Remote Sensing and Decision Support System Applications in Precision Agriculture: Challenges and Possibilities

IM Mehedi, MS Hanif, M Bilal, MT Vellingiri… - IEEE …, 2024 - ieeexplore.ieee.org
As the world's population rises, there will be a greater need for food, which will have
repercussions on the environment and on crop yields. Increased production, efficient …

Women Entrepreneurship Index Prediction Model with Automated Statistical Analysis.

V Saikumari, V Sunitha - Intelligent Automation & Soft …, 2023 - search.ebscohost.com
Recently, gender equality and women's entrepreneurship have gained considerable
attention in global economic development. Prior to the design of any policy interventions to …

A strong authentication for fortifying wireless healthcare sensor network using elliptical curve cryptography

D Prabakaran, K Sheela - 2021 IEEE Mysore Sub Section …, 2021 - ieeexplore.ieee.org
The wireless sensor network is the emerging technology with spatially placed electronic
sensors to measure the vital parameters. The necessity of monitoring the patient” s critical …

Hierarchical Model Rule Based Nlp for Semantic Training Representation Using Multi Level Structures

F Liu, Q Bian - Informatica, 2024 - informatica.si
During evaluation of large amounts of natural language texts, the utilisation of multi-level
models is essential for the purpose of extracting knowledge that is relevant. It is essential to …

A Novel Deep Reinforcement Learning (DRL) Method for Detecting Evasion Attack in Iot Environment

S Ramachandran, D Prabakaran - … International Conference on …, 2024 - ieeexplore.ieee.org
The growing prevalence of Internet of Things (IoT) devices being connected to the internet
has resulted in an increase in security concerns, particularly concerning evasion attacks …

Secure Key Generation from Speech signal Using Enhanced MFCC Algorithm

S Ramachandran - 2021 IEEE International Conference on …, 2021 - ieeexplore.ieee.org
Authentication is the crucial process of verifying and permitting the right user to access cloud
services. The cloud service security proves to be fragile by the brute force efforts of hackers …

[PDF][PDF] Analysis of Socio-Economic Status and Psychological Factors Potential of the Playing Ability of School Boys of Indian Schools in Oman

L Mohandass, T Parasuraman - irjms.com
Students' playing skill is significantly impacted by their socioeconomic status. Someone's or
a group's socioeconomic standing is determined by factors such as his or her level of …

Security and Privacy Provocation of Data in Cloud Computing

D Prabakaran, KS Kumar… - Privacy and Security …, 2022 - taylorfrancis.com
Cloud computing is an on-demand resource sharing paradigm that serves users through
Internet. The resource sharing extends from data to computing infrastructure resources. The …

[引用][C] A fuzzy based efficient and blockchain oriented secured routing in vehicular Ad-Hoc networks

NG Praveena, SS Nath - Iranian …, 2024 - University of Sistan and Baluchestan