Zobrazeno 1 - 10
of 95
pro vyhledávání: '"R Eswari"'
Autor:
Suresh Pavithra, Sundaramurthy Nandakumar, Gajula Shivashankarappa Prathima, Muthukrishnan Kavitha, R Eswari
Publikováno v:
Journal of Clinical and Diagnostic Research, Vol 17, Iss 09, Pp 06-09 (2023)
Introduction: Fear of the unknown causes anxiety in paediatric patients. The use of tell-show-do, along with audiovisual distraction, promotes positive behaviour and reduces anxiety. The use of a Dental Operating Microscope (DOM) as a visual dist
Externí odkaz:
https://doaj.org/article/8d57f1683495412688677d89b1a123e8
Autor:
R Eswari, G S Prathima, A Sanguida, Meena Ramanathan, Ananda Balayogi Bhavanani, E Harikrishnan
Publikováno v:
Yoga-Mimamsa, Vol 51, Iss 2, Pp 43-47 (2019)
Background: Children with autism spectrum disorder (ASD) exhibit poor oral health due to lack of manual dexterity. Regular training methods such as visual pedagogy and video modeling (VM) for developing the skill of toothbrushing do not address the c
Externí odkaz:
https://doaj.org/article/bafc35b2bbc043bd8e89dce918a41e89
Publikováno v:
Peer-to-Peer Networking and Applications. 15:2390-2403
Publikováno v:
International Journal of Cloud Applications and Computing. 12:1-15
The Internet of Things (IoT) has become a part of our everyday life. Due to limited storage and computational capabilities, data collected by IoT devices outsource to cloud servers. Although cloud servers provide many benefits, confidentiality and au
Publikováno v:
2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT).
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
S. P. Ramya, R. Eswari
Publikováno v:
International Journal of Cognitive Informatics and Natural Intelligence. 15:1-25
Automatic fake news detection is a challenging problem in deception detection. While evaluating the performance of deep learning-based models, if all the models are giving higher accuracy on a test dataset, it will make it harder to validate the perf
Recently, attackers are obfuscating the parts of malware attack code using steganography to carry malicious JavaScript and even to deliver cryptominers. Stegware is one of the types among information hiding malware attacks that uses steganography to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::53f97e0ef6315396bcd149b284d42a4b
https://doi.org/10.21203/rs.3.rs-613020/v1
https://doi.org/10.21203/rs.3.rs-613020/v1
Autor:
R. Eswari, Nithiya Baskaran
Publikováno v:
Journal of Organizational and End User Computing. 33:153-179
A cloud data center is established to meet the storage demand due to the rate of growth of data. The inefficient use of resources causes an enormous amount of power consumption in data centers. In this paper, a fuzzy soft set-based virtual machine (F