Search Results - "K., Johny Elma"

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Self‐attention based progressive generative adversarial network optimized with arithmetic optimization algorithm for kidney stone detection by V., Brindha Devi, K., Johny Elma, S., Rooban, Shajin, Francis H.

    Published in Concurrency and computation (10-03-2023)
    “…Summary Self‐attention based progressive generative adversarial network optimized with arithmetic optimization algorithm (AOA) is proposed in this manuscript…”
    Get full text
    Journal Article
  2. 2

    Hybridized Black Widow-Honey Badger Optimization: Swarm Intelligence Strategy for Node Localization Scheme in WSN by Elma, K Johny, S, Praveena Rachel Kamala, T, Saraswathi

    Published in Journal of grid computing (01-03-2024)
    “…The evolutionary growth of Wireless Sensor Networks (WSN) exploits a wide range of applications. To deploy the WSN in a larger area, for sensing the…”
    Get full text
    Journal Article
  3. 3

    RETRACTED ARTICLE:Optimal coverage along with connectivity maintenance in heterogeneous wireless sensor network by Johny Elma, K., Meenakshi, S.

    “…Heterogeneous wireless sensor network (HWSN) is a network which contains sensor nodes with dissimilar capabilities, such as varying energy, sensing range etc…”
    Get full text
    Journal Article
  4. 4

    Mantaray Foraging Optimization based Makespan Enhancement in Cloud based Scheduling Environment by Aswini, J, Elma, K. Johny, John Augustine, P., Kopperundevi, N., Chithra, S. M., Parasuraman, T.

    “…Cloud computing (CC) delivers on-demand and powerful business environments. It can be constructed on top of virtualized data hubs. Virtualization renders a…”
    Get full text
    Conference Proceeding
  5. 5

    Unveiling the dark: Analyzing and Categorizing dark web activities using Bi-Directional LSTMs by K, Johny Elma, S, Vishal, M, Varun

    “…The term "dark web" refers to a broad range of illegal actions which are performed by unidentified individuals or groups, making it hard to identify their…”
    Get full text
    Conference Proceeding
  6. 6

    An Intrusion Detection System for MANET to Detect Gray Hole Attack using Fuzzy Logic System by Bala, K., Paramesh, J., Elma, K. Johny, Santhanalakshmi, S. T.

    “…The Mobile Ad hoc network (MANET) is a kind of wireless communication network that is composed of several nodes which are highly movable throughout the various…”
    Get full text
    Conference Proceeding
  7. 7