Search Results - "Rajesh, Sudha"
-
1
Detection of features from the internet of things customer attitudes in the hotel industry using a deep neural network model
Published in Measurement. Sensors (01-08-2022)“…Tourism and the hotel business have benefited greatly from the use of digital social networking. Using social big data research, the application of deep…”
Get full text
Journal Article -
2
Intelligent System for Fraud Detection in Online Banking using Improved Particle Swarm Optimization and Support Vector Machine
Published in 2023 8th International Conference on Communication and Electronics Systems (ICCES) (01-06-2023)“…In the modern day, online banking has become the most popular service used by banking users. Banks collect vast amounts of useful information on their…”
Get full text
Conference Proceeding -
3
WITHDRAWN: Recognition and prevention of cyberharassment in social media using classification algorithms
Published in Materials today : proceedings (01-01-2021)Get full text
Journal Article -
4
MDHO: Mayfly Deer Hunting Optimization Algorithm for Optimal Obstacle Avoidance Based Path Planning Using Mobile Robots
Published in Cybernetics and systems (06-02-2023)“…Mobile robot becomes more significant in human life and industry, whereas navigation of robot in the dynamic environment results a challenging problem and it…”
Get full text
Journal Article -
5
Revolutionizing neural network efficiency: introducing FPAC for filter pruning via attention consistency
Published in Neural computing & applications (2024)“…The process of feature mapping is used to represent features on a map with their corresponding properties. The features are displayed visually and their…”
Get full text
Journal Article -
6
Esteemed software patterns for banking system
Published in Cluster computing (01-09-2019)“…Software architecture plays an important role in the field of Software engineering. The main challenge of software design is to improve the quality attributes…”
Get full text
Journal Article -
7
Detection of AI Generated Text With BERT Model
Published in 2024 2nd World Conference on Communication & Computing (WCONF) (12-07-2024)“…Identifying AI-generated material from human-crafted essays within a massive archive of over 28,000 compositions combining both sources is the central…”
Get full text
Conference Proceeding -
8
A Novel Approach of Ecommerce for Sales Prediction Using Hybrid ABC and AdaBoost Approach
Published in 2024 International Conference on Electronics, Computing, Communication and Control Technology (ICECCC) (02-05-2024)“…For online stores to offer speedier shipping times, precise sales forecasting is essential. Online advertising campaigns and the competitive nature of…”
Get full text
Conference Proceeding -
9
Alcoholic Consumption and Diabetes Prediction Using Machine Learning and Deep Learning
Published in 2024 Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI) (28-08-2024)“…This research investigates the impact of alcohol use and various other factors on individuals' health, with a focus on teenagers enrolled in school, though the…”
Get full text
Conference Proceeding -
10
Real Time Mental Health Monitoring System using Machine Learning
Published in 2024 Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI) (28-08-2024)“…Recent advancements in mobile health devices have spurred interest in leveraging them for monitoring mental health symptoms like stress. This project proposes…”
Get full text
Conference Proceeding -
11
Metrics measurement model: To measure the object oriented design metrics
Published in 2015 Seventh International Conference on Advanced Computing (ICoAC) (01-12-2015)“…There are many tools and methodologies are available for the development of software. The development consists of activities such as analyze, design, code,…”
Get full text
Conference Proceeding -
12
A Learning Based Factorization Approach for Uniform Distribution of Data in M2M Communication
Published in 2020 International Conference on Computing and Information Technology (ICCIT-1441) (09-09-2020)“…Now-a-days, Machine-to-Machine (M2M) communication can be accomplished with execution of Internet-of-Things (IoT) that is carried out in wireless networks…”
Get full text
Conference Proceeding -
13
Vulnerabilities Exploitation in Automative Hacking using Hardware and Software Implementation
Published in 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (25-05-2022)“…Technological advancements in automobile industry has hit its peak by visualizing cars as giant moving computers connected to cloud and providing data…”
Get full text
Conference Proceeding