Search Results - "L, Rangaiah"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Minimizing the Energy Consumption and Enhancing the NetworkLifetime in WSN using Advanced LEACH Protocol by Sivaraman, Haritha K., L, Rangaiah

    “…The lifetime of the wireless sensor network (WSN) is affected by the overall energy consumption of the routing protocol because of the difficulty of recharging…”
    Get full text
    Conference Proceeding
  2. 2

    Performance Evaluation of a Network on Chip Based on Ghz Throughput and Low Power for Streaming Data Transmission on FPGA by C, Prasanna Kumar D., L, Rangaiah

    “…Currently, because of how quickly technology is developing, designing sophisticated applications is proving to be very difficult and is leading to issues with…”
    Get full text
    Conference Proceeding
  3. 3

    Ayurvedic Flora Detection Using CNN Algorithm by R, Sunitha, S, Chaithanya, P, Bhagya, Rangaiah, L, J, Yashas

    “…Ayurveda is a traditional system of medicine that heavily relies on the habit of medicinal plants for various treatments. In the last few years, there have…”
    Get full text
    Conference Proceeding
  4. 4

    Butler Matrix Design and Simulation For 5G Applications by Sunitha, R, Vijayanand, S, Kannan, Ramani, Usha, S, Rangaiah, L., Sanjay, P

    “…This paper adduces 4x4 butler matrix beamforming network employing a new technique in transmission line structure-- open circuit coupled lines and a…”
    Get full text
    Conference Proceeding
  5. 5

    A Survey on Performance of Various Image Compression Techniques by Gireesh, H R, Rangaiah, L

    “…Image compression enables quite exciting solutions in many fields, such as image analysis, bio-medical image processing, wireless systems and seems to be a key…”
    Get full text
    Conference Proceeding
  6. 6

    Optimizing Security Performance: Leveraging Multiclass Algorithms and Dimensionality Reduction for Enhanced Accuracy by Nambiar, Hashlee Sajeev, Rangaiah, L, Praksha, P K, Vasanthakumar, C, Suriya Prakash, J

    “…It architecture is a highly interconnected field, and one of its most essential components is Intrusion Detection System (IDS). The efficiency of network…”
    Get full text
    Conference Proceeding