Zobrazeno 1 - 10
of 389
pro vyhledávání: '"Muniyandy"'
Autor:
Lenka Čepová, Muniyandy Elangovan, Janjhyam Venkata Naga Ramesh, Mandeep Kaur Chohan, Amit Verma, Faruq Mohammad
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-15 (2024)
Abstract In therapeutic diagnostics, early diagnosis and monitoring of heart disease is dependent on fast time-series MRI data processing. Robust encryption techniques are necessary to guarantee patient confidentiality. While deep learning (DL) algor
Externí odkaz:
https://doaj.org/article/7dbaa96be2d343968126071313c2906d
Publikováno v:
Frontiers in Mechanical Engineering, Vol 10 (2024)
The tribomechanical characteristics of diamond-like carbon (DLC) coatings are notably superior to other hard coatings, making them highly desirable for industrial applications. This study focuses on the synthesis of nitrogen-doped DLC (N-DLC) films t
Externí odkaz:
https://doaj.org/article/890e44ebbc6c4b3fa3cf05bf55f55d68
Publikováno v:
Frontiers in Mechanical Engineering, Vol 10 (2024)
The current research examines the effectiveness of cryogenically treated (CT) tungsten carbide cutting inserts on Custom450 stainless steel using multi-objective soft computing approaches. The Taguchi-based L27 orthogonal array was employed in the ex
Externí odkaz:
https://doaj.org/article/b53ad97a43ac4a249c57685b022a9656
Publikováno v:
IEEE Access, Vol 11, Pp 128875-128885 (2023)
Today, there is a great need for 3D instance segmentation, which has several uses in robotics and augmented reality. Unlike projective observations like 2D photographs, 3D models offer a metric reconstruction of the sceneries without occlusion or sca
Externí odkaz:
https://doaj.org/article/3e5bef6396bc44958c0f369c8f15e0b2
Publikováno v:
Mathematics, Vol 11, Iss 19, p 4132 (2023)
Cryptography is a pivotal application of graph theory in ensuring secure communication systems. Modern cryptography is deeply rooted in mathematical theory and computer science practices. It is widely recognized that encryption and decryption process
Externí odkaz:
https://doaj.org/article/86c6429e4ca64dc4a450317547d7fca0
Autor:
Tharmalingam Gunasekar, Jothivelu Thiravidarani, Miroslav Mahdal, Prabakaran Raghavendran, Arikrishnan Venkatesan, Muniyandy Elangovan
Publikováno v:
Mathematics, Vol 11, Iss 17, p 3734 (2023)
This manuscript aims to investigate the existence and uniqueness of fuzzy mild solutions for non-local impulsive neutral functional differential equations of both first and second order, incorporating finite delay. Furthermore, the study explores the
Externí odkaz:
https://doaj.org/article/c17c685e3af64a70bae04ba05a9cc738
Autor:
Allam Balaram, Rajendiran Babu, Miroslav Mahdal, Dowlath Fathima, Neeraj Panwar, Janjhyam Venkata Naga Ramesh, Muniyandy Elangovan
Publikováno v:
Sensors, Vol 23, Iss 17, p 7485 (2023)
Wireless sensor networks (WSNs) enable communication among sensor nodes and require efficient energy management for optimal operation under various conditions. Key challenges include maximizing network lifetime, coverage area, and effective data aggr
Externí odkaz:
https://doaj.org/article/a24c1aaa585349109d3c3891916f7542
Autor:
P. S. Ramesh, P. Srivani, Miroslav Mahdal, Lingala Sivaranjani, Shafiqul Abidin, Shivakumar Kagi, Muniyandy Elangovan
Publikováno v:
Sensors, Vol 23, Iss 14, p 6639 (2023)
The cluster technique involves the creation of clusters and the selection of a cluster head (CH), which connects sensor nodes, known as cluster members (CM), to the CH. The CH receives data from the CM and collects data from sensor nodes, removing un
Externí odkaz:
https://doaj.org/article/d9f89388164c48bba150f43935a5f371
Autor:
Mathias Vijay Albert William, Subramanian Ramesh, Robert Cep, Siva Kumar Mahalingam, Muniyandy Elangovan
Publikováno v:
Applied Sciences, Vol 13, Iss 14, p 8206 (2023)
The selection of an appropriate number of features and their combinations will play a major role in improving the learning accuracy, computation cost, and understanding of machine learning models. In this present work, 22 gray-level co-occurrence mat
Externí odkaz:
https://doaj.org/article/3f64851134124295b2ae25ef7e70ad94
Autor:
Shanmugam Jagan, Ashish Ashish, Miroslav Mahdal, Kenneth Ruth Isabels, Jyoti Dhanke, Parita Jain, Muniyandy Elangovan
Publikováno v:
Mathematics, Vol 11, Iss 13, p 2840 (2023)
Botnets pose a real threat to cybersecurity by facilitating criminal activities like malware distribution, attacks involving distributed denial of service, fraud, click fraud, phishing, and theft identification. The methods currently used for botnet
Externí odkaz:
https://doaj.org/article/c5ba9f0e6c074fcb9d608b385e7744e5