A. Kannan
YOU?
Author Swipe
View article: Interconnected axes of phenotypic plasticity drive coordinated cellular behaviour and worse clinical outcomes in breast cancer
Interconnected axes of phenotypic plasticity drive coordinated cellular behaviour and worse clinical outcomes in breast cancer Open
Phenotypic plasticity plays a key role in cancer progression and metastasis, enabling cancer cells to adapt and evolve, but precisely how distinct axes governing phenotypic plasticity interact to shape tumour progression and patient outcom…
View article: Comparing a rule-based decision tree to an LSTM network for the detection of ineffective efforts during expiration in neonates
Comparing a rule-based decision tree to an LSTM network for the detection of ineffective efforts during expiration in neonates Open
Detecting Ineffective Efforts during Expiration (IEE) in invasively ventilated neonates could help to improve the ventilation process and lower the discomfort of the patient. We propose an intrinsically explainable rule-based decision tree…
View article: Biometric and IoT Integration for Secure and Remote Door Access Control Using Fingerprint Recognition and GSM Technology
Biometric and IoT Integration for Secure and Remote Door Access Control Using Fingerprint Recognition and GSM Technology Open
The research focuses on improving the security and convenience of door access control systems through the integration of advanced fingerprint recognition technology with Arduino microcontrollers and the GSM module. The reliability and flex…
View article: Defective Edge Detection Using Cascaded Ensemble Canny Operator
Defective Edge Detection Using Cascaded Ensemble Canny Operator Open
Edge detection has been one of the most difficult challenges in computer vision because of the difficulty in identifying the borders and edges from the real-world images including objects of varying kinds and sizes. Methods based on ensemb…
View article: Retraction Note: Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN
Retraction Note: Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN Open
View article: Exploiting Precision Mapping and Component-Specific Feature Enhancement for Breast Cancer Segmentation and Identification
Exploiting Precision Mapping and Component-Specific Feature Enhancement for Breast Cancer Segmentation and Identification Open
Breast cancer is one of the leading causes of death globally, and thus there is an urgent need for early and accurate diagnostic techniques. Although ultrasound imaging is a widely used technique for breast cancer screening, it faces chall…
View article: HypoRiPPAtlas as an Atlas of hypothetical natural products for mass spectrometry database search
HypoRiPPAtlas as an Atlas of hypothetical natural products for mass spectrometry database search Open
Recent analyses of public microbial genomes have found over a million biosynthetic gene clusters, the natural products of the majority of which remain unknown. Additionally, GNPS harbors billions of mass spectra of natural products without…
View article: Improved tomato leaf disease classification through adaptive ensemble models with exponential moving average fusion and enhanced weighted gradient optimization
Improved tomato leaf disease classification through adaptive ensemble models with exponential moving average fusion and enhanced weighted gradient optimization Open
Tomato is one of the most popular and most important food crops consumed globally. The quality and quantity of yield by tomato plants are affected by the impact made by various kinds of diseases. Therefore, it is essential to identify thes…
View article: Phase III randomized clinical studies to evaluate the immunogenicity, lot-to-lot consistency, and safety of ROTAVAC® liquid formulations (ROTAVAC 5C & 5D) and non-inferiority comparisons with licensed ROTAVAC® (frozen formulation) in healthy infants
Phase III randomized clinical studies to evaluate the immunogenicity, lot-to-lot consistency, and safety of ROTAVAC® liquid formulations (ROTAVAC 5C & 5D) and non-inferiority comparisons with licensed ROTAVAC® (frozen formulation) in healthy infants Open
The WHO pre-qualified rotavirus vaccine, ROTAVAC®, is derived naturally from the neonatal 116E rotavirus strain, and stored at -20°C. As refrigerator storage is preferable, immunogenicity and safety of liquid formulations kept at 2-8°C, ha…
View article: An optimal energy utilization model for precision agriculture in WSNs using multi-objective clustering and deep learning
An optimal energy utilization model for precision agriculture in WSNs using multi-objective clustering and deep learning Open
Wireless Sensor Networks (WSNs) play a crucial role in Precision Agriculture by providing real-time data on various environmental parameters like temperature, humidity, soil moisture, etc. However, the efficient utilization of energy in th…
View article: A Cluster-Based Energy-Efficient Secure Optimal Path-Routing Protocol for Wireless Body-Area Sensor Networks
A Cluster-Based Energy-Efficient Secure Optimal Path-Routing Protocol for Wireless Body-Area Sensor Networks Open
Recently, research into Wireless Body-Area Sensor Networks (WBASN) or Wireless Body-Area Networks (WBAN) has gained much importance in medical applications, and now plays a significant role in patient monitoring. Among the various operatio…
View article: Reactive Handover Coordination System with Regenerative Blockchain Principles for Swarm Unmanned Aerial Vehicles
Reactive Handover Coordination System with Regenerative Blockchain Principles for Swarm Unmanned Aerial Vehicles Open
Aerial warfare systems in various countries highly expect Swarm Unmanned Aerial Vehicles (UAVs) and Flying Adhoc Networks (FANETs) for defense stability. However, swarm UAVs face many challenges, like security breaches, malfunctions, link …
View article: Intelligent Mining of Association Rules Based on Nanopatterns for Code Smells Detection
Intelligent Mining of Association Rules Based on Nanopatterns for Code Smells Detection Open
Software maintenance is an imperative step in software development. Code smells can arise as a result of poor design as well as frequent code changes due to changing needs. Early detection of code smells during software development can hel…
View article: A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems
A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems Open
Data transmission in intelligent transportation systems is being challenged by a variety of factors, such as open wireless communication channels, that pose problems related to security, anonymity, and privacy. To achieve secure data trans…
View article: An Intrusion Detection System for Securing IoT Based Sensor Networks from Routing Attacks
An Intrusion Detection System for Securing IoT Based Sensor Networks from Routing Attacks Open
View article: A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things
A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things Open
The Internet of Things (IoT) is a distributed system which is made up of the connections of smart objects (things) that can continuously sense the events in their sensing domain and transmit the data via the Internet. IoT is considered as …
View article: Fuzzy based congestion detection and control algorithm for energy efficient wireless sensor network (WSN)
Fuzzy based congestion detection and control algorithm for energy efficient wireless sensor network (WSN) Open
The Journal of the National Science Foundation of Sri Lanka publishes the results of research in all aspects of Science and Technology. The journal also has a website at http://www.nsf.gov.lk/. 2021 Impact Factor: 0.682The JNSF provides im…
View article: A clinical decision support system for polycystic ovarian syndrome using red deer algorithm and random forest classifier
A clinical decision support system for polycystic ovarian syndrome using red deer algorithm and random forest classifier Open
This study develops a clinical decision support system to assist physicians with monitoring Polycystic Ovarian Syndrome (PCOS). The proposed method uses a classification model with optimization techniques and machine learning algorithms. T…
View article: Wireless Sensor Network Assisted Intelligent Drip Irrigation System for Water Conservation in Agriculture
Wireless Sensor Network Assisted Intelligent Drip Irrigation System for Water Conservation in Agriculture Open
Agriculture is the backbone for most of the countries in the globe including our India. Crop Yield influences a country's economy and common public. Water is the most important factor in agriculture, water requirements for different crops.…
View article: An Intelligent RPL attack detection using Machine Learning-Based Intrusion Detection System for Internet of Things
An Intelligent RPL attack detection using Machine Learning-Based Intrusion Detection System for Internet of Things Open
The Internet of Things (IoT) is an important and a major key component to support human life. Sensors are the sensing devices that play an important role in IoT to detect environmental conditions. The significance of IoT is increasing due …
View article: RETRACTED ARTICLE: A user preference tree based personalized route recommendation system for constraint tourism and travel
RETRACTED ARTICLE: A user preference tree based personalized route recommendation system for constraint tourism and travel Open
View article: A User Preference Tree based Personalized Route Recommendation System for Constraint Tourism and Travel
A User Preference Tree based Personalized Route Recommendation System for Constraint Tourism and Travel Open
Personalized recommendation systems recommend the target destination based on user-generated data from social media and geo-tagged photos that are currently available as a most pertinent source. This paper proposes a tourism destination re…
View article: Symmetric Key and Polynomial Based Key Generation Mechanism for Secured Data Communications in 5G Networks
Symmetric Key and Polynomial Based Key Generation Mechanism for Secured Data Communications in 5G Networks Open
Fifth Generation (5G) networks provide data communications through various latest technologies including Software Defined Network (SDN), Artificial Intelligence, Machine Learning and Cloud Computing. In 5G, secure data communication is a c…
View article: Optimized MLCNN for Personalized News Recommendation Based on Social Media Harnessing Using Modified Genetic Algorithm
Optimized MLCNN for Personalized News Recommendation Based on Social Media Harnessing Using Modified Genetic Algorithm Open
Classification of label-specific users’ diversified interests is the most formidable task in personalized news recommendation systems (PNRS). To bring personalization to PNRS, many remarkable features have to be considered from their user …
View article: Secured Data Storage and Retrieval using Elliptic Curve Cryptography in Cloud
Secured Data Storage and Retrieval using Elliptic Curve Cryptography in Cloud Open
Security of data stored in the cloud databases is a challenging and complex issue to be addressed due to the presence of malicious attacks, data breaches and unsecured access points. In the past, many researchers proposed security mechanis…
View article: Evaluation of Parameter Settings for Training Neural Networks Using Backpropagation Algorithms
Evaluation of Parameter Settings for Training Neural Networks Using Backpropagation Algorithms Open
Artificial neural networks (ANN) are widely used for classification, and the training algorithm commonly used is the backpropagation (BP) algorithm. The major bottleneck faced in the backpropagation neural network training is in fixing the…
View article: FIRMACA-Fuzzy intelligent recommendation model using ant clustering algorithm for social networking
FIRMACA-Fuzzy intelligent recommendation model using ant clustering algorithm for social networking Open
View article: An Enhanced Framework for Storage of Packets Securely on Cloud using Channel Quality Measure
An Enhanced Framework for Storage of Packets Securely on Cloud using Channel Quality Measure Open
The data which is outsourced is done based on cloud computing and there can be security reasons, the data can be compromised by performing attacks by other user and then among sensing points in the cloud.This project implements Optimized C…
View article: Energy Efficient and Secured MQTT Protocol using IoT
Energy Efficient and Secured MQTT Protocol using IoT Open
Internet of Things is a distributed collection of smart devices, where the smart device communicates with each other using Device to Device (D2D communication. Due to the resource constraint nature of IOT, the lightweight communication pro…
View article: Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks
Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks Open
Intrusion detection systems assume a noteworthy job in the provision of security in wireless Sensor networks. The existing intrusion detection systems focus only on the detection of the known types of attacks. However, it neglects to recog…