Secure data storage and intrusion detection in the cloud using MANN and dual encryption through various attacks J Anitha Ruth, H Sirmathi, A Meenakshi IET Information Security 13 (4), 321-329, 2019 | 14 | 2019 |
Automatic classification of white blood cells using deep features based convolutional neural network A Meenakshi, JA Ruth, VR Kanagavalli, R Uma Multimedia Tools and Applications 81 (21), 30121-30142, 2022 | 12 | 2022 |
Meta-heuristic based deep learning model for leaf diseases detection JA Ruth, R Uma, A Meenakshi, P Ramkumar Neural Processing Letters 54 (6), 5693-5709, 2022 | 10 | 2022 |
Cloud computing-based resource provisioning using k-means clustering and GWO prioritization A Meenakshi, H Sirmathi, J Anitha Ruth Soft Computing 23 (21), 10781-10791, 2019 | 10 | 2019 |
Steganography based secure data storage and intrusion detection for cloud computing using signcryption and artificial neural network JA Ruth, H Sirmathi, A Meenakshi Research Journal of Applied Sciences, Engineering and Technology 13 (5), 354-364, 2016 | 3 | 2016 |
Prediction Analysis of Natural Disasters Using Machine Learning P Ramkumar, R Uma, D Satishkumar, JA Ruth, S Harikrishna Predicting Natural Disasters With AI and Machine Learning, 147-157, 2024 | | 2024 |
A Hierarchical Machine Learning Frame Work to Classify Breast Tissue for Identification of Cancer JA Ruth, VGV Mahesh, R Uma, P Ramkumar Proceedings of the 11th International Conference on Computer Engineering and …, 2021 | | 2021 |
RWH: Assessing Optimum Cistern Size Based on K-Means and Crowd Computing Approach A Pavithra, M Pushpa, JA Ruth 2020 International Conference on Smart Electronics and Communication (ICOSEC …, 2020 | | 2020 |
Resource discovery using hierarchical agglomerative method in cloud computing A Meenakshi, H Srimathi, JA Ruth Advances in Natural and Applied Sciences 10 (4), 74-78, 2016 | | 2016 |
Year of Publication: 2015 JA Ruth, A Meenakshi, H Srimathi Journal of Network and Computer Applications 36, 42-57, 2013 | | 2013 |
Quality Assured Optimal Resource Provisioning and Scheduling Technique Based on Improved Hierarchical Agglomerative Clustering Algorithm (IHAC) A Meenakshi, H Sirmathi, JA Ruth | | |
Detection of Steganographic Intrusion in Cloud JA Ruth, A Meenakshi, H Srimathi International Journal of Computer Applications 975, 8887, 0 | | |