Lalit Mohan Patnaik
Lalit Mohan Patnaik
Adjunct Professor and INSA Honorary Scientist,National Institute of Advanced Studies,Bangalore
Verified email at - Homepage
Cited by
Cited by
Adaptive probabilities of crossover and mutation in genetic algorithms
M Srinivas, LM Patnaik
IEEE Transactions on Systems, Man, and Cybernetics 24 (4), 656-667, 1994
Genetic algorithms: A survey
M Srinivas, LM Patnaik
computer 27 (6), 17-26, 1994
Classification of magnetic resonance brain images using wavelets as input to support vector machine and neural network
S Chaplot, LM Patnaik, NR Jagannathan
Biomedical signal processing and control 1 (1), 86-92, 2006
Application of genetic programming for multicategory pattern classification
JK Kishore, LM Patnaik, V Mani, VK Agrawal
IEEE transactions on evolutionary computation 4 (3), 242-258, 2000
A secure image steganography using LSB, DCT and compression techniques on raw images
KB Raja, CR Chowdary, KR Venugopal, LM Patnaik
2005 3rd international conference on intelligent sensing and information …, 2005
Extended hypercube: A hierarchical interconnection network of hypercubes
JM Kumar, LM Patnaik
IEEE Transactions on Parallel and Distributed Systems 3 (1), 45-57, 1992
Extended hypercube: A hierarchical interconnection network of hypercubes
JM Kumar, LM Patnaik
IEEE Transactions on Parallel and Distributed Systems 3 (1), 45-57, 1992
Epileptic EEG detection using neural networks and post-classification
LM Patnaik, OK Manyam
Computer methods and programs in biomedicine 91 (2), 100-109, 2008
A self-adaptive migration model genetic algorithm for data mining applications
KG Srinivasa, KR Venugopal, LM Patnaik
Information Sciences 177 (20), 4295-4313, 2007
Feature extraction based face recognition, gender and age classification
K Ramesha, KB Raja, KR Venugopal, LM Patnaik
Wireless sensor networks applications and routing protocols: survey and research challenges
U Prathap, PD Shenoy, KR Venugopal, LM Patnaik
2012 international symposium on cloud and services computing, 49-56, 2012
Secure authentication using image processing and visual cryptography for banking applications
C Hegde, S Manu, PD Shenoy, KR Venugopal, LM Patnaik
2008 16th International Conference on Advanced Computing and Communications …, 2008
Self-tuning minimum-variance control of nonlinear systems of the Hammerstein model
K Anbumani, L Patnaik, I Sarma
IEEE Transactions on Automatic Control 26 (4), 959-961, 1981
An address assignment for the automatic configuration of mobile ad hoc networks
AP Tayal, LM Patnaik
Personal and Ubiquitous Computing 8 (1), 47-54, 2004
Searching for the IoT resources: fundamentals, requirements, comprehensive review, and future directions
S Pattar, R Buyya, KR Venugopal, SS Iyengar, LM Patnaik
IEEE Communications Surveys & Tutorials 20 (3), 2101-2132, 2018
Authentication of secret information in image steganography
KS Babu, KB Raja, KK Kiran, THM Devi, KR Venugopal, LM Patnaik
TENCON 2008-2008 IEEE Region 10 Conference, 1-6, 2008
Line coverage of path delay faults
AK Majhi, VD Agrawak, J Jacob, LM Patnaik
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 8 (5), 610-614, 2000
Soft computing for data mining applications
KR Venugopal, KG Srinivasa, LM Patnaik
Springer, 2009
Dynamic association rule mining using genetic algorithms
PD Shenoy, KG Srinivasa, KR Venugopal, LM Patnaik
Intelligent Data Analysis 9 (5), 439-453, 2005
Performance of AODV routing protocol using group and entity mobility models in wireless sensor networks
SH Manjula, CN Abhilash, K Shaila, KR Venugopal, LM Patnaik
Proceedings of the International MultiConference of Engineers and Computer …, 2008
The system can't perform the operation now. Try again later.
Articles 1–20