Search Results - "Vengattaraman, Thirumal"
-
1
A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications
Published in Journal of King Saud University. Computer and information sciences (01-02-2021)“…•Systematic organization of Data Compression (DC) concepts with its importance, mathematical formulation and performance measures.•Critical investigation of…”
Get full text
Journal Article -
2
A multi-agent approach: To preserve user information privacy for a pervasive and ubiquitous environment
Published in Egyptian informatics journal (01-03-2015)“…Cloud user’s data are getting insecure in current technological advancement. This research focuses on proposing a secure model to maintain the secrecy in a…”
Get full text
Journal Article -
3
Reinforced cuckoo search algorithm-based multimodal optimization
Published in Applied intelligence (Dordrecht, Netherlands) (01-06-2019)“…This work proposes a Reinforced Cuckoo Search Algorithm (RCSA) for multimodal optimization, which comprises three different strategies: modified selection…”
Get full text
Journal Article -
4
A secure data privacy preservation for on-demand cloud service
Published in Journal of King Saud University. Engineering sciences (01-04-2017)“…This paper spotlights privacy and its obfuscation issues of intellectual, confidential information owned by insurance and finance sectors. Privacy risk in…”
Get full text
Journal Article -
5
Data privacy breach prevention framework for the cloud service
Published in Security and communication networks (01-04-2015)“…This paper examines the privacy awareness and importance of user's secrecy preserving in current ubiquitous cloud computing world. Data stored in the cloud…”
Get full text
Journal Article -
6
A New Objective Image Quality Assessment Metric: For Color and Grayscale Images
Published in 3D research (01-09-2018)“…Image quality assessment (IQA) is a challenging task in digital image processing where the images get distorted in several situations. In recent years, various…”
Get full text
Journal Article -
7
A secure data privacy preservation for on-demand
Published in Journal of King Saud University. Engineering sciences (01-04-2017)“…This paper spotlights privacy and its obfuscation issues of intellectual, confidential information owned by insurance and finance sectors. Privacy risk in…”
Get full text
Journal Article -
8
GPS: a constraint-based gene position procurement in chromosome for solving large-scale multiobjective multiple knapsack problems
Published in Frontiers of Computer Science (01-02-2018)“…The multiple knapsack problem (MKP) forms a base for resolving many real-life problems. This has also been considered with multiple objectives in genetic…”
Get full text
Journal Article -
9
-
10
Greedy based population seeding technique in Ant Colony Optimization algorithm
Published in 2016 International Conference on Communication and Electronics Systems (ICCES) (01-10-2016)“…In this paper, a new population seeding technique has been introduced in ACO algorithm. The method used for seeding technique is Greedy method. Along with the…”
Get full text
Conference Proceeding