Search Results - "B. Victoria Jancee"

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Energy‐efficient semi‐supervised learning framework for subchannel allocation in non‐orthogonal multiple access systems by Devipriya, S., Martin Leo Manickam, J., Victoria Jancee, B.

    Published in ETRI journal (01-12-2023)
    “…Non‐orthogonal multiple access (NOMA) is considered a key candidate technology for next‐generation wireless communication systems due to its high spectral…”
    Get full text
    Journal Article
  2. 2

    Energy-efficient semi-supervised learning framework for subchannel allocation in non-orthogonal multiple access systems by S. Devipriya, J. Martin Leo Manickam, B. Victoria Jancee

    Published in ETRI journal (31-12-2023)
    “…Non-orthogonal multiple access (NOMA) is considered a key candidate technology for next-generation wireless communication systems due to its high spectral…”
    Get full text
    Journal Article
  3. 3

    Online Detection of Change on Information Streams in Wireless Sensor Network Modeled Using Gaussian Distribution by Jancee, B. Victoria, Radha, S.

    Published in Modelling and simulation in engineering (01-01-2014)
    “…Wireless sensor network (WSN) is deployed to monitor certain physical quantities in a region. This monitoring problem could be stated as the problem of…”
    Get full text
    Journal Article
  4. 4

    Gray Wolf Optimization Algorithm to Enhance Data Aggregation in Wireless Sensor Network by Loganathan, Sathyapriya, Jancee, B. Victoria, Senkamalavalli, R., Lakshmi, T. C. Subbu

    “…Wireless sensor networks (WSNs) have become increasingly popular as distributed systems using small, lightweight nodes with limited resources for monitoring…”
    Get full text
    Conference Proceeding
  5. 5

    Forecasting Naturally Occurring Forest Fires using AI and Machine Learning in Wireless Sensor Networks by Akila, T., M, Menaka, Vasanth, P., Jancee, B Victoria

    “…Wildfires are recurrent and sometimes devastating in regions of subtropical deciduous forests. Protecting forest areas are essential to ensure the health and…”
    Get full text
    Conference Proceeding
  6. 6

    Vampire Attack Detection by Applying Support Vector Machine Algorithm in Wireless Sensor Network by Jancee, B. Victoria, Kalaiselvi, S., Muthukumaran, K., Bhaskar, K. Vijaya

    “…Denial of Service (DoS) attacks at the routing levels were earlier security's primary focus. Resource depletion attacks were formerly exclusively thought of as…”
    Get full text
    Conference Proceeding
  7. 7

    Reconfigurable Fault Current Detection System Using IoT by Latha, P., Kaviyarasan, K., Leo Manickam, J. Martin, Jancee, B Victoria, Aghalya, S.

    “…This research study intends to develop a novel method for identifying over-current or fault-current concerns in appliances and electronics used in the home or…”
    Get full text
    Conference Proceeding
  8. 8

    Secured Header Authentication Design using Time Competent HMAC for Optical Burst Switched Networks by A.M, Balamurugan, G, Anitha, B, Victoria Jancee

    “…OBS is an upcoming technology that could meet the growing network demands. Though its dynamic nature leads to scalability and adaptability the requirement of…”
    Get full text
    Conference Proceeding