default search action
Jaidhar C. D.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Sujatha M, Jaidhar C. D.:
Machine learning-based approaches to enhance the soil fertility - A review. Expert Syst. Appl. 240: 122557 (2024) - [j27]M. Sujatha, C. D. Jaidhar:
Canopy centre-based fuzzy-C-means clustering for enhancement of soil fertility prediction. Int. J. Comput. Sci. Eng. 27(1): 90-102 (2024) - [j26]Dinesh Naik, Jaidhar C. D.:
Video Captioning using Sentence Vector-enabled Convolutional Framework with Short-Connected LSTM. Multim. Tools Appl. 83(4): 11187-11213 (2024) - [c25]Rajesh Nayak, C. D. Jaidhar:
Smart Appliance Abnormal Electrical Power Consumption Detection. ACNS Workshops (2) 2024: 193-197 - 2023
- [j25]C. K. Sunil, C. D. Jaidhar, Nagamma Patil:
Systematic study on deep learning-based plant disease detection or classification. Artif. Intell. Rev. 56(12): 14955-15052 (2023) - [j24]Sujatha M, Jaidhar C. D., Mallikarjuna Lingappa:
1D convolutional neural networks-based soil fertility classification and fertilizer prescription. Ecol. Informatics 78: 102295 (2023) - [j23]C. K. Sunil, Jaidhar C. D., Nagamma Patil:
Tomato plant disease classification using Multilevel Feature Fusion with adaptive channel spatial and pixel attention mechanism. Expert Syst. Appl. 228: 120381 (2023) - [j22]Rajesh Nayak, C. D. Jaidhar:
Employing Feature Extraction, Feature Selection, and Machine Learning to Classify Electricity Consumption as Normal or Electricity Theft. SN Comput. Sci. 4(5): 483 (2023) - [c24]Sujatha M, Jaidhar C. D.:
Symbolic Deterministic Finite Automata-based Automated Fertilizer Prescription. ICCCNT 2023: 1-7 - 2022
- [j21]C. K. Sunil, Jaidhar C. D., Nagamma Patil:
Cardamom Plant Disease Detection Approach Using EfficientNetV2. IEEE Access 10: 789-804 (2022) - [j20]Dinesh Naik, C. D. Jaidhar:
Semantic context driven language descriptions of videos using deep neural network. J. Big Data 9(1): 17 (2022) - [j19]Dinesh Naik, C. D. Jaidhar:
A novel Multi-Layer Attention Framework for visual description prediction using bidirectional LSTM. J. Big Data 9(1): 104 (2022) - 2021
- [j18]S. L. Shiva Darshan, Jaidhar C. D.:
Windows Malware Detector Using Convolutional Neural Network Based on Visualization Images. IEEE Trans. Emerg. Top. Comput. 9(2): 1057-1069 (2021) - [c23]Dinesh Naik, C. D. Jaidhar:
Weakly Supervised Image Annotation and Segmentation. ICCCNT 2021: 1-8 - 2020
- [j17]Tushaar Gangavarapu, C. D. Jaidhar, Bhabesh Chanduka:
Applicability of machine learning in spam and phishing email filtering: review and approaches. Artif. Intell. Rev. 53(7): 5019-5081 (2020) - [j16]S. L. Shiva Darshan, C. D. Jaidhar:
An empirical study to estimate the stability of random forest classifier on the hybrid features recommended by filter based feature selection technique. Int. J. Mach. Learn. Cybern. 11(2): 339-358 (2020) - [j15]R. Anusha, C. D. Jaidhar:
Clothing invariant human gait recognition using modified local optimal oriented pattern binary descriptor. Multim. Tools Appl. 79(3-4): 2873-2896 (2020) - [j14]R. Anusha, C. D. Jaidhar:
Human gait recognition based on histogram of oriented gradients and Haralick texture descriptor. Multim. Tools Appl. 79(11-12): 8213-8234 (2020) - [j13]Shridhar Sanshi, C. D. Jaidhar:
Enhanced mobility routing protocol for wireless sensor network. Wirel. Networks 26(1): 333-347 (2020) - [c22]Tushaar Gangavarapu, C. D. Jaidhar:
A Novel Bio-inspired Hybrid Metaheuristic for Unsolicited Bulk Email Detection. ICCS (3) 2020: 240-254 - [c21]C. K. Sunil, C. D. Jaidhar, Nagamma Patil:
Empirical Study on Multi Convolutional Layer-based Convolutional Neural Network Classifier for Plant Leaf Disease Detection. ICIIS 2020: 460-465
2010 – 2019
- 2019
- [j12]Shridhar Sanshi, Jaidhar C. D.:
Fuzzy optimised routing metric with mobility support for RPL. IET Commun. 13(9): 1253-1261 (2019) - [j11]S. L. Shiva Darshan, C. D. Jaidhar:
Windows malware detection system based on LSVC recommended hybrid features. J. Comput. Virol. Hacking Tech. 15(2): 127-146 (2019) - [j10]Abhishek Kumar Singh, C. D. Jaidhar, Ajay Kumara M. A.:
Experimental analysis of Android malware detection based on combinations of permissions and API-calls. J. Comput. Virol. Hacking Tech. 15(3): 209-218 (2019) - [j9]Shridhar Sanshi, C. D. Jaidhar:
Enhanced mobility aware routing protocol for Low Power and Lossy Networks. Wirel. Networks 25(4): 1641-1655 (2019) - [c20]Nishant Kumar, Suyash Ghuge, C. D. Jaidhar:
Three-Layer Security for Password Protection Using RDH, AES and ECC. HIS 2019: 230-239 - [c19]Tushaar Gangavarapu, C. D. Jaidhar:
An Empirical Study to Detect the Collision Rate in Similarity Hashing Algorithm Using MD5. ICDSE 2019: 11-14 - [c18]R. Anusha, C. D. Jaidhar:
Frontal Gait Recognition based on Hierarchical Centroid Shape Descriptor and Similarity Measurement. ICDSE 2019: 71-76 - [c17]R. Anusha, C. D. Jaidhar:
Gaussian Filtered Gait Energy Template and Centroid Corner Distance Features for Human Gait Recognition. ICIIS 2019: 425-430 - [c16]R. Anusha, C. D. Jaidhar:
An Approach to Speed Invariant Gait Analysis for Human Recognition using Mutual Information. TENCON 2019: 1616-1621 - 2018
- [j8]Ajay Kumara M. A., Jaidhar C. D.:
Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM. Future Gener. Comput. Syst. 79: 431-446 (2018) - [j7]Raj K. Jaiswal, C. D. Jaidhar:
A Performance Evaluation of Location Prediction Position-Based Routing Using Real GPS Traces for VANET. Wirel. Pers. Commun. 102(1): 275-292 (2018) - [c15]R. Anusha, C. D. Jaidhar:
On Human Identification Using Running Patterns: A Straightforward Approach. ISDA (2) 2018: 322-331 - [c14]Shridhar Sanshi, C. D. Jaidhar:
Mobility Aware Routing Protocol Based on DIO Message for Low Power and Lossy Networks. ISDA (1) 2018: 497-508 - [c13]Bhabesh Chanduka, Tushaar Gangavarapu, C. D. Jaidhar:
A Single Program Multiple Data Algorithm for Feature Selection. ISDA (1) 2018: 662-672 - 2017
- [j6]Ajay Kumara M. A., Jaidhar C. D.:
Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor. Digit. Investig. 23: 99-123 (2017) - [j5]Raj K. Jaiswal, Jaidhar C. D.:
Location prediction algorithm for a nonlinear vehicular movement in VANET using extended Kalman filter. Wirel. Networks 23(7): 2021-2036 (2017) - [c12]Chetan Gudisagar, Bibhu Ranjan Sahoo, M. Sushma, C. D. Jaidhar:
Secure data migration between cloud storage systems. ICACCI 2017: 2208-2212 - [c11]Raj K. Jaiswal, Jaidhar C. D.:
PPRP: Predicted Position Based Routing Protocol Using Kalman Filter for Vehicular Ad-hoc Network. ICDCN 2017: 23 - [c10]Shridhar Sanshi, C. D. Jaidhar:
Multimetrics-Based Objective Function for Low-power and Lossy Networks Under Mobility. SocProS (2) 2017: 391-403 - [c9]S. L. Shiva Darshan, C. D. Jaidhar:
Empirical Study on Features Recommended by LSVC in Classifying Unknown Windows Malware. SocProS (2) 2017: 577-590 - 2016
- [c8]S. L. Shiva Darshan, Ajay Kumara M. A., C. D. Jaidhar:
Windows malware detection based on cuckoo sandbox generated report using machine learning algorithm. ICIIS 2016: 534-539 - [c7]Dinesh Naik, C. D. Jaidhar:
Image segmentation using encoder-decoder architecture and region consistency activation. ICIIS 2016: 724-729 - [c6]Ajay Kumara M. A., Jaidhar C. D.:
VMI Based Automated Real-Time Malware Detector for Virtualized Cloud Environment. SPACE 2016: 281-300 - 2015
- [c5]Ajay Kumara M. A., Jaidhar C. D.:
Execution Time Measurement of Virtual Machine Volatile Artifacts Analyzers. ICPADS 2015: 314-319 - [c4]Raj K. Jaiswal, Jaidhar C. D.:
An Applicability of AODV and OLSR Protocols on IEEE 802.11p for City Road in VANET. NEW2AN 2015: 286-298 - [c3]Raj K. Jaiswal, Jaidhar C. D.:
EDAGF: Estimation & Direction Aware Greedy Forwarding for Urban Scenario in Vehicular Ad-Hoc Network. UIC/ATC/ScalCom 2015: 814-821 - 2013
- [j4]Ravi Singh Pippal, Jaidhar C. D., Shashikala Tapaswi:
Enhanced Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing. Informatica (Slovenia) 37(2): 149-156 (2013) - [j3]Ravi Singh Pippal, Jaidhar C. D., Shashikala Tapaswi:
Robust Smart Card Authentication Scheme for Multi-server Architecture. Wirel. Pers. Commun. 72(1): 729-745 (2013) - [c2]Bosco Sebastian, Paromita Choudhury, Jaidhar C. D.:
Mechanism for Preventing Registration Flooding Attack in SIP. ICACNI 2013: 705-712 - 2012
- [j2]Ravi Singh Pippal, Shashikala Tapaswi, Jaidhar C. D.:
Secure Key Exchange Scheme for IPTV Broadcasting. Informatica (Slovenia) 36(1): 47-52 (2012) - [c1]Ravi Singh Pippal, Jaidhar C. D., Shashikala Tapaswi:
Security Vulnerabilities of User Authentication Scheme Using Smart Card. DBSec 2012: 106-113
2000 – 2009
- 2007
- [j1]Jaidhar C. D., A. V. Reddy:
Efficient Variable Length Block Switching Mechanism. Int. J. Comput. Commun. Control 2(3): 269-278 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint