Search Results - "Malarvizhi, N."
-
1
Grape leaf disease prediction using Sine Cosine Butterfly Optimization-based deep neuro fuzzy network
Published in Multimedia tools and applications (01-05-2024)“…The diseases in plants produce a distressing impact to initiate safety in producing food and show a qualitative fall in farming. Commonly, plant disease can…”
Get full text
Journal Article -
2
A design of lightweight ECC based cryptographic algorithm coupled with linear congruential method for resource constraint area in IoT
Published in Journal of ambient intelligence and humanized computing (01-05-2023)“…Internet of Things (IoT) is a thriving technology that interlinks gadgets to the internet by moulding a massive global network of unique objects which possess…”
Get full text
Journal Article -
3
Mitigate Black Hole Attack Using Hybrid Bee Optimized Weighted Trust with 2-Opt AODV in MANET
Published in Wireless personal communications (01-05-2019)“…A Mobile Ad hoc Network (MANET) is susceptible to several security threats. This work aims at securing a MANET against black hole attacks. Based on MANET…”
Get full text
Journal Article -
4
Adaptive fuzzy genetic algorithm for multi biometric authentication
Published in Multimedia tools and applications (01-04-2020)“…Biometric Authentication (BA) has turn out to be presently as key problem in privacy and security. Multimodal biometric system specializes in enhancing…”
Get full text
Journal Article -
5
Distributed deduplication with fingerprint index management model for big data storage in the cloud
Published in Evolutionary intelligence (01-06-2021)“…As data progressively grows within data centers, the cloud storage models face several issues while storing data and offers abilities needed to shift data in…”
Get full text
Journal Article -
6
Bi-directional LSTM–CNN Combined method for Sentiment Analysis in Part of Speech Tagging (PoS)
Published in International journal of speech technology (01-06-2020)“…In past few years, the popularity of social media has increased drastically, sentiment analysis on the reviews, comments and opinions from social media has…”
Get full text
Journal Article -
7
Cloud Resource Scheduling Optimal Hypervisor (CRSOH) for Dynamic Cloud Computing Environment
Published in Wireless personal communications (01-11-2020)“…Cloud computing is a facility that provides access to services. Management of massive amount of information in cloud computing is achieved by using VM…”
Get full text
Journal Article -
8
Viscoelastic, thermal, and morphological properties of nanocomposites based on modified PVA using a twin-screw melt extrusion process
Published in Journal of thermoplastic composite materials (01-11-2020)“…Melt polymer nanocomposites were prepared using polyvinyl alcohol (PVA) with the different weight percentage of calcined clays (CCs) in a twin-screw extruder…”
Get full text
Journal Article -
9
An enhanced reversible image steganography using distributive Tian's method
Published in Security and privacy (01-07-2023)“…In recent years, the concept of image encryption and data concealing has become a major area of research that significantly improves the secure communication…”
Get full text
Journal Article -
10
Data mining application on aviation accident data for predicting topmost causes for accidents
Published in Cluster computing (01-09-2019)“…Aviation safety management system is a vital component of the aviation industry. Aviation safety inspectors apply a broad knowledge about aviation industry,…”
Get full text
Journal Article -
11
Swarm-based clustering algorithm for efficient web blog and data classification
Published in The Journal of supercomputing (01-06-2020)“…Data classification and the weblog classification have become the most regular approach for people to express themselves. Data classification is another type…”
Get full text
Journal Article -
12
Secure and optimal authentication framework for cloud management using HGAPSO algorithm
Published in Cluster computing (01-03-2019)“…Data security is the major problem in cloud computing. To overcome this problem in the existing work Password can be used as a key to encrypt and decrypt the…”
Get full text
Journal Article -
13
An Efficient Human Identification through MultiModal Biometric System
Published in Brazilian Archives of Biology and Technology (2016)“…ABSTRACT Human identification is essential for proper functioning of society. Human identification through multimodal biometrics is becoming an emerging trend,…”
Get full text
Journal Article -
14
EODVGA: An Enhanced ODV Based Genetic Algorithm for Multi-Depot Vehicle Routing Problem
Published in EAI endorsed transactions on scalable information systems (01-06-2019)“…Multi-Depot Vehicle Routing Problem (MDVRP) is a familiar combinative optimization problem that simultaneously determines the direction for different vehicles…”
Get full text
Journal Article -
15
-
16
Load Balancing Policies of Web Servers: Research Analysis, Classification and Perspectives
Published in EAI endorsed transactions on scalable information systems (01-06-2019)“…The usage of the internet has increased rapidly from the past few years. Thus it automatically increases the internet traffic. In the internet, a web server…”
Get full text
Journal Article -
17
Recognition of suitable Pest for Crops using Image Processing and Deep Learning Techniques
Published in 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) (16-12-2022)“…In the economy of India, agriculture plays vital role and exports processed food to all over the world. Modern agricultural methodologies and tools become…”
Get full text
Conference Proceeding -
18
IOT Security and Machine Learning Algorithms: Survey and Analysis
Published in 2023 7th International Conference on Trends in Electronics and Informatics (ICOEI) (11-04-2023)“…The Internet of Things (IoT) establishes a web extension by combining physical components to arrange them self into shared objects. This creative observation…”
Get full text
Conference Proceeding -
19
A Comprehensive Study on Alcohol Detection and Engine Locking System using Arduino
Published in 2024 4th International Conference on Pervasive Computing and Social Networking (ICPCSN) (03-05-2024)“…Currently, there is a significant increase in incidents of drunk driving and road accidents, primarily caused by drivers who lack control over their vehicles…”
Get full text
Conference Proceeding -
20
Review on Different Approaches for Crop Prediction and Disease Monitoring Techniques
Published in 2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA) (05-11-2020)“…In this paper, distinct techniques for predicting crop yield have been discussed. Methods such as artificial neural network, Deep Learning based Weighted SOM,…”
Get full text
Conference Proceeding