S.No | Details |
1 | M.Dhurgadevi,Dr.P.Meenakshi Devi, PSO based Algorithm for Wireless Rechargeable Sensor Networks, International Journal of Computer Applications, Vol: 156, Issue:4, 2348-3539, 2025 |
2 | Meenakshi Devi P., Muna A., Yasser Ali , Effective BCDNet-based breast cancer classification model using hybrid deep learning with VGG16-based optimal feature extraction, BMC Medical Imaging, Vol: 25, Issue:12, 1471-2342, 2025 |
3 | P. Meenakshi Devi, S. Gnanavel, K. E. Narayana, S. N. Sangeethaa, Novel methods for diagnosing glaucoma: Segmenting optic discs and cups using ensemble learning algorithms and CDR ratio analysis, IETE Journal of Research, Vol: 11, 0377-2063, 2024 |
4 | Karthikeyan, S., Meenakshi Devi, P., An attempt to enhance the time of reply for web service composition with QoS, International Journal of Enterprise Network Management, Vol: 11, Issue:4, 1748-1260, 2020 |
5 | AV SanthoshBabu, P Meenakshi Devi, Gene Populated Spectral Clustering for Energy Efficient Multiple Intrusion Detection and Responsive Mechanism for MANET, Journal of Electrical Engineering, Vol: 17, Issue:4, 1582-4594, 2020 |
6 | AV SanthoshBabu, P Meenakshi Devi, Swarm optimised energy hubness clustering to detect and respond to intrusive attack variants in MANET, International Journal of Business Innovation and Research, Vol: 18, Issue:3, 1751-0260, 2019 |
7 | SanthoshBabu, A.V. Meenakshi Devi, P. Sharmila, B. Suganya, D, Performance analysis on cluster-based intrusion detection techniques for energy efficient and secured data communication in MANET, International Journal of Information Systems and Change Management, Vol: 11, 1479-3121, 2019 |
8 | M.Dhurgadevi,M , Meenakshi Devi P, An Analysis of Energy Efficiency Improvement through Wireless Energy Transfer in Wireless Sensor Network, Wireless personal communication Springer, Vol: 98, 0929-6212, 2018 |
9 | A.V. SanthoshBabu; P. Meenakshi Devi; B. Sharmila, Efficient enhanced Intrusion identification and response system for MANETs, International Journal of Business Information Systems, Vol: 29, 1746-0980, 2018 |
10 | M.Dhurgadevi,Dr.P.Meenakshi Devi, TTRP-Three Level Threshold and Round Robin with Priority Scheduling for Wireless Rechargeable Network, Transactions on Engineering and Sciences, Vol: 5, Issue:1, 2347-1964, March, 2017 |
11 | M.Dhurgadevi, Dr.P.Meenakshi Devi, RDCG-Randomized distributed cluster grid topology for wireless power transfer technology in wireless sensor network, Asian Journal of research in social sciences and humanities, Vol: 6, Issue:8, 2249-7315, August, 2016 |
12 | A. V. SanthoshBabu, P. Meenakshi Devi, B. Sharmila, Comparative Study of MANET Routing Protocols, Asian Journal of research in social sciences and humanities, Vol: 6, Issue:6, 2249-7315, June, 2016 |
13 | Suriya L, Dhurga Devi M, P.Meenakshi Devi, An Efficient Crypto based Security Authentication System for Detecting Deduplication on Cloud Storage, Discovery Engineering, Vol: 4, Issue:5, 2320-6675, 2016 |
14 | M.Dhurgadevi, Dr.P.MeenakshiDevi, An Analysis of hierarchical routing Protocols in Wireless sensor networks, International Journal of Modern Computer Science and Applications, Vol: 4, Issue:4, 2321-2632, 2016 |
15 | M.Dhurgadevi,Dr.P.Meenakshi Devi, An Analysis of Energy Efficiency of Leach Protocol in Wireless Sensor Network, International Journal of Inventions in Computer Science and Engineering, Vol: 3, Issue:2, 2348-3539, 2016 |
16 | A.V.SanthoshBabu, Dr.P.Meenakshi Devi, Energy aware Intrusion Detection System for MANETs, International Journal of Applied Engineering Research, Vol: 10, Issue:29, 0973-4562, 2015 |
17 | A.V.SanthoshBabu, Dr.P.Meenakshi Devi, K.Sudhakar, Performance Enhancements for Preemptive Ad-Hoc On-demand Multipath Distance Vector Routing, International Journal of Latest Research in Engineering and Computing, Vol: 1, Issue:1, 2454-5031, September, 2013 |
18 | Meenakshi Devi, P., Venkatesan, M. and Duraiswamy, K, Authentication watermarking using integer wavelet transform, CiiT International Journal of Digital Signal Processing, Vol: 1, Issue:4, 1738-7906, 2009 |
19 | Meenakshi Devi, P. Venkatesan, M. and Duraiswamy, K, Reversible image authentication with tamper localization based on integer wavelet transform, International Journal on Computer Science and Information Security, Vol: 6, Issue:2, 1947-5500, 2009 |
20 | P MeenakshiDevi, M Venkatesan, K Duraiswamy, A fragile watermarking scheme for image authentication with tamper localization using integer wavelet transform, Journal of Computer Science, Vol: 5, Issue:11, 1549-3636, 2009 |
21 | Venkatesan, M., Meenakshi Devi, P., Duraiswamy, K. and Thyagarajah, K, Secure authentication watermarking for binary images using pattern matching, International Journal of Computer Science and Network Security, Vol: 8, Issue:2, 1738-7906, 2008 |
22 | Venkatesan, M., Meenakshi Devi, P., Duraiswamy, K. and Thyagarajah, K, Cryptography-based secure authentication watermarking for binary images, CSI Communications, Vol: 31, Issue:5, 0970-647X, 2007 |