R. Sharmikha Sree
YOU?
Author Swipe
View article: Modern Cloud Security Threats and Vulnerabilities: A Comprehensive Review
Modern Cloud Security Threats and Vulnerabilities: A Comprehensive Review Open
View article: A Residual Network and Bi-directional LSTM based Hybrid Approach to Remote Sensing Image Captioning
A Residual Network and Bi-directional LSTM based Hybrid Approach to Remote Sensing Image Captioning Open
View article: Enhanced Pvd Steganography with Dynamic Programming and Scrambling for Robust Security
Enhanced Pvd Steganography with Dynamic Programming and Scrambling for Robust Security Open
View article: Handwriting Identification System Using Machine Learning
Handwriting Identification System Using Machine Learning Open
Recognition is regarded as a basic attribute of human beings, as well as other living organisms. Due to this pandemic situation everything become online, mainly examinations for various domains. So, many of them may try to indulge in m…
View article: Fog Assisted Computing Architecture for Healthcare IOT
Fog Assisted Computing Architecture for Healthcare IOT Open
IOT generates associate new knowledge that may be processed exploitation cloud computing. except for time period remote health watching applications, the delay caused by transferring information to the cloud and back to the applying is…
View article: A Growth System Based on Zigbee and IoT for Agriculture
A Growth System Based on Zigbee and IoT for Agriculture Open
Since agriculture is the foundation of the Indian economy, creative solutions are needed. Crop productivity is impacted by irrigation, a crucial agricultural practise. Typically, farmers inspect their fields on a regular basis. When a …
View article: Improving Data and Identity Privacy in Online Social Networks
Improving Data and Identity Privacy in Online Social Networks Open
Facebook, MySpace, Twitter, Orkut, Linkedin, and other social networking sites are increasingly popular. Users can share details about themselves and their lives on these networks, as well as connect with friends and colleagues. Some of th…
View article: Automatic Bridge Monitoring System Using IoT
Automatic Bridge Monitoring System Using IoT Open
Monitoring the bridge is very important as a poor bridge may lead to many accidents. Therefore it needs a system to monitor the strength or stability of the bridge in order to avoid any failures. Cracks may occur due to accidents or overlo…
View article: IOT Based Weather Reporting System Using Arduino and Node MCU
IOT Based Weather Reporting System Using Arduino and Node MCU Open
Weather is an ever changing phenomenon. It can change in within seconds or milliseconds. Weather was quite difficult to monitor in the days when technology was still primitive. But now it is easy as there are various sensors and computing …
View article: Integrated Ambulance Service with Advanced Real Time Traffic Control Systems
Integrated Ambulance Service with Advanced Real Time Traffic Control Systems Open
Viable and proficient open supplier conveyance like medicinal services contributions are basic in nowadays' general public. Congested driving conditions is one of the significant issues in India in view of which rescue vehicle contribution…
View article: Effective Shopping Method for Visually Impaired People using Optical Character Recognition
Effective Shopping Method for Visually Impaired People using Optical Character Recognition Open
Visual impairment persons are not able to do all works as normal persons especially during purchasing products in supermarket. To help the blind peoples recognise the objects a text reading method is proposed along with the help of camera.…
View article: Advanced Toll Plaza Monitoring by Utilization of WSN Modules
Advanced Toll Plaza Monitoring by Utilization of WSN Modules Open
An innovative model that goals to design, develop and instrument by utilization of WSN modules for improved form of toll collection structure. In the proposed system when the user approaches to the payment lane, the Xbee wireless transceiv…
View article: Effective Bug Triage with Data Reduction
Effective Bug Triage with Data Reduction Open
As human beings we all make mistakes and these mistakes are reflected as defects in the software product.These defects make the software fail which are due to our limitations as human beings.When the testing is done, the reasons for failur…
View article: Multitudinous of remedial medical image using stationary wavelet transform
Multitudinous of remedial medical image using stationary wavelet transform Open
Image fusion is becoming more popular in various field nowadays. The quality of accuracy and perception has been achieved with this con-cept. The field that is in urgent need of more contrast images and quality output of body organs image …