Search Results - "U, Kumaran"
-
1
Next-Generation Imaging Methodology: An Intelligent Transportation System for Consumer Industry
Published in IEEE transactions on consumer electronics (01-02-2024)“…Imaging technology is a recent advancement in developing smart vehicular environments in the consumer industry. Due to the increase in smart vehicles, road…”
Get full text
Journal Article -
2
A hybrid optimization algorithm using BiLSTM structure for sentiment analysis
Published in Measurement. Sensors (01-02-2023)“…Sentiment analysis can assist consumers in providing clear and objective sentiment recommendations based on large amounts of data, and it is helpful in…”
Get full text
Journal Article -
3
Secure Data Transmission in Internet of Medical Things Using RES-256 Algorithm
Published in IEEE transactions on industrial informatics (01-12-2022)“…In this article, the concept of cryptographic algorithms is used as an efficient access control mechanism for Internet of Medical Things-based health care…”
Get full text
Journal Article -
4
Fusion of mel and gammatone frequency cepstral coefficients for speech emotion recognition using deep C-RNN
Published in International journal of speech technology (01-06-2021)“…Emotions play a significant role in human life. Recognition of human emotions has numerous tasks in recognizing the emotional features of speech signals. In…”
Get full text
Journal Article -
5
Sentiment analysis of amazon user reviews using a hybrid approach
Published in Measurement. Sensors (01-06-2023)“…Consumer reviews of services and products are a critical performance indicator for businesses looking to improve their contributions. They're also important…”
Get full text
Journal Article -
6
An IOT Innovation of Smart Solar Energy Consumption Analysis and Control in Micro Grid
Published in International journal of photoenergy (12-10-2022)“…Solar energy consumption is a systematic study used to review the design of facilities, services, and equipment in an organization against specifications of…”
Get full text
Journal Article -
7
Secure authentication and integrity techniques for randomized secured routing in WSN
Published in Wireless networks (01-02-2015)“…As wireless sensor network is resource-constrained, reliability and security of broadcasted data become major issue in these types of network. In order to…”
Get full text
Journal Article -
8
Vehicle Door Safety System
Published in 2023 2nd International Conference on Computational Systems and Communication (ICCSC) (03-03-2023)“…Carelessness and absence of mind leading to unseen obstacles or moving objects from passenger or driver inside the vehicle will make way for accidents to…”
Get full text
Conference Proceeding -
9
Quick fix for obstacles emerging in management recruitment measure using IOT-based candidate selection
Published in Service oriented computing and applications (01-12-2018)“…In this paper, decision-making tool is developed for the identification of the optimal aspirant for the recruitment procedure. It is developed using the…”
Get full text
Journal Article -
10
Covid Contact Tracing Integrated with Blockchain Technology
Published in 2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT) (07-10-2022)“…The product to be developed in this project is concerned to be a Mobile Application for route tracing based on user's location history. Each user is tracked…”
Get full text
Conference Proceeding -
11
Performance Analysis of Water Quality Monitoring System in IoT Using Machine Learning Techniques
Published in 2021 International Conference on Forensics, Analytics, Big Data, Security (FABS) (21-12-2021)“…Nowadays, the Internet of things (IoT) and insights while sensing are being used in different areas of research to monitor, collect and separate knowledge from…”
Get full text
Conference Proceeding -
12
Enhanced Security Measures for Image Privacy: Encryption Perspectives
Published in 2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT) (04-01-2024)“…A key technology in information security, picture encryption is intended to safeguard the integrity and confidentiality of digital photographs. Using a variety…”
Get full text
Conference Proceeding -
13
A Comparative Study on the Performance of Machine learning Algorithms for Malware Detection and Classification
Published in 2024 IEEE 9th International Conference for Convergence in Technology (I2CT) (05-04-2024)“…From cloud computing to the Internet of Things, there are several applications and frameworks that are susceptible to cyber-attacks. To safeguard critical…”
Get full text
Conference Proceeding -
14
Using BiLSTM Structure with Cascaded Attention Fusion Model for Sentiment Analysis
Published in Journal of scientific & industrial research (New Delhi, India : 1963) (01-04-2023)Get full text
Journal Article -
15
Predicting Drug Side-effects from Open Source Health Forums using Supervised Classifier Approach
Published in 2020 5th International Conference on Communication and Electronics Systems (ICCES) (01-06-2020)“…Adverse Drug Side-effects is an unexpected cause of drug reaction from patient to patient. However, Pharmaceutical companies manufacturing the drugs which are…”
Get full text
Conference Proceeding -
16
Exposure on Edge Detection and Image Segmentation with Instinctive Classification of Brain Tumor Using Artificial Intelligence Methods
Published in 2023 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI) (21-12-2023)“…This research article proposes an exposure on edge detection on images followed by image segmentation and proceeds with the automatic classification of brain…”
Get full text
Conference Proceeding -
17
DCNET: A Novel Implementation of Gastric Cancer Detection System through Deep Learning Convolution Networks
Published in 2022 International Conference on Advanced Computing Technologies and Applications (ICACTA) (04-03-2022)“…To evaluate the Early Gastric Cancer (EGC) detection in humans one of the most common diseases that act as neoplastic disease and second-largest fatal…”
Get full text
Conference Proceeding -
18
Phishing Detection Using Machine Learning Techniques
Published in 2023 3rd Asian Conference on Innovation in Technology (ASIANCON) (25-08-2023)“…As there are many cyber-attacks that are going on in this world phishing is one of the most important cyberattack phishing attacks starts with fake messages…”
Get full text
Conference Proceeding -
19
Deep Learning for Classification of Salient Object Classification in Unmanned Crime Spot
Published in 2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT) (05-04-2023)“…The identification of saliency objects is a crucial and difficult step in the process of identifying potential suspects from an occurrence. The first step in…”
Get full text
Conference Proceeding -
20
Design and Implementation of Lung Abnormality Detection Through Sparse Projection Features Enabled Distributed Convolution Network
Published in 2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT) (05-04-2023)“…Due to various factors in recent days the lung infection has become a common disease in humans. The lung abnormality needs to be detected to avoid life…”
Get full text
Conference Proceeding