Galshetwar.Amutha Jeyakumar

  • Citations Per Year
Learn More
In this era of emerging technologies, electroniccommunication has become an integral and significantpart of everyone's life because it is simpler, faster and more secure.The objective of this paper is to come up with atechnique hiding the presence of secret message. Steganographyis the art of secret communication.Its purpose is to hide the presence of(More)
In this paper, we present an empirical comparison of some Differential Evolution (DE) variants to solve high dimensional optimization problems. The aim is to identify the behavior and scalability of DE variants. Most studies on DE are obtained using low-dimensional problems (smaller than 100) , which are relatively small for many real-world problems. We(More)
A RFID (Radio-Frequency Identification) system consists of RFID readers and tags. RFID technology uses electromagnetic fields to identify the location of the objects attached with the tag and track them continuously. The tags contain electronically stored information about the objects. The most essential requirement for setting up a RFIDenabled system is to(More)
This paper is mainly intended to compare image fusion method using different evolutionary algorithms and a comparison between these methods. The survey focuses on region-based fusion techniques, which is a major area of research. The paper compares image fusion processes using various evolutionary algorithms and illustrates the advantages and disadvantages(More)
Differential Evolution (DE) is a simple but efficient Evolutionary Algorithm (EA) for stochastic real parameter optimization. With various types of mutation and crossover applicable to DE, there exist many variants of DE. The empirical comparisons between the performances of these variants on chosen benchmarking problems are well reported in literature.(More)
  • 1