Search Results - "V, Sarasvathi"
-
1
Reliability Analysis of an IoT-Based Air Pollution Monitoring System Using Machine Learning Algorithm-BDBN
Published in Cybernetics and information technologies : CIT (01-11-2023)“…Transmission of information is an essential component in an IoT device for sending, receiving, and collecting data. The Smart devices in IoT architecture are…”
Get full text
Journal Article -
2
A Novel Self-Exploration Scheme for Learning Optimal Policies against Dynamic Jamming Attacks in Cognitive Radio Networks
Published in Cybernetics and information technologies : CIT (01-11-2023)“…Cognitive Radio Networks (CRNs) present a compelling possibility to enable secondary users to take advantage of unused frequency bands in constrained spectrum…”
Get full text
Journal Article -
3
A Model-Free Cognitive Anti-Jamming Strategy Using Adversarial Learning Algorithm
Published in Cybernetics and information technologies : CIT (01-11-2022)“…Modern networking systems can benefit from Cognitive Radio (CR) because it mitigates spectrum scarcity. CR is prone to jamming attacks due to shared…”
Get full text
Journal Article -
4
-
5
Air Quality Monitoring and Predicting System for Sustainable Health Management using Multi-Linear Regression in IoT
Published in International Journal of Computing and Digital System (Jāmiʻat al-Baḥrayn. Markaz al-Nashr al-ʻIlmī) (01-05-2020)“…Fresh Air is the preeminent requirement of each and every human being for a healthy living. With the increase in urbanization and the number of vehicles on…”
Get full text
Journal Article -
6
A Multi-Agent Reinforcement Learning-Based Optimized Routing for QoS in IoT
Published in Cybernetics and information technologies : CIT (01-12-2021)“…The Routing Protocol for Low power and lossy networks (RPL) is used as a routing protocol in IoT applications. In an endeavor to bring out an optimized…”
Get full text
Journal Article -
7
Defending Against Identity Threats Using Risk-Based Authentication
Published in Cybernetics and information technologies : CIT (01-06-2023)“…Defending against identity-based threats, which have predominantly increased in the era of remote access and working, requires non-conventional, dynamic,…”
Get full text
Journal Article -
8
Fault Tolerant Sensor Node Placement for IoT based Large Scale Automated Greenhouse System
Published in International Journal of Computing and Digital System (Jāmiʻat al-Baḥrayn. Markaz al-Nashr al-ʻIlmī) (01-03-2019)“…Greenhouse method of agriculture overcomes various issues of traditional agriculture and provides good crop yield in farming. When the maintenance of…”
Get full text
Journal Article -
9
QoS Guaranteed Intelligent Routing Using Hybrid PSO-GA in Wireless Mesh Networks
Published in Cybernetics and information technologies : CIT (01-01-2015)“…In Multi-Channel Multi-Radio Wireless Mesh Networks (MCMR-WMN), finding the optimal routing by satisfying the Quality of Service (QoS) constraints is an…”
Get full text
Journal Article -
10
A Multi Route Rank Based Routing Protocol for Industrial Wireless Mesh Sensor Networks
Published in Cybernetics and information technologies : CIT (01-12-2016)“…Wireless Mesh Sensor nodes are deployed in harsh environments, like Industrial Wireless Mesh Sensor Networks (IWMSN). There the equipment is exposed to…”
Get full text
Journal Article -
11
Hepatoprotective activity of Stereospermum suaveolens against CCl4-induced liver damage in albino rats
Published in Pharmaceutical biology (01-05-2010)“…The present study aims to evaluate the hepatoprotective activity of Stereospermum suaveolens DC (Bignoniaceae). Hepatoprotective activity is studied by carbon…”
Get more information
Journal Article -
12
A Study on IoT layered Attacks and Countermeasures
Published in 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) (16-12-2022)“…The Internet of Things is the next era of communication. There are many types of IoT devices which are now used widely in different fields such as, home…”
Get full text
Conference Proceeding -
13
Distributed File Storage Model using IPFS and Blockchain
Published in 2021 2nd Global Conference for Advancement in Technology (GCAT) (01-10-2021)“…In current scenario the patients' medical report is stored digitally in medical industry. The report consists of patients' details such as patients' private…”
Get full text
Conference Proceeding -
14
Defending Against Identity Threats using Adaptive Authentication
Published in 2023 IEEE 8th International Conference for Convergence in Technology (I2CT) (07-04-2023)“…Defending against identity-based threats and attacks which have tremendously grown in number in the age of remote working and access, requires intelligent,…”
Get full text
Conference Proceeding -
15
Venturing Crowdfunding using Smart Contracts in Blockchain
Published in 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT) (01-08-2020)“…Crowd funding is an online cash raising technique that started as a path for the people to contribute limited quantity of money to enable innovative…”
Get full text
Conference Proceeding -
16
Intelligent Digital Ledger Voting System
Published in 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) (16-12-2022)“…The proposed methodology concentrates on the development of an approach which allows the voters to vote to their constituency from any booth participating in…”
Get full text
Conference Proceeding -
17
Evolution of the Security Models in Cognitive Radio Networks: Challenges and Open Issues
Published in 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT) (20-12-2020)“…Inclusion of Cognitive Radio Network (CRN) in different networking technologies is proven to offer an efficient communication system due to its potential…”
Get full text
Conference Proceeding -
18
A Federated Learning Approach for Disease Prediction and Remedies Recommendation
Published in 2024 IEEE 9th International Conference for Convergence in Technology (I2CT) (05-04-2024)“…Deep learning breakthroughs have transformed disease prediction and treatment recommendation systems, yet the confidentiality of sensitive medical data remains…”
Get full text
Conference Proceeding -
19
Authentic Tweets Recommendation System
Published in 2023 IEEE 8th International Conference for Convergence in Technology (I2CT) (07-04-2023)“…Twitter is an online social networking website where people communicate with each other with the help of short messages, typically up to 150 characters. It is…”
Get full text
Conference Proceeding -
20
Object recognition in videos by sequential frame extraction using convolutional neural networks and fully connected neural networks
Published in 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS) (01-08-2017)“…In this paper, a method to develop an interactive application in order to detect objects from videos is proposed. The application is able to classify the video…”
Get full text
Conference Proceeding