M. Anand
YOU?
Author Swipe
View article: Automation Xtreme - A Web Automation AI Tool
Automation Xtreme - A Web Automation AI Tool Open
View article: Retraction Note: Improved encryption protocol for secure communication in trusted MANETs against denial of service attacks
Retraction Note: Improved encryption protocol for secure communication in trusted MANETs against denial of service attacks Open
View article: Natural Language Processing Based Screening for Applicant Tracking Systems
Natural Language Processing Based Screening for Applicant Tracking Systems Open
Within a brief period, a typical online job posting receives a large number of applications.As it is highly inefficient in terms of money and time so hiring companies can't handle it, manually filtering out resumes isn't practical.Addition…
View article: Controlling degeneracy and magnetization switching in an artificial spin ice system of peanut-shaped nanomagnets
Controlling degeneracy and magnetization switching in an artificial spin ice system of peanut-shaped nanomagnets Open
Using extensive numerical simulations, we probe the magnetization switching in a two-dimensional artificial spin ice (ASI) system consisting of peanut-shaped nanomagnets. We also investigated the effect of external magnetic field on the de…
View article: A Cloud Privacy-Preserving Model Using Gaussian Mutation-Based Bacterial Foraging Optimization and Genetic Crossover Operation
A Cloud Privacy-Preserving Model Using Gaussian Mutation-Based Bacterial Foraging Optimization and Genetic Crossover Operation Open
The necessity of security in the cloud system increases day by day in which the data controllers harvest the rising personal and sensitive data volume.The cloud has some unprotected private data as well as data that has been outsourced for…
View article: Cryptography Based On Dna Analysis
Cryptography Based On Dna Analysis Open
Secure data transmission is a challenging and fundamental aspect nowadays. Secure and nonvulnerable transmission of authenticated data is ensured by using cryptography and steganography methods. Advancement in technology leads to a new cry…
View article: Behaviour-based Relay Strategy on Mobile Ad-hoc Network for Effective Power Consumption
Behaviour-based Relay Strategy on Mobile Ad-hoc Network for Effective Power Consumption Open
Flooding is the most basic form of broadcast, in which an approaching signal is retransmitted once by each organization's base. The transmission storm problem is caused by the basic flood system in remote Ad-hoc networks.. Even so, in term…
View article: Design and Development of Portable Solar Parabolic Cooker with Inorganic PCM Storage
Design and Development of Portable Solar Parabolic Cooker with Inorganic PCM Storage Open
This paper, an experimental investigation is carried on a solar cooker with heat storage. Solar cookers are passive solar devices, which converts sunlight into to heat energy which is retained for boiling. Solar boilers use the cinch princ…
View article: Performance of Efficient CMOS Power Amplifier for ISM Band Applications
Performance of Efficient CMOS Power Amplifier for ISM Band Applications Open
Power amplifiers are one of the most important functional blocks in the Radio Frequency (RF) frontend for reliable wireless communications. The power amplifiers amplify and boost the input signal to needed output power. The signal is ampli…
View article: Internet Connected e-Healthcare System with Live Video Monitoring using LWIP Stack and SJF Priority Scheduling
Internet Connected e-Healthcare System with Live Video Monitoring using LWIP Stack and SJF Priority Scheduling Open
Continuous monitoring of patients in critical condition becomes essential in medical field. This paper aims at developing an innovative IoT based remote healthcare monitoring system by using Free RTOS with priority scheduling based on SJF …
View article: Energy Management in Current Fed Switched Inverter Based Propulsion Motor for Marine Application
Energy Management in Current Fed Switched Inverter Based Propulsion Motor for Marine Application Open
In this paper the super capacitor and battery based current fed switched converter produce high voltage gain and the performance of motor is improved. The fuel based renewable energy produce the less dynamic performance of the motor and li…
View article: Quantization Encoding Algorithm Based Satellite Image Compression
Quantization Encoding Algorithm Based Satellite Image Compression Open
In the field of digital data there is a demand in bandwidth for the transmission of the videos and images all over the worlds. So in order to reduce the storage space in the field of image applications there is need for the image compressi…
View article: An Efficient Approximation based Adversary Detection (EAAD) mechanism for Wireless Sensor Networks
An Efficient Approximation based Adversary Detection (EAAD) mechanism for Wireless Sensor Networks Open
Wireless Sensor Networks (WSN) has seen great improvement and utilization in the past few decades. WSN can operate in remote areas without the intervention of human is key factor in the success of WSN. WSN consist of spatially distributed …