


default search action
A. Nagaraju 0001
Person information
- affiliation: Central University Of Rajasthan, Ajmer, Rajasthan, India
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j10]Priyanka Nehra, A. Nagaraju:
Host utilization prediction using hybrid kernel based support vector regression in cloud data centers. J. King Saud Univ. Comput. Inf. Sci. 34(8 Part B): 6481-6490 (2022) - 2021
- [j9]Sophiya Sheikh
, A. Nagaraju
, Mohammad Shahid:
A fault-tolerant hybrid resource allocation model for dynamic computational grid. J. Comput. Sci. 48: 101268 (2021) - 2020
- [j8]Vinod Kumar Menaria
, S. C. Jain
, Naga Raju
, Rajani Kumari
, Anand Nayyar
, Eklas Hossain:
NLFFT: A Novel Fault Tolerance Model Using Artificial Intelligence to Improve Performance in Wireless Sensor Networks. IEEE Access 8: 149231-149254 (2020) - [j7]Amit Singh
, A. Nagaraju:
Low latency and energy efficient routing-aware network coding-based data transmission in multi-hop and multi-sink WSN. Ad Hoc Networks 107: 102182 (2020)
2010 – 2019
- 2019
- [j6]Dodda Sunitha
, Aitha Nagaraju, Gugulothu Narsimha
:
Cross-layer based routing protocol and solution to packet reordering for TCP in MANET. Clust. Comput. 22(5): 10809-10816 (2019) - 2018
- [j5]Vinod Kumar Menaria, S. C. Jain, A. Nagaraju:
A fault tolerance based route optimisation and data aggregation using artificial intelligence to enhance performance in wireless sensor networks. Int. J. Wirel. Mob. Comput. 14(2): 123-137 (2018) - 2016
- [j4]Amit Singh
, Aitha Nagaraju:
An Artificial Bee Colony-Based COPE Framework for Wireless Sensor Network. Comput. 5(2): 8 (2016) - 2014
- [j3]A. Nagaraju
, Ramachandram Sirandas
:
Reduce redundant broadcasting in MANETs using rough sets. Int. J. Wirel. Mob. Comput. 7(2): 103-122 (2014) - [j2]Devendra Kumar Mahawer, A. Nagaraju
:
Metamorphic malware detection using base malware identification approach. Secur. Commun. Networks 7(11): 1719-1733 (2014) - [c10]Geet Kalani, K. Srinivas
, A. Nagaraju
:
Adaptive ant colony network coding to neighbour topology based broadcasting techniques in MANETs. ICACCI 2014: 2163-2167 - [c9]Gaurav Pareek, Ratna Kumari, Aitha Nagaraju
:
Mobile Sensor Localization Under Wormhole Attacks: An Analysis. ISI (2) 2014: 129-137 - 2013
- [c8]K. Srinivas
, A. Venugopal Reddy, A. Nagaraju
:
Network Coding-Aware Neighbor Based Topology Control in MANETs. ADCONS 2013: 175-180 - [i1]Geet Kalani, A. Nagaraju:
Applying Network Coding To Neighbour Topology Based Broadcasting Techniques in MANETs. CoRR abs/1311.3816 (2013) - 2011
- [j1]Aitha Nagaraju, Ramachandram Srinadas:
A strategy to reduce the control packet load of AODV using weighted rough set model for MANET. Int. Arab J. Inf. Technol. 8(1): 108-116 (2011) - [c7]K. J. Bose, A. Nagaraju
:
Performance evaluation of key exchange using integrity regions in different mobility models. ACWR 2011: 327-334
2000 – 2009
- 2009
- [c6]A. Nagaraju
, Ramachandram Sirandas
:
Rough set based ad-hoc on demand distance vector routing algorithm for MANETs. Bangalore Compute Conf. 2009: 11 - [c5]A. Nagaraju
, Ramachandram Sirandas
:
Adaptive partial dominating set algorithm for mobile ad-hoc networks. Bangalore Compute Conf. 2009: 14 - [c4]A. Nagaraju
, B. Eswar:
Performance of Dominating Sets in AODV Routing Protocol for MANETs. NetCoM 2009: 166-170 - [c3]A. Nagaraju
, Ch. Ramya Krishna:
Performance Evaluation of ADV with AODV for Mobile Ad-hoc Networks. NetCoM 2009: 376-380 - 2007
- [c2]A. Nagaraju, Ramachandram Sirandas, C. Raghavendra Rao:
Highly Dynamic Multi Critriea Agent Based Routing for Mobile Ad-Hoc Networks. IICAI 2007: 1343-1353 - [c1]A. Nagaraju, Ramachandram Sirandas, C. Raghavendra Rao:
Applying Heuristic Technique to ad-hoc on demand Distance Vector Routing to Reduce Broadcast. World Congress on Engineering 2007: 1530-1533
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint