default search action
N. Ch. Sriman Narayana Iyengar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j24]P. K. Haleema, N. Ch. S. N. Iyengar:
JADETraderPal - JADE mobile agent embedded with flexible negotiation strategies for dynamic e-commerce environments. J. King Saud Univ. Comput. Inf. Sci. 32(7): 829-849 (2020)
2010 – 2019
- 2019
- [j23]Sivashanmugam G., S. P. Shantharajah, N. Ch. Sriman Narayana Iyengar:
Avian Based Intelligent Algorithm to Provide Zero Tolerance Load Balancer for Cloud Based Computing Platforms. Int. J. Grid High Perform. Comput. 11(4): 42-67 (2019) - 2018
- [j22]P. K. Haleema, N. Ch. S. N. Iyengar:
A mathematical model with flexible negotiation strategies for agent based negotiations in dynamic e-commerce environments. J. King Saud Univ. Comput. Inf. Sci. 30(4): 547-560 (2018) - 2017
- [j21]T. Vivekanandan, N. Ch. Sriman Narayana Iyengar:
Optimal feature selection using a modified differential evolution algorithm and its effectiveness for prediction of heart disease. Comput. Biol. Medicine 90: 125-136 (2017) - [j20]Mary A. Geetha, D. P. Acharjya, N. Ch. Sriman Narayana Iyengar:
Privacy preservation in fuzzy association rules using rough set on intuitionistic fuzzy approximation spaces and DSR. Int. J. Auton. Adapt. Commun. Syst. 10(1): 67-87 (2017) - 2016
- [j19]K. Lavanya, M. A. Saleem Durai, N. Ch. S. N. Iyengar:
A Hybrid Model for Rice Disease Diagnosis Using Entropy Based Neuro Genetic Algorithm. Int. J. Agric. Environ. Inf. Syst. 7(2): 52-69 (2016) - 2015
- [j18]E. Anupriya, N. Ch. S. N. Iyengar:
Semantic indexing of hybrid frequent pattern-based clustering of documents with missing semantic information. Int. J. Comput. Intell. Stud. 4(1): 72-86 (2015) - [j17]Sarasvathi V., Snehanshu Saha, N. Ch. S. N. Iyengar, Mahalaxmi Koti:
Coefficient of Restitution based Cross Layer Interference Aware Routing Protocol in Wireless Mesh Networks. Int. J. Commun. Networks Inf. Secur. 7(3) (2015) - [i5]Sarasvathi V., N. Ch. S. N. Iyengar, Snehanshu Saha:
QoS Guaranteed Intelligent Routing Using Hybrid PSO-GA in Wireless Mesh Networks. CoRR abs/1503.03639 (2015) - [i4]Sarasvathi V., Snehanshu Saha, N. Ch. S. N. Iyengar, Mahalaxmi Koti:
Coefficient of Restitution based Cross Layer Interference Aware Routing Protocol in Wireless Mesh Networks. CoRR abs/1511.04536 (2015) - 2014
- [j16]R. Raj Kumar, N. Ch. S. N. Iyengar:
Secure and synchronised mobile JXTA cloud ecosystem for sharing patient's healthcare information and medical reports. Int. J. Comput. Heal. 2(1): 15-27 (2014) - [j15]Sarasvathi V., N. Ch. S. N. Iyengar, Snehanshu Saha:
An Efficient Interference Aware Partially Overlapping Channel Assignment and Routing in Wireless Mesh Networks. Int. J. Commun. Networks Inf. Secur. 6(1) (2014) - [j14]N. Ch. S. N. Iyengar, Arindam Banerjee, Gopinath Ganapathy:
A Fuzzy Logic Based Defense Mechanism against Distributed Denial of Services Attack in Cloud Environment. Int. J. Commun. Networks Inf. Secur. 6(3) (2014) - [j13]N. Ch. Sriman Narayana Iyengar, Gopinath Ganapathy, P. C. Mogan Kumar, Ajith Abraham:
A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment. Int. J. Grid Util. Comput. 5(4): 236-248 (2014) - [j12]Mary A. Geetha, Debi Prasanna Acharjya, N. Ch. Sriman Narayana Iyengar:
Algebraic Properties of Rough Set on Two Universal Sets based on Multigranulation. Int. J. Rough Sets Data Anal. 1(2): 49-61 (2014) - 2013
- [j11]Meiyappan Yuvarani, N. Ch. Sriman Narayana Iyengar:
Interactive Query Expansion Using Concept-Based Directions Finder Based on Wikipedia. Int. Arab J. Inf. Technol. 10(6): 571-578 (2013) - [j10]Meiyappan Yuvarani, N. Ch. S. N. Iyengar, Arputharaj Kannan:
Improved concept-based query expansion using Wikipedia. Int. J. Commun. Networks Distributed Syst. 11(1): 26-41 (2013) - [j9]N. Jeyanthi, Uttara Barde, M. Sravani, Venu Tiwari, N. Ch. Sriman Narayana Iyengar:
Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP. Int. J. Commun. Networks Distributed Syst. 11(3): 262-279 (2013) - [j8]N. Jeyanthi, N. Ch. S. N. Iyengar, P. C. Mogan Kumar, A. Kannammal:
An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment. Int. J. Commun. Networks Inf. Secur. 5(2) (2013) - [c6]Mary A. Geetha, Debi Prasanna Acharjya, N. Ch. Sriman Narayana Iyengar:
Algebraic properties and measures of uncertainty in rough set on two universal sets based on multi-granulation. COMPUTE 2013: 24:1-24:8 - [c5]E. Anupriya, N. Ch. S. N. Iyengar:
Concept Based Clustering of Documents with Missing Semantic Information. ICACNI 2013: 579-589 - [i3]Sarasvathi V., N. Ch. S. N. Iyengar, Snehanshu Saha:
Interference Aware Channel Assignmnet Using Edge Coloring in Multi-Channel Multi-Radio Wireless Mesh Networks. CoRR abs/1305.0866 (2013) - 2012
- [j7]M. A. Saleem Durai, D. P. Acharjya, Arputharaj Kannan, N. Ch. Sriman Narayana Iyengar:
An intelligent knowledge mining model for kidney cancer using rough set theory. Int. J. Bioinform. Res. Appl. 8(5/6): 417-435 (2012) - [j6]N. Jeyanthi, N. Ch. S. N. Iyengar:
Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment. Int. J. Commun. Networks Inf. Secur. 4(3) (2012) - [j5]N. Jeyanthi, N. Ch. Sriman Narayana Iyengar:
An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks. Int. J. Netw. Secur. 14(5): 257-269 (2012) - 2010
- [j4]Aditya Chopra, Devang Negandhi, Soumith Chintala, A. Kannammal, N. Ch. Sriman Narayana Iyengar, V. Ramachandran:
Frame based Intelligent Tutoring System with weighted attributes and adaptive hypermedia. Int. J. Electron. Bus. 8(4/5): 342-359 (2010) - [c4]M. A. Saleem Durai, N. Ch. Sriman Narayana Iyengar:
Secure Medical Diagnosis Using Rule Based Mining. IAIT 2010: 34-42 - [i2]E. Sathiyamoorthy, N. Ch. Sriman Narayana Iyengar, V. Ramachandran:
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions. CoRR abs/1004.0765 (2010) - [i1]N. Ch. Sriman Narayana Iyengar, Syed Mohammad Ansar Sachin kumar, Piyush Nagar, Siddharth Sharma, Akshay Atrey:
An Efficient and Secure Routing Protocol for Mobile Ad-Hoc Networks. CoRR abs/1005.1751 (2010)
2000 – 2009
- 2009
- [c3]Krishnan Vijayaraghavan, Karan Parpyani, Sunny Ashok Thakwani, Aju D., N. Ch. S. N. Iyengar:
Methods of Increasing Spatial Resolution of Digital Images with Minimum Detail Loss and its Applications. ICIG 2009: 685-689 - 2008
- [j3]P. Venkata Krishna, N. Ch. Sriman Narayana Iyengar:
Design of Sequencing Medium Access Control to Improve the Performance of Wireless Networks. J. Comput. Inf. Technol. 16(2): 81-89 (2008) - [j2]P. Venkata Krishna, N. Ch. S. N. Iyengar, Sudip Misra:
An efficient Hash Table-Based Node Identification Method for bandwidth reservation in hybrid cellular and ad-hoc networks. Comput. Commun. 31(4): 722-733 (2008) - 2007
- [j1]A. Kannammal, V. Ramachandran, N. Ch. S. N. Iyengar:
Design and performance analysis of agent-based architecture for session management. Int. J. Electron. Bus. 5(3): 263-275 (2007) - 2006
- [c2]A. Kannammal, V. Ramachandran, N. Ch. S. N. Iyengar:
Secure Mobile Agent System for E-Business Applications. AICCSA 2006: 326-329 - [c1]Meiyappan Yuvarani, N. Ch. S. N. Iyengar, Arputharaj Kannan:
LSCrawler: A Framework for an Enhanced Focused Web Crawler Based on Link Semantics. Web Intelligence 2006: 794-800
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint