Skip to main content

Page of 3
and
  1. No Access

    Article

    RETRACTED ARTICLE: Analysing the User Actions and Location for Identifying Online Scam in Internet Banking on Cloud

    Arokia Jesu Prabhu Lazar, Sudhakar Sengan in Wireless Personal Communications (2022)

  2. Article

    Predicting image credibility in fake news over social media using multi-modal approach

    Social media are the main contributors to spreading fake images. Fake images are manipulated images altered through software or by other means to change the information they convey. Fake images propagated over...

    Bhuvanesh Singh, Dilip Kumar Sharma in Neural Computing and Applications (2022)

  3. No Access

    Article

    Encrypted Network Traffic Classification and Resource Allocation with Deep Learning in Software Defined Network

    The climate has changed absolutely in every area in just a few years as digitized, making high-speed internet service a significant need in the future. Future Internet is supposed to face exponential growth in...

    Roy Setiawan, Ramakoteswara Rao Ganga, Priya Velayutham in Wireless Personal Communications (2022)

  4. No Access

    Article

    Biological Feature Selection and Classification Techniques for Intrusion Detection on BAT

    Privacy is a significant problem in communications networks. As a factor, trustworthy knowledge sharing in computer networks is essential. Intrusion Detection Systems consist of security tools frequently used ...

    Satheesh Narayanasami, Sudhakar Sengan, Saira Khurram in Wireless Personal Communications (2022)

  5. No Access

    Article

    An Enhanced Trust-Based Kalman Filter Route Optimization Technique for Wireless Sensor Networks

    Wireless Sensor Networks are generally employed for observing and monitoring specific environments. WSNs are made from a huge amount of low-cost sensor nodes separated and distributed in different environments...

    Satheesh Narayanasami, Rajasekhar Butta in Wireless Personal Communications (2022)

  6. No Access

    Article

    A contemporary combined approach for query expansion

    The use of an automatic query expansion technique is to enhance the performance of the Information Retrieval System. Selecting the candidate terms for query expansion is an essential task to make query more pr...

    Dilip Kumar Sharma, Rajendra Pamula, D. S. Chauhan in Multimedia Tools and Applications (2022)

  7. No Access

    Article

    IoT Based Virtual E-Learning System for Sustainable Development of Smart Cities

    Globally, cities are emerging into Smart Cities (SC) as a result of sustainable cities and the adaption of recent Internet of Things (IoT) technology. It is becoming essential to involve students in sustainabi...

    Roy Setiawan, Maria Manuel Vianny Devadass, Regin Rajan in Journal of Grid Computing (2022)

  8. No Access

    Chapter and Conference Paper

    Advanced Smart Gloves for Physically Disabled Persons Using LABVIEW

    People with disabilities like deaf and dumb will find it challenging to communicate with ordinary people; there are various causes for these disabilities, we aim to overcome this issue. The proposed system con...

    P. M. Balasubramaniam, B. Bizu in Innovations in Computer Science and Engine… (2022)

  9. No Access

    Chapter and Conference Paper

    The Role of Artificial Intelligence and Data Science Against COVID-19

    Today, a massive outbreak of a deadly virus has challenged humanity in each aspect; we deemed ourselves powerful. Millions of people are at risk, and in some cases, even if the person has reported negative, it...

    Saumya Tripathi, Dilip Kumar Sharma in Emerging Technologies for Computing, Commu… (2022)

  10. No Access

    Chapter and Conference Paper

    Design of Automotive Accident-Avoidance System at Speed Limit Zone Using GPS

    The majority of accidents are happening due to a lack of prior information about the driver. Sometimes, drivers are distracted inherently, which causes significant road accidents on the highway speed limit zon...

    P. M. Balasubramaniam, N. Satheesh in Innovations in Computer Science and Engine… (2022)

  11. No Access

    Chapter and Conference Paper

    Detecting Image Forgery Over Social Media Using Residual Neural Network

    Social media have earned fame for consuming the news due to their quick proliferation and availability. However, they are also the main contributor in spreading fake news. Fake images spread over microblogging...

    Bhuvanesh Singh, Dilip Kumar Sharma in International Conference on Artificial Int… (2022)

  12. No Access

    Chapter and Conference Paper

    FFV: Facial Feature Vector Image Dataset with Facial Feature Analysis and Feature Ranking

    Thousands of faces can be remembered by a single individual. Faces with diverse shapes, sizes, and colors might be recalled. People are distinguished from one another by their face form and color, which makes ...

    Anand Singh Jalal, Dilip Kumar Sharma in Smart Intelligent Computing and Applicatio… (2022)

  13. No Access

    Chapter and Conference Paper

    Content-Based Image Retrieval (CBIR): A Review

    This paper gives an overview of various CBIR (Content-Based Image Retrieval) Techniques. CBIR is a system that utilizes different image features, like texture, color, and shape information, to fetch different ...

    Deepti Agrawal, Apurva Agarwal, Dilip Kumar Sharma in Recent Innovations in Computing (2022)

  14. No Access

    Chapter and Conference Paper

    Survey on Sentiment Analysis for Mix Code Text

    Sentiment analysis is difficult nowadays when we collect data from social media sites as people from every walk of life come there and write their opinion about various things. Social media is very powerful, b...

    Rahul Pradhan, Dilip Kumar Sharma in International Conference on Artificial Int… (2022)

  15. No Access

    Chapter and Conference Paper

    Novel Approximation Booths Multipliers for Error Recovery of Data-Driven Using Machine Learning

    The multiplier is a primary function of the circuit that is frequently used in Digital Signal Processing. Estimated circuits were investigated for better efficiency/lower power consumption but are still troubl...

    Sudhakar Sengan, Osamah Ibrahim Khalaf in Emerging Technology Trends in Internet of … (2022)

  16. No Access

    Chapter and Conference Paper

    Hybrid Feature Selection Method for Binary and Multi-class High Dimension Data

    We have proposed a hybrid feature selection method that combines the filter-based feature selection and ensemble learning-based wrapper feature selection method. The proposed method extracts the strengths of b...

    Ravi Prakash Varshney, Dilip Kumar Sharma in Proceedings of Data Analytics and Management (2022)

  17. No Access

    Chapter and Conference Paper

    Design of Dual-Stack, Tunneling, and Translation Approaches for Blockchain-IPv6

    The most current edition of the Internet protocol is IPv6 (IP). Because once compared to IPv4 and IPv6 has a series of benefits of more efficient packet processing. With each day, IPv4 addresses should become ...

    Srihari Varma Mantena, S. Jayasundar in Intelligent Systems and Sustainable Comput… (2022)

  18. No Access

    Chapter and Conference Paper

    Comparative Analysis of Term Extraction and Selection Techniques for Query Reformulation Using PRF

    Query reformulation (QR) is the process to make initial query exact by generating more significant terms. Term extraction and selection are one of the techniques of it. QR eliminates irrelevant and repetitive ...

    Vishal Gupta, Dilip Kumar Sharma in Emergent Converging Technologies and Biome… (2022)

  19. No Access

    Article

    Securing data in transit using data-in-transit defender architecture for cloud communication

    The advent of cloud infrastructure in which third-party cloud services may retain sensitive consumer and company data in storage environments underlines the need to advocate for encryption and multi-tenant sha...

    Keerthana Nandakumar, Viji Vinod, Syed Musthafa Akbar Batcha in Soft Computing (2021)

  20. No Access

    Article

    Multilabel land cover aerial image classification using convolutional neural networks

    Classifying the remote sensing images requires a deeper understanding of remote sensing imagery, machine learning classification algorithms, and a profound insight into satellite images’ know-how properties. I...

    Razia Sulthana Abdul Kareem, Anil Gandhudi Raman**eyulu in Arabian Journal of Geosciences (2021)

Page of 3