Zobrazeno 1 - 10
of 100
pro vyhledávání: '"S. Kuppuswami"'
Autor:
K.S. Kalaivani, S. Kuppuswami
Publikováno v:
Bulletin of the Polish Academy of Sciences: Technical Sciences, Vol 67, Iss No. 2, Pp 339-347 (2019)
An automatic analysis of product reviews requires deep understanding of the natural language text by machine. The limitation of bag-of-words (BoW) model is that a large amount of word relation information from the original sentence is lost and the wo
Externí odkaz:
https://doaj.org/article/ad66a5fef9db4c788039f352a4c886be
Publikováno v:
International Journal of Computational Intelligence Systems, Vol 4, Iss 5 (2011)
Genetic Algorithms are efficient search and optimization techniques inspired by natural evolution. To show the difficulties in solving constrained optimization problems through GA, the 0/1 knapsack problem with user specific object preferences has be
Externí odkaz:
https://doaj.org/article/82328fdf53da4d66bdc17cc804052de2
Publikováno v:
Materials Today: Proceedings. 81:694-699
Routing protocol for Low Power Lossy Network (RPL) is a proactive network layer routing protocol. It is suitable for Internet of Things (IoT). It is also a source routing protocol. It works by creating a tree based network topology called Directed Ac
Publikováno v:
The Journal of Supercomputing. 79:6825-6848
Publikováno v:
2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA).
Publikováno v:
Computer Networks. 218:109391
Publikováno v:
Mobile Computing and Sustainable Informatics ISBN: 9789811618659
Internet of things is a group of objects or devices that establish communication through Internet. Since, the communication is through Internet, more processing power is required in the devices. The IoT devices are heterogeneous and energy constraine
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0aea4e65a1ff149373cdedbab0df76ac
https://doi.org/10.1007/978-981-16-1866-6_65
https://doi.org/10.1007/978-981-16-1866-6_65
Publikováno v:
Cybernetics and Information Technologies. 18:61-74
Cryptographic protocols are the backbone of information security. Unfortunately the security of several important components of these protocols can be neglected. This causes violation of personal privacy and threats to democracy. Integration of biome
Autor:
D. Saranya, S. Kuppuswami
Publikováno v:
Journal of Computational and Theoretical Nanoscience. 15:1774-1778
Publikováno v:
2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW).
Throughput and fairness performance of transmission control protocol (TCP) worsens critically under vehicular environment due to its weakly bounded congestion threshold parameter, rate reduction approach and congestion recovery algorithm. In this pap