K. S. Reddy
YOU?
Author Swipe
View article: Floral and pollination biology of dragon fruit reveals strategies for enhancing productivity through pollination management and reproductive window extension
Floral and pollination biology of dragon fruit reveals strategies for enhancing productivity through pollination management and reproductive window extension Open
View article: Temporal Clustering for E-commerce Trends: A Machine Learning Approach to Customer Behaviour Analysis
Temporal Clustering for E-commerce Trends: A Machine Learning Approach to Customer Behaviour Analysis Open
View article: How Technology Is Enhancing the Quality of Education in Rural Areas
How Technology Is Enhancing the Quality of Education in Rural Areas Open
This paper investigates the impact of how the use of technology driven systems and technological resources enhancing the quality of education of an student especially one from rural background and this paper also provide some of the import…
View article: Smart Contract-Based Crowdfunding: A Web3 Approach to Trust less Fundraising
Smart Contract-Based Crowdfunding: A Web3 Approach to Trust less Fundraising Open
View article: AB-Swish: A Novel Activation Function for Neural Networks in Hybrid Portfolio Optimization Frameworks
AB-Swish: A Novel Activation Function for Neural Networks in Hybrid Portfolio Optimization Frameworks Open
View article: Copula entropy regularization transformer with <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si3.svg"><mml:msup><mml:mrow><mml:mi mathvariant="bold-italic">C</mml:mi></mml:mrow><mml:mn>2</mml:mn></mml:msup></mml:math> variational autoencoder and fine-tuned hybrid DL model for network intrusion detection
Copula entropy regularization transformer with variational autoencoder and fine-tuned hybrid DL model for network intrusion detection Open
In cyber security, Intrusion Detection Systems (IDS) act as a network security tool, in which computational complexity and dynamic IDS detection issues are observed by conventional studies. In this paper, a novel Copula Entropy Regularizat…
View article: Dexamethasone-Sparing Antiemetic Prophylaxis for Chemotherapy-Induced Nausea and Vomiting in Highly and Moderately Emetogenic Chemotherapy: The SHEILD Study
Dexamethasone-Sparing Antiemetic Prophylaxis for Chemotherapy-Induced Nausea and Vomiting in Highly and Moderately Emetogenic Chemotherapy: The SHEILD Study Open
This dexamethasone-sparing Generic NEPA regimen showed remarkable efficacy in CINV management for HEC/MEC regimen-receiving patients, maintaining high response rates in both acute and delayed across all cycles. These findings indicate a po…
View article: Machine Learning approach to fix Routing Problems in IoT Networks
Machine Learning approach to fix Routing Problems in IoT Networks Open
The Internet of things, an outstanding scientific technology in the current computational society, is usually made of intelligent electronic gadgets and sensing devices. IoT focuses on the interaction and communication of objects to extrac…
View article: An Efficient Multilevel Thresholding Scheme for Heart Image Segmentation Using a Hybrid Generalized Adversarial Network
An Efficient Multilevel Thresholding Scheme for Heart Image Segmentation Using a Hybrid Generalized Adversarial Network Open
Most people worldwide, irrespective of their age, are suffering from massive cardiac arrest. To detect heart attacks early, many researchers worked on the clinical datasets collected from different open-source datasets like PubMed and UCI …
View article: Design of a fingerprint template protection scheme using elliptical structures
Design of a fingerprint template protection scheme using elliptical structures Open
View article: Efficient steganalysis using convolutional auto encoder network to ensure original image quality
Efficient steganalysis using convolutional auto encoder network to ensure original image quality Open
Steganalysis is the process of analyzing and predicting the presence of hidden information in images. Steganalysis would be most useful to predict whether the received images contain useful information. However, it is more difficult to pre…
View article: Prediction of Covid-19 Outbreak in India by Employing Epidemiological Models
Prediction of Covid-19 Outbreak in India by Employing Epidemiological Models Open
The novel Corona virus (Covid-19) pandemic has frightened an unprecedented challenge to continents. The Covid-19 pandemic is a highly contagious viral disease that has been progressing across the globe. The global thought leaders, doctors,…
View article: Breast cancer detection by leveraging Machine Learning
Breast cancer detection by leveraging Machine Learning Open
View article: A Rare Presentation of Platypnea and Orthodeoxia Due to Reverse Shunting of Blood Through Patent Foramen Ovale
A Rare Presentation of Platypnea and Orthodeoxia Due to Reverse Shunting of Blood Through Patent Foramen Ovale Open
View article: Fostering Employability - Synergy between Industry and Academia
Fostering Employability - Synergy between Industry and Academia Open
View article: An Experimental Analysis of the Applications of Datamining Methods on Bigdata
An Experimental Analysis of the Applications of Datamining Methods on Bigdata Open
Data mining is a procedure of separating covered up, obscure, however possibly valuable data from gigantic data. Huge Data impactsly affects logical disclosures and worth creation. Data mining (DM) with Big Data has been broadly utiliz…
View article: Security Challenges Associated with Big Data in Health Care System
Security Challenges Associated with Big Data in Health Care System Open
The way organisations handle, evaluate and leverage information in any sector has essentially altered with big data. Healthcare is one of the most promising fields where big data can be used to create a change. In this paper, as applied to…
View article: Formulation of Control Strategies for IoT Task Scheduling
Formulation of Control Strategies for IoT Task Scheduling Open
The various Internets of Things (IoT) application tasks are difficult to schedule due to heterogeneity properties of IoT. So an efficient algorithm is required that forms < task, processor> pair appropriately. This paper presents a more se…
View article: Effective Data Analytics on Opinion Mining
Effective Data Analytics on Opinion Mining Open
Over the extent of the most recent couple of years, in setting on the augmentation being utilized Internet, bit of client's opinion has stretched out that has led to the growth in motivation towards opinion mining. Opinion Mining is fundam…
View article: Big Data Analytics With Reference To Wide Variety of Domains
Big Data Analytics With Reference To Wide Variety of Domains Open
In the current day scenario, a huge amount of data is been generated from various heterogeneous sources like social networks, business apps, government sector, marketing, health care system, sensors, machine log data which is created at su…
View article: Automated Irrigation System for Agriculture
Automated Irrigation System for Agriculture Open
About 70% of Indian population does the farming, and hence the Research and Development in this area is very much needed. This article presents a beginner model of an irrigation system to increase agricultural productivity and quality. The…
View article: Performance of Aspect-Oriented Software Quality Modelling using Artificial Neural Network Technique
Performance of Aspect-Oriented Software Quality Modelling using Artificial Neural Network Technique Open
An exact estimation is the key focus of any prediction model.Software quality is one of the basic research issue for software organizations.Of late, different uses of soft computing techniques has been endeavored.This has been conceivable …
View article: Defect Prediction Model for AOP-based Software Development using Hybrid Fuzzy C-Means with Genetic Algorithm and K-Nearest Neighbors Classifier
Defect Prediction Model for AOP-based Software Development using Hybrid Fuzzy C-Means with Genetic Algorithm and K-Nearest Neighbors Classifier Open
The number of defects has often been considered a vital indicator of quality of software.It is well known that we cannot go back and add quality.Software Quality and reliability are considered to be one of the most important concerns of so…