K. V. N. Sunitha
YOU?
Author Swipe
View article: Artificial Neural Networking in Applied Dentistry
Artificial Neural Networking in Applied Dentistry Open
Advancements in digital technology have transformed our daily lives, bringing everything within reach of our fingertips. In the last few decades, technologies have developed, trying to simulate the functioning of the human brain. The exten…
View article: Segmentation and Classification of Brain Tumor from Magnetic Resonance Images Using K-Means Algorithm and Hybrid PSO-WCA Based Radial Basis Function Neural Network
Segmentation and Classification of Brain Tumor from Magnetic Resonance Images Using K-Means Algorithm and Hybrid PSO-WCA Based Radial Basis Function Neural Network Open
The manual detection and classification of the tumor becomes a rigorous and hectic task for the radiologists from magnetic resonance images.This paper presents a novel Hybrid PSO-WCA (Particle Swarm Optimization-Water Cycle Algorithm) base…
View article: A Novel Random Split Point Procedure Using Extremely Randomized (Extra) Trees Ensemble Method for Human Activity Recognition
A Novel Random Split Point Procedure Using Extremely Randomized (Extra) Trees Ensemble Method for Human Activity Recognition Open
INTRODUCTION: Automatic detection and recognition of various human physical movements while performing daily life activities such as walking, jogging, running, sitting, standing etc. are usually considered as Activity Recognition (AR). AR …
View article: Development of IoT Health Monitor System using Security Patterns
Development of IoT Health Monitor System using Security Patterns Open
Context: The most important non-functional requirement of the software application is the security. Developing Secure Software is a challenging Process. Software vulnerabilities and defects may disclose by developers, users, hackers due to…
View article: Location Related Signals with Satellite Image Fusion Method Using Visual Image Integration Method
Location Related Signals with Satellite Image Fusion Method Using Visual Image Integration Method Open
Investigations were performed on a group utilizing (General Purpose Unit) GPU and executions were evaluated for the utilization of the created parallel usages to process satellite pictures from satellite Landsat7.The usage o... | Find, rea…
View article: Identification and Remediation of Vulnerabilities in IoT based Health Monitor
Identification and Remediation of Vulnerabilities in IoT based Health Monitor Open
Internet of Things (IoT) changes the trend “Connect the unconnected” likes human or environmental and technical interactions, interactions among the machines through Radio Networks, Sensor Networks and many more simple devices like fitbits…
View article: Calibration Factors based intrusion detection (CFID) in Cloud Computing
Calibration Factors based intrusion detection (CFID) in Cloud Computing Open
The distributed computing is the buzz in recent past, cloud computing stands first in this category. This is since, the users can adapt anything related to data storage, magnificent computing facilities on a system with less infrastructure…
View article: Distributed and Parallel Decision Forest for Human Activities Prediction: Experimental Analysis on <i>HAR-Smartphones </i>Dataset
Distributed and Parallel Decision Forest for Human Activities Prediction: Experimental Analysis on <i>HAR-Smartphones </i>Dataset Open
Sensor-based human motion detection requires the subtle amount of knowledge about various human activities from fitted sensor observations and readings. The prevalent pattern recognition methodologies have made immense progress over recent…
View article: Impact of Personality and Emotional Intelligence on Investor Behaviour
Impact of Personality and Emotional Intelligence on Investor Behaviour Open
The main objective of this study is to assess the effect of personality and emotional intelligence on the investor behaviour.The study depends on primary data and a well-structured questionnaire is used for this purpose.Stratified sampling…
View article: Effective Image Fusion Technique based on Local Correlation Modeling in Wavelet Domain for Satellite Image Fusion
Effective Image Fusion Technique based on Local Correlation Modeling in Wavelet Domain for Satellite Image Fusion Open
Image fusion is the benefit process of information received from multiple domains. The aim of the image fusion technique is to extract the necessary data from the multiple images to generate an enhanced composite image. The fused images ar…
View article: ID Based Multicast Secret-Key Management Scheme (SKMS) in MANETs
ID Based Multicast Secret-Key Management Scheme (SKMS) in MANETs Open
Mobile Ad-Hoc Network (MANET) is a self-configuring network of mobile nodes associated by wireless channel.The nodes are free to move arbitrarily anywhere in the network.Hence, lack of fixed infrastructure and host flexibility, providing s…
View article: Host Based Intrusion Detection Using Data Mining Methodologies
Host Based Intrusion Detection Using Data Mining Methodologies Open
International Journal of Computer Sciences and Engineering (A UGC Approved and indexed with DOI, ICI and Approved, DPI Digital Library) is one of the leading and growing open access, peer-reviewed, monthly, and scientific research journal …
View article: Detection and Classification of Brain Tumor from MRI Medical Image using Wavelet Transform and PSO based LLRBFNN Algorithm
Detection and Classification of Brain Tumor from MRI Medical Image using Wavelet Transform and PSO based LLRBFNN Algorithm Open
International Journal of Computer Sciences and Engineering (A UGC Approved and indexed with DOI, ICI and Approved, DPI Digital Library) is one of the leading and growing open access, peer-reviewed, monthly, and scientific research journal …
View article: Pithy Review on Routing Protocols in Wireless Sensor Networks and Least Routing Time Opportunistic Technique in WSN
Pithy Review on Routing Protocols in Wireless Sensor Networks and Least Routing Time Opportunistic Technique in WSN Open
Nowadays due to most of the telecommunication standard development organizations focusing on using device-to-device communication so that they can provide proximity-based services and add-on services on top of the available cellular infras…
View article: Optimal Node Selection and Alarm Exchange Technique for Reducing the Security Cost and False Positives in MANET
Optimal Node Selection and Alarm Exchange Technique for Reducing the Security Cost and False Positives in MANET Open
Mobile Ad-hoc Network (MANET) is a wireless network consisting of numerous nodes which are move every minute and are highly mobile.Basically, MANET is a self configuring network where nodes can enter the network and also leave the network …
View article: TreeNet analysis of human stress behavior using socio-mobile data
TreeNet analysis of human stress behavior using socio-mobile data Open
Human behavior is essentially social and humans start their daily routines by interacting with others. There are many forms of social interactions and we have used mobile phone based social interaction features and social surveys for findi…
View article: Connecting Productivity with Social Capital via Daily Mobile Phone Logs
Connecting Productivity with Social Capital via Daily Mobile Phone Logs Open
Social network analysis (SNA) is a powerful research tool which provides a comprehensive analysis on ego-alters communications with their individual productivity within a community. In this paper, various popular measures of social network…
View article: TreeNet Analysis of Human Stress Behavior using Socio-Mobile Data
TreeNet Analysis of Human Stress Behavior using Socio-Mobile Data Open
Human behavior is essentially social and humans start their daily routines by interacting with others. There are many forms of social interactions and we have used mobile phone based social interaction features and social surveys for findi…
View article: A Novel Genetic Algorithm and Particle Swarm Optimization for Data Clustering
A Novel Genetic Algorithm and Particle Swarm Optimization for Data Clustering Open
Clustering techniques suffer from fact that once they are merged or split, it cannot be undone or refined. Considering the stability of the Genetic Algorithm and the local searching capability of Swarm Optimization in clustering, these two…
View article: Connecting Productivity with Social Capital via Daily Mobile Phone Logs
Connecting Productivity with Social Capital via Daily Mobile Phone Logs Open
Human behavior and their social interactions can be quantified and modeled with the use of smart phones and any wearable badges which senses and captures real-life interactions. In traditional social sciences, such information was gathered…