Folgen
Srinivas Sethi
Srinivas Sethi
Professor of Computer Science Engineering and Application, IGIT Sarang
Bestätigte E-Mail-Adresse bei igitsarang.ac.in
Titel
Zitiert von
Zitiert von
Jahr
Efficient load balancing in cloud computing using fuzzy logic
S Sethi, A Sahu, SK Jena
IOSR Journal of Engineering 2 (7), 65-71, 2012
1252012
IoT-IIRS: Internet of Things based intelligent-irrigation recommendation system using machine learning approach for efficient water usage
A Bhoi, RP Nayak, SK Bhoi, S Sethi, SK Panda, KS Sahoo, A Nayyar
PeerJ Computer Science 7, e578, 2021
432021
The efficient ant routing protocol for MANET
S Sethi, SK Udgata
International Journal on Computer Science and Engineering 2 (07), 2414-2420, 2010
412010
Optimized and Reliable AODV for MANET
S Sethi, SK Udgata
International Journal of Computer Applications 3 (10), 22-26, 2010
242010
A multi-factor trust management scheme for secure spectrum sensing in cognitive radio networks
S Kar, S Sethi, RK Sahoo
Wireless Personal Communications 97, 2523-2540, 2017
232017
Security challenges in cognitive radio network and defending against Byzantine attack: a survey
S Kar, S Sethi, MK Bhuyan
International Journal of Communication Networks and Distributed Systems 17 …, 2016
212016
Functional analysis of mental stress based on physiological data of GSR sensor
R Sahoo, S Sethi
Emerging ICT for Bridging the Future-Proceedings of the 49th Annual …, 2015
202015
Ml-mds: Machine learning based misbehavior detection system for cognitive software-defined multimedia vanets (csdmv) in smart cities
RP Nayak, S Sethi, SK Bhoi, KS Sahoo, A Nayyar
Multimedia Tools and Applications 82 (3), 3931-3951, 2023
192023
TBDDoSA-MD: Trust-Based DDoS Misbehave Detection Approach in Software-defined Vehicular Network (SDVN).
RP Nayak, S Sethi, SK Bhoi, KS Sahoo, TA Tabbakh, ZA Almusaylim
Computers, Materials & Continua 69 (3), 2021
192021
Software Reliability Prediction using Fuzzy Min-Max Algorithm and Recurrent Neural Network Approach.
MK Bhuyan, DP Mohapatra, S Sethi
International Journal of Electrical & Computer Engineering (2088-8708) 6 (4), 2016
192016
A survey of computational intelligence approaches for software reliability prediction
MK Bhuyan, DP Mohapatra, S Sethi
ACM SIGSOFT Software Engineering Notes 39 (2), 1-10, 2014
172014
PHVA: A position based high speed vehicle detection algorithm for detecting high speed vehicles using vehicular cloud
RP Nayak, S Sethi, SK Bhoi
2018 International Conference on Information Technology (ICIT), 227-232, 2018
162018
Cloud security issues and challenges
S Sethi, S Sruti
Resource Management and Efficiency in Cloud Computing Environments, 89-104, 2017
152017
Architecture of efficient word processing using Hadoop MapReduce for big data applications
B Mandal, S Sethi, RK Sahoo
2015 International Conference on Man and Machine Interfacing (MAMI), 1-6, 2015
152015
Fuzzy-based trusted ant routing (FTAR) protocol in mobile ad hoc networks
S Sethi, SK Udgata
Multi-disciplinary Trends in Artificial Intelligence: 5th International …, 2011
152011
An intelligence-based health biomarker identification system using microarray analysis
B Sahu, JC Badajena, A Panigrahi, C Rout, S Sethi
Applied intelligent decision making in machine learning, 137-161, 2020
142020
Metaheuristic techniques for controller placement in Software-Defined networks
S Mohanty, P Priyadarshini, S Sahoo, B Sahoo, S Sethi
TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 897-902, 2019
142019
Design of WSN in real time application of health monitoring system
S Sethi, RK Sahoo
Virtual and Mobile Healthcare: Breakthroughs in Research and Practice, 643-658, 2020
122020
Prediction strategy for software reliability based on recurrent neural network
MK Bhuyan, DP Mohapatra, S Sethi
Computational Intelligence in Data Mining—Volume 2: Proceedings of the …, 2016
122016
Scalable Cluster Based Ad hoc On-demand distance vector routing protocol for MANET
S Sethi, SK Udgata
2010 Sixth International conference on Wireless Communication and Sensor …, 2010
122010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20