default search action
Shitharth Selvarajan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Shitharth Selvarajan:
A comprehensive study on modern optimization techniques for engineering applications. Artif. Intell. Rev. 57(8): 194 (2024) - [j45]Alaa O. Khadidos, Hariprasath Manoharan, Shitharth Selvarajan, Adil Omar Khadidos, Abdulrhman M. Alshareef, Mohammed Altwijri:
Distribution of resources beyond 5G networks with heterogeneous parallel processing and graph optimization algorithms. Clust. Comput. 27(6): 8269-8287 (2024) - [j44]Shitharth Selvarajan, Hariprasath Manoharan, Alaa O. Khadidos, Achyut Shankar, Adil Omar Khadidos, Wattana Viriyasitavat, Li Da Xu:
SSCM: a secured approach to supply chain management with control management using blowfish optimization. Enterp. Inf. Syst. 18(6) (2024) - [j43]Shitharth Selvarajan, Hariprasath Manoharan, Achyut Shankar, Alaa O. Khadidos, Adil Omar Khadidos, Antonino Galletta:
PUDT: Plummeting uncertainties in digital twins for aerospace applications using deep learning algorithms. Future Gener. Comput. Syst. 153: 575-586 (2024) - [j42]Osama Bassam J. Rabie, Shitharth Selvarajan, Tawfiq Hasanin, Gouse Baig Mohammad, Abddulrhman M. Alshareef, Mueen Uddin:
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs). Int. J. Inf. Sec. 23(1): 51-80 (2024) - [j41]Osama Bassam J. Rabie, Shitharth Selvarajan, Tawfiq Hasanin, Gouse Baig Mohammad, Abddulrhman M. Alshareef, Mueen Uddin:
Correction: A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs). Int. J. Inf. Sec. 23(3): 2489 (2024) - [j40]Jiaxin He, Yong Cheng, Wei Wang, Yakang Gu, Yixuan Wang, Wenjie Zhang, Achyut Shankar, Shitharth Selvarajan, Sathish A. P. Kumar:
EC-YOLOX: A Deep-Learning Algorithm for Floating Objects Detection in Ground Images of Complex Water Environments. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 7359-7370 (2024) - [j39]Zhili Zhou, Zhipeng Bao, Weiwei Jiang, Yuan Huang, Yun Peng, Achyut Shankar, Carsten Maple, Shitharth Selvarajan:
Latent Vector Optimization-Based Generative Image Steganography for Consumer Electronic Applications. IEEE Trans. Consumer Electron. 70(1): 4357-4366 (2024) - [j38]Alaa O. Khadidos, Hariprasath Manoharan, Shitharth Selvarajan, Adil Omar Khadidos, Achyut Shankar, Shailesh Khapre:
SPIS: Signal Processing for Integrated Sensing Technologies Using 6G Networks with Machine Learning Algorithms. Wirel. Pers. Commun. 136(1): 181-211 (2024) - 2023
- [j37]Anant Saraswat, Kumar Abhishek, Hiteshwar Kumar Azad, S. Shitharth:
MSI-A: An Energy Efficient Approximated Cache Coherence Protocol. IEEE Access 11: 48123-48135 (2023) - [j36]Abhishek Kumar, Swarn Avinash Kumar, Vishal Dutt, S. Shitharth, Esha Tripathi:
IoT based arrhythmia classification using the enhanced hunt optimization-based deep learning. Expert Syst. J. Knowl. Eng. 40(7) (2023) - [j35]V. Thiruppathy Kesavan, S. Murugavalli, Premkumar Manoharan, Shitharth Selvarajan:
Adaptive neuro-fuzzy inference system and particle swarm optimization: A modern paradigm for securing VANETs. IET Commun. 17(19): 2219-2236 (2023) - [j34]S. Shitharth, Hariprasath Manoharan, Lakshmi Narayanan, Takkedu Malathi, S. Vatchala, Kommu Gangadhara Rao:
Prognosis of urban environs using time series analysis for preventing overexploitation using artificial intelligence. Int. J. Data Anal. Tech. Strateg. 15(1/2): 97-115 (2023) - [j33]S. Shitharth, Hariprasath Manoharan, Rakan Alsowail, Achyut Shankar, Saravanan Pandiaraj, Carsten Maple, Gwanggil Jeon:
Development of edge computing and classification using The Internet of Things with incremental learning for object detection. Internet Things 23: 100852 (2023) - [j32]Shitharth Selvarajan, Gautam Srivastava, Alaa O. Khadidos, Adil Omar Khadidos, Mohamed Baza, Ali Alshehri, Jerry Chun-Wei Lin:
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. J. Cloud Comput. 12(1): 38 (2023) - [j31]Tao Hai, Jincheng Zhou, Ye Lu, Dayang N. A. Jawawi, Dan Wang, Shitharth Selvarajan, Hariprasath Manoharan, Ebuka Ibeke:
An archetypal determination of mobile cloud computing for emergency applications using decision tree algorithm. J. Cloud Comput. 12(1): 73 (2023) - [j30]J. Godwin Ponsam, K. Nimala, Gouse Baig Mohammad, S. Shitharth, Vijaya Kumar Reddy Radha, B. Srinivasa Rao, Srihari Kannan, Selvaraj Chandragandhi:
Certain investigation on optimization technique for sensor nodes in the bio medical recording system. J. Intell. Fuzzy Syst. 45(4): 7145-7159 (2023) - [j29]Chandrasen Pandey, Vaibhav Tiwari, Rajkumar Singh Rathore, Rutvij H. Jhaveri, Diptendu Sinha Roy, Shitharth Selvarajan:
Resource-Efficient Synthetic Data Generation for Performance Evaluation in Mobile Edge Computing Over 5G Networks. IEEE Open J. Commun. Soc. 4: 1866-1878 (2023) - [j28]Shitharth Selvarajan, Hariprasath Manoharan, Alaa O. Khadidos, Achyut Shankar, M. S. Mekala, Adil Omar Khadidos:
RLIS: Resource Limited Improved Security Beyond Fifth-Generation Networks Using Deep Learning Algorithms. IEEE Open J. Commun. Soc. 4: 2383-2396 (2023) - [j27]Rajanikanth Aluvalu, V. N. Senthil Kumaran, Manikandan Thirumalaisamy, Shajahan Basheer, Eman Ali Aldhahri, Shitharth Selvarajan:
Efficient data transmission on wireless communication through a privacy-enhanced blockchain process. PeerJ Comput. Sci. 9: e1308 (2023) - [j26]Hariprasath Manoharan, Shitharth Selvarajan, Rajanikanth Aluvalu, Maha S. Abdelhaq, Raed A. Alsaqour, Mueen Uddin:
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation. PeerJ Comput. Sci. 9: e1709 (2023) - [j25]S. Shitharth, Saud Yonbawi, Hariprasath Manoharan, Achyut Shankar, Carsten Maple, Sultan Alahmari:
Secured data transmissions in corporeal unmanned device to device using machine learning algorithm. Phys. Commun. 59: 102116 (2023) - [j24]Khaled Hamed Alyoubi, S. Shitharth, Hariprasath Manoharan, Adil Omar Khadidos, Alaa O. Khadidos:
Connotation of fuzzy logic system in Underwater communication systems for navy applications with data indulgence route. Sustain. Comput. Informatics Syst. 38: 100862 (2023) - 2022
- [j23]Shitharth Selvarajan, Pravin Kshirsagar, Balachandran Praveen Kumar, Khaled Hamed Alyoubi, Alaa O. Khadidos:
An Innovative Perceptual Pigeon Galvanized Optimization (PPGO) Based Likelihood Naïve Bayes (LNB) Classification Approach for Network Intrusion Detection System. IEEE Access 10: 46424-46441 (2022) - [j22]Alaa O. Khadidos, Shitharth Selvarajan, Hariprasath Manoharan, Ayman Yafoz, Adil Omar Khadidos, Khaled Hamed Alyoubi:
An Intelligent Security Framework Based on Collaborative Mutual Authentication Model for Smart City Networks. IEEE Access 10: 85289-85304 (2022) - [j21]Koganti Srilakshmi, Nakka Srinivas, Balachandran Praveen Kumar, Jonnala Ganesh Prasad Reddy, Sravanthy Gaddameedhi, Nagaraju Valluri, Shitharth Selvarajan:
Design of Soccer League Optimization Based Hybrid Controller for Solar-Battery Integrated UPQC. IEEE Access 10: 107116-107136 (2022) - [j20]Devikanniga Devarajan, D. Stalin Alex, T. R. Mahesh, V. Vinoth Kumar, Rajanikanth Aluvalu, V. Uma Maheswari, S. Shitharth:
Cervical Cancer Diagnosis Using Intelligent Living Behavior of Artificial Jellyfish Optimized With Artificial Neural Network. IEEE Access 10: 126957-126968 (2022) - [j19]Hariprasath Manoharan, Sulaima Lebbe Abdul Haleem, Shitharth Selvarajan, Pravin Kshirsagar, Vineet Tirth, M. Thangamani, Radha Raman Chandan:
A machine learning algorithm for classification of mental tasks. Comput. Electr. Eng. 99: 107785 (2022) - [j18]Shitharth Selvarajan, Hariprasath Manoharan, Abdulrhman M. Alshareef, Ayman Yafoz, Hassan Alkhiri, Olfat M. Mirza:
Hyper spectral image classifications for monitoring harvests in agriculture using fly optimization algorithm. Comput. Electr. Eng. 103: 108400 (2022) - [j17]Vidhu Kiran Sharma, Srikanta Kumar Mohapatra, S. Shitharth, Saud Yonbawi, Ayman Yafoz, Sultan Alahmari:
An optimization-based machine learning technique for smart home security using 5G. Comput. Electr. Eng. 104(Part): 108434 (2022) - [j16]C. Muralidharan, Mohamed Sirajudeen Yoosuf, S. Shitharth, Nawaf Alhebaishi, Rayan H. Mosli, Hassan Haes Alhelou:
Three-phase service level agreements and trust management model for monitoring and managing the services by trusted cloud broker. IET Commun. 16(19): 2309-2320 (2022) - [j15]Kommu Gangadhara Rao, S. Vatchala, Takkedu Malathi S., S. Shitharth, Hariprasath Manoharan, Lakshmi Narayanan:
Prognosis of Urban Environs using Time Series Analysis for Preventing Overexploitation using Artificial Intelligence. Int. J. Data Anal. Tech. Strateg. 14(4) (2022) - [j14]Mamata Garanayak, Suvendu Kumar Nayak, Sangeetha K., Tanupriya Choudhury, S. Shitharth:
Content and Popularity-Based Music Recommendation System. Int. J. Inf. Syst. Model. Des. 13(7): 1-14 (2022) - [j13]Sangeetha Kannan, Shitharth Selvarajan, Gouse Baig Mohammad:
Enhanced SCADA IDS Security by Using MSOM Hybrid Unsupervised Algorithm. Int. J. Web Based Learn. Teach. Technol. 17(2): 1-9 (2022) - [j12]Shitharth Selvarajan, Fahd Saleh Alotaibi, Hariprasath Manoharan, Adil Omar Khadidos, Khaled Hamed Alyoubi, Abdulrhman M. Alshareef:
Reconnoitering the significance of securty using multiple cloud environments for conveyance applications with blowfish algorithm. J. Cloud Comput. 11: 76 (2022) - [j11]Cherukuri Santhan Kumar, Natarajan Karuppiah, Balachandran Praveen Kumar, S. Shitharth, Dasu Butti:
Improvement of the Resilience of a Microgrid Using Fragility Modeling and Simulation. J. Electr. Comput. Eng. 2022: 3074298:1-3074298:12 (2022) - [j10]Adil Omar Khadidos, Shitharth Selvarajan, Alaa O. Khadidos, K. Sangeetha, Khaled Hamed Alyoubi:
Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism. J. Sensors 2022: 1-17 (2022) - [j9]Mohamed Sirajudeen Yoosuf, C. Muralidharan, S. Shitharth, Mohammed Alghamdi, Mohammed Maray, Osama Bassam J. Rabie:
FogDedupe: A Fog-Centric Deduplication Approach Using Multi-Key Homomorphic Encryption Technique. J. Sensors 2022: 1-16 (2022) - [j8]Shouvik Banik, Nonita Sharma, Monika Mangla, Sachi Nandan Mohanty, Shitharth Selvarajan:
LSTM based decision support system for swing trading in stock market. Knowl. Based Syst. 239: 107994 (2022) - [j7]Hassan A. Alterazi, Pravin Kshirsagar, Hariprasath Manoharan, Shitharth Selvarajan, Nawaf Alhebaishi, Gautam Srivastava, Jerry Chun-Wei Lin:
Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization. Sensors 22(16): 6117 (2022) - [j6]Manikandan Thirumalaisamy, Shajahan Basheer, Shitharth Selvarajan, Sara A. Althubiti, Fayadh Alenezi, Gautam Srivastava, Jerry Chun-Wei Lin:
Interaction of Secure Cloud Network and Crowd Computing for Smart City Data Obfuscation. Sensors 22(19): 7169 (2022) - [j5]S. K. Prashanth, S. Shitharth, Balachandran Praveen Kumar, V. Subedha, K. Sangeetha:
Optimal Feature Selection Based on Evolutionary Algorithm for Intrusion Detection. SN Comput. Sci. 3(6): 439 (2022) - [j4]Mididoddi Padmaja, Shitharth Selvarajan, K. Prasuna, Abhay Chaturvedi, Pravin Kshirsagar, A. Vani:
Grow of Artificial Intelligence to Challenge Security in IoT Application. Wirel. Pers. Commun. 127(3): 1829-1845 (2022) - [c3]Gautam Srivastava, Hariprasath Manoharan, Thippa Reddy Gadekallu, Rutvij H. Jhaveri, Shitharth Selvarajan, Kadiyala Ramana:
Connotation of Unconventional Drones for Agricultural Applications with Node Arrangements Using Neural Networks. VTC Fall 2022: 1-6 - 2021
- [j3]Shitharth Selvarajan, M. V. V. Prasad Kantipudi, K. Sangeetha, Pravin Kshirsagar, Thanikanti Sudhakar Babu, Hassan Haes Alhelou:
An Enriched RPCO-BCNN Mechanisms for Attack Detection and Classification in SCADA Systems. IEEE Access 9: 156297-156312 (2021) - [c2]Akhilendranath Mummadi, B. Midhun Krishna Yadav, Rachamalla Sadhwika, S. Shitharth:
An Appraisal of Cyber-Attacks and Countermeasures Using Machine Learning Algorithms. ICAIDS 2021: 27-40 - [c1]S. Saisree, S. Shitharth:
A Comprehensive Study on Eucalyptus, Open Stack and Cloud Stack. ICAIDS 2021: 404-418 - 2020
- [j2]Shitharth Selvarajan, Masood Shaik, Sirajudeen Ameerjohn, Sangeetha Kannan:
Mining of intrusion attack in SCADA network using clustering and genetically seeded flora-based optimal classification algorithm. IET Inf. Secur. 14(1): 1-11 (2020)
2010 – 2019
- 2017
- [j1]Shitharth Selvarajan, David Prince Winston:
An enhanced optimization based algorithm for intrusion detection in SCADA network. Comput. Secur. 70: 16-26 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint