default search action
Pethuru Raj Chelliah
Person information
- affiliation: Reliance Jio Infocomm Ltd., Bangalore, India
Other persons with the same name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Preetha Evangeline David, Pethuru Raj Chelliah, P. Anandhakumar:
Chapter Nine - Reshaping agriculture using intelligent edge computing. Adv. Comput. 132: 167-204 (2024) - [j36]Nithya Chidambaram, Karuppusamy Thenmozhi, Pethuru Raj, Rengarajan Amirtharajan:
DNA-chaos governed cryptosystem for cloud-based medical image repository. Clust. Comput. 27(4): 4127-4144 (2024) - 2023
- [b5]Chellammal Surianarayanan, Pethuru Raj Chelliah:
Essentials of Cloud Computing - A Holistic, Cloud-Native Perspective, Second Edition. Texts in Computer Science, Springer 2023, ISBN 978-3-031-32043-9, pp. 1-357 - [j35]Chellammal Surianarayanan, Pethuru Raj Chelliah:
Integration of the Internet of Things and Cloud: Security Challenges and Solutions - A Review. Int. J. Cloud Appl. Comput. 13(1): 1-30 (2023) - [j34]Chellammal Surianarayanan, John Jeyasekaran Lawrence, Pethuru Raj Chelliah, Edmond Prakash, Chaminda Hewage:
A Survey on Optimization Techniques for Edge Artificial Intelligence (AI). Sensors 23(3): 1279 (2023) - [j33]Chellammal Surianarayanan, John Jeyasekaran Lawrence, Pethuru Raj Chelliah, Edmond Prakash, Chaminda Hewage:
Convergence of Artificial Intelligence and Neuroscience towards the Diagnosis of Neurological Disorders - A Scoping Review. Sensors 23(6): 3062 (2023) - 2022
- [j32]Pethuru Raj, Jenn-Wei Lin:
Chapter One - Exploring the edge AI space: Industry use cases. Adv. Comput. 127: 1-34 (2022) - [j31]Pethuru Raj, J. Akilandeswari, M. Marimuthu:
Chapter Five - The edge AI paradigm: Technologies, platforms and use cases. Adv. Comput. 127: 139-182 (2022) - [j30]Kavita Saini, Pethuru Raj:
Chapter Eight - Edge platforms, frameworks and applications. Adv. Comput. 127: 237-258 (2022) - [j29]Kavita Saini, Uttama Pandey, Pethuru Raj:
Chapter Nine - Edge computing challenges and concerns. Adv. Comput. 127: 259-278 (2022) - [j28]Veeramuthu Venkatesh, Pethuru Raj, R. Anushiadevi:
Chapter Ten - A smart framework through the Internet of Things and machine learning for precision agriculture. Adv. Comput. 127: 279-306 (2022) - 2021
- [j27]Pethuru Raj:
Chapter One - Demystifying the blockchain technology. Adv. Comput. 121: 1-42 (2021) - [j26]Pethuru Raj:
Chapter Thirteen - Empowering digital twins with blockchain. Adv. Comput. 121: 267-283 (2021) - [j25]Pethuru Raj:
Chapter Eighteen - Industrial use cases at the cusp of the IoT and blockchain paradigms. Adv. Comput. 121: 355-385 (2021) - [j24]Pethuru Raj:
Preface. Adv. Comput. 121: xv-xvi (2021) - [j23]Pethuru Raj Chelliah, Chellammal Surianarayanan:
Multi-Cloud Adoption Challenges for the Cloud-Native Era: Best Practices and Solution Approaches. Int. J. Cloud Appl. Comput. 11(2): 67-96 (2021) - [j22]Nithya Chidambaram, Pethuru Raj, Karuppusamy Thenmozhi, Rengarajan Amirtharajan:
A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images. Multim. Tools Appl. 80(15): 23359-23375 (2021) - [j21]Chellammal Surianarayanan, Pethuru Raj Chelliah:
Leveraging Artificial Intelligence (AI) Capabilities for COVID-19 Containment. New Gener. Comput. 39(3): 717-741 (2021) - [j20]K. Hariharan, N. R. Rajaan, Peter Pethuru Raj Chelliah, Malini Deepika:
The Enriched Feature Enhancement Technique for Satellite Image Based on Transforms Using PCNN. Wirel. Pers. Commun. 117(4): 2729-2744 (2021) - 2020
- [j19]Pethuru Raj, Jenn-Wei Lin:
Chapter One - Stepping into the digitally instrumented and interconnected era. Adv. Comput. 117: 1-34 (2020) - [j18]Janet Barnabas, Pethuru Raj:
Chapter Nine - The human body: A digital twin of the cyber physical systems. Adv. Comput. 117: 219-246 (2020) - [j17]Pethuru Raj, Chellammal Surianarayanan:
Chapter Twelve - Digital twin: The industry use cases. Adv. Comput. 117: 285-320 (2020) - [j16]Nithya Chidambaram, Pethuru Raj, Karuppuswamy Thenmozhi, Rengarajan Amirtharajan:
Advanced framework for highly secure and cloud-based storage of colour images. IET Image Process. 14(13): 3143-3153 (2020) - [j15]Malarvizhi N, P. Selvarani, Pethuru Raj:
Adaptive fuzzy genetic algorithm for multi biometric authentication. Multim. Tools Appl. 79(13-14): 9131-9144 (2020) - [j14]Parvathy Arulmozhi, N. Hemavathi, John Bosco Balaguru Rayappan, Pethuru Raj:
ALRC: A Novel Adaptive Linear Regression Based Classification for Grade based Student Learning using Radio Frequency Identification. Wirel. Pers. Commun. 112(4): 2091-2107 (2020)
2010 – 2019
- 2019
- [b4]Chellammal Surianarayanan, Pethuru Raj Chelliah:
Essentials of Cloud Computing - A Holistic Perspective. Texts in Computer Science, Springer 2019, ISBN 978-3-030-13133-3, pp. 1-304 - [j13]Jenn-Wei Lin, Pethuru Raj Chelliah, Meng-Chieh Hsu, Jia-Xin Hou:
Efficient Fault-Tolerant Routing in IoT Wireless Sensor Networks Based on Bipartite-Flow Graph Modeling. IEEE Access 7: 14022-14034 (2019) - [j12]Veeramuthu Venkatesh, Pethuru Raj, K. Kannan, P. Balakrishnan:
Precision centric framework for activity recognition using Dempster Shaffer theory and information fusion algorithm in smart environment. J. Intell. Fuzzy Syst. 36(3): 2117-2124 (2019) - [j11]Nithya Chidambaram, Pethuru Raj, Karuppusamy Thenmozhi, Sundararaman Rajagopalan, Rengarajan Amirtharajan:
A cloud compatible DNA coded security solution for multimedia file sharing & storage. Multim. Tools Appl. 78(23): 33837-33863 (2019) - 2018
- [b3]Pethuru Raj, Anupama Raman:
Software-Defined Cloud Centers - Operational and Management Technologies and Tools. Computer Communications and Networks, Springer 2018, ISBN 978-3-319-78636-0, pp. 1-240 - [j10]Pethuru Raj:
Chapter One - A Detailed Analysis of NoSQL and NewSQL Databases for Bigdata Analytics and Distributed Computing. Adv. Comput. 109: 1-48 (2018) - [j9]Pethuru Raj:
Chapter Seven - The Hadoop Ecosystem Technologies and Tools. Adv. Comput. 109: 279-320 (2018) - [j8]Pethuru Raj, Ganesh Chandra Deka:
Preface. Adv. Comput. 109: ix-x (2018) - [j7]Pethuru Raj, Ganesh Chandra Deka:
Preface. Adv. Comput. 111: ix-x (2018) - [j6]N. Mohanapriya, G. Kousalya, P. Balakrishnan, Pethuru Raj Chelliah:
Energy efficient workflow scheduling with virtual machine consolidation for green cloud computing. J. Intell. Fuzzy Syst. 34(3): 1561-1572 (2018) - [j5]Sathish A. P. Kumar, R. Madhumathi, Pethuru Raj Chelliah, Lei Tao, Shangguang Wang:
A novel digital twin-centric approach for driver intention prediction and traffic congestion avoidance. J. Reliab. Intell. Environ. 4(4): 199-209 (2018) - [p1]Sumitra Binu, Mohammed Misbahuddin, Pethuru Raj:
A Strong Single Sign-on User Authentication Scheme Using Mobile Token Without Verifier Table for Cloud Based Services. Computer and Network Security Essentials 2018: 237-261 - 2017
- [b2]G. Kousalya, P. Balakrishnan, Pethuru Raj Chelliah:
Automated Workflow Scheduling in Self-Adaptive Clouds - Concepts, Algorithms and Methods. Computer Communications and Networks, Springer 2017, ISBN 978-3-319-56981-9, pp. 1-221 - [j4]S. Rajaraajeswari, R. Selvarani, Pethuru Raj, P. Mohanavadivu:
Fuzzy logic for decision-enablement: a novel context-awareness framework for smarter environments. Int. J. High Perform. Comput. Netw. 10(1/2): 64-77 (2017) - [c7]Pethuru Raj Chelliah, Sathish A. P. Kumar:
A Cloud-Based Service Delivery Platform for Effective Homeland Security. CSCloud 2017: 157-162 - 2016
- [j3]Brij B. Gupta, Shingo Yamaguchi, Pethuru Raj Chelliah:
Guest editorial special issues on security trends in mobile cloud computing, web, and social networking. EURASIP J. Inf. Secur. 2016: 27 (2016) - [j2]Nithya Chidambaram, Pethuru Raj, Karuppusamy Thenmozhi, Rengarajan Amirtharajan:
Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique. Int. J. Digit. Multim. Broadcast. 2016: 8789397:1-8789397:6 (2016) - [c6]Jeeva Chelladhurai, Pethuru Raj Chelliah, Sathish Alampalayam Kumar:
Securing Docker Containers from Denial of Service (DoS) Attacks. SCC 2016: 856-859 - [c5]Pethuru Raj:
Deciphering the Growing Docker Ecosystem. Intelligent Environments (Workshops) 2016: 590-603 - 2015
- [b1]Pethuru Raj, Anupama Raman, Dhivya Nagaraj, Siddhartha Duggirala:
High-Performance Big-Data Analytics - Computing Systems and Approaches. Computer Communications and Networks, Springer 2015, ISBN 978-3-319-20743-8, pp. 1-424 - [c4]Sumitra Binu, Pethuru Raj, Mohammed Misbahuddin:
Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment. ACSS (1) 2015: 183-202 - [c3]Sumitra Binu, Mohammed Misbahuddin, Pethuru Raj:
A Mobile Based Remote User Authentication Scheme without Verifier Table for Cloud Based Services. WCI 2015: 502-509 - 2014
- [j1]Pethuru Raj Chelliah:
Elucidating the Cloud Enterprise Architecture for Smarter Enterprises. IT Prof. 16(6): 33-37 (2014) - [c2]Rathnakar Achary, V. Vityanathan, Pethuru Raj Chelliah, S. Nagarajan:
Dynamic Job Scheduling Using Ant Colony Optimization for Mobile Cloud Computing. ISI (2) 2014: 71-82 - 2013
- [c1]Devasia Kurian, Pethuru Raj Chelliah:
Upgradation of business applications with autonomic computing. COMPUTE 2013: 7:1-7:7 - 2010
- [i1]C. Ravichandiran, Pethuru Raj Chelliah, V. Vaidhyanathan:
Analysis, Modification, and Implementation (AMI) of Scheduling Algorithm for the IEEE 802.116e (Mobile WiMAX). CoRR abs/1003.1479 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint