Diabetes prediction using machine learning algorithms A Mujumdar, V Vaidehi Procedia Computer Science 165, 292-299, 2019 | 459 | 2019 |
A Survey on malware analysis and mitigation techniques SS Chakkaravarthy, D Sangeetha, V Vaidehi Computer Science Review 32, 1-23, 2019 | 217 | 2019 |
Target Tracking using Interactive Multiple Model for Wireless Sensor Network S Vasuhi, V Vaidehi Information Fusion, 2015 | 112 | 2015 |
Video based automatic fall detection in indoor environment V Vaidehi, K Ganapathy, K Mohan, A Aldrin, K Nirmal Recent Trends in Information Technology (ICRTIT), 2011 International …, 2011 | 93 | 2011 |
Solar energy harvesting for wireless sensor networks PTV Bhuvaneswari, R Balakumar, V Vaidehi, P Balamuralidhar Computational Intelligence, Communication Systems and Networks, 2009. CICSYN …, 2009 | 90 | 2009 |
Abnormal human activity recognition using SVM based approach A Palaniappan, R Bhargavi, V Vaidehi Recent Trends In Information Technology (ICRTIT), 2012 International …, 2012 | 87 | 2012 |
Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks SS Chakkaravarthy, D Sangeetha, MV Cruz, V Vaidehi, B Raman IEEE Access 8, 169944-169956, 2020 | 74 | 2020 |
Neural network aided Kalman filtering for multitarget tracking applications V Vaidehi, N Chitra, M Chokkalingam, CN Krishnan Computers & Electrical Engineering 27 (2), 217-228, 2001 | 73 | 2001 |
Minimal infrequent pattern based approach for mining outliers in data streams CS Hemalatha, V Vaidehi, R Lakshmi Expert Systems with Applications 42 (4), 1998-2012, 2015 | 71 | 2015 |
Agent based health monitoring of elderly people in indoor environments using wireless sensor networks V Vaidehi, M Vardhini, H Yogeshwaran, G Inbasagar, R Bhargavi, ... Procedia Computer Science 19, 64-71, 2013 | 61 | 2013 |
Always best-connected QoS integration model for the WLAN, WiMAX heterogeneous network J Jackson Juliet Roy, V Vaidehi, S Srikanth Industrial and Information Systems, First International Conference on, 361-366, 2006 | 59 | 2006 |
Secure Group Key Management Scheme for Multicast Networks. R Srinivasan, V Vaidehi, R Rajaraman, S Kanagaraj, RC Kalimuthu, ... IJ Network Security 10 (3), 205-209, 2010 | 53 | 2010 |
Cloud-enabled remote health monitoring system S Babu, M Chandini, P Lavanya, K Ganapathy, V Vaidehi Recent Trends in Information Technology (ICRTIT), 2013 International …, 2013 | 52 | 2013 |
Enhancement techniques incorporated in LEACH-a survey PTV Bhuvaneswari, V Vaidehi Indian Journal of Science and Technology 2 (5), 36-44, 2009 | 50 | 2009 |
WC-PAD: Web Crawling based Phishing Attack Detection T Nathezhtha, D Sangeetha, V Vaidehi 2019 International Carnahan Conference on Security Technology (ICCST), 1-6, 2019 | 48 | 2019 |
A novel approach to the integration of GPS and INS using recurrent neural networks with evolutionary optimization techniques M Malleswaran, V Vaidehi, N Sivasankari Aerospace Science and Technology 32 (1), 169-179, 2014 | 47 | 2014 |
Frequent Bit Pattern Mining Over Tri-axial Accelerometer Data Streams for Recognizing Human Activities and Detecting Fall CS Hemalatha, V Vaidehi Procedia Computer Science 19, 56-63, 2013 | 44 | 2013 |
Cost-effective workflow scheduling approach on cloud under deadline constraint using firefly algorithm KK Chakravarthi, L Shyamala, V Vaidehi Applied Intelligence, 1-16, 2020 | 42 | 2020 |
Role-based policy to maintain privacy of patient health records in cloud A Tembhare, SS Chakkaravarthy, D Sangeetha, V Vaidehi, MV Rathnam The Journal of Supercomputing, 1-16, 2019 | 42 | 2019 |
Anomaly detection using DBSCAN clustering technique for traffic video surveillance R Ranjith, JJ Athanesious, V Vaidehi Advanced Computing (ICoAC), 2015 Seventh International Conference on, 1-6, 2015 | 42 | 2015 |