His main research concerns Computer security, Identification, Artificial intelligence, Authentication and Supply chain. Selwyn Piramuthu studies Computer security, focusing on Radio-frequency identification in particular. Selwyn Piramuthu has included themes like Machine learning and Process in his Artificial intelligence study.
His Machine learning research incorporates themes from Data mining and Job shop. The various areas that Selwyn Piramuthu examines in his Authentication study include Focus and Cryptography. His Supply chain research includes elements of Business model, Information sharing and Knowledge management.
His scientific interests lie mostly in Computer security, Artificial intelligence, Supply chain, Machine learning and Radio-frequency identification. Selwyn Piramuthu regularly links together related areas like Protocol in his Computer security studies. Many of his studies on Artificial intelligence involve topics that are commonly interrelated, such as Pattern recognition.
His work on Supply chain management and Service management is typically connected to Tracing and Visibility as part of general Supply chain study, connecting several disciplines of science. His work in Machine learning addresses subjects such as Data mining, which are connected to disciplines such as Feature selection, Knowledge-based systems, Process and Verification and validation. His studies in Radio-frequency identification integrate themes in fields like Quality and Identification.
His primary areas of study are Computer security, Supply chain, Identification, Object and Protocol. His Computer security research includes themes of Wireless sensor network and Bounding overwatch. His Supply chain research is multidisciplinary, incorporating perspectives in Natural resource economics and Process management.
As a member of one scientific family, Selwyn Piramuthu mostly works in the field of Identification, focusing on Cryptography and, on occasion, Variety, Mutual authentication and Identifier. Selwyn Piramuthu has included themes like Authentication protocol and Information retrieval in his Object study. Selwyn Piramuthu studied Protocol and Authentication that intersect with Public-key cryptography, Field, SIMPLE, Encryption and Hash function.
The scientist’s investigation covers issues in Protocol, Authentication, Computer network, Computer security and Supply chain. His Protocol study combines topics in areas such as Scalability, Field, Hash function and Encryption, Public-key cryptography. Selwyn Piramuthu has researched Authentication in several fields, including Cryptographic protocol and SIMPLE.
The various areas that he examines in his Computer security study include Wireless sensor network, Database transaction and Information needs. His work is dedicated to discovering how Information needs, Data science are connected with Salient and other disciplines. His research in the fields of Sustainable supply chain overlaps with other disciplines such as Population, Food industry and Sustainable agriculture.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Financial credit-risk evaluation with neural and neurofuzzy systems
Selwyn Piramuthu.
European Journal of Operational Research (1999)
Financial credit-risk evaluation with neural and neurofuzzy systems
Selwyn Piramuthu.
European Journal of Operational Research (1999)
Evaluating feature selection methods for learning in data mining applications
Selwyn Piramuthu.
European Journal of Operational Research (2004)
Evaluating feature selection methods for learning in data mining applications
Selwyn Piramuthu.
European Journal of Operational Research (2004)
Job shop scheduling with a genetic algorithm and machine learning
Chung Yee Lee;Selwyn Piramuthu;Y.K. Tsai.
(1997)
Job shop scheduling with a genetic algorithm and machine learning
Chung Yee Lee;Selwyn Piramuthu;Y.K. Tsai.
(1997)
Identifying RFID-embedded objects in pervasive healthcare applications
Yu-Ju Tu;Wei Zhou;Selwyn Piramuthu.
decision support systems (2009)
Identifying RFID-embedded objects in pervasive healthcare applications
Yu-Ju Tu;Wei Zhou;Selwyn Piramuthu.
decision support systems (2009)
Protocols for RFID tag/reader authentication
Selwyn Piramuthu.
decision support systems (2007)
Protocols for RFID tag/reader authentication
Selwyn Piramuthu.
decision support systems (2007)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Illinois at Urbana-Champaign
City University of Macau
University of Évry Val d'Essonne
École Supérieure d'Ingénieurs en Électrotechnique et Électronique
University of Luxembourg
National Institute of Advanced Industrial Science and Technology
University of Granada
Yuan Ze University
Toulouse Business School
National Taiwan University
Colorado State University
Columbia University
University of Paris-Saclay
University of Tokyo
South China University of Technology
Nanjing University of Posts and Telecommunications
University of Tartu
Stazione Zoologica Anton Dohrn
University of Minnesota
University of Würzburg
University of Oslo
International Institute for Applied Systems Analysis
Drexel University
University of Sydney
University of Calgary
California Institute of Technology