Back close
A Normalized Rank Based A* Algorithm for Region Based Path Planning on an Image

Authors : V. Sangeetha, V. Sangeetha, R. Sivagami, R. Sivagami, K. S. Ravichandran , K. S. Ravichandran

Publisher :Springer Link

A Fuzzy Gain-Based Dynamic Ant Colony Optimization for Path Planning in Dynamic Environments

Authors : Sangeetha Viswanathan, Raghunathan Krishankumar, Kattur Soundarapandian Ravichandran, Fausto Cavallaro, Samarjit Kar, Dragan Pamucar, Abbas Mardani

Assessment of cloud vendors using interval‐valued probabilistic linguistic information and unknown weights

Authors : Sangeetha Viswanathan, R. Sivagami, R. Krishankumar, K. S. Ravichandran, Samarjit Kar, Amir H. Gandomi

Publisher :Wiley Online Library

On the statistical analysis of ZUC, ESPRESSO and Grain V1

Authors : Saurabh Shrivastava, K.V. Lakshmy

Publisher :International Journal of Computing

Agent based ground ight control using type-2 fuzzy logic and hybrid ant colony optimization to a dynamic environment

Authors : Poornaselvan, K. J., , Gireesh Kumar, T, Vijayan, V. P

Publisher :Emerging Trends in Engineering and Technology, 2008. ICETET'08. First International Conference on (pp. 343-348). IEEE.

Feature Based Classification System for JPEG Steganalysis

Authors : Shankar, D. D., , Gireeshkumar, T, Jithin, R

Publisher :Conference Proceedings RTCSP (Vol.10), (pp. 1 - 4).

An intelligent question answering conversational agent using Nave Bayesian classifier

Authors : Niranjan, M., , Saipreethy, M. S., , Gireesh Kumar, T

Publisher :Technology Enhanced Education (ICTEE),

An algorithm for k-error joint linear complexity of binary multi-sequences

Authors : M. Sethumadhavan , , M. Sindhu , , Chungath Srinivasan , , C. Kavitha

Publisher :Journal of Discrete Mathematical Sciences and Cryptography

Image Steganographic Scheme Based On Modied Triway PVD in Orthogonal Domain

Authors : Gireesh Kumar, T, Anna Alexander, , Jina Varghese, Sneha Johnson

Publisher :Indo-US Conference and Workshop on Cyber Security, Cyber Crime and Cyber Forensics, Aug 19-21, 2009.

Survey on various steganographic algorithms

Authors : Deepa, R, Nimmy, K, Thiruppathi, K., , Reshma R

Publisher :Proceedings of International Conference on Information and network technology

Admissions Apply Now