default search action
Revathi Venkataraman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Abinaya Gopalakrishnan, Raj Gururajan, Xujuan Zhou, Revathi Venkataraman, Ka Ching Chan, Niall Higgins:
A survey of autonomous monitoring systems in mental health. WIREs Data. Mining. Knowl. Discov. 14(3) (2024) - 2023
- [j19]Abinaya Gopalakrishnan, Raj Gururajan, Revathi Venkataraman, Xujuan Zhou, Ka Ching Chan, Arul Saravanan, Maitrayee Sen:
Attribute Selection Hybrid Network Model for risk factors analysis of postpartum depression using Social media. Brain Informatics 10(1): 28 (2023) - [j18]Rajasekar Deepa, Revathi Venkataraman:
Efficient target monitoring with fault-tolerant connectivity in wireless sensor networks. Trans. Emerg. Telecommun. Technol. 34(2) (2023) - [c5]Abinaya Gopalakrishnan, Raj Gururajan, Revathi Venkataraman, Xujuan Zhou, Ka Ching Chan:
A Combined Attribute Extraction Method for Detecting Postpartum Depression Using Social Media. HIS 2023: 17-29 - [i1]Souradeep Das, Revathi Venkataraman:
Incentivized Third Party Collateralization for Stablecoins. CoRR abs/2309.11521 (2023) - 2022
- [j17]Gautam Srivastava, Muneeswari S, Revathi Venkataraman, V. Kavitha, N. Parthiban:
A review of the state of the art in business intelligence software. Enterp. Inf. Syst. 16(1): 1-28 (2022) - [j16]Abinaya Gopalakrishnan, Revathi Venkataraman, Raj Gururajan, Xujuan Zhou, Rohan Genrich:
Mobile phone enabled mental health monitoring to enhance diagnosis for severity assessment of behaviours: a review. PeerJ Comput. Sci. 8: e1042 (2022) - 2021
- [j15]G. Abirami, Revathi Venkataraman:
Performance analysis of the dynamic trust model algorithm using the fuzzy inference system for access control. Comput. Electr. Eng. 92: 107132 (2021) - [j14]R. Deepa, Revathi Venkataraman:
Enhancing Whale Optimization Algorithm with Levy Flight for coverage optimization in wireless sensor networks. Comput. Electr. Eng. 94: 107359 (2021) - [j13]Mullur Pushpalatha, T. Anusha, T. Rama Rao, Revathi Venkataraman:
L-RPL: RPL powered by laplacian energy for stable path selection during link failures in an Internet of Things network. Comput. Networks 184: 107697 (2021) - [j12]R. Deepa, Revathi Venkataraman:
Target Coverage and Network Connectivity Challenges in Wireless Sensor Networks. EAI Endorsed Trans. Energy Web 8(31): e12 (2021) - [j11]C. Jothikumar, Revathi Venkataraman, T. Sai Raj, J. Selvin Paul Peter, T. Y. J. Nagamalleswari:
EUCOR: An Efficient Unequal Clustering and Optimal Routing in wireless sensor networks for energy conservation. J. Intell. Fuzzy Syst. 40(5): 9187-9195 (2021) - [c4]K. Sornalakshmi, Revathi Venkataraman, N. Parthiban, V. Kavitha:
IoT based Circadian Rhythm Monitoring using Fuzzy Logic. IoTBDS 2021: 223-228 - [c3]Raj Gururajan, Xiaohui Tao, Yuefeng Li, Xujuan Zhou, Soman Elangovan, Srinivas Kondalsamy-Chennakesavan, Revathi Venkataraman:
Emerging Applications in Healthcare and Their Implications to Academia and Practice. WISE (2) 2021: 497-500 - 2020
- [j10]Vaishnavi Moorthy, Revathi Venkataraman, T. Rama Rao:
Security and privacy attacks during data communication in Software Defined Mobile Clouds. Comput. Commun. 153: 515-526 (2020) - [j9]Gautam Srivastava, C. N. S. Vinoth Kumar, V. Kavitha, N. Parthiban, Revathi Venkataraman:
Two-stage data encryption using chaotic neural networks. J. Intell. Fuzzy Syst. 38(3): 2561-2568 (2020) - [j8]R. Mythili, Revathi Venkataraman, T. Sai Raj:
An attribute-based lightweight cloud data access control using hypergraph structure. J. Supercomput. 76(8): 6040-6064 (2020) - [j7]Xujuan Zhou, Raj Gururajan, Yuefeng Li, Revathi Venkataraman, Xiaohui Tao, Ghazal Bargshady, Prabal Datta Barua, Srinivas Kondalsamy-Chennakesavan:
A survey on text classification and its applications. Web Intell. 18(3): 205-216 (2020) - [c2]Xujuan Zhou, Yuefeng Li, Raj Gururajan, Ghazal Bargshady, Xiaohui Tao, Revathi Venkataraman, Prabal Datta Barua, Srinivas Kondalsamy-Chennakesavan:
A New Deep Convolutional Neural Network Model for Automated Breast Cancer Detection. BESC 2020: 1-4
2010 – 2019
- 2019
- [j6]C. Jothikumar, Revathi Venkataraman:
EODC: An Energy Optimized Dynamic Clustering Protocol for Wireless Sensor Network using PSO approach. Int. J. Comput. Commun. Control 14(2): 183-198 (2019) - [j5]C. Jothikumar, Revathi Venkataraman, T. Sai Raj, Rohin Selva:
An energy efficient cluster based routing approach to minimize energy consumption using CORP in wireless sensor networks. J. Intell. Fuzzy Syst. 36(6): 5835-5844 (2019) - 2017
- [j4]Ramya Vijay, T. Rama Rao, Revathi Venkataraman:
Concurrent Multi-Band Low-Noise Amplifier. J. Circuits Syst. Comput. 26(6): 1750104:1-1750104:11 (2017) - 2015
- [j3]Revathi Venkataraman, Scott Moeller, Bhaskar Krishnamachari, T. Rama Rao:
Trust-based backpressure routing in wireless sensor networks. Int. J. Sens. Networks 17(1): 27-39 (2015) - 2014
- [j2]Mullur Pushpalatha, T. Rama Rao, Revathi Venkataraman:
Applicability of sub graph centrality to improve data accessibility among peers in MANETs. Peer-to-Peer Netw. Appl. 7(2): 129-146 (2014) - 2013
- [c1]Anirudh Sunil Nath, Revathi Venkataraman, Mullur Pushpalatha, D. Vanusha:
Implementation of data privacy between nodes using AES in wireless ad hoc networks. ANC@MobiHoc 2013: 19-24 - 2012
- [j1]Revathi Venkataraman, Mullur Pushpalatha, T. Rama Rao:
Regression-based trust model for mobile ad hoc networks. IET Inf. Secur. 6(3): 131-140 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint