Alert button
Picture for K. Duraiswamy

K. Duraiswamy

Alert button

Neural Networks for Dynamic Shortest Path Routing Problems - A Survey

Add code
Bookmark button
Alert button
May 30, 2010
R. Nallusamy, K. Duraiswamy

Viaarxiv icon

Intrusion Detection In Mobile Ad Hoc Networks Using GA Based Feature Selection

Add code
Bookmark button
Alert button
May 30, 2010
R. Nallusamy, K. Jayarajan, K. Duraiswamy

Figure 1 for Intrusion Detection In Mobile Ad Hoc Networks Using GA Based Feature Selection
Figure 2 for Intrusion Detection In Mobile Ad Hoc Networks Using GA Based Feature Selection
Figure 3 for Intrusion Detection In Mobile Ad Hoc Networks Using GA Based Feature Selection
Viaarxiv icon

Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris

Add code
Bookmark button
Alert button
Mar 07, 2010
A. Jagadeesan, K. Duraiswamy

Figure 1 for Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris
Figure 2 for Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris
Figure 3 for Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris
Viaarxiv icon

Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform

Add code
Bookmark button
Alert button
Dec 03, 2009
P. Meenakshi Devi, M. Venkatesan, K. Duraiswamy

Figure 1 for Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform
Figure 2 for Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform
Figure 3 for Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform
Figure 4 for Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform
Viaarxiv icon

An Application of Bayesian classification to Interval Encoded Temporal mining with prioritized items

Add code
Bookmark button
Alert button
Aug 07, 2009
C. Balasubramanian, K. Duraiswamy

Figure 1 for An Application of Bayesian classification to Interval Encoded Temporal mining with prioritized items
Figure 2 for An Application of Bayesian classification to Interval Encoded Temporal mining with prioritized items
Figure 3 for An Application of Bayesian classification to Interval Encoded Temporal mining with prioritized items
Viaarxiv icon