N Kirubakaran
YOU?
Author Swipe
View article: Diverse Trajectory on Consumer’s Product Feedback Analysis by Confidence Interval
Diverse Trajectory on Consumer’s Product Feedback Analysis by Confidence Interval Open
The current investigation addresses the possibilities and limitations of the sentiment analysis of consumer remarks in the context of economic needs. It makes it easier for businesses to comprehend how the public's opinion shapes their abi…
View article: Identify Vessels in UAV Data by Dynamic Multi-Label Image Classification
Identify Vessels in UAV Data by Dynamic Multi-Label Image Classification Open
To improve the monitoring and operational control of maritime traffic and nearby marine environments, this study investigates the use of Unmanned Aerial Vehicles (UAVs) and drones for improved surveillance, mapping, and remote sensing. UAV…
View article: Identify Vessels in UAV Data by Dynamic Multi-Label Image Classification
Identify Vessels in UAV Data by Dynamic Multi-Label Image Classification Open
To improve the monitoring and operational control of maritime traffic and nearby marine environments, this study investigates the use of Unmanned Aerial Vehicles (UAVs) and drones for improved surveillance, mapping, and remote sensing. UAV…
View article: Deep Learning-Based Symptom Checker: A Comparative Study of NLP Techniques for Accurate Diagnosis
Deep Learning-Based Symptom Checker: A Comparative Study of NLP Techniques for Accurate Diagnosis Open
View article: Webrecon: Adaptive Web Vulnerability Scanner with Ctf Integration
Webrecon: Adaptive Web Vulnerability Scanner with Ctf Integration Open
View article: Enhanced Mobile Broadband in 5 Era: Addressing Demand for High-Speed Connectivity for the Future of Mobile Data Services
Enhanced Mobile Broadband in 5 Era: Addressing Demand for High-Speed Connectivity for the Future of Mobile Data Services Open
In this paper, we examine the enhanced Mobile Broadband-one of the most important features of 5G networks in a world wherein increasing demands are being fueled for high-speed and reliable mobile data services. In this era of wireless comm…
View article: Chemometric heavy metal contamination in tropical Indian estuaries: Implications for source identification
Chemometric heavy metal contamination in tropical Indian estuaries: Implications for source identification Open
View article: RIS enabled NOMA for Resource Allocation in Beyond 5G Networks
RIS enabled NOMA for Resource Allocation in Beyond 5G Networks Open
The cluster communication of the beyond 5G Heterogeneous Network (Hetnet) is dependent on multiple access techniques.Reconfigurable intelligent surface (RIS) is the potential benefit of 5G when it is combined with nonorthogonal multiple ac…
View article: Fault Identification in Modified Hybrid Digital Pulse Width Modulation using Triple Modular Redundancy
Fault Identification in Modified Hybrid Digital Pulse Width Modulation using Triple Modular Redundancy Open
In this paper, the fault analysis is performed for the identification in the Modified Hybrid Digital Pulse Width Modulation by making use of the Triple Modular Redundancy method. The developed algorithm is real time implemented using the X…
View article: Retraction Note to: Advanced resilient data consigning mechanism for mobile adhoc networks
Retraction Note to: Advanced resilient data consigning mechanism for mobile adhoc networks Open
View article: Enhanced Bioavailability of Boswellic Acid by Piper longum: A Computational and Pharmacokinetic Study
Enhanced Bioavailability of Boswellic Acid by Piper longum: A Computational and Pharmacokinetic Study Open
Chronic inflammation is a key culprit factor in the onset and progression of several diseases. Novel and pharmacologically effective therapeutic approaches are needed for new treatment remedy or improved pharmacokinetics and pharmacodynami…
View article: Efficient Way to Detect Bone Cancer using Image Segmentation
Efficient Way to Detect Bone Cancer using Image Segmentation Open
Malignant growth is a wild division of irregular cells, which is spread over the parts of the body. Bone disease is one of the sorts of malignancy. Bone malignancy is a pernicious and threatening illness, caused because of uncontrolled div…
View article: A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT
A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT Open
Recent years have witnessed the increasing efforts toward making architecture standardization for the secured wireless mobile ad hoc networks. In this scenario when a node actively utilizes the other node resources for communicating and re…