Hi, I am Subramanian Karthikeyan, My LiveDNA is 91.443
 
   
  Home
 
 
 
Dr. Subramanian Karthikeyan
 
Highest Degree: Ph.D. in Computer Science and Engineering from Alagappa University, India
 
Institute: College of Applied Sciences, Oman
 
Area of Interest: Computer Sciences
  •   IT Security
  •   Sensor Network Security
  •   Cryptography
  •   Steganography
 
URL: http://livedna.org/91.443
 
My SELECTED Publications
1:   Anand Kumar, M. and S. Karthikeyan, 2011. Security model for TCP/IP protocol suite. J. Adv. Inform. Technol., 2: 87-91.
CrossRef  |  Direct Link  |  
2:   Anand Kumar, M. and S. Karthikeyan, 2012. Investigating the efficiency of Blowfish and Rejindael (AES) algorithms. Int. J. Comput. Network Inform. Security, 4: 22-28.
CrossRef  |  Direct Link  |  
3:   Appathurai, K. and S. Karthikeyan, 2011. Survey on spatio-temporal access methods. Int. J. Comput. Applic., 18: 40-44.
4:   Appathurai, K. and S. Karthikeyan, 2012. A new proposed algorithm for BBx-index structure. Int. J. Comput. Sci. Issues, 9: 287-293.
5:   Appathurai, K. and S. Karthikeyan, 2012. A new proposed algorithm for OBBx-index structure. Int. J. Comput. Applic., 50: 32-36.
Direct Link  |  
6:   Appathurai, K. and S. Karthikeyan, 2012. A novel indexing method for BBx-index structure. Int. J. Comput. Technol. Applic., 3: 779-784.
7:   Appathurai, K. and S. Karthikeyan, 2012. Comparative analysis of proposed POBBx-index structure. Int. J. Comput. Technol. Applic., 3: 1349-1356.
8:   Appathurai, K. and S. Karthikeyan, 2013. Moving object indexing using crossbreed update. Int. J. Comput. Applic., 69: 25-30.
Direct Link  |  
9:   Brindha, N., S. Karthikeyan and N. Lalitha, 2007. A comparative study between Business Process Outsourcing (BPO) and Knowledge Process Outsourcing (KPO). J. Manage., 2: 584-592.
10:   Chandramohan, G. and S.K. Subramanian, 2014. An efficient hybrid segmentation algorithm for computer tomography image segmentation. Int. Rev. Comput. Software, 9: 1576-1582.
Direct Link  |  
11:   Chandramohan, V.V.G. and D.S. Karthikeyan, 2014. An efficient clustering based segmentation algorithm for computer tomography image segmentation. J. Biomed. Eng. Med. Imag., 1: 1-11.
Direct Link  |  
12:   Gomathi, V.V. and S. Karthikeyan, 2013. A Proposed Hybrid Medoid Shift with K-Means (HMSK) Segmentation Algorithm to Detect Tumor and Organs for Effective Radiotherapy. In: Mining Intelligence and Knowledge Exploration, Prasath, R. and T. Kathirvalavakumar (Eds.). Springer International Publishing, Switzerland, ISBN: 978-3-319-03843- pp: 139-147.
13:   Gomathi, V.V. and S. Karthikeyan, 2014. Performance analysis of distance measures for computer tomography image segmentation. Int. J. Comput. Technol. Applic., 5: 400-405.
14:   Gomathi, V.V. and S. Karthikeyan, 2014. Performance analysis of wavelet and curvelet filtering techniques for reduction of streak artifacts in computer tomography images. Int. J. Control Theory Applic., 7: 53-62.
15:   Gomathi, V.V. and S. Karthikeyan, 2014. Performance evaluation of HMSK and SQFD algorithms for computer tomography (CT) image segmentation of effective radiotherapy. J. Theor. Applied Inform. Technol., 66: 409-415.
Direct Link  |  
16:   Gomathi, V.V. and S. Karthikeyan, 2015. A novel ECFT algorithm to improve the excellence of computer tomography images for effective segmentation. Int. J. Tomography Simul., 28: 45-62.
Direct Link  |  
17:   Gunasundari, R. and S. Karthikeyan, 2010. A new approach to improve the performance of page content ranking in web content mining. Data Min. Knowl. Eng., 2: 63-65.
Direct Link  |  
18:   Gunasundari, R. and S. Karthikeyan, 2012. A new approach for web information extraction. Int. J. Comput. Technol. Applic., 3: 211-215.
19:   Gunasundari, R. and S. Karthikeyan, 2012. A study of content extraction from web pages based on links. Int. J. Data Min. Knowl. Manage. Process, 2: 23-30.
20:   Gunasundari, R. and S. Karthikeyan, 2013. An effective design for extracting web content from webpages. Eur. J. Scient. Res., 99: 473-484.
21:   Hemalatha, M., V.V. Gomathi and S. Karthikeyan, 2006. An efficient algorithm for predicting survival of medical data. Int. J. Technol. Knowledge Soc., 2: 37-48.
Direct Link  |  
22:   Karthikeyan, S. and E. Ramaraj, 2006. A design of enhanced security protocol for wireless communication using hybrid encryption technique (AES-rijndael and RSA). Indian J. Comput. Technol., 1: 22-29.
23:   Karthikeyan, S. and E. Ramaraj, 2006. A new type of network security protocol using hybrid encryption in virtual private networking. J. Comput. Sci., 2: 672-675.
CrossRef  |  Direct Link  |  
24:   Karthikeyan, S., 2008. An extended MD5 (ExMD5) algorithm for better data integrity. J. Comput. Sci., 2: 584-592.
25:   Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2005. An improvement of security of 802.22 using hybrid encryption (AES-rijndael and RSA). J. Inform. Sci. Technol., 1: 18-26.
26:   Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. A new approach of hybrid encryption technique in database security. Int. J. Technol. Knowledge Soc., 2: 55-60.
27:   Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. An improvement of Eun-jun-kyung-kee`s remote user authentication scheme in smart card using hybrid encryption. J. Comput. Sci., 1: 293-300.
28:   Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2009. A design of security protocol using hybrid encryption technique (AES-rijndael and RSA). Int. J. Comput. Internet Manage., 17: 78-86.
Direct Link  |  
29:   Karthikeyan, S., E. Ramaraj and N. Lalitha, 2006. An analysis of key management in transport layer security standard. PCTE J. Comput. Sci., 2: 78-84.
30:   Karthikeyan, S., E. Ramaraj and N. Lalitha, 2006. The new approach of secure protocol in smart card using hybrid encryption technique. ICFAI J. Syst. Manage., 2: 71-75.
31:   Karthikeyan, S., E. Ramaraj and N. Lalitha, 2007. An analysis and improvement of security in wired equivalent privacy (WEP) algorithm using hybrid encryption technique. Int. J. Comput. Sci. Syst. Anal., 1: 75-81.
32:   Karthikeyan, S., M. Hemalatha and E. Ramaraj, 2005. Database search and retrieval system for bacteria. Bioinformatics India J., 3: 37-42.
33:   Karthikeyan, S., M. Hemalatha and V.V. Gomathi, 2005. A data-mining tool to increase human life days from affecting cardiac arrest. Bioinformatics India J., 3: 96-111.
34:   Karthikeyan, S., M. Hemalatha and V.V. Gomathi, 2008. Data mining-knowledge discovery database. Tamil Comput. Magazine, 12: 4-8.
35:   Kavitha, B., S. Karthikeyan and P.S. Maybell, 2011. Emerging intuitionistic fuzzy classifiers for intrusion detection system. J. Adv. Inform. Technol., 2: 99-108.
CrossRef  |  Direct Link  |  
36:   Kavitha, N. and S. Karthikeyan, 2011. An efficient algorithm for mining frequent K-item sets for association rule mining in large databases. Data Min. Knowl. Eng., 3: 555-558.
Direct Link  |  
37:   Kavitha, N. and S. Karthikeyan, 2012. An efficient mining algorithm for closed frequent itemsets and its associated data. Int. J. Comput. Applic., 49: 22-25.
Direct Link  |  
38:   Kavitha, N. and S. Karthikeyan, 2013. Customer buying behavior analysis: A clustered closed frequent itemsets for transactional databases. Int. J. Comput. Sci. Issues, 10: 113-117.
39:   Kumar, M.A. and S. Karthikeyan, 2010. A new security architecture for TCP/IP protocol suite. Int. J. Adv. Res. Comput. Sci., 1: 177-181.
Direct Link  |  
40:   Kumar, M.A., K. Appathurai, P. Nagarajan and M. Hemalatha, 2010. Comparative analysis of IPv4 and IPv6 to evaluate performance. Int. J. Comput. Network Security, 2: 67-71.
41:   Kumar, M.A., S. Karthikeyan, K. Appathurai and P. Nagarajan, 2011. A novel security protocol based on hybrid cryptography. Int. J. Comput. Sci. Syst. Eng. Inform. Technol., 4: 35-39.
42:   Mahalingam, P., N. Jeyaprakash and S. Karthikeyan, 2011. Components based key management algorithm for storage area networks. J. Adv. Inform. Technol., 2: 72-79.
CrossRef  |  Direct Link  |  
43:   Nagarajan, M. and S. Karthikeyan, 2009. Health condition observation in high level efficiency using an advanced sensor network. CIIT Int. J. Wireless Commun., 1: 183-189.
Direct Link  |  
44:   Narayanan, R. and K. Subramanian, 2011. An efficient secure biometric system with non-invertible gabor transform. Int. J. Comput. Sci. Issues, 8: 170-175.
Direct Link  |  
45:   Priya, S.M. and S. Karthikeyan, 2011. Increasing lifetime of sensor networks by using dynamic clustering. Int. J. Wireless Commun. Network., 3: 1-5.
46:   Priya, S.M. and S. Karthikeyan, 2012. An efficient clustered multipath routing to improve lifespan in WSN. Int. J. Comput. Sci. Issues, 9: 182-187.
Direct Link  |  
47:   Priya, S.M. and S. Karthikeyan, 2012. CMR-FD: Clustered multipath routing with false destination to increase the lifetime of sensor network. Int. J. Comput. Applic., 48: 11-16.
Direct Link  |  
48:   Priyaa, D.S., T. Nachimuthu and S. Karthikeyan, 2011. An evolving approach on video frame retrieval based on color, shape and region. Int. J. Comput. Sci. Eng. Technol., 2: 84-89.
Direct Link  |  
49:   Radha, N. and S. Karthikeyan, 2010. A study on biometric template security. ICTACT J. Soft Comput., 1: 37-41.
50:   Radha, N. and S. Karthikeyan, 2011. An evaluation of fingerprint security using noninvertible biohash. Int. J. Network Security Applic., 3: 118-128.
CrossRef  |  Direct Link  |  
51:   Radha, N., S. Karthikeyan and P. Anupriya, 2010. Securing retina fuzzy vault system using soft biometrics. Global J. Comput. Sci. Technol., 10: 13-18.
Direct Link  |  
52:   Radha, N., T. Rubya and S. Karthikeyan, 2011. Securing retinal template using quasigroups. J. Adv. Inform. Technol., 2: 80-86.
CrossRef  |  Direct Link  |  
53:   Ramaraj, A., N. Laitha and S. Karthikeyan, 2006. An analysis of key management in cryptographic algorithms. Asia J. Inform. Technol., 5: 963-967.
Direct Link  |  
54:   Sakthivel, C. and D. Karthikeyan, 2014. Multi-hop unified routing algorithm for energy-constrained networks. J. Theor. Applied Inform. Technol., 69: 25-31.
Direct Link  |  
55:   Sakthivel, C.R. and S. Karthikeyan, 2013. A survey on wireless routing schemes in single and multi-hop energy constrained networks. CiiT Int. J. Networking Commun. Eng., 5: 461-465.
Direct Link  |  
56:   Sakthivel, C.R. and S. Karthikeyan, 2014. Reliable multi-hop MISO based cooperative communications for energy-constrained wireless sensor networks. Int. J. Emerg. Trends Eng. Dev., 4: 180-189.
Direct Link  |  
57:   Shanmugavel, D.P., 2006. Trends in Bioinformatics. In: Microarray in Bioinformatics , Hemalatha, M. and S. Karthikeyan (Eds.). Pointer publishers, Jaipur, India, pp: 212-250.
58:   Sundararajan, S. and S. Karthikeyan, 2012. A study on spatial data clustering algorithms in data mining. Int. J. Eng. Comput. Sci., 1: 37-41.
Direct Link  |  
59:   Sundararajan, S. and S. Karthikeyan, 2014. An efficient data ranking technique based on bicluster score. Int. J. Emerg. Trends Eng. Dev., 4: 377-386.
Direct Link  |  
60:   Sundararajan, S. and S. Karthikeyan, 2014. An efficient hybrid approach for data clustering using dynamic K-means algorithm and firefly algorithm. ARPN J. Eng. Applied Sci., 9: 1-6.
61:   Thilagam, K. and S. Karthikeyan, 2011. An analysis of hybrid techniques of seam carving. Int. J. Comput. Sci. Eng., 3: 1406-1412.
Direct Link  |  
62:   Thilagam, K. and S. Karthikeyan, 2011. An efficient method for content aware image resizing using PSC. Int. J. Comput. Technol. Applic., 2: 807-812.
63:   Thilagam, K. and S. Karthikeyan, 2012. Content aware retargeting of stego images. Int. J. Comput. Applic., 52: 4-8.
Direct Link  |  
64:   Thilagam, K. and S. Karthikeyan, 2012. Optimized image resizing using piecewise seam carving. Int. J. Comput. Applic., 42: 24-30.
CrossRef  |  Direct Link  |