default search action
R. Geetha
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j24]R. Geetha, E. Priya, M. Vijayakumar:
An approach for automated acute cerebral ischemic stroke lesion segmentation and correlation of significant features with modified Rankin Scale. Biomed. Signal Process. Control. 100: 106921 (2025) - 2024
- [j23]R. Geetha, G. Belshia Jebamalar, S. Arumai Shiney, Nhu-Ngoc Dao, Hyeonjoon Moon, Sungrae Cho:
Enhancing Upscaled Image Resolution Using Hybrid Generative Adversarial Network-Enabled Frameworks. IEEE Access 12: 27784-27793 (2024) - [j22]D. Nithya, V. Madhusudanan, B. S. N. Murthy, R. Geetha, Nguyen Xuan Mung, Nhu-Ngoc Dao, Sungrae Cho:
Delayed dynamics analysis of SEI2RS malware propagation models in cyber-Physical systems. Comput. Networks 248: 110481 (2024) - [j21]R. Geetha, D. Annal Priyadarshini, V. Indira, V. Sujatha:
An effective review on the prediction and analysis of infectious lung diseases using machine learning algorithms. Int. J. Bioinform. Res. Appl. 20(4) (2024) - [j20]M. Balasubramanian, K. Ramyadevi, R. Geetha:
Deep transfer learning based real time face mask detection system with computer vision. Multim. Tools Appl. 83(6): 17511-17530 (2024) - [j19]D. Kavitha, S. Geetha, R. Geetha:
An adaptive neuro fuzzy methodology for the diagnosis of prenatal hypoplastic left heart syndrome from ultrasound images. Multim. Tools Appl. 83(10): 30755-30772 (2024) - [j18]D. Kavitha, S. Geetha, R. Geetha, Seifedine Nimer Kadry:
Dynamic neuro fuzzy diagnosis of fetal hypoplastic cardiac syndrome using ultrasound images. Multim. Tools Appl. 83(20): 59317-59333 (2024) - [j17]R. Geetha, A. Jegatheesan, Rajesh Kumar Dhanaraj, K. Vijayalakshmi, Anand Nayyar, V. Arulkumar, J. Velmurugan, Rajendran Thavasimuthu:
CVS-FLN: a novel IoT-IDS model based on metaheuristic feature selection and neural network classification model. Multim. Tools Appl. 83(39): 86557-86591 (2024) - 2023
- [j16]V. MadhuSudanan, R. Geetha, B. S. N. Murthy, Nhu-Ngoc Dao, Sungrae Cho:
Analysis of Delay-Aware Worm Propagation Model in Wireless IoT Systems With Ratio-Dependent Functional Response. IEEE Access 11: 34968-34976 (2023) - [c4]M. J. Angelin, R. Geetha:
Increasing the Power in Photovoltaic Systems using a Floating PV System compared with a Rooftop PV System by Limiting the Temperature Loss. IC3I 2023: 1506-1510 - [c3]B. R. Subashini, R. Geetha:
Efficient Energy Management in Photovoltaic System Using Grid Interconnected Solar System Compared with Battery Energy Storage System by Limiting the Panel Array Losses. IC3I 2023: 1534-1538 - 2022
- [j15]R. Geetha, S. Karthika, Ponnurangam Kumaraguru:
'Will I Regret for This Tweet?' - Twitter User's Behavior Analysis System for Private Data Disclosure. Comput. J. 65(2): 275-296 (2022) - [j14]R. Geetha, T. Padmavathy, G. Umarani Srikanth:
A Scalable Block Chain Framework for User Identity Management in a Decentralized Network. Wirel. Pers. Commun. 123(4): 3719-3736 (2022) - 2021
- [j13]R. Geetha, S. Karthika, Ponnurangam Kumaraguru:
Tweet-scan-post: a system for analysis of sensitive private data disclosure in online social media. Knowl. Inf. Syst. 63(9): 2365-2404 (2021) - [j12]R. Geetha, S. Geetha:
A multi-layered "plus-minus one" reversible data embedding scheme. Multim. Tools Appl. 80(9): 14123-14136 (2021) - [j11]R. Geetha, K. Ramyadevi, M. Balasubramanian:
Prediction of domestic power peak demand and consumption using supervised machine learning with smart meter dataset. Multim. Tools Appl. 80(13): 19675-19693 (2021) - [j10]R. Geetha, V. MadhuSudanan, M. N. Srinivas:
Influence of Clamor on the Transmission of Worms in Remote Sensor Network. Wirel. Pers. Commun. 118(1): 461-473 (2021) - 2020
- [j9]R. Geetha, S. Geetha:
Multi-Layered "Plus-Minus one" Reversible Data Embedding Scheme. J. Inf. Hiding Multim. Signal Process. 11(2): 58-69 (2020) - [j8]R. Geetha, S. Geetha:
Embedding electronic patient information in clinical images: an improved and efficient reversible data hiding technique. Multim. Tools Appl. 79(19-20): 12869-12890 (2020) - [j7]R. Geetha, T. Padmavathy, T. Thilagam, A. Lallithasree:
Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm. Wirel. Pers. Commun. 112(1): 21-36 (2020) - [j6]R. Geetha, A. K. Suntheya, G. Umarani Srikanth:
Cloud Integrated IoT Enabled Sensor Network Security: Research Issues and Solutions. Wirel. Pers. Commun. 113(2): 747-771 (2020) - [j5]V. MadhuSudanan, R. Geetha:
Dynamics of Epidemic Computer Virus Spreading Model with Delays. Wirel. Pers. Commun. 115(3): 2047-2061 (2020) - [c2]R. Geetha, S. Karthika:
Sensitive Keyword Extraction Based on Cyber Keywords and LDA in Twitter to Avoid Regrets. ICCIDS 2020: 59-70
2010 – 2019
- 2019
- [j4]R. Geetha, S. Sivasubramanian, Madasamy Kaliappan, S. Vimal, Annamalai Suresh:
Cervical Cancer Identification with Synthetic Minority Oversampling Technique and PCA Analysis using Random Forest Classifier. J. Medical Syst. 43(9): 286:1-286:19 (2019) - [j3]R. Geetha, V. Madhusudhan, T. Padmavathy, A. Lallithasree:
A Light Weight Secure Communication Scheme for Wireless Sensor Networks. Wirel. Pers. Commun. 108(3): 1957-1976 (2019) - 2018
- [j2]G. Umarani Srikanth, R. Geetha:
Task scheduling using Ant Colony Optimization in multicore architectures: a survey. Soft Comput. 22(15): 5179-5196 (2018) - 2016
- [c1]R. Geetha, S. Geetha:
Multilevel RDH scheme using image interpolation. ICACCI 2016: 1952-1956 - 2015
- [j1]E. A. Mary Anita, R. Geetha, E. Kannan:
A Novel Hybrid Key Management Scheme for Establishing Secure Communication in Wireless Sensor Networks. Wirel. Pers. Commun. 82(3): 1419-1433 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint