C. Ramesh Kumar
YOU?
Author Swipe
View article: Leptospirosis with a Rare Presentation Section of Acute Multiple Cerebral Infarcts: A Case Report
Leptospirosis with a Rare Presentation Section of Acute Multiple Cerebral Infarcts: A Case Report Open
Leptospirosis is a zoonotic disease that can manifest as an asymptomatic infection or as a fulminant, fatal illness. According to published literature, neurological manifestations can be observed in 10-15% of cases. Here is a case of a 65-…
View article: Prodify with Machine Learning and Data Visualization
Prodify with Machine Learning and Data Visualization Open
View article: Urinary tract mycosis masquerading as renal papillary necrosis post-COVID: A case report
Urinary tract mycosis masquerading as renal papillary necrosis post-COVID: A case report Open
Urinary tract mycosis is more often seen in hospitalized patients than in community-acquired ones. Funguria is common but becomes invasive and life-threatening in immunosuppressed patients such as with diabetes mellitus, post-transplant, c…
View article: Understanding the behaviour of magnetic field distribution of railgun under transient conditions using finite element method
Understanding the behaviour of magnetic field distribution of railgun under transient conditions using finite element method Open
The magnetic field distribution in the rails is a crucial factor in comprehending railgun behaviour. The projectile's rapid movement has a significant impact on the magnetic field. If the dispersion of the magnetic field conclusions regard…
View article: Attribute-Based Access Control for Secure Cloud Storage Structure
Attribute-Based Access Control for Secure Cloud Storage Structure Open
This research presents a novel approach to safe access procedure in cloud storage structure by addressing the challenges associated with managing and distributing complex secret keys.The proposed procedure utilizes attribute-based access c…
View article: Optimized Reversible Logic Multiplexer Designs for Energy-Efficient Nanoscale Computing
Optimized Reversible Logic Multiplexer Designs for Energy-Efficient Nanoscale Computing Open
Nano- and quantum-based low-power applications are where reversible logic really shines. By using digitally equivalent circuits with reversible logic gates, energy savings may be achieved. Reducing garbage output and ancilla inputs is a pr…
View article: Renewable Energy Based Smart Grid Construction Using Hybrid Design in Control System with Enhancing of Energy Efficiency of Electronic Converters for Power Electronic in Electric Vehicles
Renewable Energy Based Smart Grid Construction Using Hybrid Design in Control System with Enhancing of Energy Efficiency of Electronic Converters for Power Electronic in Electric Vehicles Open
The power electronic interface is critical in matching a distributed generation (DG) unit’s characteristics to grid requirements as most DG technologies rely on renewable energy. Increased adoption of electric vehicles (EV) is seen as a po…
View article: Intelligent Water Drops Algorithm-Based Aggregation in Heterogeneous Wireless Sensor Network
Intelligent Water Drops Algorithm-Based Aggregation in Heterogeneous Wireless Sensor Network Open
This paper provides a novel implementation of the intelligent water drops (IWD) method for resolving data aggregation issues in heterogeneous wireless sensor networks (WSN). When the aggregating node is utilized to transmit the data to the…
View article: Face swapping using deep privacy
Face swapping using deep privacy Open
In this paper, we propose an estimation for totally customized mind face exchanging pictures and accounts. To the best of our data, this is the best strategic fit for conveying photo reasonable and fleetingly levelheaded results at the meg…
View article: A novel authentication scheme of identity based group signature algorithm for wireless body sensor network (WBSN)
A novel authentication scheme of identity based group signature algorithm for wireless body sensor network (WBSN) Open
Wireless Body Sensor Network (WBSN) faces several security problems such as loss of information, access control and authentication. As WBSN collects vital information and operates in unfriendly environment, severe security mechanisms are n…
View article: Implementation of Modified Wiener Filtering in Frequency Domain in Speech Enhancement
Implementation of Modified Wiener Filtering in Frequency Domain in Speech Enhancement Open
The most common complaint about Digital Hearing Aids is feedback noise. Many attempts have been undertaken in recent years to successfully reduce feedback noise. A wiener filter, which calculates the wiener gain using before and after filt…
View article: Prediction of Rainfall Induced Landslides using Machine Learning Algorithms
Prediction of Rainfall Induced Landslides using Machine Learning Algorithms Open
Landslide is one of the major natural hazards which is experienced all over the world and causes huge losses to land and property. Most of the landslides are generally caused by multiple factors which act together to destabilize the slope.…
View article: A Well Organized Model in Cloud Computing Platform for Data Accessing
A Well Organized Model in Cloud Computing Platform for Data Accessing Open
Cloud Computing is a trending technology. The main benefit is user will pay only for the resources which have been utilized in the cloud services. Data which are stored in cloud can be accessed by the people from anywhere in the world usin…