Search Results - "Jayasakthi Velmurugan, K."

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Novel algorithm machine translation for language translation tool by Jayasakthi Velmurugan, K., Sumathy, G., Pradeep, K. V.

    Published in Computational intelligence (01-04-2024)
    “…Fuzzy matching techniques are the presently used methods in translating the words. Neural machine translation and statistical machine translation are the…”
    Get full text
    Journal Article
  2. 2

    Advanced led selection and map detection in glim systems using fuzzy dynamic arithmetic optimization (FDAO) algorithm by Suresh, K., Lathif, Syed Ismail Abdul, Jayasakthi Velmurugan, K., Anand, Krishnamurthy

    Published in Optical and quantum electronics (01-11-2023)
    “…As emerging technologies, numerous studies were carried out based on multiple input multiple output (MIMO) visible light communication (VLC) system that…”
    Get full text
    Journal Article
  3. 3

    Deep anomaly detection: A linear one-class SVM approach for high-dimensional and large-scale data by Suresh, K., Jayasakthi Velmurugan, K., Vidhya, R., Rahini sudha, S., Kavitha

    Published in Applied soft computing (01-12-2024)
    “…Anomaly detection plays a crucial role in various fields including cyber security, finance, healthcare, and industrial monitoring. Traditional methods in…”
    Get full text
    Journal Article
  4. 4

    Air quality forecasting‐driven cloud resource allocation for sustainable energy consumption: An ensemble classifier approach by Kandan, M., Jayasakthi Velmurugan, K., Gururama Senthilvel, P., Sathish Kumar, N.

    “…In recent times, air quality prediction is turned out to be one of the important research topics among research communities to prevent lives from negative…”
    Get full text
    Journal Article
  5. 5

    Melanoma Boundaries Detection Techniques using Artificial Intelligence by Velmurugan, K. Jayasakthi, Srinivasan, P., Gayathri, A., Yuvarani, S.

    “…Melanoma is the 6th most successive disease in the United States, with more than 9000 individuals kicking the bucket every year. Fast acknowledgment of…”
    Get full text
    Conference Proceeding
  6. 6

    Image Forgery Detection Using Machine Learning by Latha, K., Kavitha, D., Hemavathi, S., Velmurugan, K. Jayasakthi, R, Neathi

    “…Imaging technology has made tremendous progress in recent years, and digital images can now be captured by a variety of handheld devices such as mobile phones,…”
    Get full text
    Conference Proceeding
  7. 7

    Using a Machine Learning Algorithm and Fundus Images to Treat Diabetic Retinopathy by M, Fathima Mubarakkaa, V, Myvizhi Selvi, Hemavathi, S., Jancy, P. Leela, Velmurugan, K. Jayasakthi, Kiruthika

    “…Diabetes-related complications include diabetic retinopathy (DR), a condition that damages the eyes. Pictures of the retinal fundus can be used to find it…”
    Get full text
    Conference Proceeding
  8. 8

    System for Prioritizing Covid-19 Patients Based on Certain Parameters by Hemavathi, S, Sumesh, Lohith, Sai Krishnan, R, Latha, K., Jayasakthi Velmurugan, K., Kavitha, D.

    “…Over numerous nations on earth, a brand-new virus known as the corona virus has been spreading like wildfire. Hospitals are exposed to many people, and it…”
    Get full text
    Conference Proceeding
  9. 9

    Medical Assistant App by S, Hemavathi, A C, Sam Abhishek, J, Sai Kaushik, D, Sai Deepak, Latha, K., Velmurugan, K. Jayasakthi

    “…Apps for medical assistance can be quite important in the provision of emergency healthcare. Anyone may require the contact information for the closest…”
    Get full text
    Conference Proceeding
  10. 10

    Cloud framework using mobile phone camera by Velmurugan, K. Jayasakthi, Dorairangaswamy, M. A.

    “…Designing a collaborative framework for offloading computation from mobile Phone is an interesting idea. People expect all the features of desktop in mobile…”
    Get full text
    Conference Proceeding
  11. 11
  12. 12

    Video Steganography by Neural Networks Using Hash Function by Velmurugan, K.Jayasakthi, Hemavathi, S.

    “…Video Steganography is an extension of image steganography where any kind of file in any extension is hidden into a digital video. The video content is dynamic…”
    Get full text
    Conference Proceeding
  13. 13

    Quality of Service Factor based Unfailing Route Formation in Wireless Sensor Network by Yuvarani, S., Gayathri, A., Velmurugan, K.Jayasakthi, Meenakshi, V., Sadhana, S, Srinivasan, C.

    “…Nowadays, several analytical methods exist to make unfailing route formation. However, it is still challenging work because the wireless medium is unreliable…”
    Get full text
    Conference Proceeding
  14. 14

    Convenient Way of Accessing Multimedia Functions Using Ml and Open CV by C, Hemavathi, G, Vivekanandhan, C, Cibi, R, Abhinav Krishna, Velmurugan, K.Jayasakthi, D, Kavitha

    “…In current world, most of the activities are machine-used and the existing systems to human computer interaction is not sufficient or efficient. So this paper…”
    Get full text
    Conference Proceeding
  15. 15

    IoT-WSN Based Water Monitoring System by S, Hemavathi, S, Snehasre, Velmurugan, K.Jayasakthi, R, Asha, Latha, K., S, Thirishika

    “…Water pollution poses a significant challenge in the context of promoting environmentally sustainable globalization.Regularly monitoring the quality of water…”
    Get full text
    Conference Proceeding
  16. 16

    The Convergence of Traffic Management System by S, Hemavathi, Mubarakkaa, Fathima, Jancy, P.Leela, V, Myvizhiselvi, Velmurugan, K.Jayasakthi, R, Neathi

    “…As the number of cars in towns increases, so will the traffic flow, which implies that parking tickets in Bangladesh and throughout the world have become more…”
    Get full text
    Conference Proceeding
  17. 17

    MedLyric - Exploring Health and Well-Being Through a Website by S, Hemavathi, J, Sai Kaushik, D, Sai Deepak, C, Sam Abhishek A, Devi, A.Sangeerani, Velmurugan, K.Jayasakthi

    “…"MedLyric" is a comprehensive online platform meant to give immediate information and help to individuals during emergency circumstances and in other…”
    Get full text
    Conference Proceeding