Search Results - "V, Sarasvathi"

Refine Results
  1. 1

    Reliability Analysis of an IoT-Based Air Pollution Monitoring System Using Machine Learning Algorithm-BDBN by Saritha, Sarasvathi, V.

    “…Transmission of information is an essential component in an IoT device for sending, receiving, and collecting data. The Smart devices in IoT architecture are…”
    Get full text
    Journal Article
  2. 2

    A Novel Self-Exploration Scheme for Learning Optimal Policies against Dynamic Jamming Attacks in Cognitive Radio Networks by Sudha, Y., Sarasvathi, V.

    “…Cognitive Radio Networks (CRNs) present a compelling possibility to enable secondary users to take advantage of unused frequency bands in constrained spectrum…”
    Get full text
    Journal Article
  3. 3

    A Model-Free Cognitive Anti-Jamming Strategy Using Adversarial Learning Algorithm by Sudha, Y., Sarasvathi, V.

    “…Modern networking systems can benefit from Cognitive Radio (CR) because it mitigates spectrum scarcity. CR is prone to jamming attacks due to shared…”
    Get full text
    Journal Article
  4. 4
  5. 5

    Air Quality Monitoring and Predicting System for Sustainable Health Management using Multi-Linear Regression in IoT by S, Smrithi, V, Sarasvathi, -, Saritha

    “…Fresh Air is the preeminent requirement of each and every human being for a healthy living. With the increase in urbanization and the number of vehicles on…”
    Get full text
    Journal Article
  6. 6

    A Multi-Agent Reinforcement Learning-Based Optimized Routing for QoS in IoT by Jermin Jeaunita, T. C., Sarasvathi, V.

    “…The Routing Protocol for Low power and lossy networks (RPL) is used as a routing protocol in IoT applications. In an endeavor to bring out an optimized…”
    Get full text
    Journal Article
  7. 7

    Defending Against Identity Threats Using Risk-Based Authentication by Dasu, Lalitha Sravanti, Dhamija, Mannav, Dishitha, Gurram, Vivekanandan, Ajith, Sarasvathi, V.

    “…Defending against identity-based threats, which have predominantly increased in the era of remote access and working, requires non-conventional, dynamic,…”
    Get full text
    Journal Article
  8. 8

    Fault Tolerant Sensor Node Placement for IoT based Large Scale Automated Greenhouse System by Jeaunita, T. C. Jermin, V., Sarasvathi

    “…Greenhouse method of agriculture overcomes various issues of traditional agriculture and provides good crop yield in farming. When the maintenance of…”
    Get full text
    Journal Article
  9. 9

    QoS Guaranteed Intelligent Routing Using Hybrid PSO-GA in Wireless Mesh Networks by Sarasvathi, V., Iyengar, N. Ch. S. N., Saha, Snehanshu

    “…In Multi-Channel Multi-Radio Wireless Mesh Networks (MCMR-WMN), finding the optimal routing by satisfying the Quality of Service (QoS) constraints is an…”
    Get full text
    Journal Article
  10. 10

    A Multi Route Rank Based Routing Protocol for Industrial Wireless Mesh Sensor Networks by Sarasvathi, V., Iyengar, N.Ch.S.N.

    “…Wireless Mesh Sensor nodes are deployed in harsh environments, like Industrial Wireless Mesh Sensor Networks (IWMSN). There the equipment is exposed to…”
    Get full text
    Journal Article
  11. 11

    Hepatoprotective activity of Stereospermum suaveolens against CCl4-induced liver damage in albino rats by Chandrashekhar, V M, Muchandi, Ashok A, Sudi, Sarasvathi V, Ganapty, Seru

    Published in Pharmaceutical biology (01-05-2010)
    “…The present study aims to evaluate the hepatoprotective activity of Stereospermum suaveolens DC (Bignoniaceae). Hepatoprotective activity is studied by carbon…”
    Get more information
    Journal Article
  12. 12

    A Study on IoT layered Attacks and Countermeasures by Surendran, Smrithi, Sarasvathi, V

    “…The Internet of Things is the next era of communication. There are many types of IoT devices which are now used widely in different fields such as, home…”
    Get full text
    Conference Proceeding
  13. 13

    Distributed File Storage Model using IPFS and Blockchain by Lobo, Pearl Alisha, Sarasvathi, V

    “…In current scenario the patients' medical report is stored digitally in medical industry. The report consists of patients' details such as patients' private…”
    Get full text
    Conference Proceeding
  14. 14

    Defending Against Identity Threats using Adaptive Authentication by Dasu, Lalitha Sravanti, Dhamija, Mannav, Dishitha, Gurram, Vivekanandan, Ajith, V, Sarasvathi

    “…Defending against identity-based threats and attacks which have tremendously grown in number in the age of remote working and access, requires intelligent,…”
    Get full text
    Conference Proceeding
  15. 15

    Venturing Crowdfunding using Smart Contracts in Blockchain by Yadav, Nikhil, V, Sarasvathi

    “…Crowd funding is an online cash raising technique that started as a path for the people to contribute limited quantity of money to enable innovative…”
    Get full text
    Conference Proceeding
  16. 16

    Intelligent Digital Ledger Voting System by Shreshth, Arpit, M, Altaf Ahmed, A, Poorvika, Jha, Mrityunjay, V, Sarasvathi

    “…The proposed methodology concentrates on the development of an approach which allows the voters to vote to their constituency from any booth participating in…”
    Get full text
    Conference Proceeding
  17. 17

    Evolution of the Security Models in Cognitive Radio Networks: Challenges and Open Issues by Sudha, Y, Sarasvathi, V

    “…Inclusion of Cognitive Radio Network (CRN) in different networking technologies is proven to offer an efficient communication system due to its potential…”
    Get full text
    Conference Proceeding
  18. 18

    A Federated Learning Approach for Disease Prediction and Remedies Recommendation by A, Sehag, Jayasankar, Varshini, Poojitha, Setti Durga, Sai Raman, Shreyas, V, Sarasvathi

    “…Deep learning breakthroughs have transformed disease prediction and treatment recommendation systems, yet the confidentiality of sensitive medical data remains…”
    Get full text
    Conference Proceeding
  19. 19

    Authentic Tweets Recommendation System by Agrawal, Harshika, Deepti, Meela, Nikhil, V R, Jain, Snehil, Sarasvathi, V

    “…Twitter is an online social networking website where people communicate with each other with the help of short messages, typically up to 150 characters. It is…”
    Get full text
    Conference Proceeding
  20. 20

    Object recognition in videos by sequential frame extraction using convolutional neural networks and fully connected neural networks by Mazumdar, Meghajit, Sarasvathi, V, Kumar, Akshay

    “…In this paper, a method to develop an interactive application in order to detect objects from videos is proposed. The application is able to classify the video…”
    Get full text
    Conference Proceeding