default search action
Umamakeswari Arumugam
Person information
- affiliation: Sastra University, Department of Computer Science and Engineering, Thanjavur, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Ezhilarasie Rajapackiyam, M. Anusouya Devi, Mandi Sushmanth Reddy, Umamakeswari Arumugam, Subramaniyaswamy Vairavasundaram, Indragandhi Vairavasundaram, Vishnu Suresh:
An efficient computation offloading in edge environment using genetic algorithm with directed search techniques for IoT applications. Future Gener. Comput. Syst. 158: 378-390 (2024) - [j24]A. Joy Christy, A. Umamakeswari, Ramya Madhuri V, Srilakshmi A:
A novel CNN framework for skin disease classification using adaptive percentage filter for image binarization and fast-marching inpainting method. Multim. Tools Appl. 83(23): 63547-63570 (2024) - 2023
- [j23]Narendran Sobanapuram Muruganandam, Umamakeswari Arumugam:
Dynamic Ensemble Multivariate Time Series Forecasting Model for PM2.5. Comput. Syst. Sci. Eng. 44(2): 979-989 (2023) - 2022
- [j22]N. Saravanan, Umamakeswari Arumugam:
Enhanced attribute based encryption technique for secured access in cloud storage for personal health records. Concurr. Comput. Pract. Exp. 34(11) (2022) - [j21]Srinivasan Ananthanarayanan Bragadeesh, Umamakeswari Arumugam:
Secured Vehicle Life Cycle Tracking Using Blockchain and Smart Contract. Comput. Syst. Sci. Eng. 41(1): 1-18 (2022) - 2021
- [j20]N. Saravanan, A. Umamakeswari:
Lattice based access control for protecting user data in cloud environments with hybrid security. Comput. Secur. 100: 102074 (2021) - [j19]A. Joy Christy, A. Umamakeswari, L. Priyatharsini, A. Neyaa:
RFM ranking - An effective approach to customer segmentation. J. King Saud Univ. Comput. Inf. Sci. 33(10): 1251-1257 (2021) - [j18]N. Saravanan, A. Umamakeswari:
Hap-Cp-Abe Based Encryption Technique With Hashed Access Policy Based Authentication Scheme For Privacy Preserving Of Phr. Microprocess. Microsystems 80: 103540 (2021) - 2020
- [j17]P. Shanthi, A. Umamakeswari:
Efficient top representative for multi-authorship encrypted cloud data to assist cognitive search. J. Intell. Fuzzy Syst. 39(6): 8079-8089 (2020) - [j16]Srinivasan Ananthanarayanan Bragadeesh, Umamakeswari Arumugam:
Development of a reliable supply chain system using blockchain. J. Intell. Fuzzy Syst. 39(6): 8377-8387 (2020) - [j15]H. Sankar, V. Subramaniyaswamy, Varadarajan Vijayakumar, Arun Kumar Sangaiah, Logesh Ravi, A. Umamakeswari:
Intelligent sentiment analysis approach using edge computing-based deep learning technique. Softw. Pract. Exp. 50(5): 645-657 (2020)
2010 – 2019
- 2019
- [j14]R. Thanuja, A. Umamakeswari:
Black hole detection using evolutionary algorithm for IDS/IPS in MANETs. Clust. Comput. 22(Supplement): 3131-3143 (2019) - [j13]Ranjeeth Kumar Sundararajan, Umamakeswari Arumugam:
FBMT: fuzzy based merkle technique for detecting and mitigating malicious nodes in sensor networks. Int. Arab J. Inf. Technol. 16(6): 1106-1113 (2019) - [j12]Surendar Madhawa, P. Balakrishnan, Umamakeswari Arumugam:
Roll forward validation based decision tree classification for detecting data integrity attacks in industrial internet of things. J. Intell. Fuzzy Syst. 36(3): 2355-2366 (2019) - [j11]R. Ezhilarasie, A. Umamakeswari, Mandi Sushmanth Reddy, P. Balakrishnan:
Grefenstette Bias based genetic algorithm for multi-site offloading using docker container in edge computing. J. Intell. Fuzzy Syst. 36(3): 2419-2429 (2019) - [j10]R. Ezhilarasie, Mandi Sushmanth Reddy, A. Umamakeswari:
A new hybrid adaptive GA-PSO computation offloading algorithm for IoT and CPS context application. J. Intell. Fuzzy Syst. 36(5): 4105-4113 (2019) - [j9]P. Padmakumari, Umamakeswari Arumugam:
Task Failure Prediction using Combine Bagging Ensemble (CBE) Classification in Cloud Workflow. Wirel. Pers. Commun. 107(1): 23-40 (2019) - [j8]P. Shanthi, A. Umamakeswari:
Privacy Preserving Time Efficient Access Control Aware Keyword Search Over Encrypted Data on Cloud Storage. Wirel. Pers. Commun. 109(4): 2133-2145 (2019) - 2018
- [j7]Surendar Madhawa, P. Balakrishnan, Umamakeswari Arumugam:
Data driven intrusion detection system for software defined networking enabled industrial internet of things. J. Intell. Fuzzy Syst. 34(3): 1289-1300 (2018) - [j6]Surendar Madhawa, P. Balakrishnan, Umamakeswari Arumugam:
Employing invariants for anomaly detection in software defined networking based industrial internet of things. J. Intell. Fuzzy Syst. 35(2): 1267-1279 (2018) - [j5]Ranjeeth Kumar Sundararajan, Umamakeswari Arumugam:
Event Detection and Information Passing Using LEACH Protocol in Wireless Sensor Networks. Wirel. Pers. Commun. 101(3): 1703-1714 (2018) - 2017
- [j4]V. Subramaniyaswamy, Logesh Ravi, M. Abejith, Sunil Umasankar, A. Umamakeswari:
Sentiment Analysis of Tweets for Estimating Criticality and Security of Events. J. Organ. End User Comput. 29(4): 51-71 (2017) - [c2]P. Balakrishnan, Gnana Guru Ganesan, Ezhilarasi Rajapackiyam, Umamakeswari Arumugam:
An Adaptive Neuro-Fuzzy Inference System Based Situation Awareness Assessment in VLC Enabled Connected Cars. SIRS 2017: 213-227 - 2015
- [j3]R. Ezhilarasie, Umamakeswari Arumugam, T. Renugadevi:
Key management schemes in wireless sensor networks: a survey. Int. J. Adv. Intell. Paradigms 7(3/4): 222-239 (2015) - [j2]Booma Govindaram, A. Umamakeswari:
An autonomous approach for efficient landmine detection and marking using high sensitive robot. Int. J. Adv. Intell. Paradigms 7(3/4): 280-291 (2015) - [j1]Ranjeeth Kumar Sundararajan, Umamakeswari Arumugam:
Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks. J. Sensors 2015: 203814:1-203814:12 (2015)
2000 – 2009
- 2004
- [c1]A. Umamakeswari, A. Rajaraman:
Role of Object Attributes of Dynamic Images in Visual Computing for Engineering Applications. International Conference on Computational Intelligence 2004: 145-148
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint