Zobrazeno 1 - 10
of 35
pro vyhledávání: '"J. Jeyasudha"'
Publikováno v:
AI-Enabled Social Robotics in Human Care Services ISBN: 9781668481714
Due to the development of industrial 5.0 concepts, the integration of multi-disciplinary concepts is evolving in the manufacturing industries. In this chapter, the integration of robot technology with additive manufacturing processes is discussed to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9636abd19d57c55b7d76997a39a48c13
https://doi.org/10.4018/978-1-6684-8171-4.ch010
https://doi.org/10.4018/978-1-6684-8171-4.ch010
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
J. Jeyasudha, G. Usha
Publikováno v:
PROCEEDING OF INTERNATIONAL CONFERENCE ON ENERGY, MANUFACTURE, ADVANCED MATERIAL AND MECHATRONICS 2021.
Publikováno v:
2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon).
Autor:
B. Jothi, J. Jeyasudha
Publikováno v:
2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon).
Publikováno v:
SN Computer Science. 3
Twitter has become a popular platform to receive daily updates. The more the people rely on it, the more critical it becomes to get genuine information out. False information can easily be shared on Twitter, which influences people's feelings, especi
Autor:
J. Jeyasudha, G. Usha
Publikováno v:
Wireless Personal Communications. 127:1283-1309
With an advent of social networks, spamming has posted the most important serious issues among the users. These are termed as influential users who spread the spam messages in the community which has created the social and psychological impact on the
E-learning among 2-year MBBS students in a Government Medical College in South India -- A KAP study.
Publikováno v:
National Journal of Physiology, Pharmacy & Pharmacology; 2023, Vol. 13 Issue 3, p494-498, 5p
Publikováno v:
Journal of Computational and Theoretical Nanoscience. 15:3034-3036
Autor:
G. Usha, J. Jeyasudha
Publikováno v:
2018 3rd International Conference on Inventive Computation Technologies (ICICT).
Reconnaissance phase is where attackers identify their targets and how to collect information from professional social networks which can be used to select and exploit targeted employees to penetrate in an organization. Here, a framework is proposed