Search Results - "Balasubadra, K."

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    A Unique Multi-Agent-Based Approach for Enhanced QoS Resource Allocation in Multi Cloud Environment while Maintaining Minimized Energy and Maximize Revenue by Jambulingam, Umamageswaran, Balasubadra, K.

    “…The use of the multi-cloud data storage in one heterogeneous service is a polynimbus cloud strategy. Cloud computing uses a pay-as-you-go model to deliver…”
    Get full text
    Journal Article
  2. 2

    Cross Layer Controlling Algorithm to Overcome Congestion in Underwater Wireless Sensor Network by Rani, K. S., Balasubadra, K.

    Published in Wireless personal communications (01-02-2022)
    “…Underwater Wireless sensor network posses several factors, which causes congestion, issues in the network, like mutual interference, many to one communication,…”
    Get full text
    Journal Article
  3. 3

    Revamping data access privacy preservation method against inside attacks in wireless sensor networks by Babu, S. Sathees, Balasubadra, K.

    Published in Cluster computing (01-01-2019)
    “…Despite more privacy preservation techniques available in wireless sensor networks (WSN), no modest technique dealt with compromised nodes. Among several…”
    Get full text
    Journal Article
  4. 4

    Improving NB-IoT performance in weak coverage areas with CBSTO polar coding and LMMSE channel estimation by Bavani, G, Srinivasan, V. Prasanna, Balasubadra, K., Raj, Velankanni Cyril

    Published in Peer-to-peer networking and applications (01-07-2024)
    “…The Narrowband Internet of Things (NB-IoT) technology is considered as an attractive option for IoT applications due to its ability in offering better…”
    Get full text
    Journal Article
  5. 5

    An Efficient Carrier Frequency Offset Tracking for OFDMA Systems Using Normalized Least-Mean-Square Algorithm by Ilaiyaraja, S., Balasubadra, K., Senthil, B.

    Published in Circuits, systems, and signal processing (01-10-2020)
    “…In orthogonal frequency-division multiple access (OFDMA), carrier frequency offset (CFO) destroys the orthogonality between subcarriers due to Doppler effect…”
    Get full text
    Journal Article
  6. 6

    Distributive Aware Probabilistic Back Propagation (DAPBP) Routing Scheme for Vehicular Networks by Rabik, M. Mohamed, Balasubadra, K.

    Published in Wireless personal communications (01-11-2017)
    “…There are many broadcast methods developed for vehicular networks to know information about the neighbors and to transmit useful data to other vehicles. As the…”
    Get full text
    Journal Article
  7. 7

    A low power and high speed approximate adder for image processing applications by Narmadha, G., Selvaraj M., Deivasigamani, S., Balasubadra K.

    “…Low power is an essential requirement for suitable multimedia devices, image compression techniques utilizing several signal processing architectures and…”
    Get full text
    Journal Article
  8. 8

    DAD: A Secured Routing Protocol for Detecting and Preventing Denial-of-Service in Wireless Networks by Thomas Paul Roy, A., Balasubadra, K.

    Published in Wireless personal communications (01-09-2016)
    “…This paper aims to provide a complete security mechanism for DOS attacks in wireless networks. Various techniques and methodologies were proposed in the…”
    Get full text
    Journal Article
  9. 9

    Service Composition and Execution Plan Generation of Composite Semantic WEB Services Using Abductive Event Calculus by Paulraj, D., Swamynathan, S., Chandran, Daniel, Balasubadra, K., Prem, M. Vigilson

    Published in Computational intelligence (01-11-2016)
    “…Web Service composition is indispensable, as a single web service cannot satisfy the complex functional requirement of a user. The two key challenges of…”
    Get full text
    Journal Article
  10. 10

    IoT-Driven Image Recognition for Microplastic Analysis in Water Systems using Convolutional Neural Networks by Hasan, M D Ashfaqul, Balasubadra, K., Vadivel, G., Arunfred, N., Ishwarya, M.V, Murugan, S.

    “…Microplastic pollution in water systems is growing, requiring novel detection and analysis methods. This research presents an Internet of Things (IoT)-driven…”
    Get full text
    Conference Proceeding
  11. 11

    An Energy-Aware Agent-Based Resource Allocation Using Targeted Load Balancer for Improving Quality of Service in Cloud Environment by Jambulingam, Umamageswaran, Balasubadra, K.

    Published in Cybernetics and systems (03-10-2023)
    “…In order to manage the load on dispersed data centers and cut down on energy established on time usage, agent-based resource allocation is given attention…”
    Get full text
    Journal Article
  12. 12

    Link Correlation Procedure for Improving Energy Efficiency in Homogeneous WSN by Babu, V Suresh, Kumar, Pardeep, Balasubadra, K., Dineshkumar, T

    “…The wireless sensor network (WSN) is a multi-hop wireless network which include s numerous sensor nodes prearranged in a self-organized mode. In this approach…”
    Get full text
    Conference Proceeding
  13. 13

    Real-time Glass Recycling Quality Assurance and Contamination Reduction with IoT and Random Forest algorithm by Balasubadra, K., Shadaksharappa, B., Seeni, Senthil Kumar, Sridevi, V., R, Thamizhamuthu, Srinivasan, C.

    “…The recycling industry is crucial to environmental protection and resource conservation. Glass recycling has great sustainability potential, but quality…”
    Get full text
    Conference Proceeding
  14. 14

    Enhancing Credit Card Fraud Detection through LSTM-Based Sequential Analysis with Early Stopping by Jhansi Ida, S., Balasubadra, K., R R, Skandarsini, T, Lakshmi Narayanaa

    “…There is still a serious problem with credit card fraud in the world of financial transactions, requiring innovative solutions to effectively detect and halt…”
    Get full text
    Conference Proceeding
  15. 15

    Role of Data Mining Across Different Formats of Multimedia by Velmurugan, A K, Rajalingam, A., Dhawaleswar Rao, C.H, Balasubadra, K.

    “…In today's world, mining data from videos plays a significant role in the process of information retrieval. The generation of information pertaining to moving…”
    Get full text
    Conference Proceeding
  16. 16

    Data-Driven Drive Safety with Cloud-based Adaptive Cruise Control using K-Nearest Neighbors Algorithm by Choudri, Subramani Roy, Nagalakshmi, T. J., Krishna, Peddi Sai, Balasubadra, K., Mouleeswaran, S K, Maniraj, S.P.

    “…An innovative new technique cloud-based adaptive cruise control (ACC) uses data analysis and cloud computing to make driving safer and more efficient. Current…”
    Get full text
    Conference Proceeding
  17. 17

    Three dimensional numerical modeling and simulation of a uniformly doped GaAs MESFET photodetector by Balasubadra, K, Thangam, T, Mani, V Raja, Sankaranarayanan, K

    “…A new 3D numerical model of a GaAs MESFET Photo detector has been presented in this paper. The model takes into account all the major effects that determine…”
    Get full text
    Journal Article
  18. 18

    Hidden Markov Model with Machine Learning-Based Black hole Attack Identification in Wireless Sensor Networks by Balasubadra, K., Shiny, X.S.Asha, P V, Pramila, Solainayagi, P., Maniraj, S P

    “…Wireless Sensor Network (WSN) is lying to several attacks because the Black hole is problematic to distinguish and protect. Impostor internments and…”
    Get full text
    Conference Proceeding
  19. 19

    A New Analytic Description of Short-Channel Effects in Fully Depleted Single Gate SOI MESFETs for Low Power VLSI Applications by Balamurugan, N.B., Sankaranarayanan, K., Suguna, M., Balasubadra, K., Kalaivani

    “…In this paper, the potential variation in the channel obtained from analytical solution of two-dimensional (2-D) Poisson's equation is used to calculate the…”
    Get full text
    Conference Proceeding
  20. 20

    Crosslayer Analysis over Fading Channels by Manikandan, A, Balasubadra, A K, Vigneshwaran, M, Rakesh, T S, Ramprasad, O G

    “…In future packet based wireless communication systems, transmission in the downlink will often dominate the traffic load. To achieve a high throughput also…”
    Get full text
    Conference Proceeding