Reshma Banu
YOU?
Author Swipe
View article: Interaction between age and tumor Stage in Survival Outcomes of Patients with Mantle Cell Lymphoma
Interaction between age and tumor Stage in Survival Outcomes of Patients with Mantle Cell Lymphoma Open
Age, tumor stage, and marital status strongly influence MCL outcomes, highlighting the need for personalized management strategies. Widowed status underscores the role of social support in survival. Tailored interventions, accounting for t…
View article: A Scalable AI-Driven Framework for Sustainable Ride-Sharing and Intelligent Logistics Using Advanced Route Optimization
A Scalable AI-Driven Framework for Sustainable Ride-Sharing and Intelligent Logistics Using Advanced Route Optimization Open
As the population grows and urbanization accelerates, there is expanding need for new transportation and logistical solutions. Today, ride-share and delivery services rely on dedicated drivers, which limit flexibility of transportation, an…
View article: AgriTrust: A Blockchain-Based Bidding System for Transparent and Secure Agricultural Trade
AgriTrust: A Blockchain-Based Bidding System for Transparent and Secure Agricultural Trade Open
— AgriTrust is a bidding platform driven by blockchain technology that aims to improve agricultural trade's efficiency, security, and transparency. Price manipulation, a lack of trust, and ineffective transaction procedures are common prob…
View article: Survival Outcomes of U.S. Patients with CMML: A Two-Decade Analysis from the SEER Database
Survival Outcomes of U.S. Patients with CMML: A Two-Decade Analysis from the SEER Database Open
Background: Chronic Myelomonocytic Leukemia (CMML) is a rare and aggressive form of leukemia with characteristics of both myeloproliferative neoplasms (MPNs) and myelodysplastic syndromes (MDSs). This study aims to explore the clinical fea…
View article: A Review on Enhanced Security in ATM Transaction Using Fingerprint Authentication
A Review on Enhanced Security in ATM Transaction Using Fingerprint Authentication Open
The proliferation of automated teller machine (ATM) usage in modern banking has necessitated robust security measures to safeguard transactions against various threats. Traditional methods of authentication, primarily reliant on Personal I…
View article: Prediction of crop yielding using machine learning algorithm
Prediction of crop yielding using machine learning algorithm Open
The effect of environmental change in India, most part of the agriculture crops are being seriously affected the production over a time of the most recent thirty years. Anticipating of crops Yield result before of its harvest will help the…
View article: A signature-based data security and authentication framework for internet of things applications
A signature-based data security and authentication framework for internet of things applications Open
Internet of things (IoT) is the next big revolution in modernized network technologies connecting a massive number of heterogeneous smart appliances and physical objects. Owing to these technologies' novelty, various issues are characteriz…
View article: Boosted Lara Translation and Assessment Utilizing Fuzzy Grounded Impression in Wireless Communication
Boosted Lara Translation and Assessment Utilizing Fuzzy Grounded Impression in Wireless Communication Open
A Wireless Network is an assortment of organization hubs that can work with framework or Adhoc mode.Because of the absence of incorporated control in Adhoc-based remote organizations, planning a steering convention to give a proficient and…
View article: An Insight of Existing Research Methods towards Securing IoT Communication System
An Insight of Existing Research Methods towards Securing IoT Communication System Open
IoT is an advanced analytics system that incorporates physical devices, intelligent technologies, and internet services to provide automation services and cost-effective productivity. The IoT oriented framework offers effective control, st…
View article: The Role of Faith Communities in Improving Supports to Reduce Loneliness and Social Isolation in Immigrants 65
The Role of Faith Communities in Improving Supports to Reduce Loneliness and Social Isolation in Immigrants 65 Open
This report titled “The Role of Faith Communities in Improving Supports to Reduce Loneliness and Social Isolation in Immigrants 65+” connects survey findings with the importance of offering programs and services through faith groups and ma…
View article: PCB Fault Detection Using Image Processing
PCB Fault Detection Using Image Processing Open
The importance of the Printed Circuit Board inspection process has been magnified by requirements of the modern manufacturing environment where delivery of 100% defect free PCBs is the expectation. To meet such expectations, identifying va…
View article: Cloud Computing – A Unified Approach for Surveillance Issues
Cloud Computing – A Unified Approach for Surveillance Issues Open
Cloud computing describes highly scalable resources provided as an external service via the Internet on a basis of pay-per-use. From the economic point of view, the main attractiveness of cloud computing is that users only use what they ne…
View article: Intra Frame Coding In Advanced Video Coding Standard (H.264) to Obtain Consistent PSNR and Reduce Bit Rate for Diagonal Down Left Mode Using Gaussian Pulse
Intra Frame Coding In Advanced Video Coding Standard (H.264) to Obtain Consistent PSNR and Reduce Bit Rate for Diagonal Down Left Mode Using Gaussian Pulse Open
Intra prediction process of H.264 video coding standard used to code first frame i.e. Intra frame of video to obtain good coding efficiency compare to previous video coding standard series. More benefit of intra frame coding is to reduce s…
View article: Impact of CBR Traffic on Energy Consumption in MANET
Impact of CBR Traffic on Energy Consumption in MANET Open
Mobile Ad hoc networks (MANETs) are power constrained since nodes are operated with limited battery supply. If a battery of the node drains, its ability to forward the traffic gets affected results in reduced network lifetime. There has be…
View article: Survey on Congestion Elusion Topography in Wireless Sensor Network using K-Map
Survey on Congestion Elusion Topography in Wireless Sensor Network using K-Map Open
Wireless Sensor Network (WSN) is an ad-hoc net-work consisting of sensor nodes having limited computational power fitted with a radio transceiver.This has been enabled by the availability, particularly in recent years, of sensors that are …
View article: Maximized Congestion Control in TCP with Multi-Path Support in Wireless Cobweb Network
Maximized Congestion Control in TCP with Multi-Path Support in Wireless Cobweb Network Open
Wireless Cobweb Network (WCN) [1] is a group of wireless devices that has function to transfer all data over wireless channel and it is able to self-organized, self-configure network path itself by optimize routing protocol over Layer 2 (M…
View article: Survey on Signatured Xml Encryption for Multi-Tier Web Services Security
Survey on Signatured Xml Encryption for Multi-Tier Web Services Security Open
Web service is the technology tied up with SOAP, UDDI and WSDL of XML format, so web services searching based on XML keyword become essential. By systematic monitoring it has been observed that internet communication is less protected than…
View article: Gait Based Human Recognition with Various Classifiers Using Exhaustive Angle Calculations in Model Free Approach
Gait Based Human Recognition with Various Classifiers Using Exhaustive Angle Calculations in Model Free Approach Open
Human Gait recognition is emerging as a supportive biometric technique in recent years that identifies the people through the way they walk. The gait recognition in model free approaches faces the challenges like speed variation, cloth var…