E. Naresh
YOU?
Author Swipe
View article: Comprehensive brain tumour concealment utilizing peak valley filtering and deeplab segmentation
Comprehensive brain tumour concealment utilizing peak valley filtering and deeplab segmentation Open
Brain tumour identification, segmentation cataloguing from MRI images is most thought-provoking and is a very much essential for many medical image analysis applications. Every brain imaging modality provides information about various part…
View article: Adaptive deep SVM for detecting early heart disease among cardiac patients
Adaptive deep SVM for detecting early heart disease among cardiac patients Open
Heart attack is one of the most common heart diseases, which causes more deaths worldwide. Early detection and continuous monitoring are essential in reducing the death rate caused by heart diseases. Machine learning gives a promising solu…
View article: Advances in authentication and security protocols for 5G networks: a comprehensive survey
Advances in authentication and security protocols for 5G networks: a comprehensive survey Open
5G networks, the newest generation of wireless communication in an era of quick technical breakthroughs, promise unmatched speed, dependability, and connection. With this ground-breaking innovation, it is crucial to have strong authenticat…
View article: 3TFL-XLnet-CP: A Novel Transformer-Based Crop Yield Prediction Framework with Weighted Loss Based 3-Tier Feature Learning Model
3TFL-XLnet-CP: A Novel Transformer-Based Crop Yield Prediction Framework with Weighted Loss Based 3-Tier Feature Learning Model Open
The advancement of crop yield prediction through artificial intelligence (AI) has gained significant attention. However, the existing AI-based approaches for maximizing agricultural productivity, specifically in crop yield prediction, have…
View article: A novel deep unsupervised approach for super-resolution of remote sensing hyperspectral image using gompertz-function convergence war accelerometric-optimization generative adversarial network (GF-CWAO-GAN)
A novel deep unsupervised approach for super-resolution of remote sensing hyperspectral image using gompertz-function convergence war accelerometric-optimization generative adversarial network (GF-CWAO-GAN) Open
Hyperspectral remote sensing images obtained from cameras are characterized by high-dimensions and low quality, which makes them unfavorable for various analytics purposes. This is due to the presence of visible and invisible frequencies o…
View article: Adaptive residual convolutional neural network for moiré image restoration
Adaptive residual convolutional neural network for moiré image restoration Open
Restoring Moiré images presents significant challenges due to the complex interference patterns that obscure image details. These patterns often degrade the quality of images, making accurate restoration crucial for various applications. E…
View article: Suspicious behaviour detection in multilayer social networks using PF-KMA and SS-GAE techniques
Suspicious behaviour detection in multilayer social networks using PF-KMA and SS-GAE techniques Open
Multilayer Social networks are an important part of human life to interact on different networks at the same time. Due to the openness of such networks, they become a platform for spammers to spread malicious behaviors. Hence, there is an …
View article: Meta Heuristic Technique with Reinforcement Learning for Node Deployment in Wireless Sensor Networks
Meta Heuristic Technique with Reinforcement Learning for Node Deployment in Wireless Sensor Networks Open
Wireless Sensor Networks (WSNs) are vital in applications like environmental monitoring, smart homes, and battlefield surveillance. Comprising small devices with limited resources, WSNs require efficient node deployment for power optimizat…
View article: Design of Cost Efficient VBIR Technique Using ICA and IVCA
Design of Cost Efficient VBIR Technique Using ICA and IVCA Open
With an emphasis on early-stage contrast agent transit through tumour vasculature, this study presents Adaptive Complex Independent Components Analysis (ACICA) as a unique method for evaluating intravascular responsiveness in prostatic tis…
View article: Design of Node Level Load Balancing in Hierarchical Fog Structure
Design of Node Level Load Balancing in Hierarchical Fog Structure Open
Fog computing refers to the operations performed in a distributed network of nodes on the edge of the network to provide faster output generation for emergent requests.The fog layer brings computation closer to the devices, thereby reducin…
View article: Autonomous Garbage Accumulation Robot using Internet of Things
Autonomous Garbage Accumulation Robot using Internet of Things Open
All around the globe, the waste age rates are rising step by step. Overseeing litters appropriately is fundamental for building maintainable and decent conditions. Be that as it may, it has stayed Trash assortment has gotten hard to keep u…
View article: Design of Chest Visual Based Image Reclamation Method Using Dual Tree Complex Wavelet Transform and Edge Preservation Smoothing Algorithm
Design of Chest Visual Based Image Reclamation Method Using Dual Tree Complex Wavelet Transform and Edge Preservation Smoothing Algorithm Open
The proposed article put forward a new scheme for image reclamation using second phase discrete symlet transform for medical images. The current medical image reclamation approaches have limitations in providing accurate reclamation fallou…
View article: Parametrized Optimization Based on an Investigation of Musical Similarities Using SPARK and Hadoop
Parametrized Optimization Based on an Investigation of Musical Similarities Using SPARK and Hadoop Open
The big data processing framework Spark is used to power a parameterizable recommender system that can make recommendations for music based on a user’s individual tastes and take into account a variety of musical tonal qualities. The syste…
View article: Effective utilisation of Geospatial Data for peer-to-peer communication among autonomous vehicles using Optimized Machine learning algorithm
Effective utilisation of Geospatial Data for peer-to-peer communication among autonomous vehicles using Optimized Machine learning algorithm Open
The transportation infrastructure of the future will be based on autonomous vehicles. When it comes to transportation, both emerging and established nations are keen on perfecting systems based on autonomous vehicles. Transportation author…
View article: Medicinal Plant Identification in Real-Time Using Deep Learning Model
Medicinal Plant Identification in Real-Time Using Deep Learning Model Open
Medicinal plants have a long tradition of being cultivated and harvested in India. The Indian Forest is the principal repository for many useful medicinal herbs. As a result of their critical role in maintaining people's life, medicinal pl…
View article: A Novel Framework for Detection of Harmful Snakes Using YOLO Algorithm
A Novel Framework for Detection of Harmful Snakes Using YOLO Algorithm Open
The spotlight of our discussion here is on developing a model for detecting snakes present in the agricultural fields using cameras and machine learning algorithms. The idea is to construct a machine learning model to identify the snakes, …
View article: A network intrusion detection framework on sparse deep denoising auto-encoder for dimensionality reduction
A network intrusion detection framework on sparse deep denoising auto-encoder for dimensionality reduction Open
In today's internet-driven world, a multitude of attacks occurs daily, propelled by a vast user base. The effective detection of these numerous attacks is a growing area of research, primarily accomplished through intrusion detection syste…
View article: Enhancing Data Security in Cloud Computing with Optimized Feature Selection and Machine Learning for Intrusion Detection
Enhancing Data Security in Cloud Computing with Optimized Feature Selection and Machine Learning for Intrusion Detection Open
The major objective of this project is to create a Machine Learning (ML) model that can improve data security when data is transported or handled utilizing cloud computing. Researchers must develop a model or a strategy that can secure the…
View article: A Novel Approach for Specification Testing on Heart Disease Detection Using Feed-Forward Neural Network
A Novel Approach for Specification Testing on Heart Disease Detection Using Feed-Forward Neural Network Open
The proposed work highlights the importance of testing in machine-learning applications and the ensuing need to increase model quality to decrease the likelihood of errors. The proposed work considers patient health information that may be…
View article: Cooperative control for multi-player pursuit-evasion games embedded on communication technology with reinforcement learning
Cooperative control for multi-player pursuit-evasion games embedded on communication technology with reinforcement learning Open
Recent advances in research on the Multi-agent System (MAS) optimal control issue will help sectors like robotics, communications, and power systems. This work looks at the intelligent design of a large-scale multi-pursuer and multi-evader…
View article: Enhanced Multi-Stage Guided-Attention Mechanism for Traffic Accident-Based Patient Safety Prediction Model
Enhanced Multi-Stage Guided-Attention Mechanism for Traffic Accident-Based Patient Safety Prediction Model Open
The patient safety prediction model is required for analysis by considering the traffic accident database. In this paper, develop an Enhanced Multi Stage Guided Attention Mechanism (EMSGAM) for a traffic accident-based patient safety predi…
View article: Lightweight Cloud-Based Solution for Digital Education and Assessment
Lightweight Cloud-Based Solution for Digital Education and Assessment Open
With a shift from the regular in-class education to e-learning-based education, there is a need to have the right platform to conduct assessments and courses in a more effective and user-friendly manner which includes robust monitoring, ca…
View article: A Network Intrusion Detection Framework on Sparse Deep Denoising Autoencoder for Dimensionality Reduction
A Network Intrusion Detection Framework on Sparse Deep Denoising Autoencoder for Dimensionality Reduction Open
"Network security" is currently among the crucial areas of computer science. Due to the proliferation of IoT tools and "peer-to-peer" systems, the necessity to mitigate safety concerns is prominent. Intrusion detection in network systems i…
View article: Multimedia Multilevel Security by Integrating Steganography and Cryptography Techniques
Multimedia Multilevel Security by Integrating Steganography and Cryptography Techniques Open
Multimedia-based Steganography is famous for its security purpose, These steganography techniques were used by our ancestors and it is still carried out now with better and vast technology. The aim is to provide better security in an effec…
View article: An Impact of Empirical Data Analysis in the World of Business Environment
An Impact of Empirical Data Analysis in the World of Business Environment Open
Data Analysis plays a key role in all the fields of (Production and Operations, Finance, Marketing, Human Resource Analysis and Management) for successful market share. Data science can raise the value of any business who can effectively u…
View article: Establishing Self-Healing and Seamless Connectivity among IoT Networks Using Kalman Filter
Establishing Self-Healing and Seamless Connectivity among IoT Networks Using Kalman Filter Open
The Internet of Things (IoT) is the extension of Internet connectivity into physical devices and to everyday objects. Efficient mobility support in IoT provides seamless connectivity to mobile nodes having restrained resources in terms of …
View article: Effective Software Installation for Embedded Software by Applying the Reverse Engineering Approach
Effective Software Installation for Embedded Software by Applying the Reverse Engineering Approach Open
Background/Objectives: Reverse Engineering of Electronic Programme Resources (EPR) is the process of reading the binary data from the files having “.bin” extension and presented in a well-structured format. Method/Analysis: The resources u…
View article: Community based Approach for Better Software Team Management- A New Methodology for Cost Curtailment
Community based Approach for Better Software Team Management- A New Methodology for Cost Curtailment Open
Objectives: To present and showcase the importance of cost estimation and reduction through a novel approach for better team management in software industry. Methods/Statistical Analysis: The cost cutting has been the major focus of the so…