Skip to main content

and
  1. No Access

    Article

    Two-ways chip to chip communications through 2-dimensional photonic structures via photonic integrated circuit

    In this study, two-dimensional photonic structures (triangular, square, and honeycomb) are used to realise chip-to-chip communications in two ways. The transportation of signals from one chip to another is qui...

    S. A. Sivakumar, R. Naveen, S. Jafar Ali Ibrahim in Optical and Quantum Electronics (2023)

  2. No Access

    Article

    Synthesized feature learning model on news aggregator for chatbot

    The introduction of Deep learning over Shallow Learning has powered machines in the current era. The Conversational Software Agent (often referred to as a Chatbot) employs deep learning techniques to behave li...

    Prince Verma, Kiran Jyoti, Varsha Sahni, S. Jafar Ali Ibrahim in Soft Computing (2023)

  3. No Access

    Chapter and Conference Paper

    Performance Augmentation of DIMOS Transistor

    In this study, the source region of a partially depleted PD SOI n-MOSFET has a high peak-to-valley ratio tunnel diode buried within it. In the MOSFET source region, intrinsic germanium is added at various micr...

    S. Jafar Ali Ibrahim, V. Jeya Kumar in Intelligent Data Engineering and Analytics (2023)

  4. No Access

    Chapter

    Estimating the Risk of Diabetes Using Association Rule Mining Based on Clustering

    Association rule is a well known and simple strategy for finding relations between information in a huge informational collection. Association rule summarization is used to deliver an enormous arrangement of r...

    N. Senthamarai, M. Sathya in Image Based Computing for Food and Health … (2023)

  5. No Access

    Chapter and Conference Paper

    Detection of Parkinson’s Disease in Brain MRI Images Using Deep Learning Algorithms

    A neurological illness called Parkinson’s disease usually affects elderly persons. Dopamine is produced by neurons in the Substantia Nigra area and is depleted in Parkinson's disease. Movement is impacted by t...

    N. S. Kalyan Chakravarthy, Ch. Hima Bindu in Evolution in Computational Intelligence (2023)

  6. No Access

    Chapter and Conference Paper

    SVM-Based Cloning and Jamming Attack Detection in IoT Sensor Networks

    Internet of things (IoT) devices are susceptible to numerous safety intimidations because of their limited features and abilities. In IoT, the wireless communications are generally shown intermittently amongst...

    M. Jeyaselvi, M. Sathya, S. Suchitra in Advances in Information Communication Tech… (2022)

  7. No Access

    Article

    Prediction of Novel Drugs and Diseases for Hepatocellular Carcinoma Based on Multi-Source Simulated Annealing Based Random Walk

    Computational techniques for foreseeing drug-disease associations by means of incorporating gene expression as well as biological network give high intuitions to the composite associations amongst targets, dru...

    S. Jafar Ali Ibrahim, M. Thangamani in Journal of Medical Systems (2018)