M. Deva Priya
YOU?
Author Swipe
View article: MedBox Alert: AI and IoT-Powered Smart Pill Assistant for Intelligent Healthcare
MedBox Alert: AI and IoT-Powered Smart Pill Assistant for Intelligent Healthcare Open
In today’s modern world, people are leading fast-paced lives, often juggling work, studies, and personal responsibilities. In such a busy routine, many patients — especially the elderly, people with chronic diseases, or those living alone …
View article: Exploring Knowledge Attitude and Experiences Regarding Infant Hearing Impairment among Mothers of Infants in Chennai Tamilnadu
Exploring Knowledge Attitude and Experiences Regarding Infant Hearing Impairment among Mothers of Infants in Chennai Tamilnadu Open
Objective: This study intends to explore mothers’ knowledge, beliefs and exposure concerning infant hearing loss in Chennai, Tamil Nadu. Methodology: A Cross-sectional survey lasting for 2 months conducted at Government Medical College &…
View article: Empowering Change: The Role of Women Entrepreneurs in Advancing Global Sustainability Through Sustainable Development Goals
Empowering Change: The Role of Women Entrepreneurs in Advancing Global Sustainability Through Sustainable Development Goals Open
To promote equitable development and significantly contribute to social and fiscal stability, entrepreneurship boosts revenue growth, creates jobs, and inspires innovation. People and communities may use their entrepreneurial spirit and in…
View article: Smart Flood Alerting System using Embedded Systems
Smart Flood Alerting System using Embedded Systems Open
One natural disaster that commonly brings about tremendous economic loss as well as lots of casualties is flooding. For purposes of mitigation, an IoT-based flood monitoring and warning system has been devised. The system relies on the uti…
View article: An Improved Recurrent Neural Network for Industrial IoT Botnet Attack Detection
An Improved Recurrent Neural Network for Industrial IoT Botnet Attack Detection Open
This research aims to improve the Industrial Internet of Things (IIoT) security, which fosters technological confidence and promotes expansion. The IIoT is mainly used in manufacturing, oil, and gas to avoid botnet attacks. The diverse nat…
View article: Analysis of Forecasted Rainfall Across Blocks in Guntur District, Andhra Pradesh, India
Analysis of Forecasted Rainfall Across Blocks in Guntur District, Andhra Pradesh, India Open
This paper represents a block and district level analysis of agro meteorological forecasted rainfall of Guntur district, Andhra Pradesh, during 2022-23. The forecasted rainfall data which was issued by IMD, Amaravathi, Guntur, Andhra Prade…
View article: A Knowledge Based Cloud-Expert System for Disease Diagnosis
A Knowledge Based Cloud-Expert System for Disease Diagnosis Open
Expert systems are among the most widely used types of knowledge- based systems. Because these systems mimic how human professionals make decisions, they are helpful for complex analysis, calculations, and forecasts. Knowledge-based system…
View article: Detection and Classification of Brain Tumor in MRI Images using EPCMA+ML-ELM
Detection and Classification of Brain Tumor in MRI Images using EPCMA+ML-ELM Open
Substantial clinical statistics along with analytical features can be extracted from brain tumor images. The identified quantitative measures of exact tumor regions aid physicians and radiologists in effective treatment. Magnetic Resonance…
View article: Adaptive Guided Differential Evolution‐based Slime Mould Algorithm‐based efficient Multi‐objective Task Scheduling for Cloud Computing Environments
Adaptive Guided Differential Evolution‐based Slime Mould Algorithm‐based efficient Multi‐objective Task Scheduling for Cloud Computing Environments Open
In a Cloud Computing (CC) environment, users are charged based on on‐demand resource utilization and expected Quality of Service (QoS). Multi‐Objective‐based Task Scheduling (MOTS) problem formulated for achieving the expected QoS in a CC …
View article: Socio -Economic and Demographic Characteristics of Kadar Tribe of Anamalai Tiger Reserve
Socio -Economic and Demographic Characteristics of Kadar Tribe of Anamalai Tiger Reserve Open
This article provides a descriptive glimpse into the socio-economic and characteristics of the Kadar tribe who live in all six settlements within the Pollachi division of Anamalai Tiger Reserve in Tamil Nadu viz., Kavarkkal, Nedungundru, E…
View article: Selfish Node Detection Scheme based on Bates Distribution Inspired Trust Factor for MANETs
Selfish Node Detection Scheme based on Bates Distribution Inspired Trust Factor for MANETs Open
The trustworthiness of mobile nodes is considered as the principal parameter for ensuring significant data dissemination in a Mobile Ad hoc NETwork (MANET). However, the selfish behaviour of nodes minimizes the trust by dropping a consider…
View article: Intelligent Aspect based Model for Efficient Sentiment Analysis of User Reviews
Intelligent Aspect based Model for Efficient Sentiment Analysis of User Reviews Open
Mining online reviews to extract opinion targets and words are substantial tasks in fine-grained opinion mining.The main aim is to mine sensible multi-grain aspects and opinion words from unlabeled reviews.In this paper, Combined Aspect ba…
View article: Diagnosis for Early Stage of Breast Cancer using Outlier Detection Algorithm Combined with Classification Technique
Diagnosis for Early Stage of Breast Cancer using Outlier Detection Algorithm Combined with Classification Technique Open
Breast cancer is the most dangerous cancers that lead to women in death. Particularly in the developed countries it takes second leading place that increase the chance of death in women. It can be not easily diagnosed by the lab. It has di…
View article: An adaptive throttle and brake control system for automatic cruise control in disability support vehicle
An adaptive throttle and brake control system for automatic cruise control in disability support vehicle Open
Throttle and brake control system implemented as an Anti-braking system with several modes of operation during normal and emergency conditions is available. However, using an intelligent system to support seamless motion of physically chal…
View article: A Novel Cluster based Scheme for Node Positioning in Indoor Environment
A Novel Cluster based Scheme for Node Positioning in Indoor Environment Open
Location estimation in Wireless Sensor Network (WSN) is mandatory to achieve high network efficiency. Identifying the positions of sensors is an uphill task as monitoring nodes are involved in estimation and localization. Clustered Positio…
View article: Secured Routing in Mobile Ad hoc Networks (MANETs)
Secured Routing in Mobile Ad hoc Networks (MANETs) Open
A Mobile Adhoc Network (MANET) is prone to attacks. Adversaries take hold of the network, thus degrading their performance. Various attacks are prevalent in MANET, out of which Byzantine attack plays a vital role. A node or group of nodes …
View article: A Deep Convolutional Neural Network Based Lung Disorder Diagnosis
A Deep Convolutional Neural Network Based Lung Disorder Diagnosis Open
Lungs play an important role in human respiratory system. There are diseases that affect the functioning of lungs. To analyse lung diseases in the chest region using X-ray based Computer-Aided Diagnosis (CAD) system, it is necessary to det…
View article: A Markov Process-based Opportunistic Trust Factor Estimation Mechanism for Efficient Cluster Head Selection and Extending the Lifetime of Wireless Sensor Networks
A Markov Process-based Opportunistic Trust Factor Estimation Mechanism for Efficient Cluster Head Selection and Extending the Lifetime of Wireless Sensor Networks Open
INTRODUCTION: The lifetime of a sensor network completely relies on the potentialities of the utilized Cluster Head (CH) selection scheme that aids in building efficient Wireless Sensor Networks (WSNs). Most of the existing CH selection ap…
View article: Parallel Rc4 Key Searching System Based On Fpga
Parallel Rc4 Key Searching System Based On Fpga Open
this paper presents an effective fieldprogrammable gate array (FPGA)-based hardware implementation of a parallel key searching system for the brute-force attack on RC4 encryption. The design employs several novel key scheduling techniques …