default search action
Yogesh Palanichamy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j24]Niveditha Parthasarathy, Yogesh Palanichamy:
Novel Video Benchmark Dataset Generation and Real-Time Recognition of Symbolic Hand Gestures in Indian Dance Applying Deep Learning Techniques. ACM Journal on Computing and Cultural Heritage 16(3): 49:1-49:19 (2023) - 2022
- [j23]Radhakrishnan Maivizhi, Palanichamy Yogesh:
Identity-based secure data aggregation in big data wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 41(1): 16-28 (2022) - [j22]Radhakrishnan Maivizhi, Palanichamy Yogesh:
Fuzzy routing for in-network aggregation in wireless sensor networks. Peer-to-Peer Netw. Appl. 15(1): 592-611 (2022) - [j21]P. Rajasekar, Yogesh Palanichamy:
A flexible deadline-driven resource provisioning and scheduling algorithm for multiple workflows with VM sharing protocol on WaaS-cloud. J. Supercomput. 78(6): 8025-8055 (2022) - 2021
- [j20]P. Rajasekar, Yogesh Palanichamy:
Scheduling multiple scientific workflows using containers on IaaS cloud. J. Ambient Intell. Humaniz. Comput. 12(7): 7621-7636 (2021) - [j19]A. Samson Arun Raj, Yogesh Palanichamy:
Packet classification based aerial intelligent relay-road side unit (air-rsu) framework for vehicular ad-hoc networks. Peer-to-Peer Netw. Appl. 14(3): 1132-1153 (2021) - [j18]P. Rajasekar, Yogesh Palanichamy:
Adaptive Resource Provisioning and Scheduling Algorithm for Scientific Workflows on IaaS Cloud. SN Comput. Sci. 2(6): 456 (2021) - [j17]Radhakrishnan Maivizhi, Palanichamy Yogesh:
Q-learning based routing for in-network aggregation in wireless sensor networks. Wirel. Networks 27(3): 2231-2250 (2021) - [j16]Sripathi Venkata Naga Santhosh Kumar, Yogesh Palanichamy, Munuswamy Selvi, Sannasi Ganapathy, Arputharaj Kannan, Sankar Pariserum Perumal:
Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. Wirel. Networks 27(6): 3873-3894 (2021) - [c3]Radhakrishnan Maivizhi, Palanichamy Yogesh:
Linear Discriminant Analysis for Data Aggregation in Big Data Wireless Sensor Networks. COMAD/CODS 2021: 417 - 2020
- [j15]Radhakrishnan Maivizhi, Palanichamy Yogesh:
Secure In-Network Aggregation in Wireless Sensor Networks. Int. J. Intell. Inf. Technol. 16(1): 49-74 (2020) - [j14]Saraswathi Shunmuganathan, Renuka Devi Saravanan, Yogesh Palanichamy:
Securing VPN from insider and outsider bandwidth flooding attack. Microprocess. Microsystems 79: 103279 (2020) - [j13]A. Samson Arun Raj, Yogesh Palanichamy:
An aerial intelligent relay-road side unit (AIR-RSU) framework for modern intelligent transportation system. Peer-to-Peer Netw. Appl. 13(3): 965-986 (2020) - [j12]Gayathri Santhosh, Yogesh Palanichamy:
Rank-Based Report Filtering Scheme (RRFS) for Verifying Phoney Reports in Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2020: 2785960:1-2785960:22 (2020) - [c2]Radhakrishnan Maivizhi, Palanichamy Yogesh:
Concealed Multidimensional Data Aggregation in Big Data Wireless Sensor Networks. COMAD/CODS 2020: 19-27
2010 – 2019
- 2019
- [j11]Rakesh Rajendran, Sripathi Venkata Naga Santhosh Kumar, Yogesh Palanichamy, Kannan Arputharaj:
Detection of DoS attacks in cloud networks using intelligent rule based classification system. Clust. Comput. 22(Suppl 1): 423-434 (2019) - 2018
- [j10]Sripathi Venkata Naga Santhosh Kumar, Yogesh Palanichamy:
Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wirel. Networks 24(4): 1343-1360 (2018) - 2016
- [j9]Sannasi Ganapathy, Pandi Vijayakumar, Yogesh Palanichamy, Arputharaj Kannan:
An intelligent CRF based feature selection for effective intrusion detection. Int. Arab J. Inf. Technol. 13(1): 44-50 (2016) - 2015
- [j8]Anitha Manikandan, Yogesh Palanichamy:
Optimized Group Channel Assignment Using Computational Geometry over Wireless Mesh Networks. Mob. Inf. Syst. 2015: 718079:1-718079:18 (2015) - 2014
- [j7]Arockia Xavier Annie Rayan, Yogesh Palanichamy:
Effective VCR operations using efficient tree mechanism and scheduling for video streams in peer to peer networks. Int. J. Commun. Networks Distributed Syst. 13(1): 106-118 (2014) - [j6]R. Sethukkarasi, Sannasi Ganapathy, Yogesh Palanichamy, Arputharaj Kannan:
An intelligent neuro fuzzy temporal knowledge representation model for mining temporal patterns. J. Intell. Fuzzy Syst. 26(3): 1167-1178 (2014) - 2013
- [j5]Sannasi Ganapathy, Kanagasabai Kulothungan, Sannasy Muthurajkumar, Muthuswamy Vijayalakshmi, Yogesh Palanichamy, Arputharaj Kannan:
Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J. Wirel. Commun. Netw. 2013: 271 (2013) - 2012
- [j4]Arockia Xavier Annie Rayan, Yogesh Palanichamy, Arputharaj Kannan:
Enhancing Scalability in On-Demand Video Streaming Services for P2P Systems. Adv. Multim. 2012: 109619:1-109619:18 (2012) - [j3]Sannasi Ganapathy, Yogesh Palanichamy, Arputharaj Kannan:
Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM. Comput. Intell. Neurosci. 2012: 850259:1-850259:10 (2012) - [j2]Arockia Xavier Annie Rayan, Yogesh Palanichamy:
Enhanced Link based Congestion Control (ELCC) in Peer-to-Peer (P2P) based Video on Demand (VoD) System. J. Networks 7(10): 1515-1522 (2012) - [j1]Dhatchayani M, Arockia Xavier Annie Rayan, Yogesh Palanichamy, Benet Zacharias:
Test Case Generation and Reusing Test Cases for GUI Designed with HTML. J. Softw. 7(10): 2269-2277 (2012) - [p1]Jaisankar Narayanasamy, Sannasi Ganapathy, Yogesh Palanichamy, Arputharaj Kannan, K. Anand:
An Intelligent Agent Based Intrusion Detection System Using Fuzzy Rough Set Based Outlier Detection. Soft Computing Techniques in Vision Science 2012: 147-153 - 2010
- [c1]Arockia Xavier Annie Rayan, Yogesh Palanichamy:
VoD System: Providing Effective Peer-to-Peer Environment for an Improved VCR Operative Solutions. ICICA (2) 2010: 127-134
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint