Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Vijayan Ramaraj"'
Publikováno v:
Journal of Information Systems Engineering and Business Intelligence, Vol 10, Iss 1, Pp 70-80 (2024)
Background: The field of clinical or medical imaging is beginning to experience significant advancements in recent years. Various medical imaging methods such as computed tomography (CT), X-radiation (X-ray), and magnetic resonance imaging (MRI) prod
Externí odkaz:
https://doaj.org/article/b0b19cec32ac4edd876f7159ea03917f
Autor:
Mareeswari Venkatachala Appa Swamy, Jayalakshmi Periyasamy, Muthamilselvan Thangavel, Surbhi B. Khan, Ahlam Almusharraf, Prasanna Santhanam, Vijayan Ramaraj, Mahmoud Elsisi
Publikováno v:
Diagnostics, Vol 13, Iss 11, p 1942 (2023)
With the rapidly increasing reliance on advances in IoT, we persist towards pushing technology to new heights. From ordering food online to gene editing-based personalized healthcare, disruptive technologies like ML and AI continue to grow beyond our
Externí odkaz:
https://doaj.org/article/b7e56f0065bf478b8efa55989c3ba9d0
Autor:
Elsisi, Mareeswari Venkatachala Appa Swamy, Jayalakshmi Periyasamy, Muthamilselvan Thangavel, Surbhi B. Khan, Ahlam Almusharraf, Prasanna Santhanam, Vijayan Ramaraj, Mahmoud
Publikováno v:
Diagnostics; Volume 13; Issue 11; Pages: 1942
With the rapidly increasing reliance on advances in IoT, we persist towards pushing technology to new heights. From ordering food online to gene editing-based personalized healthcare, disruptive technologies like ML and AI continue to grow beyond our
Publikováno v:
Recent Patents on Computer Science. 12:34-40
Background: In many modern applications, information filtering is now used that exposes users to a collection of data. In such systems, the users are provided with recommended items’ list they might prefer or predict the rate that they might prefer
Autor:
N. Jeyanthi, Vijayan Ramaraj
Publikováno v:
International Journal of Signal and Imaging Systems Engineering. 10:31
Mobile ad-hoc network is one of the most effective self-configuring and infrastructure less based communication networks. During the communication process, trust between the networks is placed an important issue due to the intermediate attacks. Sever