


default search action
Usha Devi Gandhi
Person information
- affiliation: Vellore Institute of Technology, School of Information Technology and Engineering, India
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Sangeetha Ramaswamy, Usha Devi Gandhi:
Priority Based Energy Efficient MAC Protocol by Varying Data Rate for Wireless Body Area Network. Comput. Syst. Sci. Eng. 48(2): 395-411 (2024) - [j21]R. Sangeetha, Usha Devi Gandhi:
Correction: Priority Based Energy Efficient MAC Protocol by Varying Data Rate For Wireless Body Area Network. Comput. Syst. Sci. Eng. 48(3): 859 (2024) - 2022
- [j20]Jayashree Moorthy, Usha Devi Gandhi
:
A Survey on Medical Image Segmentation Based on Deep Learning Techniques. Big Data Cogn. Comput. 6(4): 117 (2022) - [j19]Sangeetha Ramaswamy
, Usha Devi Gandhi
:
Trust-Based Data Communication in Wireless Body Area Network for Healthcare Applications. Big Data Cogn. Comput. 6(4): 148 (2022) - [j18]Shakila Basheer, vivekanadan S., Parthasarathy Panchatcharam, Usha Devi Gandhi:
Internet of Things-Based Automated Shopping Cart Incorporated With Virtual Instrumentation Using LabVIEW for Control Applications. Int. J. Grid High Perform. Comput. 14(1): 1-16 (2022) - [j17]Hariharan Rajadurai
, Usha Devi Gandhi:
A stacked ensemble learning model for intrusion detection in wireless network. Neural Comput. Appl. 34(18): 15387-15395 (2022) - 2021
- [j16]Hariharan Rajadurai
, Usha Devi Gandhi
:
An empirical model in intrusion detection systems using principal component analysis and deep learning models. Comput. Intell. 37(3): 1111-1124 (2021) - [j15]Gokulnath B. V., Usha Devi Gandhi:
Identifying and classifying plant disease using resilient LF-CNN. Ecol. Informatics 63: 101283 (2021) - [j14]Dhivya S.
, Usha Devi Gandhi:
Study on Automated Approach to Recognize Characters for Handwritten and Historical Document. ACM Trans. Asian Low Resour. Lang. Inf. Process. 20(3): 37:1-37:24 (2021) - [j13]Dhivya S.
, Usha Devi Gandhi:
TAMIZHİ: Historical Tamil-Brahmi Script Recognition Using CNN and MobileNet. ACM Trans. Asian Low Resour. Lang. Inf. Process. 20(3): 39:1-39:26 (2021) - 2020
- [j12]Usha Moorthy
, Usha Devi Gandhi
:
Usha Moorthy, Usha Devi Gandhi: Forest optimization algorithm-based feature selection using classifier ensemble. Comput. Intell. 36(4): 1445-1462 (2020) - [j11]Priyan Malarvizhi Kumar
, Usha Devi Gandhi, Shakila Basheer
, Parthasarathy Panchatcharam
:
A study on data de-duplication schemes in cloud storage. Int. J. Grid Util. Comput. 11(4): 509-516 (2020) - [j10]Priyan Malarvizhi Kumar
, Usha Devi Gandhi
:
Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application. J. Supercomput. 76(6): 3963-3983 (2020) - [j9]Hariharan Rajadurai
, Usha Devi Gandhi:
Fuzzy Based Collaborative Verification System for Sybil Attack Detection in MANET. Wirel. Pers. Commun. 110(4): 2179-2193 (2020)
2010 – 2019
- 2019
- [j8]Senthil Murugan Nagarajan
, Usha Devi Gandhi:
Feature extraction using LR-PCA hybridization on twitter data and classification accuracy using machine learning algorithms. Clust. Comput. 22(6): 13965-13974 (2019) - [j7]Priyan Malarvizhi Kumar, Usha Devi Gandhi:
A survey on internet of vehicles: applications, technologies, challenges and opportunities. Int. J. Adv. Intell. Paradigms 12(1/2): 98-119 (2019) - [j6]Shakila Basheer
, Usha Devi Gandhi, Priyan Malarvizhi Kumar, Parthasarathy Panchatcharam
:
Network Support Data Analysis for Fault Identification Using Machine Learning. Int. J. Softw. Innov. 7(2): 41-49 (2019) - 2018
- [j5]Priyan Malarvizhi Kumar
, Usha Devi Gandhi
:
A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases. Comput. Electr. Eng. 65: 222-235 (2018) - [j4]Priyan Malarvizhi Kumar
, Usha Devi Gandhi
:
Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles. Clust. Comput. 21(1): 213-227 (2018) - [j3]Priyan Malarvizhi Kumar
, Usha Devi Gandhi, Gunasekaran Manogaran, Revathi Sundarasekar, Naveen K. Chilamkurti
, R. Varatharajan:
Ant colony optimization algorithm with Internet of Vehicles for intelligent traffic control system. Comput. Networks 144: 154-162 (2018) - [j2]Usha Devi Gandhi, Priyan Malarvizhi Kumar
, R. Varatharajan, Gunasekaran Manogaran, Revathi Sundarasekar, Shreyas Kadu:
HIoTPOT: Surveillance on IoT Devices against Recent Threats. Wirel. Pers. Commun. 103(2): 1179-1194 (2018) - [j1]Senthil Murugan Nagarajan
, Usha Devi Gandhi:
Detecting Streaming of Twitter Spam Using Hybrid Method. Wirel. Pers. Commun. 103(2): 1353-1374 (2018) - [c1]R. Hariharan, I. Sumaiya Thaseen, Usha Devi Gandhi:
Performance Analysis of Single- and Ensemble-Based Classifiers for Intrusion Detection. SocProS (2) 2018: 759-770
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint