Search Results - "Suresh, Helina Rajini"

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Suppression of four wave mixing effect in DWDM system by Rajini Suresh, Helina, Vinitha, V., Girinath, N., Karthick, R.

    Published in Materials today : proceedings (2021)
    “…This article discusses the nonlinear effect, four-wave mixing (FWM), which lowers the performance of optical communication systems. The concept of orthogonal…”
    Get full text
    Journal Article
  2. 2

    An Integrative Computational Intelligence for Robust Anomaly Detection in Social Networks by Suresh, Helina Rajini, Reddy, Vallem Ranadheer, K, Sangamithrai, Praveena, Hirald Dwaraka, C, Gnanaprakasam, C, Sakthi Lakshmi Priya

    “…Anomaly detection is very important in social networks to keep the truth, security and believability of online communities. This paper presents Adapto Detect…”
    Get full text
    Journal Article
  3. 3

    A Novel Interference Mitigation Technique and Signal Strength Prediction in future Wireless Communication by Suresh, Helina Rajini, Jackson, Beulah, Dhanalakshmi, K M, Anand, A, Ramkumar, S, Asha, A

    “…The modern cellular systems are the key enabler for the development of recent wireless communication systems. So a new concept of frequency reuse has been…”
    Get full text
    Conference Proceeding
  4. 4

    A Deep Learning Approach for Automated Skin Disease Classification and Diagnosis by Suresh, Helina Rajini, Amutha, M., Tamizharasi, A., Jaya Krishna, A. P., Lalitha, S., Nithya, P

    “…Everyone is ware that a wide range of problems affect skin structure, function, and appearance. Dermatological issues or dermatoses are common names used to…”
    Get full text
    Conference Proceeding
  5. 5

    Pulse Non-Orthogonal Multiple Access (PNOMA) Technique for Future Generation Wireless Networks by Radhika, S., S, Hemalatha, Suresh, Helina Rajini, Makanyadevi, K., J, William Andrews, Kamatchi, S.

    “…The foundation of Non-orthogonal multiple access (NOMA) is providing services to several consumers at once while using the same resource in terms of frequency,…”
    Get full text
    Conference Proceeding
  6. 6

    Unsupervised Deep Learning Approaches for Anomaly Detection in IoT Data Streams by Suresh, Helina Rajini, Neelaveni, R., Kumar, Bonda Kiran, Arunadevi, R., G, Indhumathi, Varun, M

    “…The proliferation of IoT devices is primarily responsible for the data deluge that has engulfed multiple industries. Nevertheless, due to the high…”
    Get full text
    Conference Proceeding
  7. 7
  8. 8

    Efficiently Listing URLs from Active Hidden Servers in the Onion Routing Network by Bhuvaneswari, C Ambika, Ruby, E D Kanmani, Suresh, Helina Rajini, Ershia, V Diana, Prabha, M, Saravanan, K Anandha

    “…The Onion Routing (Tor) network has created to allow manipulators to peruse the internet anonymously. It is renowned for its strong anonymity and privacy…”
    Get full text
    Conference Proceeding