V. Subedha
YOU?
Author Swipe
View article: Gesture Language Recognition Through Computer Vision and a Spatial-Temporal Mathematical Model
Gesture Language Recognition Through Computer Vision and a Spatial-Temporal Mathematical Model Open
For people with speech and hearing impairments, sign language is a vital form of communication that allows them to communicate and en-gage with others. Nonetheless, a major obstacle is the general public's limited comprehension of sign la…
View article: A smart irrigation monitoring service using wireless sensor networks
A smart irrigation monitoring service using wireless sensor networks Open
The present research uses wireless sensor networks (WSN) to create a smart watering system. The system’s ability to perform real-time monitoring and management of irrigation makes sure that crops get the right quantity of water depending o…
View article: Detection and Predicting Air Pollution Level in a Specific City using Deep Learning
Detection and Predicting Air Pollution Level in a Specific City using Deep Learning Open
Air pollution affects millions of people worldwide, making it a growing issue. Deep learning can identify and forecast metropolitan air pollution. Deep learning needs a massive dataset of air quality measurements and meteorological factors…
View article: A Smart Irrigation Monitoring Service Using Wireless Sensor Networks
A Smart Irrigation Monitoring Service Using Wireless Sensor Networks Open
This research introduces a Smart Watering System powered by Wireless Sensor Networks (WSN) for precision agriculture. The system utilizes real-time monitoring and irrigation management to provide crops with the right amount of water based …
View article: Minimum Latency-Secure Key Transmission for Cloud-Based Internet of Vehicles Using Reinforcement Learning
Minimum Latency-Secure Key Transmission for Cloud-Based Internet of Vehicles Using Reinforcement Learning Open
The Internet of Vehicles (IoV) communication key management level controls the confidentiality and security of its data, which may withstand user identity-based attacks such as electronic spoofing. The IoV group’s key is updated with a def…
View article: Product Review Based on Machine Learning Algorithms
Product Review Based on Machine Learning Algorithms Open
The purchase of products or administrations through an electronic trade called web based shopping over internet using a web browser. Online Product surveys are significant for up and coming purchasers in helping them decide. To this end, d…
View article: Local Bus Transport Tracking using Android Applications
Local Bus Transport Tracking using Android Applications Open
Local bus transport tracking is a live monitoring system by this application we can track local buses time to time and users can follow schedule and timings for buses. The proposed tool has potential to assist live monitoring using the cur…
View article: A novel approach-foot tumour detection algorithm using watershed and thresholding based segmentation.
A novel approach-foot tumour detection algorithm using watershed and thresholding based segmentation. Open
Detection of foot tumour has always been a little tedious as it is generally confounded with other diseases of the foot. Hence, the method of detecting foot tumour is of utmost importance. Though image processing techniques have replaced t…
View article: Early Detection of Dementia by Observing Change in the Driving Pattern of a Person using Smart Phone Sensors and DTW Algorithm
Early Detection of Dementia by Observing Change in the Driving Pattern of a Person using Smart Phone Sensors and DTW Algorithm Open
The word dementia describes a set of symptoms that could contain recollection defeat and difficulties alongside thinking, problem-solving or language.Dementia is provoked after the mind is broken by illnesses, such as Alzheimer's illness o…