An energy efficient method for secure and reliable data transmission in wireless body area networks using RelAODV KS Raja, U Kiruthika Wireless Personal Communications 83, 2975-2997, 2015 | 70 | 2015 |
IOT based automation of fish farming SU Kiruthika, SR Kanaga, R Jaichandran J. of Adv. Res. in Dynam. Control Syst 9 (1), 2017 | 54 | 2017 |
Lifecycle model of a negotiation agent: A survey of automated negotiation techniques U Kiruthika, TS Somasundaram, SKS Raja Group Decision and Negotiation 29 (6), 1239-1262, 2020 | 49 | 2020 |
Semantic-enabled CARE Resource Broker (SeCRB) for managing grid and cloud environment TS Somasundaram, K Govindarajan, U Kiruthika, R Buyya The Journal of Supercomputing 68, 509-556, 2014 | 28 | 2014 |
Detection and classification of paddy crop disease using deep learning techniques SU Kiruthika, SKS Raja, R Jaichandran, C Priyadharshini Int. J. Recent Technol. Eng 8, 2277-3878, 2019 | 26 | 2019 |
E-agriculture for direct marketing of food crops using chatbots U Kiruthika, SKS Raja, V Balaji, CJ Raman 2020 International Conference on Power, Energy, Control and Transmission …, 2020 | 21 | 2020 |
Detection of tuberculosis in chest X-rays using U-net architecture SU Kiruthika, SKS Raja, V Balaji, CJ Raman, SSLD Arumugam International Journal of Innovative Technology and Exploring Engineering 9 …, 2019 | 21 | 2019 |
Mobile and wearable technologies for persons with disabilities: A bibliometric analysis (2000–2021) TK Chiew, S Khoo, P Ansari, U Kiruthika Disability and Rehabilitation: Assistive Technology 19 (3), 994-1002, 2024 | 7 | 2024 |
Determination of competency of programmers by classification and ranking using AHP TS Somasundaram, U Kiruthika, M Gowsalya, A Hemalatha, A Philips 2015 IEEE International Conference on Electro/Information Technology (EIT …, 2015 | 7 | 2015 |
Hybrid machine learning model using decision tree and support vector machine for diabetes identification K Dhasaradhan, R Jaichandran, KL Shunmuganathan, S Usha Kiruthika, ... Data Engineering and Intelligent Computing: Proceedings of ICICC 2020, 293-305, 2021 | 6 | 2021 |
A novel fraud detection scheme for credit card usage employing random forest algorithm combined with feedback mechanism U Kiruthika, SKS Raja, CJ Raman, V Balaji 2020 International Conference on Power, Energy, Control and Transmission …, 2020 | 6 | 2020 |
Design and implementation of facial recognition system for visually impaired using image processing SKS Raja, M Vivekanandan, SU Kiruthika, S Ayshwarya International Journal of Recent Technology and Engineering (IJRTE) 8 (4), 2019 | 6 | 2019 |
Device aware VOD Services with Bicubic Interpolation Algorithm on Cloud VNR Bandaru, SU Kiruthika, G Rajasekaran, M Lakshmanan 2020 IEEE 4th Conference on Information & Communication Technology (CICT), 1-5, 2020 | 5 | 2020 |
Efficient agent-based negotiation by predicting opponent preferences using AHP U Kiruthika, TS Somasundaram Journal of applied research and technology 16 (1), 22-34, 2018 | 4 | 2018 |
Object Recognition in Soccer Sports Videos U Kiruthika, K Kausalya, KSR S 2022 Smart Technologies, Communication and Robotics (STCR), 1-5, 2022 | 3* | 2022 |
Lucid-GAN: an adversarial network for enhanced image inpainting U Maheshwari, VPK Turlapati, U Kiruthika 2021 IEEE International Conference on Computational Intelligence and Virtual …, 2021 | 3 | 2021 |
Towards Improving Human Activity Recognition Using Artificial Neural Network T Sharma, P Kavipriya, U Kiruthika 2021 Emerging Trends in Industry 4.0 (ETI 4.0), 1-5, 2021 | 3 | 2021 |
Dynamic contract generation and monitoring for b2b applications with composite services K Rajaram, S Usha Kiruthika Information and Communication Technologies: International Conference, ICT …, 2010 | 3 | 2010 |
Systematic Review of Deep Learning Models for Dental Images U Kiruthika S, P J, KS Raja S 2023 7th International Conference on Computing Methodologies and …, 2023 | 2* | 2023 |
Blockchain technology for privacy and security issues and challenges in IOT-based systems CJ Raman, SU Kiruthika, LJ Ali, SKS Raja Blockchain for Information Security and Privacy, 193-215, 2021 | 2 | 2021 |