default search action
K. Geetha
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]K. Geetha, Malaya Kumar Hota:
Seismic Random Noise Suppression Using Optimal ANFIS as an Adaptive Self-Tuning Filter and Wavelet Thresholding. IEEE Access 12: 39578-39588 (2024) - [j28]K. Geetha, Malaya Kumar Hota:
Corrections to "Seismic Random Noise Suppression Using Optimal ANFIS as an Adaptive Self-Tuning Filter and Wavelet Thresholding". IEEE Access 12: 150229 (2024) - [j27]P. Sathishkumar, C. Rajan, K. Geetha:
A constructive Steiner graph matching for Radio frequency identification device tag detection in wireless and internet of things environment. Int. J. Commun. Syst. 37(11) (2024) - [j26]M. J. Jeyasheela Rakkini, K. Geetha:
Q-Learning model for selfish miners with optional stopping theorem for honest miners. Int. Trans. Oper. Res. 31(6): 3975-3998 (2024) - 2023
- [j25]S. Pradeepa, K. Geetha, K. Kannan, K. R. Manjula:
DEODORANT: a novel approach for early detection and prevention of polycystic ovary syndrome using association rule in hypergraph with the dominating set property. J. Ambient Intell. Humaniz. Comput. 14(5): 5421-5437 (2023) - [j24]M. J. Jeyasheela Rakkini, K. Geetha:
Deep learning classification of bitcoin miners and exploration of upper confidence bound algorithm with less regret for the selection of honest mining. J. Ambient Intell. Humaniz. Comput. 14(6): 6545-6561 (2023) - [j23]A. Srilakshmi, K. Geetha:
An improved generative network model for tackling mode collapse in medical leaf image generation. J. Intell. Fuzzy Syst. 45(2): 2223-2233 (2023) - [j22]A. Srilakshmi, K. Geetha:
A novel framework for soybean leaves disease detection using DIM-U-net and LSTM. Multim. Tools Appl. 82(18): 28323-28343 (2023) - 2022
- [j21]K. Geetha, N. Anitha, Samad Noeiaghdam, Unai Fernandez-Gamiz, Shyam Sundar Santra, Khaled Mohamed Khedher:
Generalization of (Q, L)-Fuzzy Soft Subhemirings of a Hemiring. Adv. Fuzzy Syst. 2022: 6102211:1-6102211:12 (2022) - [j20]Gurram Sunitha, K. Geetha, S. Neelakandan, Aditya Kumar Singh Pundir, S. Hemalatha, Vinay Kumar:
Intelligent deep learning based ethnicity recognition and classification using facial images. Image Vis. Comput. 121: 104404 (2022) - [j19]N. Sasikaladevi, K. Geetha, A. Revathi:
EMOTE - Multilayered encryption system for protecting medical images based on binary curve. J. King Saud Univ. Comput. Inf. Sci. 34(3): 676-686 (2022) - 2021
- [j18]M. Karpagam, K. Geetha, C. Rajan:
A reactive search optimization algorithm for scientific workflow scheduling using clustering techniques. J. Ambient Intell. Humaniz. Comput. 12(2): 3199-3207 (2021) - [j17]M. Sujatha, K. Geetha, P. Balakrishnan:
User-centric framework to facilitate trust worthy cloud service provider selection based on fuzzy inference system. J. Intell. Fuzzy Syst. 41(5): 5629-5637 (2021) - [j16]T. Renugadevi, K. Geetha:
Task aware optimized energy cost and carbon emission-based virtual machine placement in sustainable data centers. J. Intell. Fuzzy Syst. 41(5): 5677-5689 (2021) - [j15]A. Revathi, N. Sasikaladevi, K. Geetha:
Forensic investigation for twin identification from speech: perceptual and gamma-tone features and models. Multim. Tools Appl. 80(12): 18301-18315 (2021) - [c4]N. Saranya, K. Geetha, C. Rajan:
An Optimized Data Replication Algorithm in Mobile Edge Computing Systems to Reduce Latency in Internet of Things. HIS 2021: 76-87 - 2020
- [j14]M. Sujatha, K. Geetha, P. Balakrishnan, T. Renugadevi:
OUTFIT - An optimal data storage hosting model using Sugeno-type fuzzy inference system for multi-cloud environments. J. Intell. Fuzzy Syst. 38(5): 6595-6605 (2020) - [j13]N. Sasikaladevi, K. Geetha, A. Revathi:
RIGID- reversible lightweight, high payload semantically secured e-record hiding technique for smart city applications using pseudo-random matrices. Multim. Tools Appl. 79(17-18): 12289-12306 (2020) - [j12]N. Saranya, K. Geetha, C. Rajan:
Data Replication in Mobile Edge Computing Systems to Reduce Latency in Internet of Things. Wirel. Pers. Commun. 112(4): 2643-2662 (2020)
2010 – 2019
- 2019
- [j11]K. Sakthimurugan, K. Geetha:
Designing low power magentic flip flop in 45 nm FDSOI technology for large scale cluster based engineering application. Clust. Comput. 22(Supplement): 6907-6912 (2019) - [j10]T. Kavitha, K. Geetha, Rajappa Muthaiah:
India: Intruder Node Detection and Isolation Action in Mobile Ad Hoc Networks Using Feature Optimization and Classification Approach. J. Medical Syst. 43(6): 179:1-179:7 (2019) - [j9]T. Kavitha, K. Geetha, Rajappa Muthaiah:
Correction to: India: Intruder Node Detection and Isolation Action in Mobile Ad Hoc Networks Using Feature Optimization and Classification Approach. J. Medical Syst. 43(7): 199:1 (2019) - [j8]N. Sasikaladevi, K. Geetha, K. Sriharshini, M. Durga Aruna:
RADIANT - hybrid multilayered chaotic image encryption system for color images. Multim. Tools Appl. 78(9): 11675-11700 (2019) - [j7]N. Sasikaladevi, K. Geetha, A. Revathi, N. Mahalakshmi, N. Archana:
SCAN-speech biometric template protection based on genus-2 hyper elliptic curve. Multim. Tools Appl. 78(13): 18339-18361 (2019) - [j6]N. Sasikaladevi, K. Geetha, N. Mahalakshmi, N. Archana:
SNAP-compressive lossless sensitive image authentication and protection scheme based on Genus-2 hyper elliptic curve. Multim. Tools Appl. 78(18): 26163-26179 (2019) - [j5]K. Geetha, Arputharaj Kannan:
An Efficient Information System for Providing Location Based Services in Network Environments. Wirel. Pers. Commun. 109(4): 2377-2398 (2019) - 2018
- [j4]K. Geetha, R. Vadivel:
Syllable Segmentation of Tamil Speech Signals Using Vowel Onset Point and Spectral Transition Measure. Autom. Control. Comput. Sci. 52(1): 25-31 (2018) - [j3]K. Geetha, Arputharaj Kannan:
Efficient spatial query processing for KNN queries using well organised net-grid partition indexing approach. Int. J. Data Min. Model. Manag. 10(4): 331-352 (2018) - [j2]N. Sasikaladevi, K. Geetha, K. N. Venkata Srinivas:
A multi-tier security system (SAIL) for protecting audio signals from malicious exploits. Int. J. Speech Technol. 21(2): 319-332 (2018) - [c3]K. Geetha, N. Sasikaladevi, G. T. Dhayaleni:
Effective Traffic Management to Avoid Traffic Congestion Using Recursive Re-routing Algorithm. ICACDS (2) 2018: 288-297 - 2017
- [j1]Satyanarayana Vollala, V. V. Varadhan, K. Geetha, N. Ramasubramanian:
Design of RSA processor for concurrent cryptographic transformations. Microelectron. J. 63: 112-122 (2017)
2000 – 2009
- 2009
- [c2]K. Geetha, N. A. Gounden, S. Monikandan:
SEMALRU: An Implementation of Modified Web Cache Replacement Algorithm. NaBIC 2009: 1406-1410 - 2006
- [c1]M. Karnan, K. Thangavel, K. Thanushkodi, K. Geetha:
Partial Swarm Optimization for Segmentation of Microcalcifications in Mammograms. IMECS 2006: 115-120
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint