Search Results - "Prakash, R. Krishna"
-
1
Hardiness sensing for susceptibility using American Fuzzy Lop
Published in ITM web of conferences (2021)“…American Fuzzy Lop is an automated software testing method to give unexceeded values, else random data’s as input to computer programs for testing the…”
Get full text
Journal Article Conference Proceeding -
2
Leveraging Network Vulnerability Detection using Improved Import Vector Machine and Cuckoo Search based Grey Wolf Optimizer
Published in 2023 1st International Conference on Optimization Techniques for Learning (ICOTL) (07-12-2023)“…In the current interconnected and susceptible digital environment, the demand for reliable network attack prediction systems has reached a critical level. This…”
Get full text
Conference Proceeding -
3
Blockchain Technology for Protecting Ingenuity of Image
Published in 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (12-05-2023)“…Hash link is exploited for digital images to obtain imagecord concepts derived from cryptographic formation. The primary difference from the Blockchain…”
Get full text
Conference Proceeding -
4
IoT based Realtime Pregnancy Monitoring System
Published in 2023 2nd International Conference on Ambient Intelligence in Health Care (ICAIHC) (17-11-2023)“…The healthcare landscape has undergone a significant transformation through the integration of the Internet of Things (IoT), paving the way for inno-vative…”
Get full text
Conference Proceeding -
5
Wave perturbations in Earth’s thermosphere in conjunction with X1.7 solar flare: Observational perspective
Published in Advances in space research (01-04-2024)“…Based on satellite observations, the study examines the effect of an X1.7 flare (which occurred on January 27, 2012) on neutral winds and the formation of wave…”
Get full text
Journal Article -
6
Post Quantum Steganography for Cloud Privacy Preservation using Multivariable Quadratic Polynomial
Published in 2022 International Conference on Computer, Power and Communications (ICCPC) (14-12-2022)“…The cryptography and steganography can be employed as an appropriate tool for improving the confidentiality of transmissions over the cloud environment…”
Get full text
Conference Proceeding -
7
Comprehensive investigation on Deep learning models: Applications, Advantages, and Challenges
Published in 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT) (24-06-2024)“…Artificial intelligence (AI) and machine learning (ML) have been completely transformed by deep learning (DL), which provides unmatched power in handling…”
Get full text
Conference Proceeding -
8
Enhancing VANET Efficiency with ACRR Technique for Improved Traffic Management and Network Scalability
Published in 2024 International Conference on Science Technology Engineering and Management (ICSTEM) (26-04-2024)“…The role of Vehicular Ad Hoc Networks (VANETs) is crucial in enabling Intelligent Transportation System (ITS) technologies such as safe financial transactions,…”
Get full text
Conference Proceeding -
9
RADIATION-INDUCED ELECTRICAL CONDUCTIVITY IN ALUMINA
Published 01-01-1973Get full text
Dissertation