Citation : J.Jeyalakshmi,L.Priya,S.Sreesubha,” Effective prevention of reverse engineering attacks on softwa ...
Citation : N. Kanagavalli, S. Baghavathi Priya, S. Ilavarasan, “Identification of Deception Detection on Soci ...
Citation : P.Manjula, Dr.S. Bagavathi priya,”Certificateless Effective Key Management Protocol (CL-EKM) Authe ...
Citation : G.Anitha, S. Baghavathi Priya, “Surveillance Camera Based Fall Detection System Using Long Short T ...
Citation : G.S. Ganesh, Yazhini Samyukkktha Ramanikaran, M.Sindhuja, G. Rajesh Kannan, J. Jeyalakshmi, “Big d ...
Citation : Poonkuzhali S, Deepika N, Sindhuja M, Jeyalakshmi J and Sreeshuba S, “ Intelligent Data Analytics ...
Citation : Jeyalakshmi J, Poonkuzhali S, Sree Subha S and Mohana E, ”Streaming Classification Hoeffding Tree ...
Publisher :IJPAM
Citation : Sujata Roy, Jeyalakshmi Jeyabalan, Saikat Gochhait, Poonkuzhali Sugumaran, M. Michael Gromiha, “Me ...
Publisher :IIETA
Citation : Nedungadi, P., Salethoor, S. N., Puthiyedath, R., Nair, V. K., Kessler, C., & Raman, R., "Ayurveda r ...
Citation : S.Poonkuzhali, J.Jeyalakshmi,“Study of Diabetes Mellitus Patients for Thyroid related co-morbiditi ...
Publisher :WILEY
Citation : S.Poonkuzhali, J.Jeyalakshmi, “Prescriptive Analytics of Constraint Optimisation of Diabetes Diet ...
Publisher :SCIBULCOM LTD
Citation : S.Poonkuzhali , M.Shobana, J.Jeyalakshmi, ”A Deep Transfer Learning Approach For Iot/Iiot Cyber A ...