D. Narmatha
YOU?
Author Swipe
View article: Deep Learning Models In Early Prediction And Risk Identification Of Chronic Kidney Disease
Deep Learning Models In Early Prediction And Risk Identification Of Chronic Kidney Disease Open
— If not identified and treated promptly, chronic kidney disease (CKD), a gradual illness in which the kidneys lose their capacity to filter blood, can result in irreversible kidney failure. There has never been a greater need for effectiv…
View article: Prediction of recital characteristics of a CI diesel engine operated by bio-fuel extracts from cotton seed oil, linseed oil and mahua seed oil using ANN metho
Prediction of recital characteristics of a CI diesel engine operated by bio-fuel extracts from cotton seed oil, linseed oil and mahua seed oil using ANN metho Open
In the wide survey, it is explored that the potential of artificial neural network is used to foretell the recital (performance) characteristics of a four stroke single cylinder diesel engine using the biofuel obtained from cottonseed, lin…
View article: A View of Artificial Neural Network Models in Different Application Areas
A View of Artificial Neural Network Models in Different Application Areas Open
Neural network is a web of million numbers of inter-connected neurons which executes parallel processing. An Artificial neural network is a nonlinear mapping structure; an information processing pattern is stimulated by the approach as bio…
View article: a–Domination of Cartesian Product of Path Semigraphs
a–Domination of Cartesian Product of Path Semigraphs Open
In a scientific enquiry it is common to study the behaviour of combined systems after studying the systems individually. The graphical structures are combined in many ways. The Cartesian product is one of the way of combining graphs to get…
View article: Text File Encryption and Decryption by FFT and IFFT Algorithm Using Lab view
Text File Encryption and Decryption by FFT and IFFT Algorithm Using Lab view Open
An approach to encrypt and decrypt the text files using FFT and IFFT algorithm respectively. Cryptography involves encryption and decryption process. The use of data encryption is to provide security to the confidential data from unauthori…
View article: Dominations In Semigraphs
Dominations In Semigraphs Open
The semigraph generalization is more closely related to the axiom that the two edges in a semigraph have atmost one vertex in common, where as the hypergraph generalization is based on the consideration of an edge as a subset of two elemen…