Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Privacy Preservation Using Network Coding Against Traffic Analysis in Wireless Network

    Wireless spoofing attacks are simple to execute, yet they have a big impact on how well wireless sensor networks function. Cryptographic authentication can be used to confirm a node’s identity; however, due to...

    A Antonidoss, K. Dinakaran, P. Valarmathie in Proceedings of Second International Confer… (2024)

  2. Article

    Retraction Note to: Quality of service (Qos) and priority aware models for adaptive efficient image retrieval in WSN using TBL routing with RLBP features

    K. Dinakaran, K. R. Adinadh, K. R. Sanjuna in Journal of Ambient Intelligence and Humani… (2023)

  3. Article

    Retraction Note to: Multilevel sentiment analysis using domain thesaurus

    K. Priya, K. Dinakaran, P. Valarmathie in Journal of Ambient Intelligence and Humani… (2023)

  4. No Access

    Article

    RETRACTED ARTICLE: Multilevel sentiment analysis using domain thesaurus

    The main aspects or features of products are identified through aspect extraction. Sentiment analysis is performed for the source domain, which is referred as the product. Then, the source domain is mapped to ...

    K. Priya, K. Dinakaran, P. Valarmathie in Journal of Ambient Intelligence and Humani… (2021)

  5. No Access

    Article

    RETRACTED ARTICLE: Quality of service (Qos) and priority aware models for adaptive efficient image retrieval in WSN using TBL routing with RLBP features

    The problem of image retrieval in wireless sensor networks has been well studied. Towards image retrieval in WSN, various methods have been discussed earlier, but suffer to achieve higher performance in image ...

    K. Dinakaran, K. R. Adinadh, K. R. Sanjuna in Journal of Ambient Intelligence and Humani… (2021)