default search action
Elijah Blessing Rajsingh
Person information
- affiliation: Karunya University, Department of Computer Science and Technology, Coimbatore, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Deva Priya Isravel, Salaja Silas, G. Jaspher Willsie Kathrine, Elijah Blessing Rajsingh, Andrew J:
Enhanced multivariate singular spectrum analysis-based network traffic forecasting for real time industrial IoT applications. IET Networks 13(4): 301-312 (2024) - [j34]Deva Priya Isravel, Salaja Silas, Jaspher Willsie Kathrine Gnanaraj, Elijah Blessing Rajsingh, J. Andrew:
Multivariate Forecasting of Network Traffic in SDN-Based Ubiquitous Healthcare System. IEEE Open J. Commun. Soc. 5: 1537-1550 (2024) - 2023
- [j33]Renu Mary Daniel, Anitha Thomas, Elijah Blessing Rajsingh, Salaja Silas:
A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption. Inf. Comput. 294: 105067 (2023) - [j32]Titus Issac, Salaja Silas, Elijah Blessing Rajsingh:
Modelling a P-System inspired multi-objective centralized heterogeneous wireless outdoor illumination. J. Ambient Intell. Humaniz. Comput. 14(3): 2935-2950 (2023) - 2022
- [j31]Titus Issac, Salaja Silas, Elijah Blessing Rajsingh:
Investigative prototyping a tissue P system for solving distributed task assignment problem in heterogeneous wireless sensor network. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part B): 3685-3702 (2022) - [j30]Deva Priya Isravel, Salaja Silas, Elijah Blessing Rajsingh:
Centrality Based Congestion Detection Using Reinforcement Learning Approach for Traffic Engineering in Hybrid SDN. J. Netw. Syst. Manag. 30(1): 2 (2022) - [j29]Deva Priya Isravel, Salaja Silas, Elijah Blessing Rajsingh:
Long-term traffic flow prediction using multivariate SSA forecasting in SDN based networks. Pervasive Mob. Comput. 83: 101590 (2022) - 2021
- [j28]Renu Mary Daniel, Elijah Blessing Rajsingh, Salaja Silas:
A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography. J. King Saud Univ. Comput. Inf. Sci. 33(1): 86-98 (2021) - 2020
- [j27]Renu Mary Daniel, Elijah Blessing Rajsingh, Salaja Silas:
An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries. Inf. Comput. 275: 104630 (2020) - [j26]A. Shamila Ebenezer, Elijah Blessing Rajsingh, Baskaran Kaliaperumal:
Support vector machine-based proactive fault-tolerant scheduling for grid computing environment. Int. J. Adv. Intell. Paradigms 16(3/4): 381-403 (2020) - [c6]P. Joyce Beryl Princess, Salaja Silas, Elijah Blessing Rajsingh:
Performance Analysis of Feature Detection and Description (FDD) Methods on Accident Images. MIND (1) 2020: 384-396
2010 – 2019
- 2019
- [j25]J. Dinesh Peter, Elijah Blessing Rajsingh, Amir Hossein Alavi:
Special Section on Big Data and Cloud Technologies. Comput. Electr. Eng. 75: 312-314 (2019) - [j24]Edwin Prem Kumar Gilbert, Baskaran Kaliaperumal, Elijah Blessing Rajsingh, M. Lydia, A. Immanuel Selvakumar:
Trust aware nature inspired optimised routing in clustered wireless sensor networks. Int. J. Bio Inspired Comput. 14(2): 103-113 (2019) - [j23]Salaja Silas, Elijah Blessing Rajsingh:
A novel patient friendly IT enabled framework for selection of desired healthcare provider. Int. J. Medical Eng. Informatics 11(1): 14-40 (2019) - [j22]Renu Mary Daniel, Elijah Blessing Rajsingh, Salaja Silas:
An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks. J. Inf. Secur. Appl. 47: 156-172 (2019) - [j21]Edwin Prem Kumar Gilbert, M. Lydia, Baskaran Kaliaperumal, Elijah Blessing Rajsingh:
Trust aware fault tolerant prediction model for wireless sensor network based measurements in Smart Grid environment. Sustain. Comput. Informatics Syst. 23: 29-37 (2019) - [j20]V. Vivek, R. Srinivasan, R. Elijah Blessing, R. Dhanasekaran:
Payload fragmentation framework for high-performance computing in cloud environment. J. Supercomput. 75(5): 2789-2804 (2019) - 2018
- [j19]Edwin Prem Kumar Gilbert, Baskaran Kaliaperumal, Elijah Blessing Rajsingh, M. Lydia:
Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks. Comput. Electr. Eng. 72: 894-909 (2018) - 2017
- [j18]S. Carolin Jeeva, Elijah Blessing Rajsingh:
Phishing URL detection-based feature selection to classifiers. Int. J. Electron. Secur. Digit. Forensics 9(2): 116-131 (2017) - [j17]Anne W. Regis, Elijah Blessing Rajsingh:
Mobile entities in wireless sensor networks: comparative study and performance analysis. Int. J. Inf. Commun. Technol. 11(3): 301-324 (2017) - [j16]Renu Mary Daniel, Elijah Blessing Rajsingh, Salaja Silas:
Analysis of hierarchical identity based encryption schemes and its applicability to computing environments. J. Inf. Secur. Appl. 36: 20-31 (2017) - 2016
- [j15]M. Caroline Viola Stella Mary, Elijah Blessing Rajsingh, Ganesh R. Naik:
Retinal Fundus Image Analysis for Diagnosis of Glaucoma: A Comprehensive Survey. IEEE Access 4: 4327-4354 (2016) - [j14]S. Carolin Jeeva, Elijah Blessing Rajsingh:
Intelligent phishing url detection using association rule mining. Hum. centric Comput. Inf. Sci. 6: 10 (2016) - [j13]Immanuel John Raja Jebadurai, Elijah Blessing Rajsingh, Getzi Jeba Leelipushpam Paulraj, Salaja Silas:
EDIS: an effective method for detection and isolation of sinkhole attacks in mobile ad hoc networks. Int. J. Wirel. Mob. Comput. 11(3): 171-181 (2016) - [j12]Sujitha Juliet, Elijah Blessing Rajsingh, Kirubakaran Ezra:
A novel medical image compression using Ripplet transform. J. Real Time Image Process. 11(2): 401-412 (2016) - 2015
- [j11]M. Caroline Viola Stella Mary, Elijah Blessing Rajsingh, J. Kishore Kumar Jacob, D. Anandhi, Umberto Amato, S. Easter Selvan:
An empirical study on optic disc segmentation using an active contour model. Biomed. Signal Process. Control. 18: 19-29 (2015) - [j10]Sujitha Juliet, Elijah Blessing Rajsingh, Kirubakaran Ezra:
Projection-Based Medical Image Compression for Telemedicine Applications. J. Digit. Imaging 28(2): 146-159 (2015) - [j9]Sujitha Juliet, Elijah Blessing Rajsingh, Kirubakaran Ezra:
A novel image compression method for medical images using geometrical regularity of image structure. Signal Image Video Process. 9(7): 1691-1703 (2015) - 2014
- [j8]I Diana Jeba Jingle, Elijah Blessing Rajsingh:
ColShield : an effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks. Hum. centric Comput. Inf. Sci. 4: 8 (2014) - [j7]Premnath K. N, R. Srinivasan, Elijah Blessing Rajsingh:
Magnetic Field Model (MFM) in Soft Computing and parallelization techniques for Self Organizing Networks (SON) in Telecommunications. Int. J. Energy Optim. Eng. 3(3): 57-71 (2014) - [j6]G. Jaspher Willsie Kathrine, Kirubakaran Ezra, Elijah Blessing Rajsingh:
Enhancing security of electronic health records through grid-based user authentication scheme. Int. J. Inf. Commun. Technol. 6(2): 109-121 (2014) - [j5]Anne W. Regis, Elijah Blessing Rajsingh:
An autonomous moving heuristic for mobile sink based on feasible sojourn regions to maximise network lifetime in wireless sensor networks. Int. J. Inf. Technol. Commun. Convergence 3(1): 65-86 (2014) - 2013
- [j4]Jaspher Willsie Kathrine Gnanaraj, Kirubakaran Ezra, Elijah Blessing Rajsingh:
Smart card based time efficient authentication scheme for global grid computing. Hum. centric Comput. Inf. Sci. 3: 16 (2013) - [j3]Salaja Silas, Elijah Blessing Rajsingh, Kirubakaran Ezra:
An efficient service selection framework for pervasive environments. Int. J. Wirel. Mob. Comput. 6(1): 80-90 (2013) - 2012
- [j2]Salaja Silas, Kirubakaran Ezra, Elijah Blessing Rajsingh:
A novel fault tolerant service selection framework for pervasive computing. Hum. centric Comput. Inf. Sci. 2: 5 (2012) - [c5]Japhynth Jacob, Elijah Blessing Rajsingh, Isaac Balasingh Jesudasan:
Ontology Based Resource Allocation (OBRA) for Adaptive Intelligent Grid Environment. UCAmI 2012: 330-333 - 2010
- [j1]Sharmila Anand John Francis, Elijah Blessing Rajsingh:
Stability analysis of analytical hierarchy process clustering protocol in mobile ad hoc networks. Int. J. Commun. Networks Distributed Syst. 4(4): 407-435 (2010)
2000 – 2009
- 2009
- [c4]Sharmila Anand John Francis, Elijah Blessing Rajsingh:
Relative Weight Based Clustering in Mobile Ad Hoc Networks. UKSim 2009: 526-531 - 2006
- [c3]Sangheethaa Sukumaran, R. Elijah Blessing:
Reputation Based Localized Access Control for Mobile Ad-Hoc Networks. ADHOC-NOW 2006: 197-210 - 2004
- [c2]R. Elijah Blessing, V. Rhymend Uthariaraj:
Design of Secure Multicast Models for Mobile Services. SOFSEM 2004: 163-173 - 2003
- [c1]R. Elijah Blessing, V. Rhymend Uthariaraj:
Evaluation and Analysis of Computational Complexity for Secure Multicast Models. ICCSA (2) 2003: 684-694
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint