Search

Your search keyword '"Sridevi, R."' showing total 386 results

Search Constraints

Start Over You searched for: Author "Sridevi, R." Remove constraint Author: "Sridevi, R."
386 results on '"Sridevi, R."'

Search Results

202. Protein Synthesis in the Male Accessory Reproductive Glands of Spodoptera litura(Noctuidae: Lepidoptera)

204. UIP—A Smart Web Application to Manage Network Environments

205. Energy Distribution in a Smart Grid with Load Weight and Time Zone

206. Data Mining in Healthcare and Predicting Obesity

207. An Android-Based Mobile Application to Help Alzheimer’s Patients

208. Experimental Analysis of the Changes in Speech while Normal Speaking, Walking, Running, and Eating

209. Artificial Intelligence Approach to Legal Reasoning Evolving 3D Morphology and Behavior by Computational Artificial Intelligence

210. An Analytical Study on Gesture Recognition Technology

211. Malicious URL Classification Using Machine Learning Algorithms and Comparative Analysis

212. Analysis of Object Identification Using Quadrature Bank Filter in Wavelet Transforms

213. Action Recognition in Sports Videos Using Stacked Auto Encoder and HOG3D Features

214. Image Registration and Rectification Using Background Subtraction Method for Information Security to Justify Cloning Mechanism Using High-End Computing Techniques

215. Analyzing Effect of Political Situations on Sensex-Nifty-Rupee—A Study Based on Election Results

216. Analyzing Heterogeneous Satellite Images for Detecting Flood Affected Area of Kerala

217. Study and Analysis of Modified Mean Shift Method and Kalman Filter for Moving Object Detection and Tracking

218. Optimization in Wireless Sensor Network Using Soft Computing

219. Human Fall Detection Using Temporal Templates and Convolutional Neural Networks

220. Decentralized Framework for Record-Keeping System in Government Using Hyperledger Fabric

221. A Review of Various Mechanisms for Botnets Detection

222. Hand Gesture Recognition Based on Saliency and Foveation Features Using Convolutional Neural Network

223. Action Recognition Using Motion History Information and Convolutional Neural Networks

224. A Survey of IDS Techniques in MANETs Using Machine-Learning

225. Accuracy Comparison of Classification Techniques for Mouse Dynamics-Based Biometric CaRP

226. Role and Impact of Wearables in IoT Healthcare

227. Implementation of Children Activity Tracking System Based on Internet of Things

228. Data Mining: Min–Max Normalization Based Data Perturbation Technique for Privacy Preservation

229. Food Consumption Monitoring and Tracking in Household Using Smart Container

230. Performance Comparison of Random Forest Classifier and Convolution Neural Network in Predicting Heart Diseases

231. Study and Ranking of Vulnerabilities in the Indian Mobile Banking Applications Using Static Analysis and Bayes Classification

232. ECC-Based Secure Group Communication in Energy-Efficient Unequal Clustered WSN (EEUC-ECC)

233. Workload Assessment Based on Physiological Parameters

234. Rough Set-Based Classification of Audio Data

235. Realistic Handwriting Generation Using Recurrent Neural Networks and Long Short-Term Networks

236. ESADSA: Enhanced Self-adaptive Dynamic Software Architecture

237. Detection of Parkinson’s Disease Through Speech Signatures

238. A New Framework Approach to Predict the Wine Dataset Using Cluster Algorithm

239. Performance Analysis of Feature Extraction Methods Based on Genetic Expression for Clustering Video Dataset

240. A Survey on Analysis of User Behavior on Digital Market by Mining Clickstream Data

241. Necessity of Fourth Factor Authentication with Multiple Variations as Enhanced User Authentication Technique

242. A Framework for Evaluating the Quality of Academic Websites

243. Optimal Resource Allocation in OFDMA-LTE System to Mitigate Interference Using GA rule-based Mostly HBCCS Technique

244. Dog Breed Classification Using Transfer Learning

245. Data Mining Task Optimization with Soft Computing Approach

246. Review of Techniques for Automatic Text Summarization

247. Identification of Cryptographic Algorithms Using Clustering Techniques

248. Segmentation of Soft Tissues from MRI Brain Images Using Optimized KPCM Clustering Via Level Set Formulation

249. MLID: Machine Learning-Based Intrusion Detection from Network Transactions of MEMS Integrated Diversified IoT

250. A Survey on Deceptive Phishing Attacks in Social Networking Environments

Catalog

Books, media, physical & digital resources