default search action
K. Murugesan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j33]T. A. Midhun, K. Murugesan:
A study of stochastically perturbed epidemic model of HPV infection and cervical cancer in Indian female population. Math. Comput. Simul. 228: 431-465 (2025)
2010 – 2019
- 2018
- [j32]P. Rajesh Kumar, K. Murugesan:
Computer Aided Segmentation of Blockages in Coronary Heart Images Using Canfis Classifier. Wirel. Pers. Commun. 103(2): 1341-1352 (2018) - 2017
- [j31]R. Chandra Guru Sekar, K. Murugesan:
STWS approach for Hammerstein system of nonlinear Volterra integral equations of the second kind. Int. J. Comput. Math. 94(9): 1867-1878 (2017) - 2016
- [j30]R. Chandra Guru Sekar, K. Murugesan:
System of linear second order Volterra integro-differential equations using Single Term Walsh Series technique. Appl. Math. Comput. 273: 484-492 (2016) - [c8]Ch. Manoj, N. SaiTeja, R. Ajay Kumar, M. Jasmine Pemeena Priyadarsini, K. Murugesan, Inabathini Srinivasa Rao:
Unmanned aerial vehicle based bomb detection. ICACCI 2016: 2385-2389 - 2015
- [j29]V. Balakumar, K. Murugesan:
Numerical solution of Volterra integral-algebraic equations using block pulse functions. Appl. Math. Comput. 263: 165-170 (2015) - 2014
- [j28]V. Balakumar, K. Murugesan:
Single-Term Walsh Series method for systems of linear Volterra integral equations of the second kind. Appl. Math. Comput. 228: 371-376 (2014) - [j27]S. Suganthi, K. Murugesan, S. Raghavan:
Optimized mechanical Design of capacitive micromachined Switch: a CAD-Based Neural Model. J. Circuits Syst. Comput. 23(3) (2014) - 2013
- [j26]M. Jasmine Pemeena Priyadarsini, K. Murugesan, Inabathini Srinivasa Rao, Y. Saiteja, Vemana Janith:
Automatic target Recognition in cluttered visible imagery. J. Comput. Sci. 9(5): 572-582 (2013) - 2012
- [j25]G. Indumathi, K. Murugesan:
Optimal error considerate cross-layer scheduler for heterogeneous users. IET Commun. 6(4): 442-448 (2012) - 2011
- [j24]A. Raghunathan, K. Murugesan:
Performance-Enhanced Caching Scheme for Web Clusters for Dynamic Content. Int. J. Bus. Data Commun. Netw. 7(3): 16-36 (2011) - [j23]K. Ruba Soundar, K. Murugesan:
An Adaptive Face Recognition in Combined Global and Local Preserving Feature Space. Int. J. Pattern Recognit. Artif. Intell. 25(1): 99-115 (2011) - [c7]V. Murugesh, K. Murugesan, Kyung Tae Kim:
Simulation of Non-linear Singular System Using RK-Butcher Algorithm. ICHIT (2) 2011: 625-632 - [c6]D. Neels Pon Kumar, K. Murugesan, G. Annapoorani:
Fuzzy priority scheduler for WiMAX with improved QoS. ICWET 2011: 875-880 - 2010
- [j22]G. Indumathi, K. Murugesan:
An Adaptive Time slot Allocation for Statistical QoS guarantees in Wireless Networks using Cross-layer approach. Int. J. Commun. Networks Inf. Secur. 2(1) (2010) - [j21]K. Ruba Soundar, K. Murugesan:
Preserving Global and Local Features - a Combined Approach for Recognizing Face Images. Int. J. Pattern Recognit. Artif. Intell. 24(1): 39-53 (2010) - [j20]K. Ruba Soundar, K. Murugesan:
Correlation Based Face Matching in Combined Global and Local Preserving Feature Space. Int. J. Pattern Recognit. Artif. Intell. 24(8): 1281-1294 (2010) - [j19]A. Raghunathan, K. Murugesan:
Schema-based Cache Validation to Improve Query Performance of Web Services. J. Web Eng. 9(2): 116-131 (2010)
2000 – 2009
- 2009
- [j18]V. Murugesh, K. Murugesan:
RK-Butcher algorithms for singular system-based electronic circuit. Int. J. Comput. Math. 86(3): 523-536 (2009) - [c5]K. Murugesan, Muhammad Rukunuddin Ghalib, J. Gitanjali, J. Indumathi, D. Manjula:
A Pioneering Cryptic Random Projection based Approach for Privacy Preserving Data Mining. IRI 2009: 437-439 - 2008
- [c4]G. Indumathi, K. Murugesan:
Distributed fair scheduling with distributed coordination function in WLAN. ICON 2008: 1-6 - 2007
- [c3]K. Murugesan, P. Elango:
CNN Based Hole Filler Template Design Using Numerical Integration Techniques. ICANN (1) 2007: 490-500 - 2006
- [j17]David J. Evans, K. Murugesan, S. Sekar, Hyun-Min Kim:
Non-linear singular systems using RK-Butcher algorithms. Int. J. Comput. Math. 83(1): 131-142 (2006) - [j16]Devarajan Gopal, V. Murugesh, K. Murugesan:
Numerical solution of second-order robot arm control problem using Runge-Kutta-Butcher algorithm. Int. J. Comput. Math. 83(3): 345-356 (2006) - [c2]V. Murugesh, K. Murugesan:
Simulation of Time-Multiplexing Cellular Neural Networks with Numerical Integration Algorithms. International Conference on Computational Science (1) 2006: 457-464 - 2005
- [j15]J. Y. Park, K. Murugesan, David J. Evans, S. Sekar, V. Murugesh:
Observer design of singular systems (transistor circuits) using the RK-Butcher algorithms. Int. J. Comput. Math. 82(1): 111-123 (2005) - [j14]J. Y. Park, David J. Evans, K. Murugesan, S. Sekar:
Optimal control of time-varying singular systems using the RK-Butcher algorithm. Int. J. Comput. Math. 82(5): 617-627 (2005) - [j13]K. Murugesan, S. Sekar, V. Murugesh, David J. Evans:
Numerical strategies for the system of first-order IVPS using the RK-Butcher algorithm. Int. J. Comput. Math. 82(11): 1379-1387 (2005) - 2004
- [j12]K. Murugesan, S. Sekar, V. Murugesh, J. Y. Park:
Numerical solution of an industrial robot arm control problem using the RK-Butcher algorithm. Int. J. Comput. Appl. Technol. 19(2): 132-138 (2004) - [j11]J. Y. Park, David J. Evans, K. Murugesan, S. Sekar, V. Murugesh:
Optimal control of singular systems using the rk-butcher algorithm. Int. J. Comput. Math. 81(2): 239-249 (2004) - [j10]S. Sekar, V. Murugesh, K. Murugesan:
Numerical Strategies for the System of Second Order IVPs Using the RK-Butcher Algorithms. Int. J. Comput. Sci. Appl. 1(2): 96-117 (2004) - [c1]V. Murugesh, K. Murugesan:
Comparison of Numerical Integration Algorithms in Raster CNN Simulation. AACC 2004: 115-122 - 2003
- [j9]K. Murugesan, D. Paul Dhayabaran, E. C. Henry Amirtharaj, David J. Evans:
Numerical Strategy for the System of Second Order IVPs Using RK Method Based on Centroidal Mean. Int. J. Comput. Math. 80(2): 233-241 (2003) - 2002
- [j8]K. Murugesan, D. Paul Dhayabaran, E. C. Henry Amirtharaj, David J. Evans:
A Fourth Order Embedded Runge-Kutta RKACeM(4, 4) Method Based on Arithmetic and Centroidal Means with Error Control. Int. J. Comput. Math. 79(2): 247-269 (2002) - 2001
- [j7]K. Murugesan, D. Paul Dhayabaran, E. C. Henry Amirtharaj, David J. Evans:
A comparison of extended runge-kutta formulae based on variety of means to solve system of ivps. Int. J. Comput. Math. 78(2): 225-252 (2001) - 2000
- [j6]K. Murugesan, D. Paul Dhayabaran, David J. Evans:
Analysis of non-linear singular system from fluid dynamics using extended runge-kutta methods. Int. J. Comput. Math. 76(2): 239-266 (2000)
1990 – 1999
- 1999
- [j5]K. Murugesan, D. Paul Dhayabaran, David J. Evans:
Analysis of different second order systems via runge-kutta method. Int. J. Comput. Math. 70(3): 477-493 (1999) - [j4]K. Murugesan, D. Paul Dhayabaran, David J. Evans:
Analysis of second order multivariate linear system using single term walsh series technique and runge kutta method. Int. J. Comput. Math. 72(3): 367-374 (1999) - 1992
- [j3]K. Balachandran, K. Murugesan:
Optimal control of singular systems via single-term walsh series. Int. J. Comput. Math. 43(3-4): 153-159 (1992) - 1991
- [j2]K. Balachandran, K. Murugesan:
Numerical solution of a singular nonlinear system from fluid dynamics. Int. J. Comput. Math. 38(3-4): 211-218 (1991) - 1990
- [j1]K. Balachandran, K. Murugesan:
Analysis of nonlinear singular systems via stws method. Int. J. Comput. Math. 36(1-2): 9-12 (1990)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint