scheme with Quality Control for Binary Images Using Block Parity. IAS 2007: 468-471
Informal and Other Publications
- 2010
- [i9]R. Nallusamy, K. Duraiswamy, R. Dhanalakshmi, P. Parthiban:
Optimization of Multiple Vehicle Routing Problems using Approximation Algorithms. CoRR abs/1001.4197 (2010) - [i8]K. Prasanth, K. Duraiswamy, K. Jayasudha, C. Chandrasekar:
Efficient Packet Forwarding Approach in Vehicular Ad Hoc Networks Using EBGR Algorithm. CoRR abs/1002.1186 (2010) - [i7]A. Jagadeesan, K. Duraiswamy:
Secured Cryptographic Key Generation From Multimodal Biometrics Feature Level Fusion Of Fingerprint And Iris. CoRR abs/1002.2527 (2010) - [i6]A. Jagadeesan, K. Duraiswamy:
Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris. CoRR abs/1003.1458 (2010) - [i5]M. S. Danessh, C. Balasubramanian, K. Duraiswamy:
Similarity Data Item Set Approach: An Encoded Temporal Data Base Technique. CoRR abs/1003.4076 (2010) - [i4]K. Prasanth, K. Duraiswamy, K. Jayasudha, C. Chandrasekar:
Improved Packet Forwarding Approach in Vehicular Ad Hoc Networks Using RDGR Algorithm. CoRR abs/1003.5437 (2010) - 2009
- [i3]C. Balasubramanian, K. Duraiswamy:
An Application of Bayesian classification to Interval Encoded Temporal mining with prioritized items. CoRR abs/0908.0984 (2009) - [i2]P. Meenakshi Devi, M. Venkatesan, K. Duraiswamy:
Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform. CoRR abs/0912.0607 (2009) - [i1]A. Sabari, K. Duraiswamy:
Ant Based Adaptive Multicast Routing Protocol (AAMRP) for Mobile Ad Hoc Networks. CoRR abs/0912.0984 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint